SlideShare ist ein Scribd-Unternehmen logo
21/11/19 h15,30
FONTANAFREDDA
FICO BOLOGNA
Agenda:
Ore 16.00 – Introduzione e moderazione
di Gabriele D’Angelo – Researcher & Professor @ Unibo
Parteciperanno alla tavola rotonda:
Valerio Dalla Casa – ICT Security Manager @ VM Sistemi
Giulia Caliari – Security Architect @ IBM
Massimo Lucarelli – Senior Sales Engineer @ Bitdefender
Alessandro Cecchetti – General Manager @ Colin & Partners
Mario Anglani – Founder @ HackInBo
Andrea Biondo – Capitano Nazionale Italiana
Cyber Defender
Ore 18.00 – Chiusura lavori e aperitivo di networking
con la degustazione di prodotti
di qualità del territorio.
RoundTable: da Industria 4.0 a GDPR
#ICTSecurity #ZeroTrust
Il punto della situazione sulla protezione dei dati e della produttività aziendale:
stakeholder dell’ICT Security a confronto.
Gabriele D’Angelo
Researcher & Professor
@ Unibo
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
#ZeroTrust
(in Humans)
Gabriele D’Angelo <g.dangelo@unibo.it>
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Cyber vs. Physical
Cyber vs. Physical
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Difesa del Perimetro: Evoluzione
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Difesa del Perimetro: Evoluzione
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Difesa del Perimetro: Evoluzione
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
La Caduta del Perimetro
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
(post) Industria 4.0
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Advanced Persistent Threat (APT)
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
L’Umano al Centro
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Sempre gli Stessi Problemi
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
La Mia Banca è Differente!
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Programmare = Sbagliare
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Soluzione?
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Soluzione
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Valerio Dalla Casa
ICT Security Manager
@ VM Sistemi
19
Operational Technology è l’insieme dei sistemi di
monitoraggio e di controllo di processi fisici,
dispositivi ed infrastrutture aziendali.
Che cosa è
l’Operational Technology (OT)?
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
20
l’Operational Technology (OT)
utilizzata dove?
Monitorare, Controllare ed Attuare Automazione Industriale
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
21
l’OT che converge verso l’IT
Prima l’OT…
• Era Disconnesso dall’IT
• Utilizzava protocolli proprietari
• Utilizzava sistemi di cablaggio
proprietari
• Utilizzava HW e SW proprietari
• Erano solitamente sistemi dimenticati
Ora l’OT…
• È Incorporato nel network aziendale
• Utilizza protocolli Internet
• È in crescita l’utilizzo di tecnologia
wireless standard
• È in crescita l’utilizzo di HW general
purpose e sistemi operativi
molto diffusi
• È Un crescente target del cybercrime
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
22
La differenza tra l’IT e OT
Requisiti Real-Time
Disponibilità
Ciclo di vita dei dispositivi
Aggiornamenti
Maturo
Ritardi accettati
Ritardi accettati
Regolari e schedulati
4/5 anni
Schedulati e mandatori
Molto Alta
Aspetto necessario e critico
Oltre 20 anni
Poco frequente
Occasionali
In crescita
Test sicurezza/audit
Sicurezza
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
23
Security Fabric Overview
OT Solution
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
L’approccio Fortinet alla Sicurezza OT
24
Enterprise Zone
DMZ
Operation & Control
Control Zone
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Fortiguard Industial
25
Isolamento dei singoli
device all’interno
delle stesse subnet
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Gestione Access Point integrata
all’interno della dashboard del firewall
26
• SSID Singola
• Multiple PSK (MPSK)
• Segmentazione rete per device
• Vlan policy o device policy
• Autenticazione Radius
• Autenticazione MAC
• Dynamic Vlan allocation
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Fortiguard Industial DB
27
IPS e
Application
control su
protocolli
industriali
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Use Case – Necessità:
28
IT
CDL 1 Network CDL 2 Network
1) Integrazione OT con IT per
elaborazioni dati, monitoraggio,
manutenzione ecc..
2) Messa in sicurezza centri
di lavoro
3) Livelli di sicurezza maggiori per
centri di lavoro specifici
4) Unico SSID per il mondo OT
5) Gestione automatica
degli incidenti di sicurezza
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
29
1) Collegamento al mondo IT tramite FW
dedicato alla gestione dell’infrastruttura OT
2) Separazione network centri di lavoro tramite
VLAN gestite centralmente da OT FW
3) Separazione singoli device all’interno del
CDL1 tramite policy di device isolation
gestite da OT FW
4) Unico SSID per l’ OT ed autenticazione
tramite MAC address gestita dal NAC.
5) FortiAnalyzer con IoC
e integrazione con la Fabric
Fortinet per isolamento
device compromessi
OT FW
FortiNAC FortiAnalyzer
Security Fabric
CDL 2 Network
Device isolation con Intraswitch policy
CDL 1 Network
IT
Soluzioni
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
30
Automazione della messa in quarantena di device che presentano
Anomalie o tracce di comportamenti malevoli
OT FWFortiNAC FortiAnalyzer
CDL 1 Network
OT FWFortiNAC FortiAnalyzer
CDL 1 Network
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Giulia Caliari
Security Architect
@ IBM
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Massimo Lucarelli
Senior Sales Engineer
@ Bitdefender
Non è possibile visualizzare l'immagine.
A GLOBAL SECURITY-TECHNOLOGY CO.
Founded in 2001
1,600+ employees …
800 in R&D /
engineering
Enterprise HQ in Silicon
Valley (Santa Clara,
California)
Enterprise business
growing 92%+ year-
over-year
Operates world’s largest
security-delivery
infrastructure
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Estimated 38% of global cyber security solutions use Bitdefender software in some form.
500 Million
Endpoints Protected
150 Countries
WORLD’S LARGEST SECURITY-DELIVERY INFRASTRUCTURE
More than 150 OEM partnerships
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
BITDEFENDER
GRAVITYZONE
Single Agent
Single Console
All Endpoints
END-USER DEVICES
DATACENTER & CLOUD
Public, Private &
Hybrid Cloud
Software-Defined &
Hyperconverged
Infrastructure
Servers
(physical)
Virtual Desktops
(VDI / DaaS)
Mobile
Laptops &
Workstations
(physical)
AN INTEGRATED ENTERPRISE-SECURITY PLATFORM
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Single
Modular
Agent
INTEGRATED LAYERED NEXT-GEN EPP AND EDR PLATFORM
Next-Gen EPP
EDR
Sandbox
Patch
Management
ERA
Full-Disk
Encryption
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
47
GravityZone
Prevention, Detection, Response and Risk Analytics
REPORTING AND INTEGRATION
DETECTION AND RESPONSE
PREVENTION
RISK ANALYTICS and
HARDENING Encryption Web Threat Protection Application Control Device ControlPatch Management
Endpoint Risk
Analytics
Powershell Script Protection Local & Cloud Machine Learning HyperDetect Sandbox Analyzer Firewall
Machine
Learning
Dashboards & Reports Notifications SIEM Integration API Support
IoC Lookup Blocklist Network Isolation Sandbox Detonation Visualization
Access Blocking Quarantine Disinfection & RemovalProcess Termination Rollback
