SlideShare a Scribd company logo
1 of 11
Governing Information
Security
ROBERTO REALE, INNOVATION MANAGER
03/12/2019
Cyberspace
 “… a consensual hallucination
experienced daily by billions of
legitimate operators, in every nation,
by children being taught
mathematical concepts... A graphic
representation of data abstracted
from the banks of every computer in
the human system. Unthinkable
complexity. Lines of light ranged in
the non-space of the mind, clusters
and constellations of data. Like city
lights, receding” (Gibson, 1966)
Domains of Cybersecurity
Strategic Model for the Italian Public
Sector
“security comprises activities for the
regulation and governing of cybersecurity
in the PA for assessment testing and
CERT-PA as an operative tool by which to
support the adoption of correct security
levels at the Public Administration. All
other aspects are also identified as come
together to make the IT systems secure
and reliable, as well as guidance and
correlated instruments for compliance in
respect of privacy” (2019 - 2021 Three-
Year Plan)
Areas covered by Standardisation
 Security feature provision — Sector/technology specific security features
 Security assurance — Common Criteria initiative (ISO 15408)
 Security threat sharing — CSIRTs (Computer Security Incident Response
Teams) STIX/TAXII, CyBox, MISPs (Malware information Sharing Platform)
 Organisational management for secure operations — ISO/IEC 27001
Strategic Focus Areas
 Infrastructures and Centres — Secure
the national internet network and data
centres of the PA
 Enabling actions — Protection of critical
national applications, national threat
repository, system-wide risk
management
 Enabling Technologies — Encryption,
blockchain, biometric, and quantum
technologies
 Technologies to Protect — Industry 4.0,
IoT, industrial control systems, and
robots
 Horizontal Actions —Training,
awareness and certification projects
EU Strategy
 Cybersecurity requirements for Operators of Essential Services (OES –
essentially critical infrastructure companies) and digital service providers (DSPs)
 Certification framework for digital products, services, and processes
 The EU Cybersecurity Act made the European Network and Information
Security Agency (ENISA) a permanent government agency and significantly
expanded its role and responsibilities with respect to cybersecurity
 Cybersecurity as a “high priority” field: the proposed cybersecurity budget for
2021-27 include €2 billion to fund “safeguarding the EU's digital economy,
society and democracies through polling expertise, boosting EU's cybersecurity
industry, financing state-of-the-art cybersecurity equipment and infrastructure”
ENISA Guidelines
 Technical Guidelines for the implementation of minimum security
measures for Digital Service Providers
 Mapping of OES [Operators of Essential Services] Security Requirements to
Specific Sectors
 Good practices on interdependencies between OES and DSPs
 Guidelines on assessing DSPs and OES compliance to the NISD security
requirements
NIS Cooperation Group Guidelines
 Reference document on the identification of Operators of Essential Services
 Reference document on security measures for Operators of Essential Services
 Reference document on Incident Notification for Operators of Essential
Services
 Compendium on cyber security of election technology
 Guidelines on notification of Operators of Essential Services incidents
 Guidelines on notification of Digital Service Providers incidents
 Cybersecurity Incident Taxonomy
 Guidelines for the Member States on voluntary information exchange on cross-
border dependencies
 Risk assessment of 5G networks
DevSecOps
 Security as Code
 Automation
 Everyone is responsible
 Security added to all business processes (no silos)
 Consumable Security Services (API)
 Open Contribution & Collaboration
 Nation-wide DevSecOps
roberto@reale.me

More Related Content

What's hot

To Regulate or not to Regulate - Opening the AI Black Box for Parliaments
To Regulate or not to Regulate - Opening the AI Black Box for Parliaments To Regulate or not to Regulate - Opening the AI Black Box for Parliaments
To Regulate or not to Regulate - Opening the AI Black Box for Parliaments Dr. Fotios Fitsilis
 
Call for Paper - International Journal of Mobile Network Communications & Te...
Call for Paper - International Journal of Mobile Network Communications &  Te...Call for Paper - International Journal of Mobile Network Communications &  Te...
Call for Paper - International Journal of Mobile Network Communications & Te...ijmnct
 
Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...ijmnct
 
Ijmnct cfp july 25
Ijmnct cfp july 25Ijmnct cfp july 25
Ijmnct cfp july 25ijmnct
 
Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...ijassn
 
FIWARE Global Summit - Alastria Blockchain Ecosystem
FIWARE Global Summit - Alastria Blockchain EcosystemFIWARE Global Summit - Alastria Blockchain Ecosystem
FIWARE Global Summit - Alastria Blockchain EcosystemFIWARE
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)ijassn
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
IoT and Crime Prevention
IoT and Crime PreventionIoT and Crime Prevention
IoT and Crime PreventionIoTUK
 
Call for Papers-International Journal of Mobile Network Communications & Tele...
Call for Papers-International Journal of Mobile Network Communications & Tele...Call for Papers-International Journal of Mobile Network Communications & Tele...
Call for Papers-International Journal of Mobile Network Communications & Tele...ijmnct
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)ijassn
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
Horizon research project opportunities final
Horizon research project opportunities finalHorizon research project opportunities final
Horizon research project opportunities finalPanagiotisKeramidis
 
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)pijans
 
AIOTI presentation
AIOTI presentationAIOTI presentation
AIOTI presentationIoTUK
 
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)ijwscjournal
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub OverviewIoTUK
 

What's hot (19)

To Regulate or not to Regulate - Opening the AI Black Box for Parliaments
To Regulate or not to Regulate - Opening the AI Black Box for Parliaments To Regulate or not to Regulate - Opening the AI Black Box for Parliaments
To Regulate or not to Regulate - Opening the AI Black Box for Parliaments
 
Call for Paper - International Journal of Mobile Network Communications & Te...
Call for Paper - International Journal of Mobile Network Communications &  Te...Call for Paper - International Journal of Mobile Network Communications &  Te...
Call for Paper - International Journal of Mobile Network Communications & Te...
 
Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...Call for Paper - International Journal of Mobile Network Communications & Tel...
Call for Paper - International Journal of Mobile Network Communications & Tel...
 
Ijmnct cfp july 25
Ijmnct cfp july 25Ijmnct cfp july 25
Ijmnct cfp july 25
 
Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...Call for papers - International conference on networks, blockchain and intern...
Call for papers - International conference on networks, blockchain and intern...
 
FIWARE Global Summit - Alastria Blockchain Ecosystem
FIWARE Global Summit - Alastria Blockchain EcosystemFIWARE Global Summit - Alastria Blockchain Ecosystem
FIWARE Global Summit - Alastria Blockchain Ecosystem
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
IoT and Crime Prevention
IoT and Crime PreventionIoT and Crime Prevention
IoT and Crime Prevention
 
Call for Papers-International Journal of Mobile Network Communications & Tele...
Call for Papers-International Journal of Mobile Network Communications & Tele...Call for Papers-International Journal of Mobile Network Communications & Tele...
Call for Papers-International Journal of Mobile Network Communications & Tele...
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
Horizon research project opportunities final
Horizon research project opportunities finalHorizon research project opportunities final
Horizon research project opportunities final
 
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
9 th International Conference on Mobile & Wireless Networks (MoWiN 2020)
 
AIOTI presentation
AIOTI presentationAIOTI presentation
AIOTI presentation
 
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
International Conference on Big Data, IoT and Machine Learning (BIOM 2021)
 
PETRAS Hub Overview
PETRAS Hub OverviewPETRAS Hub Overview
PETRAS Hub Overview
 

Similar to Governing Information Security

The National Security Framework of Spain
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of SpainMiguel A. Amutio
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transportAndrey Apuhtin
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesingsegughana
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsBigData_Europe
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Img s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meetingImg s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meetingMarco Manso
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementchristophefeltus
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...Miguel A. Amutio
 
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxSecurity Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxedgar6wallace88877
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecurityBigData_Europe
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...Sandro D'Elia
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115James Bryce Clark
 

Similar to Governing Information Security (20)

The National Security Framework of Spain
The National Security Framework of SpainThe National Security Framework of Spain
The National Security Framework of Spain
 
Cyber security for smart cities an architecture model for public transport
Cyber security for smart cities   an architecture model for public transportCyber security for smart cities   an architecture model for public transport
Cyber security for smart cities an architecture model for public transport
 
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-DebeesingCTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systemsSC7 Workshop 3: Enhancing cyber defence of cyber space systems
SC7 Workshop 3: Enhancing cyber defence of cyber space systems
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Img s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meetingImg s sumary-paper_for_march19_meeting
Img s sumary-paper_for_march19_meeting
 
ITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information TechnologyITU Security in Telecommunications & Information Technology
ITU Security in Telecommunications & Information Technology
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security in smart cities
Cyber security in smart cities  Cyber security in smart cities
Cyber security in smart cities
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...20111010 The National Security Framework of Spain for Guide Share Europe, in ...
20111010 The National Security Framework of Spain for Guide Share Europe, in ...
 
