Cyber Crime Conference 2016

Cyber Crime Conference 2016

click photo for more information
Cyber Crime Conference 2016
Si è conclusa con grandissimo successo la 7° edizione della Cyber Crime Conference tenutasi lo scorso 12 Aprile presso il Centro Congressi Roma Aurelia Antica. 937 visitatori, suddivisi nelle due aule parallele, hanno assistito attivamente ai contributi di illustri ospiti e personaggi di altissimo prestigio come l’Onorevole Domenico Rossi, Sottosegretario al Ministero della Difesa, Rita […]
1
38

Si è conclusa con grandissimo successo la 7° edizione della Cyber Crime Conference tenutasi lo scorso 12 Aprile presso il Centro Congressi Roma Aurelia Antica.
937 visitatori, suddivisi nelle due aule parallele, hanno assistito attivamente ai contributi di illustri ospiti e personaggi di altissimo prestigio come l’Onorevole Domenico Rossi, Sottosegretario al Ministero della Difesa, Rita Forsi, Direttore Generale dell’ISCOM del Ministero dello Sviluppo Economico, Roberto Di Legami, Direttore della Polizia Postale e delle Comunicazioni, Silvia Portesi, Network and Information Security – Research and Analysis Expert at ENISA. A moderare i due incontri simultanei: Barbara Carfagna,giornalista di TV7 e Speciale TG1, e Patrizia Licata, giornalista e collaboratrice di Formiche.net.
Nelle tavole rotonde si sono affrontate tematiche attualissime e di estremo interesse: “La rete come arma: la convergenza tra terrorismo e cyber-spazio” e “La cooperazione pubblico-privato tra i SOC e le Istituzioni”.
L’ISIS rappresenta senza ombra di dubbio la principale minaccia terroristica per tutti i Paesi occidentali. Il numero sempre più elevato di cittadini europei coinvolti in azioni terroristiche ha portato da tempo gli esperti del settore a riflettere in modo più attento e approfondito sui metodi e i mezzi utilizzati da questa organizzazione terroristica per radicalizzare e plasmare la mente dei futuri martiri. Ciò soprattutto in considerazione della loro distanza dai territori di radicalizzazione delle dottrine religiose e la loro vicinanza per nascita e per cultura ai principi occidentali. In quest’ambito, uno degli strumenti maggiormente utilizzati ed efficaci, è senza dubbio la rete Internet.
La prima tavola rotonda ha approfondito queste tematiche mettendo a fuoco il ruolo che internet e le tecnologie hanno nella strategia dello Stato Islamico al fine di qualificare al meglio questa minaccia per delineare possibili soluzioni di contenimento.
Nella seconda tavola rotonda, con i nostri interlocutori del mondo istituzionale, dell’impresa privata e dei Security Operation Centers (SOC), si sono approfondite le procedure con le quali i SOC collaborano con le istituzioni e il ruolo che questi centri svolgono nel prevenire e combattere il cyber crimine: case studies, best practices e difficoltà in questo compito cruciale di monitoraggio della sicurezza informatica. In modo particolare è stato approfondito il nodo della privacy, molte volte considerata l’antitesi della security.
Hanno dato il loro contributo scientifico (in ordine alfabetico):
Arije Antinori, CRI.ME LAB “Sapienza” Università di Roma, Dip. di Comunicazione e Ricerca Sociale CORIS; Stefano Bargellini, Safety, Security, Property and Facilities Director at Vodafone Italia; Isabella Corradini, Presidente centro ricerche Themis Crime; Gerardo Costabile, Head of Security & Safety at Fastweb; Giuseppe Di Somma, Presidente Cifit – Criminology International Forensic Investigation Thechnologies; Paolo Dal Checco, consulente informatico forense; Luisa Franchina, Presidente di AIIC; Corrado Giustozzi, Membro del Permanent Stakeholders’ Group di ENISA; Carlo Mauceli, National Technology Officer di Microsoft; Stefano Mele, of Counsel di Carnelutti Studio Legale Associato, Avvocato specializzato in Diritto delle Tecnologie, Privacy, Sicurezza delle informazioni e Intelligence; Alessio Pennasilico, Strategic Security Consultant; Gian Luigi Savioli, responsabile Security Monitoring & Incident Handling per Telecom Italia; Giuseppe Vaciago, Avvocato esperto in diritto penale societario e delle nuove tecnologie; Valerio Vertua,Vice Presidente di CSA Italy e Presidente di Digital Forensics Alumni; Stefano Zanero, Professore associato, Politecnico di Milano.
Numerosi anche gli interventi di aziende operanti nel settore, che hanno profilato scenari ed offerto soluzioni su: protezione delle infrastrutture critiche, accessi privilegiati, machine learning, protezione dalle nuove minacce, sicurezza dei droni, evoluzione tecnologico-criminale, hacking back, botnet, cyber risk management, digital forensics, sicurezza nel cloud e molto altro.
Hanno dato il loro contributo (in ordine alfabetico):
Francesco Armando, Technical Account Manager Qualys Italia; Gianni Baroni, Amministratore Delegato Gruppo Daman; Corrado Broli, Country Manager Italy Darktrace; Michele Fiorilli, Pre-Sales Area Manager DGS; Giovanni Giovannelli, Senior Sales Engineer Sophos Italia; Joseph La Mela, Sales Manager Centro Sud Cyberark; Valerio Pastore, President, Chief Technology Officer e Fondatore di Boole Server; Marcello Romeo, Presales Manager Italy, Intel Security; Marco Zanovello, Program Manager Var Group, Security Team Yarix; Andrea Zapparoli Manzoni, Head of Cyber Security, KPMG Advisory SpA.
Ricordiamo il Patrocinio dell’Agenzia per l’Italia Digitale, del Ministero dello Sviluppo Economico, dell’ISCOM, di ENISA, del CISdell’Università “Sapienza”, del Laboratorio Nazionale di Cyber Security del CINI.

