We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

ItaliaSec

Search

Clear Expand Collapse

Accelerating Cybersecurity with Gen AI & Automation

Marco Rottigni of SentinelOne discusses creating integrated security ecosystems where multi-source data becomes actionable intelligence through platform consolidation and generative AI automation workflows.

Price
Course duration Duration: 30 minutes

Adaptation to DORA: Experiences Compared

Francesco Puccioni of Credem Banca, Pasquale De Rinaldis of Iccrea Banca and Giovanni Lamberti of Mooney share practical DORA implementation experiences across different financial institution sizes.

Price
Course duration Duration: 35 minutes

Adaptive Defense Against AI-Driven Attacks

Paolo Tagliaferri of Cloudflare and Lorenzo Eusepi of Groupama Assicurazioni demonstrate how to overcome traditional WAF limitations through adaptive defense mechanisms against evolving AI-driven attack vectors.

Price
Course duration Duration: 30 minutes

Addressing Global Threats & Driving Digital Transformation

Susanna Cecchetti of OneTrust and Nunzio Bucello of Sara Assicurazioni explore strategic cybersecurity approaches, NIS2/DORA compliance and evidence-based risk management in digital transformation.

Price
Course duration Duration: 25 minutes

AI & Cloud-Native Security

Giulio Puri of Sysdig explores how AI multiplies security team effectiveness, bridging skills gaps and improving decision-making in cloud-native architectures through intelligent incident response automation.

Price
Course duration Duration: 25 minutes

Cyber Resilience & Business Continuity

Massimo Ravenna of Cyber Security Foundation, Alessandro Bulgarelli of Banca BPER, Nadia Bertone of BRT and Fabrizio Cassoni of Integrity360 discuss evolving business continuity in today's threat landscape.

Price
Course duration Duration: 35 minutes

Cybersecurity Investments

Fabio Gianotti of Moncler, Michele Fabbri of De Nora, Pierfrancesco Cavalli of Admiral and Massimo Tripodi of Veracode discuss securing budgets and demonstrating cybersecurity investment value to executives.

Price
Course duration Duration: 30 minutes

Cybersecurity Tactics for Tight Budgets & Growing Threats

Francesco Morelli, Massimo Cottafavi, Mario Mangano, Susanna Cecchetti and Cristiano Tito discuss strategic cybersecurity trade-offs amid resource constraints.

Price
Course duration Duration: 45 minutes

Darkweb & Compromised Credentials

Fabio Sammartino of Kaspersky covers credential theft as cybercriminals' most profitable vector, exploring darkweb monitoring, threat intelligence strategies and corporate defense against compromised accounts.

Price
Course duration Duration: 15 minutes

Decoding Cybercrime

Valerio Rizzati of SoSafe examines six critical cybercrime trends, from AI-driven attacks to multi-channel exploitation, covering evolving threat vectors and human risk factors in modern security landscapes.

Price
Course duration Duration: 15 minutes

Defend Your Business From the Infostealer Epidemic

Mauro Vezzoli of Picus Security and Mauro Conosciani of Aeroporti Di Roma examine the Infostealer epidemic, discussing continuous validation frameworks against rapidly evolving credential theft campaigns.

Price
Course duration Duration: 25 minutes

Evolving DNS as Part of Your Detection & Response Strategy

Guido Moscarella of Neverhack Southern Region and Riccardo Canetta of Infoblox demonstrate DNS evolution from basic network service to critical security control point for proactive threat detection.

Price
Course duration Duration: 15 minutes

Implementing a Vulnerability Management Program

Giampaolo Tacchini shares Edison's transformation from traditional CVSS scoring to contextualized risk-based vulnerability management, incorporating business impact and threat prioritization strategies.

Price
Course duration Duration: 20 minutes

Managing Third-Party Risk

Paola Rocco of Ordine degli Ingegneri della Provincia di Roma presents strategies for transforming reactive vendor management into continuous monitoring, covering GDPR, DORA and NIS2 compliance frameworks.

Price
Course duration Duration: 25 minutes

New Frontiers for Digital Identity Security

David Ciamberlano and Salvatore Bertolino of Ping Identity demonstrate AI-powered identity protection, real-time behavioral analysis and decentralized identity as the future of access management.

Price
Course duration Duration: 40 minutes

Our Journey From Traditional Solutions to HyperSOC

Stefano Scaramuzzino, CISO at ASL Roma 1, reveals their transformation from reactive security to proactive HyperSOC, balancing healthcare accessibility with robust protection across Italy's largest health authority.

Price
Course duration Duration: 25 minutes

PAM (R)evolution

Marco Di Martino of Delinea explores modern PAM evolution into comprehensive identity security, covering authorization management, non-human identity governance and AI-driven analytics for unified platforms.

Price
Course duration Duration: 25 minutes

Protecting the Identity-Based Attack Life Cycle

Marco Magnaguagno of Semperis and Michele Fabbri of De Nora share insights on securing identity infrastructure across multinational operations, addressing the complete identity-based attack life cycle.

Price
Course duration Duration: 25 minutes

Ransomware Evolution, Prevention and Mitigation

Fabrizio Pettinau, senior solutions engineer at Akamai, discusses ransomware's evolution into a sophisticated AI-enhanced industry, covering micro-segmentation, network visibility and rapid response strategies for organizational defense.

Price
Course duration Duration: 25 minutes

Safety & Responsibility in a World of Connected Products

Alessandro Oteri of PensieroSicuro, Francesca Merighi of Sacmi, William Udovich of Silverfort and Ia Kochiashvili of Ferrero discuss connected product security across global supply chains and regulatory compliance.

Price
Course duration Duration: 35 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement