[:it]Welcome & Introduction
Ezio Viola, Amministratore Delegato, The Innovation Group[:]
[:it]I trend del Cyber Risk Management: risultati della Survey 2015 TIG – Deloitte su un campione di aziende italiane
Ezio Viola, Amministratore Delegato, The Innovation Group e Stefano Buschi, Cyber Risk Services, Partner, Deloitte[:]
[:it]
Invited speaker:
Francesca Bonora, Head of ICT Security Governance and Fraud Prevention, UniCredit
Roberto Cosa, CSO, Security Director and IS Committee Chairman, H3G
Con la partecipazione di aziende Leader dell’Industria ICT quali:
Elio Molteni, Senior Solution Strategist, CA Technologies
Miguel Suarez, Presales manager Italy&Iberia, Symantec
Gastone Nencini, Country Manager, Trend Micro[:]
[:it]Le nuove frontiere del Cyber Risk management: integrazione con ERM e finanziamento del rischio
Alessandro De Felice, Chief Risk Officer, Prysmian – Presidente ANRA[:]
[:it]
Invited speaker:
Michele Colajanni, Professore, Università di Modena e Reggio Emilia
Stefano Scoccianti, Enterprise Risk Manager, Hera
Mauro Torri, CRO, Italcementi Group
Con la partecipazione di aziende Leader dell’Industria ICT quali:
Marco Casazza, Pre-Sales Team Lead and Sales Systems Engineer, RSA[:]
[:it]Coffee Break e visita all’area espositiva[:]
[:it]“(In)Security of Things – From wearable to SmartGrids… New internetworking with old flaws”
Raoul Brenna , Responsabile della Practice Security and Infrastructures, CEFRIEL – Politecnico di Milano[:]
[:it]
Con la partecipazione di:
Giovanni Signorelli, Responsabile della Sicurezza informatica e compliance, Snam
Con la partecipazione di aziende Leader dell’Industria ICT quali:
Massimo Argenti, Team Lead Enterprise, Forcepoint
Rodolfo Rotondo, Business Solution Strategist, VMware[:]
[:it]Lunch buffet e visita all’area espositiva[:]
[:it]Risk vs Rule-based security policies: the case of software vulnerabilities
Luca Allodi, Research Fellow, Universita’ di Trento[:]
[:it]Security Ratings for your Business
Cesare San Martino, Responsabile del competence center, Eurosel Moma e Giovanni Signorelli, Responsabile della Sicurezza informatica e compliance, Snam[:]
[:it]Violare infrastrutture critiche ed Enterprise anche dai contenuti o attività sensibili diventa più facile ogni giorno. Esiste un metodo per la difesa?
Paolo Emiliani, ICT Security Manager, Positive Technologies[:]
[:it]Market Leading Attack Mitigation Solution
The multilayered defense: Staying Ahead of Today’s Complex Threats
Giorgio Ancona, Head of Big Data & Security e Head of Strategic Alliances, Innovation & Communication, Atos e Nicola Cavallina, Channel Manager, Radware[:]
[:it]La sicurezza a 360°, one step ahead
David Gubiani, Security Engineering Manager Italy, Check Point[:]
[:it]Where are we heading?
Insights and possible solutions for Italy and Europe in HLS and critical infrastructure defense
Zori Kor, Vice President, ASERO Worldwide – former Israeli Security Agency (ISA)[:]
[:it]Think Like a Hacker React Like a CISO
Luigi Tassistro, Technical manager, Brinthesis e Massimo Fanton, Managing Director, Brinthesis[:]
[:it]Bot Detection 2.0 – An Essential Defence Layer Against a Rising Threat
Yaron Oliker, CEO and co-founder, Unbotify[:]
[:it]Application Security as a Business Enabler
Ran Ohayon, Regional Director, Checkmarx[:]
[:it]Chiusura dei lavori[:]