Comments

Write a comment

DeepSec 2016 – When your Firewall turns against you

click photo for more information
DeepSec 2016 – When your Firewall turns against you
This talk, held by René Freingruber and Raschin Tavakoli at DeepSec 2016, will demonstrate how attackers can compromise a company’s network via their firewall system: “It’s a common misbelief that security tools are always secure. The aim of this talk is to show the audience the difference between a secure and a security product. First […]
10
0

[Read] Issues in Maritime Cyber Security For Online

click photo for more information
[Read] Issues in Maritime Cyber Security  For Online
https://sw.pdfbest.xyz/?book=1633915557The world relies on maritime commerce to move exceptionally large portions of goods, services, and people. Collectively this effort comprises the Maritime Transportation System or MTS. A major component of this daunting multi-faceted enterprise are cyber networks, and the infrastructure they control. From the complex programs managing the loading and unloading of containers to waiting […]
7
1

About For Books Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of

click photo for more information
About For Books  Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of
https://micin-seller.blogspot.com/?book=0190276525From North Korea’s recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on military, civilian, and commercial targets have escalated, there is not yet a clear set of ethical guidelines that apply to cyber warfare. […]
1
1

The Honeynet Project Annual Workshop 2016

click photo for more information
The Honeynet Project Annual Workshop 2016
Information Security Trends: Deception, Honeypots, Malware Analysis, Security Visualization, and more!
9
1

SPS Cyber Security

click photo for more information
SPS Cyber Security
Dealing with sensitive information, numerous products, thousands of fall alerts, lack of contacts could slow down your lean and increase the risk of breach. Things could get out of control and all your valuable data incorporating major confidential information gets leaked. THAT is what cyber criminals are looking for. The value that they steal is […]
14
7

Everything You Need to Know: Cyber Security Education Channel

click photo for more information
Everything You Need to Know: Cyber Security Education Channel
My name is Levi and I created the CyberSecurity Education Channel as a place where the average person can come and learn about CyberSecurity Concepts and be entertained while doing it. I have been in the IT industry for the last 12 years in various roles at various organizations. Over the course of my 12 […]
1
6

Cyber Threat Intelligence – the 3 challenges for CISO’s

click photo for more information
Cyber Threat Intelligence – the 3 challenges for CISO’s
Cyber Threat Intelligence is a new practice for many companies and organization. Understand the 3 biggest challenges for CISO’s and VP of Cyber Security Operations when building a Threat Management practice. by Joep Gommers, CEO & Founder of EclecticIQ
3
17