Exploit Mitigation Process Inspector Event Recorder Threat Analytics
Managed EDR and MDR
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
HYPERDETECT – TUNABLE MACHINE LEARNING
Protects from:
• Ransomware
• Exploits
• Fileless attacks
• Script-based attacks
Provides maximum
detection accuracy
without false positives
Delivers full visibility
into suspicious
activities
Set the detection-aggressiveness level…
…to counter relevant threats
Gain full visibility and enable automatic action
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Advanced detection and
response shows precisely
how a potential threat
works and its context in
your environment.
MITRE attack techniques
and indicators of
compromise provide up to
the minute insight into
named threats and other
malware that may be
involved.
Easy to understand visual
guides highlight critical
attack paths, easing
burdens on IT staff.
EDR workflow and visualization
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
SANDBOX ANALYZER
Uses machine learning and behavioral
analysis to assess suspicious files
Runs in blocking or monitoring mode
Provides a verdict in near-real-time
and takes policy-based remediation
action
Delivers in-depth reporting on malware
behavior
Protects against:
• Advanced targeted
attacks
• Custom malware
• Unknown packers
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
GravityZone Endpoint Risk Analytics
Enterprise-Wide Risk Dashboard
View prioritized risks across the
Enterprise (1240 Disabled Firewalls)
See the highest priority
endpoints by Risk Score
View Risks by endpoint
and automatically fix
specific misconfigurations
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Helps improve security posture by expediently
discovering and eliminating vulnerabilities
Provides the widest range of security- and non-
security patches for operating systems, third-
party applications and golden images
Covers Windows-based physical, virtual on-
prem and cloud-based endpoints and servers
Is deployed and managed from the GravityZone
console and integrated into its agent
INTEGRATED PATCH MANAGEMENT
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Full-disk encryption
 Leverages native Windows BitLocker and Mac OS FileVault
encryption to ensure compatibility and performance
 Is fully integrated into the GravityZone Control Center for
centralized deployment, management and key recovery
 Requires no additional agent to deploy or key management
server to install
 Delivers encryption-specific reports to help prove compliance
 Supports pre-boot authentication enforcement
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
GRAVITYZONE SECURITY FOR HYBRID & MULTI-CLOUD ENVIRONMENTS
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
• SEE WHAT OTHERS CAN’T
WITH LIVE HYPERVISOR
MEMORY INTROSPECTION
Protection against advanced persistent threats
Isolated and impossible to compromise
Truly agentless
No impact on consolidation ratios
Deploys in minutes
Supports any EPP
BITDEFENDER HYPERVISOR INTROSPECTION
A REVOLUTION IN DATACENTER SECURITY
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Global Protective Network Threat Intelligence System
Bitdefender Cyberlabs and the Global Protective Network
• 77M+ malicious URLs
• 1PB+ of known files
• 3M+ threat samples
processed/day
Classification and Analysis Transforms data
in into Technical Threat Intelligence (IOCs).
Use AI/ML models, Event Correlation,
automated IOC creation tools
Global
Protective
Network
Telemetry from 500M
Bitdefender Customers
Honeypot Infrastructure
Dark Web monitoring
Web crawlers
Customer submissions
IoT focused Honeypots
Blogs, News, Social Media
monitoring
SPAM feeds
Telemetry from 500M
Bitdefender Customers
Honeypot Infrastructure
Dark Web monitoring
Web crawlers
Customer submissions
IoT focused Honeypots
Blogs, News, Social Media
monitoring
SPAM feeds
Classification and Analysis Transforms data
in into Technical Threat Intelligence (IOCs).
Use AI/ML models, Event Correlation,
automated IOC creation tools
Data
Clustering
Machine
Learning engines
used to group by
feature
Advanced
Sandboxing
Records
complete
malware
behavior
Object features
extraction
Extract over
80,000 features
and behaviors
Network
Threat
Inspection
Stream based
machine
learning engine
Object
Reputation
Billions of known
file hashes used
for whitelisting
Event
Correlation,
IOC Creation
Identify
malicious
content across
multiple engines
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
THANK YOU!
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Alessandro Cecchetti
General Manager
@ Colin & Partners
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Mario Anglani
Founder
@ HackInBo
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Andrea Biondo
Capitano Nazionale
Italiana Cyber Defender
Team Italy & mhackeroni
Andrea Biondo
2019-11-21
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
About me
● MSc student in CS @ UniPd
● Security researcher (academia / industry)
○ Memory corruption (esp. browsers)
○ Reverse engineering / code analysis
○ Exploit mitigations
● Capture The Flag player
○ 4 years with spritzers/NoPwnIntended
○ 2 years with mhackeroni
○ 2 years with Team Italy
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
What are CTFs?
● Set of vulnerable challenges in various categories
○ Binary, web, cryptography, forensics, reversing, …
● Each challenge holds a flag
○ FLAG{this_is_a_flag}
● Hack the challenge to get the flag
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Styles of CTFs
● Jeopardy
○ Hack the challenge, get the flag
● Attack/defense
○ Each team hosts a server with the same vulnerable services
○ Teams attack and defend against each other
○ Flags change every “tick” (few minutes)
○ Points for availability (“SLA”)
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
mhackeroni
● Born in 2018 for competing at DEF CON CTF
○ Most prestigious A/D hacking competition in the world
● Coalition of some of the best italian teams
○ ~50 persons
= + + + +
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Arena Suite
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
DEF CON CTF 2018, Las Vegas
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
DEF CON CTF 2019, Las Vegas
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
HITB PRO CTF 2019, Abu Dhabi
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Team Italy
● “Nazionale Italiana Cyberdefender”
○ 10 persons
○ Some also from mhackeroni
● Supported by the government
● Selected (partially) from CyberChallenge.IT
○ Intensive 3-month cybersecurity training for high-school/university students
● One competition: European Cybersecurity Challenge (ECSC)
○ Each participating European country sends a team
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
ECSC 2017, Malaga
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
ECSC 2018, London
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
ECSC 2019, Bucharest
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Why?
● A lot of fun, but also a great way of learning
○ We are integrating CTFs in university education
○ Some tech companies (e.g., Google, Facebook) do it too
● Compared to the real world:
○ Less attack surface and exploit polishing
○ Complex, state-of-the-art vulnerabilities and exploitation techniques
https://ctftime.org/
Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
Fine
Grazie a tutti
per l’attenzione