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docxSecurity Attacks and Countermeasures on Cloud Assisted IoT App.docx
Security Attacks and Countermeasures on Cloud Assisted IoT App.docx
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
Looking beyond 2020 IEEE – 13th System of Systems Engineering Conference - So...
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 

More from Roberto Reale

eInvoicing adoption in Italy & CEF projects
eInvoicing adoption in Italy & CEF projectseInvoicing adoption in Italy & CEF projects
eInvoicing adoption in Italy & CEF projectsRoberto Reale
 
eProcurement governance: i nodi da sciogliere
eProcurement governance: i nodi da sciogliereeProcurement governance: i nodi da sciogliere
eProcurement governance: i nodi da sciogliereRoberto Reale
 
Società Civile: diritto di accesso e sicurezza in rete
Società Civile: diritto di accesso e sicurezza in reteSocietà Civile: diritto di accesso e sicurezza in rete
Società Civile: diritto di accesso e sicurezza in reteRoberto Reale
 
Tecnologie emergenti: opportunità, sfide, governance
Tecnologie emergenti: opportunità, sfide, governanceTecnologie emergenti: opportunità, sfide, governance
Tecnologie emergenti: opportunità, sfide, governanceRoberto Reale
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for BusinessRoberto Reale
 
Politically correct. Sentiment analysis of Italian political texts
Politically correct. Sentiment analysis of Italian political textsPolitically correct. Sentiment analysis of Italian political texts
Politically correct. Sentiment analysis of Italian political textsRoberto Reale
 
Beyond relational: «neural» DBMS?
Beyond relational: «neural» DBMS?Beyond relational: «neural» DBMS?
Beyond relational: «neural» DBMS?Roberto Reale
 
La Strategia per la Crescita Digitale 2014-2020
La Strategia per la Crescita Digitale 2014-2020La Strategia per la Crescita Digitale 2014-2020
La Strategia per la Crescita Digitale 2014-2020Roberto Reale
 
Homo Digitalis: Metamorfosi dell'identità
Homo Digitalis: Metamorfosi dell'identitàHomo Digitalis: Metamorfosi dell'identità
Homo Digitalis: Metamorfosi dell'identitàRoberto Reale
 
The History of Technological Anxiety and the Future of Economic Growth: Is Th...
The History of Technological Anxiety and the Future of Economic Growth: Is Th...The History of Technological Anxiety and the Future of Economic Growth: Is Th...
The History of Technological Anxiety and the Future of Economic Growth: Is Th...Roberto Reale
 
All'ombra del Leviatano: Filesystem in Userspace
All'ombra del Leviatano: Filesystem in UserspaceAll'ombra del Leviatano: Filesystem in Userspace
All'ombra del Leviatano: Filesystem in UserspaceRoberto Reale
 
Fog and the City: an urbanist's perspective
Fog and the City: an urbanist's perspectiveFog and the City: an urbanist's perspective
Fog and the City: an urbanist's perspectiveRoberto Reale
 
The Unbearable Lightness: Extending the Bash shell
The Unbearable Lightness: Extending the Bash shellThe Unbearable Lightness: Extending the Bash shell
The Unbearable Lightness: Extending the Bash shellRoberto Reale
 

More from Roberto Reale (13)

eInvoicing adoption in Italy & CEF projects
eInvoicing adoption in Italy & CEF projectseInvoicing adoption in Italy & CEF projects
eInvoicing adoption in Italy & CEF projects
 
eProcurement governance: i nodi da sciogliere
eProcurement governance: i nodi da sciogliereeProcurement governance: i nodi da sciogliere
eProcurement governance: i nodi da sciogliere
 
Società Civile: diritto di accesso e sicurezza in rete
Società Civile: diritto di accesso e sicurezza in reteSocietà Civile: diritto di accesso e sicurezza in rete
Società Civile: diritto di accesso e sicurezza in rete
 
Tecnologie emergenti: opportunità, sfide, governance
Tecnologie emergenti: opportunità, sfide, governanceTecnologie emergenti: opportunità, sfide, governance
Tecnologie emergenti: opportunità, sfide, governance
 
Blockchain for Business
Blockchain for BusinessBlockchain for Business
Blockchain for Business
 
Politically correct. Sentiment analysis of Italian political texts
Politically correct. Sentiment analysis of Italian political textsPolitically correct. Sentiment analysis of Italian political texts
Politically correct. Sentiment analysis of Italian political texts
 
Beyond relational: «neural» DBMS?
Beyond relational: «neural» DBMS?Beyond relational: «neural» DBMS?
Beyond relational: «neural» DBMS?
 
La Strategia per la Crescita Digitale 2014-2020
La Strategia per la Crescita Digitale 2014-2020La Strategia per la Crescita Digitale 2014-2020
La Strategia per la Crescita Digitale 2014-2020
 
Homo Digitalis: Metamorfosi dell'identità
Homo Digitalis: Metamorfosi dell'identitàHomo Digitalis: Metamorfosi dell'identità
Homo Digitalis: Metamorfosi dell'identità
 
The History of Technological Anxiety and the Future of Economic Growth: Is Th...
The History of Technological Anxiety and the Future of Economic Growth: Is Th...The History of Technological Anxiety and the Future of Economic Growth: Is Th...
The History of Technological Anxiety and the Future of Economic Growth: Is Th...
 