Cyber Crime Conference 2016 Intervista a Andrea Zapparoli Manzoni, Head of Cyber Security, KPMG Advisory SpA

click photo for more information
Cyber Crime Conference 2016 Intervista a Andrea Zapparoli Manzoni, Head of Cyber Security, KPMG Advisory SpA
Titolo Relazione: La funzione del CSIRT (Computer Security Incident Response Team) nel supportare il processo di Cyber Risk Management Abstract: Il processo di Cyber Risk Management va alimentato in tempo reale tramite adeguate fonti di intelligence, relative sia all’esterno che all’interno. Per quanto riguarda il secondo ambito l’apporto informativo del CSIRT, se ben strutturato, è […]
1
21

DeepSec 2016 – Smart Sheriff, Dumb Idea: The Wild West of Government Assisted Parenting

click photo for more information
DeepSec 2016 – Smart Sheriff, Dumb Idea: The Wild West of Government Assisted Parenting
Abraham Aranguren & Fabian Fäßler about their talk, held at DeepSec 2016: “Would you want to let your kids discover the darker corners of the internet without protection? Wouldn’t it be handy to know what they do online, to be alerted when they search for dangerous keywords and to be able to control what websites […]
1
21

Avec le passage à la haute définition, un quart des téléviseurs sera obsolète en 2016

click photo for more information
Avec le passage à la haute définition, un quart des téléviseurs sera obsolète en 2016
Le changement de norme de diffusion devrait entraîner le renouvellement d’un quart des appareils en service en France. Retrouver toutes les infos sur la vidéo sur : http://www.francetvinfo.fr/culture/tv/video-avec-le-passage-a-la-haute-definition-un-quart-des-televiseurs-sera-obsolete-en-2016_820069.html
1
30

How to Get a Job in Cybersecurity: Career Advice

click photo for more information
How to Get a Job in Cybersecurity: Career Advice
Interested in cybersecurity? Not sure what to study or how to prepare? Our Lockheed Martin experts share advice about how to get a cyber job.
7
34

Top Cyber Security Certifications To Get For Defense | SOC IR Hunter

click photo for more information
Top Cyber Security Certifications To Get For Defense | SOC IR Hunter
Follow me on Twitter: https://twitter.com/Valcan_K #Cybersecurity #Hacking #certifications #giveaway ****Giveaway has ended****** Timestamps for the various roles/jobs: SOC Analyst: 01:19 Incident Responder: 04:41 Security Engineer: 07:33 Threat Hunter: 09:41 What’s going on #SecurityNinjas! This is the second video in the “What Cyber Security certs should I get?” For Entry Level Certs Check out this video: […]
1
37

El Mejor Anti Virus Para Tu Android 2016

click photo for more information
El Mejor Anti Virus Para Tu Android 2016
Si Te Gusto El Video Manito Arriva, Suscribite, Coparte El Video Con Tus Amigos!\r\rProximamente Mas Videos, Mejores Videos, y Exitos Para Tds! \r\rComunidad TuAndroidSinLimite! Nada Es Imposible!\r\r\rFELIZ NAVIDAD A TODOS! 😀
1
29

Eidos Congress 2013

click photo for more information
Eidos Congress 2013
The Eidos Institute’s 9th Congress includesd a number of important meetings and presentations with government, industry and university leaders. Congress is an annual event in Australia and Africa – involving high calibre, diverse and influential participants. After nine years it remains a premier networking event for policy and research leaders. Key areas of focus aligned […]
2
35

Steve Zetzer – Cyber Security Seminar May 2014

click photo for more information
Steve Zetzer – Cyber Security Seminar May 2014
15
36

A Look at Global Cyber Threats @ DrupalCamp Ohio 2013

click photo for more information
A Look at Global Cyber Threats @ DrupalCamp Ohio 2013
Peak Security, Inc.
1
30

How can you turn your employees from security threats to allies?

click photo for more information
How can you turn your employees from security threats to allies?
We sat down with Allure CEO Salvatore Stolfo to talk about the current cyber security landscape. Allure Security Technology, Inc. Protect your customers from phishing attacks
1
36

View Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern

click photo for more information
View Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern
Click here to Acces ebook http://yourlifeisgood.club/?book=1597499986 Trial Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure EbookUnlimied ebook acces Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure,full ebook Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power […]
3
32

About For Books Exploding Data: Reclaiming Our Cyber Security in the Digital Age For Kindle

click photo for more information
About For Books  Exploding Data: Reclaiming Our Cyber Security in the Digital Age  For Kindle
https://md.pdfbest.xyz/?book=0802127932none
2
35