Weitere ähnliche Inhalte

Was ist angesagt?

Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
CSA Argentina
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
TI Safe
 
Aerospace Company Customer Presentation
Aerospace Company Customer PresentationAerospace Company Customer Presentation
Aerospace Company Customer Presentation
Splunk
 
Integra Customer Presentation
Integra Customer PresentationIntegra Customer Presentation
Integra Customer Presentation
Splunk
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
CSA Argentina
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
Sylvain Martinez
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
newbie2019
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
Cristian Garcia G.
 
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Sylvain Martinez
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
Waterfall Security Solutions
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
CSA Argentina
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
Moti Sagey מוטי שגיא
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
NetworkCollaborators
 
Threat Landscape for Education
Threat Landscape for EducationThreat Landscape for Education
Threat Landscape for Education
ColloqueRISQ
 
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
Cisco Case Studies
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
Sylvain Martinez
 
TI Safe ICS Cybersecurity Training
TI Safe ICS Cybersecurity TrainingTI Safe ICS Cybersecurity Training
TI Safe ICS Cybersecurity Training
TI Safe
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
Robb Boyd
 

Was ist angesagt? (20)

Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
Aerospace Company Customer Presentation
Aerospace Company Customer PresentationAerospace Company Customer Presentation
Aerospace Company Customer Presentation
 
Integra Customer Presentation
Integra Customer PresentationIntegra Customer Presentation
Integra Customer Presentation
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2Talk2 esc4 muscl-ids_v1_2
Talk2 esc4 muscl-ids_v1_2
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 
Threat Landscape for Education
Threat Landscape for EducationThreat Landscape for Education
Threat Landscape for Education
 
Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
TI Safe ICS Cybersecurity Training
TI Safe ICS Cybersecurity TrainingTI Safe ICS Cybersecurity Training
TI Safe ICS Cybersecurity Training
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 

Ähnlich wie RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
alvin chin
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Industry 4.0: Sensor Driven Manufacturing
Industry 4.0: Sensor Driven ManufacturingIndustry 4.0: Sensor Driven Manufacturing
Industry 4.0: Sensor Driven Manufacturing
SMARTRAC
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
team-WIBU
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
BlockArmour1
 
Now It Is Easily To Be Maintain The Industrial Machine- Part 2
Now It Is Easily To Be Maintain The Industrial Machine- Part 2Now It Is Easily To Be Maintain The Industrial Machine- Part 2
Now It Is Easily To Be Maintain The Industrial Machine- Part 2
Infyiot Solutions
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
John Kingsley
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
Kellton Tech Solutions Ltd
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT Implementation
Aditya Basu
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
AMETIC
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
Lan & Wan Solutions
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
cvrlifesciences
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
The Economist Media Businesses
 
