SlideShare a Scribd company logo
1 of 10
Security ChallengeSecurity Challenge
Bologna 12 Settembre 2016
Luca Moroni Via Virtuosa Founder
Validation of business withValidation of business with customerscustomers
Via Virtuosa winning strategyVia Virtuosa winning strategy
Key point ofKey point of Via VirtuosaVia Virtuosa
We Offer:We Offer:
• A wide knowledge of the marketA wide knowledge of the market
requirements within the NE Italy arearequirements within the NE Italy area
• Sale hardening to startup withoutSale hardening to startup without
exprerienceexprerience
• AgilityAgility
• A portfolio of mixed competencesA portfolio of mixed competences
• Bottom-up approachBottom-up approach
• Segregation of selling productSegregation of selling product
• Competence in scoutingCompetence in scouting
• Freestandig projectFreestandig project
• Guaranteed auditor rotationGuaranteed auditor rotation
• Anonymous scoutingAnonymous scouting
No innerspaceNo innerspace
• 2010-2015: 78 new customers2010-2015: 78 new customers
• Revenue 13/14 +15% 14/15Revenue 13/14 +15% 14/15
+17,7%+17,7%
• Via Virtuosa is a cybersecurityVia Virtuosa is a cybersecurity
brand in the actual businessbrand in the actual business
areaarea
Seminar “Sicurezza e rete”
(Bassano del Grappa – VI - 2001)
Talk “Cyber Security Awareness of Critical
Infrastructures in North East of Italy: Scenario and
Guidelines for self-assessment ”
(ISACA SLOVENIA CONFERENCE Ljubljana, Oktober
2016)
Future goalsFuture goals
Get over the boundariesGet over the boundaries andand
Build BridgeheadsBuild Bridgeheads
Cyberattach Rank Source: Executive Opinion Survey 2015 Word
Economic Forum
Future goalsFuture goals
Industrialization of brokeringIndustrialization of brokering
businessesbusinesses
Leaning the business model andLeaning the business model and
moving the technical resourcesmoving the technical resources
outside (eg. Startup).outside (eg. Startup).
Internal core team will be focusedInternal core team will be focused
only on technical sales andonly on technical sales and
scouting.scouting.
Future goalsFuture goals
Looking for strong sponsors forLooking for strong sponsors for
P.A. and International GroupsP.A. and International Groups
escalation.escalation.
Offering segregationOffering segregation
Security Advisor SearchSecurity Advisor Search
✓
Future sponsorsFuture sponsors
• Business Angels looking for safeBusiness Angels looking for safe
investmentinvestment
• Startups seeking an externalStartups seeking an external
salesforcesalesforce
• EU Companies that are seeking anEU Companies that are seeking an
external BU on cybersecurityexternal BU on cybersecurity
• EU Vendors that are seeking aEU Vendors that are seeking a
segregated auditor whitin oursegregated auditor whitin our
territoryterritory
IN CASE OF INFORMATION SECURITY PROBLEMS
SCRATCH OFF GENTLY WITH COIN
Thanks
viavirtuosa.com - l.moroni@viavirtuosa.it

More Related Content

What's hot

Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Michael Davis
 

What's hot (20)

Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
Why IT Systems Need to Conduct IT System Penetration Tests - Chris Gatford, N...
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
IoT security Q3 2020 overview
IoT security Q3 2020 overview IoT security Q3 2020 overview
IoT security Q3 2020 overview
 
CV 2.4 18/06/2016
CV 2.4 18/06/2016CV 2.4 18/06/2016
CV 2.4 18/06/2016
 
Organizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC ApproachOrganizational Resilience Management - an Integrated GRC Approach
Organizational Resilience Management - an Integrated GRC Approach
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
 
ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls ACI's Global Encryption, Cloud & Cybersecurity Controls
ACI's Global Encryption, Cloud & Cybersecurity Controls
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
 
Mbs t18 a
Mbs t18 aMbs t18 a
Mbs t18 a
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
 
10 the-finstix-data-model
10 the-finstix-data-model10 the-finstix-data-model
10 the-finstix-data-model
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
H2020 finsec-ort-webinar-ml-dl-cybersecurity-july 2020
H2020 finsec-ort-webinar-ml-dl-cybersecurity-july 2020H2020 finsec-ort-webinar-ml-dl-cybersecurity-july 2020
H2020 finsec-ort-webinar-ml-dl-cybersecurity-july 2020
 

Similar to Presentazione Security Challenga 12/9/16 Bologna

Reyes_1120am_Bring Stakeholders Along_17Sep2015_PDF
Reyes_1120am_Bring Stakeholders Along_17Sep2015_PDFReyes_1120am_Bring Stakeholders Along_17Sep2015_PDF
Reyes_1120am_Bring Stakeholders Along_17Sep2015_PDF
Federico Reyes
 
Innovation 360 profile
Innovation 360 profileInnovation 360 profile
Innovation 360 profile
Innovation 360
 

Similar to Presentazione Security Challenga 12/9/16 Bologna (20)

Nuvolab Seminar for Accelmed 2014: Going Global - Small Business Big World
Nuvolab Seminar for Accelmed 2014: Going Global - Small Business Big WorldNuvolab Seminar for Accelmed 2014: Going Global - Small Business Big World
Nuvolab Seminar for Accelmed 2014: Going Global - Small Business Big World
 
ONEtoONEcfUSA_Overview
ONEtoONEcfUSA_OverviewONEtoONEcfUSA_Overview
ONEtoONEcfUSA_Overview
 