9 Key Challenges in Cybersecurity

click photo for more information
9 Key Challenges in Cybersecurity
2
30

Add These Cybersecurity Books to Your Reading List | Story Books

click photo for more information
Add These Cybersecurity Books to Your Reading List | Story Books
👇 All Books Are Below 👇 Cybersecurity story books is a great way to get started in cybersecurity. Not only are they interesting, but very easy to understand to the common reader. This was actually one of the ways I got interested in cybersecurity, reading specific books pertaining to the industry! Books Mentioned: 1) Cybersecurity […]
2
29

Powerful website security software 2016 – TrafficShield

click photo for more information
Powerful website security software 2016 – TrafficShield
Download: http://tinyurl.com/jjwel57 Powerful website security software 2016 – TrafficShield
1
36

Why police support the London Digital Security Centre’s work

click photo for more information
Why police support the London Digital Security Centre’s work
Commander Chris Greany from the City of London Police talks about cyber crime and his support for the work of the London Digital Security Centre to protect businesses. The LDSC has been set up to help better protect micro to medium businesses from cyber risks and threats. It is a joint venture between the Mayor’s […]
2
41

Michael Crawford – Describe Data

click photo for more information
Michael Crawford – Describe Data
Michael Crawford – Describe Data presents at the Instech London ‘Cyber Security & Insurance – The Challenges & Opportunities’ event on 8th October 2018
8
37

Cyber Security and IT security Consulting

click photo for more information
Cyber Security and IT security Consulting
Learn more at http://www.tncc.com/it-security/ Be Safe – Ensure Your Email and Business Information are Protected from the Threats of Cybercrime You hear a lot of news these days about cybercrime. Go online and pull up your favorite news site (because let’s face it, you’re not going to go out and grab a newspaper), and we’re […]
1
37

Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)

click photo for more information
Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security)
Download here http://www.ezbooks.site/?book=1441938915 Data Warehousing and Data Mining Techniques for Cyber Security Advances in Information SecurityDownload Read Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security) PDF OnlineDownload Read Data Warehousing and Data Mining Techniques for Cyber Security (Advances in Information Security) PDF Online Audio BookDownload Read Data Warehousing and Data […]
1
40

Cyber Security – Engin Kirda, Northeastern University

click photo for more information
Cyber Security –  Engin Kirda, Northeastern University
Cyber Security Engin Kirda, Northeastern University Cyber security has emerged as an important, multi-disciplinary research area in the last decade. Strengthening the security and resilience of computer systems has recently become an important security mission for many organizations and nations. In this talk, I plan to give an overview of current cyber security research, and […]
2
35

Stakes of Cyber Strikes & CES Security Systems

click photo for more information
Stakes of Cyber Strikes & CES Security Systems
The Carlos Ghosn Caper takes another turn as Japan has issued an arrest warrant…for his wife. We take another look at this winding case, in addition to a look ahead for trade in the Eurozone with Hilary Fordwich of the British American Business Association. Plus, we take a step over to Europe, where we are […]
2
39

Cyber Security Certifications 2020 | Cyber Security Certification For Beginners | Simplilearn

click photo for more information
Cyber Security Certifications 2020 | Cyber Security Certification For Beginners | Simplilearn
This video on cybersecurity certifications will help you understand the different certifications available for cybersecurity professionals. This video explains the importance of cybersecurity certification and the certifications available in foundations, managerial, and advanced levels. Cybersecurity certifications are provided to an individual who clears the respective certifications’ exam. The certifications hold a very high value in […]
1
38

கொள்ளை போகும் Whats App தகவல்கள் ? ஆபத்துகளை விளக்கும் Cyber Security Analyst Sriram

click photo for more information
கொள்ளை போகும்  Whats App தகவல்கள் ? ஆபத்துகளை விளக்கும் Cyber Security Analyst Sriram
Click the link to get a chance to win Rs 7,00,000 : https://a.a23.in/behindwoods_air Subscribe Now to Behindwoods Ash: https://yt.vu/+behindwoodsash Subscribe – https://goo.gl/oMHseY We will work harder to generate better content. Thank you for your support. Reach 7 crore people at Behindwoods. Click here to advertise: https://goo.gl/a3MgeB For more videos, interviews, reviews & news, go to: […]
2
35
load more posts