Why IIoT Gateway is Critical for Smart Manufacturing?
Why IIoT Gateway is Critical for Smart Manufacturing?Why IIoT Gateway is Critical for Smart Manufacturing?
Why IIoT Gateway is Critical for Smart Manufacturing?
Infyiot Solutions
 

Ähnlich wie RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust (20)

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Industry 4.0: Sensor Driven Manufacturing
Industry 4.0: Sensor Driven ManufacturingIndustry 4.0: Sensor Driven Manufacturing
Industry 4.0: Sensor Driven Manufacturing
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
Now It Is Easily To Be Maintain The Industrial Machine- Part 2
Now It Is Easily To Be Maintain The Industrial Machine- Part 2Now It Is Easily To Be Maintain The Industrial Machine- Part 2
Now It Is Easily To Be Maintain The Industrial Machine- Part 2
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT Implementation
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Evento 15 aprile
Evento 15 aprileEvento 15 aprile
Evento 15 aprile
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Why IIoT Gateway is Critical for Smart Manufacturing?
Why IIoT Gateway is Critical for Smart Manufacturing?Why IIoT Gateway is Critical for Smart Manufacturing?
Why IIoT Gateway is Critical for Smart Manufacturing?
 

Mehr von Talea Consulting Srl

Cassetto Doganale Import - Talea Consulting.pdf
Cassetto Doganale Import - Talea Consulting.pdfCassetto Doganale Import - Talea Consulting.pdf
Cassetto Doganale Import - Talea Consulting.pdf
Talea Consulting Srl
 
RIFIUTI - Talea Consulting.pdf
RIFIUTI - Talea Consulting.pdfRIFIUTI - Talea Consulting.pdf
RIFIUTI - Talea Consulting.pdf
Talea Consulting Srl
 
DOGANA 4.0 - Talea Consulting.pdf
DOGANA 4.0 - Talea Consulting.pdfDOGANA 4.0 - Talea Consulting.pdf
DOGANA 4.0 - Talea Consulting.pdf
Talea Consulting Srl
 
HR - Talea Consulting.pdf
HR - Talea Consulting.pdfHR - Talea Consulting.pdf
HR - Talea Consulting.pdf
Talea Consulting Srl
 
Webapp Nota spese - Talea Consulting.pdf
Webapp Nota spese - Talea Consulting.pdfWebapp Nota spese - Talea Consulting.pdf
Webapp Nota spese - Talea Consulting.pdf
Talea Consulting Srl
 
Webapp DDT - Talea Consulting.pdf
Webapp DDT - Talea Consulting.pdfWebapp DDT - Talea Consulting.pdf
Webapp DDT - Talea Consulting.pdf
Talea Consulting Srl
 
Dogana 4.0 - Talea Consulting.pdf
Dogana 4.0 - Talea Consulting.pdfDogana 4.0 - Talea Consulting.pdf
Dogana 4.0 - Talea Consulting.pdf
Talea Consulting Srl
 
Slide Webinar - Firma Elettronica: aggiornamenti normativi e casi d’uso
Slide Webinar - Firma Elettronica: aggiornamenti normativi e casi d’usoSlide Webinar - Firma Elettronica: aggiornamenti normativi e casi d’uso
Slide Webinar - Firma Elettronica: aggiornamenti normativi e casi d’uso
Talea Consulting Srl
 
Slide Webinar "BIXHUB e i servizi avanzati IX"
Slide Webinar "BIXHUB e i servizi avanzati IX"Slide Webinar "BIXHUB e i servizi avanzati IX"
Slide Webinar "BIXHUB e i servizi avanzati IX"
Talea Consulting Srl
 
Nuove Linee Guida AgID per la Conservazione Digitale: Che cosa cambia da Genn...
Nuove Linee Guida AgID per la Conservazione Digitale: Che cosa cambia da Genn...Nuove Linee Guida AgID per la Conservazione Digitale: Che cosa cambia da Genn...
Nuove Linee Guida AgID per la Conservazione Digitale: Che cosa cambia da Genn...
Talea Consulting Srl
 
La Digital Transformation per il miglioramento continuo nella gestione delle ...
La Digital Transformation per il miglioramento continuo nella gestione delle ...La Digital Transformation per il miglioramento continuo nella gestione delle ...
La Digital Transformation per il miglioramento continuo nella gestione delle ...
Talea Consulting Srl
 
Slide Webinar La Digital Transformation della tua azienda grazie alle diverse...
Slide Webinar La Digital Transformation della tua azienda grazie alle diverse...Slide Webinar La Digital Transformation della tua azienda grazie alle diverse...
Slide Webinar La Digital Transformation della tua azienda grazie alle diverse...
Talea Consulting Srl
 
Slide webinar Dogana 4.0 NEXT - 6 Luglio 2021
Slide webinar Dogana 4.0 NEXT - 6 Luglio 2021Slide webinar Dogana 4.0 NEXT - 6 Luglio 2021
Slide webinar Dogana 4.0 NEXT - 6 Luglio 2021
Talea Consulting Srl
 
Slide Webinar 30 aprile 2021 "Digital Transformation a supporto dell’RSPP per...
Slide Webinar 30 aprile 2021 "Digital Transformation a supporto dell’RSPP per...Slide Webinar 30 aprile 2021 "Digital Transformation a supporto dell’RSPP per...
Slide Webinar 30 aprile 2021 "Digital Transformation a supporto dell’RSPP per...
Talea Consulting Srl
 
