How to deal with supply security in practice

WEBINAR Cybersecurity & Data Protection More and more often one hears about Supply Chain Security, and companies and public administrations have realised that their degree of security also depends on that of their suppliers. Incidents of course there were. In addition, there are increasing compliance obligations that require the company to control its supply chain. […]
CYBER RISK 2024 – Milan

How you can help companies and public administration to understand the challenges they will face in the months to come. A unique opportunity to raise awareness of the danger, to understand the sources of risk and how attackers operate, and thus to make good choices on how to deploy the limited resources available. The event […]
CYBER RISK 2024 – Rome

How you can help public administration and companies understand the challenges they will face in the months to come. A unique opportunity to raise awareness of the danger, to understand the sources of risk and how attackers operate, and thus to make good choices on how to deploy the limited resources available. The event is […]
Cybersecurity: NIS2 and DORA

YOU MAKE A HOLE IN ONE!

Connectical: One provider for all of your company’s digital services
Digital Evidence In The Criminal Process

Cyber Security and Privacy
CREST SEMINAR

Cyber Risk Evaluation Support Tool Next July 17, at 5 p.m. Fabrizio Cirilli will give a Webinar presentation to our CREST software for risk assessment according to ISO/IEC 27001:2022, distributed in SaaS mode. Free access to CREST will be made available to all participants.
Business Continuity

Preparing for the future: navigating uncertainty with resilience and determination Dealing with topics such as Business Continuity in the ICT world has never been an easy task: beliefs, myths and standards come together in a mix of endless arguments and interpretations. In the document you will then find what is necessary to clarify the possible […]
6 MINUTES to breach your IT infrastructure

Confindustria Belluno, SCP, Margas and CLUSIT advocacy A conference that will demonstrate live what happens during a hacker attack and how cyber criminals manage to get into companies. Most importantly, how to prevent dangerous situations, limit risks and prepare to resume business operations as quickly as possible.
DIGITAL DEFENSE

Innovations and Trends in Cybersecurity