All'ombra del Leviatano: Filesystem in Userspace
All'ombra del Leviatano: Filesystem in UserspaceAll'ombra del Leviatano: Filesystem in Userspace
All'ombra del Leviatano: Filesystem in Userspace
 
Fog and the City: an urbanist's perspective
Fog and the City: an urbanist's perspectiveFog and the City: an urbanist's perspective
Fog and the City: an urbanist's perspective
 
The Unbearable Lightness: Extending the Bash shell
The Unbearable Lightness: Extending the Bash shellThe Unbearable Lightness: Extending the Bash shell
The Unbearable Lightness: Extending the Bash shell
 

Recently uploaded

OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxJohnree4
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationNathan Young
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxaryanv1753
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...marjmae69
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 

Recently uploaded (20)

OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Genshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptxGenshin Impact PPT Template by EaTemp.pptx
Genshin Impact PPT Template by EaTemp.pptx
 
The Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism PresentationThe Ten Facts About People With Autism Presentation
The Ten Facts About People With Autism Presentation
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Event 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptxEvent 4 Introduction to Open Source.pptx
Event 4 Introduction to Open Source.pptx
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
Gaps, Issues and Challenges in the Implementation of Mother Tongue Based-Mult...
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 

Governing Information Security

  • 1. Governing Information Security ROBERTO REALE, INNOVATION MANAGER 03/12/2019
  • 2. Cyberspace  “… a consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts... A graphic representation of data abstracted from the banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the non-space of the mind, clusters and constellations of data. Like city lights, receding” (Gibson, 1966)
  • 4. Strategic Model for the Italian Public Sector “security comprises activities for the regulation and governing of cybersecurity in the PA for assessment testing and CERT-PA as an operative tool by which to support the adoption of correct security levels at the Public Administration. All other aspects are also identified as come together to make the IT systems secure and reliable, as well as guidance and correlated instruments for compliance in respect of privacy” (2019 - 2021 Three- Year Plan)
  • 5. Areas covered by Standardisation  Security feature provision — Sector/technology specific security features  Security assurance — Common Criteria initiative (ISO 15408)  Security threat sharing — CSIRTs (Computer Security Incident Response Teams) STIX/TAXII, CyBox, MISPs (Malware information Sharing Platform)  Organisational management for secure operations — ISO/IEC 27001
  • 6. Strategic Focus Areas  Infrastructures and Centres — Secure the national internet network and data centres of the PA  Enabling actions — Protection of critical national applications, national threat repository, system-wide risk management  Enabling Technologies — Encryption, blockchain, biometric, and quantum technologies  Technologies to Protect — Industry 4.0, IoT, industrial control systems, and robots  Horizontal Actions —Training, awareness and certification projects
  • 7. EU Strategy  Cybersecurity requirements for Operators of Essential Services (OES – essentially critical infrastructure companies) and digital service providers (DSPs)  Certification framework for digital products, services, and processes  The EU Cybersecurity Act made the European Network and Information Security Agency (ENISA) a permanent government agency and significantly expanded its role and responsibilities with respect to cybersecurity  Cybersecurity as a “high priority” field: the proposed cybersecurity budget for 2021-27 include €2 billion to fund “safeguarding the EU's digital economy, society and democracies through polling expertise, boosting EU's cybersecurity industry, financing state-of-the-art cybersecurity equipment and infrastructure”
  • 8. ENISA Guidelines  Technical Guidelines for the implementation of minimum security measures for Digital Service Providers  Mapping of OES [Operators of Essential Services] Security Requirements to Specific Sectors  Good practices on interdependencies between OES and DSPs  Guidelines on assessing DSPs and OES compliance to the NISD security requirements
  • 9. NIS Cooperation Group Guidelines  Reference document on the identification of Operators of Essential Services  Reference document on security measures for Operators of Essential Services  Reference document on Incident Notification for Operators of Essential Services  Compendium on cyber security of election technology  Guidelines on notification of Operators of Essential Services incidents  Guidelines on notification of Digital Service Providers incidents  Cybersecurity Incident Taxonomy  Guidelines for the Member States on voluntary information exchange on cross- border dependencies  Risk assessment of 5G networks
  • 10. DevSecOps  Security as Code  Automation  Everyone is responsible  Security added to all business processes (no silos)  Consumable Security Services (API)  Open Contribution & Collaboration  Nation-wide DevSecOps