Case history Metal Work: Dematerializzazione Piani di Collaudo e Disegni Tecnici
Case history Metal Work: Dematerializzazione Piani di Collaudo e Disegni TecniciCase history Metal Work: Dematerializzazione Piani di Collaudo e Disegni Tecnici
Case history Metal Work: Dematerializzazione Piani di Collaudo e Disegni Tecnici
Talea Consulting Srl
 
Slide webinar “Dalla fattura elettronica alla digitalizzazione del Ciclo Pass...
Slide webinar “Dalla fattura elettronica alla digitalizzazione del Ciclo Pass...Slide webinar “Dalla fattura elettronica alla digitalizzazione del Ciclo Pass...
Slide webinar “Dalla fattura elettronica alla digitalizzazione del Ciclo Pass...
Talea Consulting Srl
 
Case history Minipan: un’Azienda PAPERLESS a 360 gradi
Case history Minipan: un’Azienda PAPERLESS a 360 gradiCase history Minipan: un’Azienda PAPERLESS a 360 gradi
Case history Minipan: un’Azienda PAPERLESS a 360 gradi
Talea Consulting Srl
 
Slide del Webinar "Dogana 4.0 Next" del 19 Novembre 2020
Slide del Webinar "Dogana 4.0 Next" del 19 Novembre 2020Slide del Webinar "Dogana 4.0 Next" del 19 Novembre 2020
Slide del Webinar "Dogana 4.0 Next" del 19 Novembre 2020
Talea Consulting Srl
 
Slide del Webinar "Dogana 4.0 Next: digitalizzazione delle procedure di impor...
Slide del Webinar "Dogana 4.0 Next: digitalizzazione delle procedure di impor...Slide del Webinar "Dogana 4.0 Next: digitalizzazione delle procedure di impor...
Slide del Webinar "Dogana 4.0 Next: digitalizzazione delle procedure di impor...
Talea Consulting Srl
 
Slide Webinar Protocollo Prevenzione COVID-19: l’evoluzione dei processi azie...
Slide Webinar Protocollo Prevenzione COVID-19: l’evoluzione dei processi azie...Slide Webinar Protocollo Prevenzione COVID-19: l’evoluzione dei processi azie...
Slide Webinar Protocollo Prevenzione COVID-19: l’evoluzione dei processi azie...
Talea Consulting Srl
 

Mehr von Talea Consulting Srl (20)

Cassetto Doganale Import - Talea Consulting.pdf
Cassetto Doganale Import - Talea Consulting.pdfCassetto Doganale Import - Talea Consulting.pdf
Cassetto Doganale Import - Talea Consulting.pdf
 
RIFIUTI - Talea Consulting.pdf
RIFIUTI - Talea Consulting.pdfRIFIUTI - Talea Consulting.pdf
RIFIUTI - Talea Consulting.pdf
 
DOGANA 4.0 - Talea Consulting.pdf
DOGANA 4.0 - Talea Consulting.pdfDOGANA 4.0 - Talea Consulting.pdf
DOGANA 4.0 - Talea Consulting.pdf
 
HR - Talea Consulting.pdf
HR - Talea Consulting.pdfHR - Talea Consulting.pdf
HR - Talea Consulting.pdf
 
Webapp Nota spese - Talea Consulting.pdf
Webapp Nota spese - Talea Consulting.pdfWebapp Nota spese - Talea Consulting.pdf
Webapp Nota spese - Talea Consulting.pdf
 
Webapp DDT - Talea Consulting.pdf
Webapp DDT - Talea Consulting.pdfWebapp DDT - Talea Consulting.pdf
Webapp DDT - Talea Consulting.pdf
 
Dogana 4.0 - Talea Consulting.pdf
Dogana 4.0 - Talea Consulting.pdfDogana 4.0 - Talea Consulting.pdf
Dogana 4.0 - Talea Consulting.pdf
 
Slide Webinar - Firma Elettronica: aggiornamenti normativi e casi d’uso
Slide Webinar - Firma Elettronica: aggiornamenti normativi e casi d’usoSlide Webinar - Firma Elettronica: aggiornamenti normativi e casi d’uso
Slide Webinar - Firma Elettronica: aggiornamenti normativi e casi d’uso
 
Slide Webinar "BIXHUB e i servizi avanzati IX"
Slide Webinar "BIXHUB e i servizi avanzati IX"Slide Webinar "BIXHUB e i servizi avanzati IX"
Slide Webinar "BIXHUB e i servizi avanzati IX"
 
Nuove Linee Guida AgID per la Conservazione Digitale: Che cosa cambia da Genn...
Nuove Linee Guida AgID per la Conservazione Digitale: Che cosa cambia da Genn...Nuove Linee Guida AgID per la Conservazione Digitale: Che cosa cambia da Genn...
Nuove Linee Guida AgID per la Conservazione Digitale: Che cosa cambia da Genn...
 
La Digital Transformation per il miglioramento continuo nella gestione delle ...
La Digital Transformation per il miglioramento continuo nella gestione delle ...La Digital Transformation per il miglioramento continuo nella gestione delle ...
La Digital Transformation per il miglioramento continuo nella gestione delle ...
 
