EDEN – Data Protection in Policing

The conference will provide an opportunity to discussion and comparison on related aspects to the human factor in data protection personalities, now increasingly coveted relevant.
Security and Intelligence: new threats

Speakers: Antonino Vaccaro, Corrado Giustozzi, Fabio Sammartino, Lior Tabansky, Mirco Marchetti, Gabriele Carrer.
XIV LEGAL INFORMATICS CONFERENCE IN MEMORY OF ROMANO ONEDA

Calcŭlo ergo sum What is artificial intelligence and how it is regulated Respecting a tradition that is renewed since the first edition, we will be once again among the speakers of the beautiful Conference of Legal Informatics of the College Ghislieri of Pavia, now in its sixteenth edition and entitled this year to the memory […]
RADIO 24 – With Enrico Pagliarini – Electronics and recycling – TV and viewing distance – Antivirus made in Italy

Comment on the discussion going on in our country on the necessity and advisability of having IT security products such as antivirus developed in Italy.
ANSA Conference: AI, war and cyberwar

Humanity augmented by artificial intelligence The IV edition of the annual event dedicated to AI.
Security Summit Milan 2022 – Streaming edition

Third-party security and compliance risk We talked about supply chain security, processes and technologies.
Business continuity, resilience, sustainability

What may not have been said Tools for implementing resilience in our organisations; methodological approach and certification of management systems. In addition to the chairmen Corrado Miralli, Physical & Cyber Security Manager, Saipem S.p.A. & Chair of BCI Italy Chapter and Alessandro Manfredini, Group Security & Cyber Defence, a2a & Chair of AIPSA, coordinated by SKY’s competent […]
More threats and more regulations for everyone

Serious cyber attacks on the rise, especially in Europe Who are the perpetrators? How is the EU defending its strategic infrastructure?
How to deal with supply security in practice

WEBINAR Cybersecurity & Data Protection More and more often one hears about Supply Chain Security, and companies and public administrations have realised that their degree of security also depends on that of their suppliers. Incidents of course there were. In addition, there are increasing compliance obligations that require the company to control its supply chain. […]
Digital Evidence In The Criminal Process

Cyber Security and Privacy