Slide Webinar La Digital Transformation della tua azienda grazie alle diverse...
Slide Webinar La Digital Transformation della tua azienda grazie alle diverse...Slide Webinar La Digital Transformation della tua azienda grazie alle diverse...
Slide Webinar La Digital Transformation della tua azienda grazie alle diverse...
 
Slide webinar Dogana 4.0 NEXT - 6 Luglio 2021
Slide webinar Dogana 4.0 NEXT - 6 Luglio 2021Slide webinar Dogana 4.0 NEXT - 6 Luglio 2021
Slide webinar Dogana 4.0 NEXT - 6 Luglio 2021
 
Slide Webinar 30 aprile 2021 "Digital Transformation a supporto dell’RSPP per...
Slide Webinar 30 aprile 2021 "Digital Transformation a supporto dell’RSPP per...Slide Webinar 30 aprile 2021 "Digital Transformation a supporto dell’RSPP per...
Slide Webinar 30 aprile 2021 "Digital Transformation a supporto dell’RSPP per...
 
Case history Metal Work: Dematerializzazione Piani di Collaudo e Disegni Tecnici
Case history Metal Work: Dematerializzazione Piani di Collaudo e Disegni TecniciCase history Metal Work: Dematerializzazione Piani di Collaudo e Disegni Tecnici
Case history Metal Work: Dematerializzazione Piani di Collaudo e Disegni Tecnici
 
Slide webinar “Dalla fattura elettronica alla digitalizzazione del Ciclo Pass...
Slide webinar “Dalla fattura elettronica alla digitalizzazione del Ciclo Pass...Slide webinar “Dalla fattura elettronica alla digitalizzazione del Ciclo Pass...
Slide webinar “Dalla fattura elettronica alla digitalizzazione del Ciclo Pass...
 
Case history Minipan: un’Azienda PAPERLESS a 360 gradi
Case history Minipan: un’Azienda PAPERLESS a 360 gradiCase history Minipan: un’Azienda PAPERLESS a 360 gradi
Case history Minipan: un’Azienda PAPERLESS a 360 gradi
 
Slide del Webinar "Dogana 4.0 Next" del 19 Novembre 2020
Slide del Webinar "Dogana 4.0 Next" del 19 Novembre 2020Slide del Webinar "Dogana 4.0 Next" del 19 Novembre 2020
Slide del Webinar "Dogana 4.0 Next" del 19 Novembre 2020
 
Slide del Webinar "Dogana 4.0 Next: digitalizzazione delle procedure di impor...
Slide del Webinar "Dogana 4.0 Next: digitalizzazione delle procedure di impor...Slide del Webinar "Dogana 4.0 Next: digitalizzazione delle procedure di impor...
Slide del Webinar "Dogana 4.0 Next: digitalizzazione delle procedure di impor...
 
Slide Webinar Protocollo Prevenzione COVID-19: l’evoluzione dei processi azie...
Slide Webinar Protocollo Prevenzione COVID-19: l’evoluzione dei processi azie...Slide Webinar Protocollo Prevenzione COVID-19: l’evoluzione dei processi azie...
Slide Webinar Protocollo Prevenzione COVID-19: l’evoluzione dei processi azie...
 

Kürzlich hochgeladen

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Kürzlich hochgeladen (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust

  • 1. 21/11/19 h15,30 FONTANAFREDDA FICO BOLOGNA Agenda: Ore 16.00 – Introduzione e moderazione di Gabriele D’Angelo – Researcher & Professor @ Unibo Parteciperanno alla tavola rotonda: Valerio Dalla Casa – ICT Security Manager @ VM Sistemi Giulia Caliari – Security Architect @ IBM Massimo Lucarelli – Senior Sales Engineer @ Bitdefender Alessandro Cecchetti – General Manager @ Colin & Partners Mario Anglani – Founder @ HackInBo Andrea Biondo – Capitano Nazionale Italiana Cyber Defender Ore 18.00 – Chiusura lavori e aperitivo di networking con la degustazione di prodotti di qualità del territorio. RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust Il punto della situazione sulla protezione dei dati e della produttività aziendale: stakeholder dell’ICT Security a confronto.
  • 2. Gabriele D’Angelo Researcher & Professor @ Unibo Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 3. #ZeroTrust (in Humans) Gabriele D’Angelo <g.dangelo@unibo.it> Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 5. Cyber vs. Physical Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 6. Difesa del Perimetro: Evoluzione Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 7. Difesa del Perimetro: Evoluzione Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 8. Difesa del Perimetro: Evoluzione Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 9. La Caduta del Perimetro Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 10. (post) Industria 4.0 Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 11. Advanced Persistent Threat (APT) Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 12. L’Umano al Centro Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 13. Sempre gli Stessi Problemi Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 14. La Mia Banca è Differente! Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 15. Programmare = Sbagliare Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 16. Soluzione? Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 17. Soluzione Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 18. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust Valerio Dalla Casa ICT Security Manager @ VM Sistemi
  • 19. 19 Operational Technology è l’insieme dei sistemi di monitoraggio e di controllo di processi fisici, dispositivi ed infrastrutture aziendali. Che cosa è l’Operational Technology (OT)? Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 20. 20 l’Operational Technology (OT) utilizzata dove? Monitorare, Controllare ed Attuare Automazione Industriale Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 21. 21 l’OT che converge verso l’IT Prima l’OT… • Era Disconnesso dall’IT • Utilizzava protocolli proprietari • Utilizzava sistemi di cablaggio proprietari • Utilizzava HW e SW proprietari • Erano solitamente sistemi dimenticati Ora l’OT… • È Incorporato nel network aziendale • Utilizza protocolli Internet • È in crescita l’utilizzo di tecnologia wireless standard • È in crescita l’utilizzo di HW general purpose e sistemi operativi molto diffusi • È Un crescente target del cybercrime Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 22. 22 La differenza tra l’IT e OT Requisiti Real-Time Disponibilità Ciclo di vita dei dispositivi Aggiornamenti Maturo Ritardi accettati Ritardi accettati Regolari e schedulati 4/5 anni Schedulati e mandatori Molto Alta Aspetto necessario e critico Oltre 20 anni Poco frequente Occasionali In crescita Test sicurezza/audit Sicurezza Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 23. 23 Security Fabric Overview OT Solution Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 24. L’approccio Fortinet alla Sicurezza OT 24 Enterprise Zone DMZ Operation & Control Control Zone Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 25. Fortiguard Industial 25 Isolamento dei singoli device all’interno delle stesse subnet Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 26. Gestione Access Point integrata all’interno della dashboard del firewall 26 • SSID Singola • Multiple PSK (MPSK) • Segmentazione rete per device • Vlan policy o device policy • Autenticazione Radius • Autenticazione MAC • Dynamic Vlan allocation Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 27. Fortiguard Industial DB 27 IPS e Application control su protocolli industriali Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 28. Use Case – Necessità: 28 IT CDL 1 Network CDL 2 Network 1) Integrazione OT con IT per elaborazioni dati, monitoraggio, manutenzione ecc.. 2) Messa in sicurezza centri di lavoro 3) Livelli di sicurezza maggiori per centri di lavoro specifici 4) Unico SSID per il mondo OT 5) Gestione automatica degli incidenti di sicurezza Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 29. 29 1) Collegamento al mondo IT tramite FW dedicato alla gestione dell’infrastruttura OT 2) Separazione network centri di lavoro tramite VLAN gestite centralmente da OT FW 3) Separazione singoli device all’interno del CDL1 tramite policy di device isolation gestite da OT FW 4) Unico SSID per l’ OT ed autenticazione tramite MAC address gestita dal NAC. 5) FortiAnalyzer con IoC e integrazione con la Fabric Fortinet per isolamento device compromessi OT FW FortiNAC FortiAnalyzer Security Fabric CDL 2 Network Device isolation con Intraswitch policy CDL 1 Network IT Soluzioni Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 30. 30 Automazione della messa in quarantena di device che presentano Anomalie o tracce di comportamenti malevoli OT FWFortiNAC FortiAnalyzer CDL 1 Network OT FWFortiNAC FortiAnalyzer CDL 1 Network Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 31. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust Giulia Caliari Security Architect @ IBM
  • 32. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 33. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 34. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 35. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 36. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 37. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 38. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 39. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 40. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 41. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 42. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust Massimo Lucarelli Senior Sales Engineer @ Bitdefender
  • 43. Non è possibile visualizzare l'immagine. A GLOBAL SECURITY-TECHNOLOGY CO. Founded in 2001 1,600+ employees … 800 in R&D / engineering Enterprise HQ in Silicon Valley (Santa Clara, California) Enterprise business growing 92%+ year- over-year Operates world’s largest security-delivery infrastructure Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 44. Estimated 38% of global cyber security solutions use Bitdefender software in some form. 500 Million Endpoints Protected 150 Countries WORLD’S LARGEST SECURITY-DELIVERY INFRASTRUCTURE More than 150 OEM partnerships Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 45. BITDEFENDER GRAVITYZONE Single Agent Single Console All Endpoints END-USER DEVICES DATACENTER & CLOUD Public, Private & Hybrid Cloud Software-Defined & Hyperconverged Infrastructure Servers (physical) Virtual Desktops (VDI / DaaS) Mobile Laptops & Workstations (physical) AN INTEGRATED ENTERPRISE-SECURITY PLATFORM Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 46. Single Modular Agent INTEGRATED LAYERED NEXT-GEN EPP AND EDR PLATFORM Next-Gen EPP EDR Sandbox Patch Management ERA Full-Disk Encryption Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 47. 47 GravityZone Prevention, Detection, Response and Risk Analytics REPORTING AND INTEGRATION DETECTION AND RESPONSE PREVENTION RISK ANALYTICS and HARDENING Encryption Web Threat Protection Application Control Device ControlPatch Management Endpoint Risk Analytics Powershell Script Protection Local & Cloud Machine Learning HyperDetect Sandbox Analyzer Firewall Machine Learning Dashboards & Reports Notifications SIEM Integration API Support IoC Lookup Blocklist Network Isolation Sandbox Detonation Visualization Access Blocking Quarantine Disinfection & RemovalProcess Termination Rollback Exploit Mitigation Process Inspector Event Recorder Threat Analytics Managed EDR and MDR Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 48. HYPERDETECT – TUNABLE MACHINE LEARNING Protects from: • Ransomware • Exploits • Fileless attacks • Script-based attacks Provides maximum detection accuracy without false positives Delivers full visibility into suspicious activities Set the detection-aggressiveness level… …to counter relevant threats Gain full visibility and enable automatic action Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 49. Advanced detection and response shows precisely how a potential threat works and its context in your environment. MITRE attack techniques and indicators of compromise provide up to the minute insight into named threats and other malware that may be involved. Easy to understand visual guides highlight critical attack paths, easing burdens on IT staff. EDR workflow and visualization Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 50. SANDBOX ANALYZER Uses machine learning and behavioral analysis to assess suspicious files Runs in blocking or monitoring mode Provides a verdict in near-real-time and takes policy-based remediation action Delivers in-depth reporting on malware behavior Protects against: • Advanced targeted attacks • Custom malware • Unknown packers Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 51. GravityZone Endpoint Risk Analytics Enterprise-Wide Risk Dashboard View prioritized risks across the Enterprise (1240 Disabled Firewalls) See the highest priority endpoints by Risk Score View Risks by endpoint and automatically fix specific misconfigurations Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 52. Helps improve security posture by expediently discovering and eliminating vulnerabilities Provides the widest range of security- and non- security patches for operating systems, third- party applications and golden images Covers Windows-based physical, virtual on- prem and cloud-based endpoints and servers Is deployed and managed from the GravityZone console and integrated into its agent INTEGRATED PATCH MANAGEMENT Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 53. Full-disk encryption  Leverages native Windows BitLocker and Mac OS FileVault encryption to ensure compatibility and performance  Is fully integrated into the GravityZone Control Center for centralized deployment, management and key recovery  Requires no additional agent to deploy or key management server to install  Delivers encryption-specific reports to help prove compliance  Supports pre-boot authentication enforcement Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 54. GRAVITYZONE SECURITY FOR HYBRID & MULTI-CLOUD ENVIRONMENTS Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 55. • SEE WHAT OTHERS CAN’T WITH LIVE HYPERVISOR MEMORY INTROSPECTION Protection against advanced persistent threats Isolated and impossible to compromise Truly agentless No impact on consolidation ratios Deploys in minutes Supports any EPP BITDEFENDER HYPERVISOR INTROSPECTION A REVOLUTION IN DATACENTER SECURITY Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 56. Global Protective Network Threat Intelligence System Bitdefender Cyberlabs and the Global Protective Network • 77M+ malicious URLs • 1PB+ of known files • 3M+ threat samples processed/day Classification and Analysis Transforms data in into Technical Threat Intelligence (IOCs). Use AI/ML models, Event Correlation, automated IOC creation tools Global Protective Network Telemetry from 500M Bitdefender Customers Honeypot Infrastructure Dark Web monitoring Web crawlers Customer submissions IoT focused Honeypots Blogs, News, Social Media monitoring SPAM feeds Telemetry from 500M Bitdefender Customers Honeypot Infrastructure Dark Web monitoring Web crawlers Customer submissions IoT focused Honeypots Blogs, News, Social Media monitoring SPAM feeds Classification and Analysis Transforms data in into Technical Threat Intelligence (IOCs). Use AI/ML models, Event Correlation, automated IOC creation tools Data Clustering Machine Learning engines used to group by feature Advanced Sandboxing Records complete malware behavior Object features extraction Extract over 80,000 features and behaviors Network Threat Inspection Stream based machine learning engine Object Reputation Billions of known file hashes used for whitelisting Event Correlation, IOC Creation Identify malicious content across multiple engines Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 58. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust Alessandro Cecchetti General Manager @ Colin & Partners
  • 59. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 60. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 61. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 62. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 63. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 65. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 66. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 68. Team Italy & mhackeroni Andrea Biondo 2019-11-21 Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 69. About me ● MSc student in CS @ UniPd ● Security researcher (academia / industry) ○ Memory corruption (esp. browsers) ○ Reverse engineering / code analysis ○ Exploit mitigations ● Capture The Flag player ○ 4 years with spritzers/NoPwnIntended ○ 2 years with mhackeroni ○ 2 years with Team Italy Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 70. What are CTFs? ● Set of vulnerable challenges in various categories ○ Binary, web, cryptography, forensics, reversing, … ● Each challenge holds a flag ○ FLAG{this_is_a_flag} ● Hack the challenge to get the flag Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 71. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 72. Styles of CTFs ● Jeopardy ○ Hack the challenge, get the flag ● Attack/defense ○ Each team hosts a server with the same vulnerable services ○ Teams attack and defend against each other ○ Flags change every “tick” (few minutes) ○ Points for availability (“SLA”) Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 73. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 74. mhackeroni ● Born in 2018 for competing at DEF CON CTF ○ Most prestigious A/D hacking competition in the world ● Coalition of some of the best italian teams ○ ~50 persons = + + + + Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 75. Arena Suite Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 76. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 77. DEF CON CTF 2018, Las Vegas Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 78. DEF CON CTF 2019, Las Vegas Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 79. HITB PRO CTF 2019, Abu Dhabi Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 80. Team Italy ● “Nazionale Italiana Cyberdefender” ○ 10 persons ○ Some also from mhackeroni ● Supported by the government ● Selected (partially) from CyberChallenge.IT ○ Intensive 3-month cybersecurity training for high-school/university students ● One competition: European Cybersecurity Challenge (ECSC) ○ Each participating European country sends a team Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 81. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 82. Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 83. ECSC 2017, Malaga Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 84. ECSC 2018, London Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 85. ECSC 2019, Bucharest Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 86. Why? ● A lot of fun, but also a great way of learning ○ We are integrating CTFs in university education ○ Some tech companies (e.g., Google, Facebook) do it too ● Compared to the real world: ○ Less attack surface and exploit polishing ○ Complex, state-of-the-art vulnerabilities and exploitation techniques https://ctftime.org/ Da Industria 4.0 a GDPR – RoundTable - #ICTSecurity #ZeroTrust
  • 87. Fine Grazie a tutti per l’attenzione