Working with prosperity
Working with prosperityWorking with prosperity
Working with prosperity
 
The crisis of the marketer in IT
The crisis of the marketer in IT The crisis of the marketer in IT
The crisis of the marketer in IT
 
Venture on demand: step up your start-up game
Venture on demand: step up your start-up gameVenture on demand: step up your start-up game
Venture on demand: step up your start-up game
 
global Venture funding and start up data : top 10 charts
global Venture funding and start up data : top 10 chartsglobal Venture funding and start up data : top 10 charts
global Venture funding and start up data : top 10 charts
 
Reyes_1120am_Bring Stakeholders Along_17Sep2015_PDF
Reyes_1120am_Bring Stakeholders Along_17Sep2015_PDFReyes_1120am_Bring Stakeholders Along_17Sep2015_PDF
Reyes_1120am_Bring Stakeholders Along_17Sep2015_PDF
 
Sandip hadkar portfolio 2018
Sandip hadkar   portfolio 2018Sandip hadkar   portfolio 2018
Sandip hadkar portfolio 2018
 
Gap Consulting - Brochure
Gap Consulting - BrochureGap Consulting - Brochure
Gap Consulting - Brochure
 
Reasons for small business outsourcing
Reasons for small business outsourcingReasons for small business outsourcing
Reasons for small business outsourcing
 
Top 100 global engineering and construction brands
Top 100  global engineering and construction brands Top 100  global engineering and construction brands
Top 100 global engineering and construction brands
 
Tax, Transfer Pricing, Accouting, Auditing & Advisory Services | VGNC
Tax, Transfer Pricing, Accouting, Auditing & Advisory Services | VGNCTax, Transfer Pricing, Accouting, Auditing & Advisory Services | VGNC
Tax, Transfer Pricing, Accouting, Auditing & Advisory Services | VGNC
 
VGNC |Top Accounting & Business Consulting Firms in Delhi
VGNC |Top Accounting & Business Consulting Firms in DelhiVGNC |Top Accounting & Business Consulting Firms in Delhi
VGNC |Top Accounting & Business Consulting Firms in Delhi
 
Business model innovation
Business model innovationBusiness model innovation
Business model innovation
 
Innovation 360 profile
Innovation 360 profileInnovation 360 profile
Innovation 360 profile
 
25 Corporate Incubators examples
25 Corporate Incubators examples25 Corporate Incubators examples
25 Corporate Incubators examples
 
ESCP Europe Club Executive Event
ESCP Europe Club Executive EventESCP Europe Club Executive Event
ESCP Europe Club Executive Event
 
Research NXT - About US
Research NXT - About USResearch NXT - About US
Research NXT - About US
 
Slash | The Venture Builder Playbook (5 may2021)
Slash  | The Venture Builder Playbook (5 may2021)Slash  | The Venture Builder Playbook (5 may2021)
Slash | The Venture Builder Playbook (5 may2021)
 
Investment & by Challenge Advisory
Investment & by Challenge AdvisoryInvestment & by Challenge Advisory
Investment & by Challenge Advisory
 

More from Luca Moroni ✔✔

Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Luca Moroni ✔✔
 

More from Luca Moroni ✔✔ (20)

Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton Spa
Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton SpaGenerazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton Spa
Generazione Z di Ettore Guarnaccia - Evento Bersaglio Mobile Breton Spa
 
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante
50 Anni Liceo Tron Schio. Cos'è la Cyber Security e perchè è così importante
 
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...
Etel - L’utilizzo dell’aspetto ludico per aumentare la consapevolezza riguard...
 
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
Talk "Come Costruire un firewall Umano" Italian Hacker Camp 2018
 
Articolo Via Virtuosa Sole 24 ore
Articolo Via Virtuosa Sole 24 oreArticolo Via Virtuosa Sole 24 ore
Articolo Via Virtuosa Sole 24 ore
 
IoT: utile di sicuro. Ma sicuro?
IoT: utile di sicuro. Ma sicuro?IoT: utile di sicuro. Ma sicuro?
IoT: utile di sicuro. Ma sicuro?
 
Strumenti ISACA a supporto della conformità con il GDPR
Strumenti ISACA a supporto della conformità con il GDPRStrumenti ISACA a supporto della conformità con il GDPR
Strumenti ISACA a supporto della conformità con il GDPR
 
Scegliere i servizi Cloud: il metodo di approccio e il rischio Cloud
Scegliere i servizi Cloud: il metodo di approccio e il rischio CloudScegliere i servizi Cloud: il metodo di approccio e il rischio Cloud
Scegliere i servizi Cloud: il metodo di approccio e il rischio Cloud
 
Caso ip mosaic 2007
Caso ip mosaic 2007Caso ip mosaic 2007
Caso ip mosaic 2007
 
Confindustria udine sicurezza in produzione 2014
Confindustria udine sicurezza in produzione 2014Confindustria udine sicurezza in produzione 2014
Confindustria udine sicurezza in produzione 2014
 
Aziende poco pronte alla cyber insurance
Aziende poco pronte alla cyber insuranceAziende poco pronte alla cyber insurance
Aziende poco pronte alla cyber insurance
 
Frequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk InsuranceFrequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk Insurance
 
Un Volo Sulla Cybersecurity
Un Volo Sulla CybersecurityUn Volo Sulla Cybersecurity
Un Volo Sulla Cybersecurity
 
Proteggere i dispositivi mobili
Proteggere i dispositivi mobiliProteggere i dispositivi mobili
Proteggere i dispositivi mobili
 
Articolo aprile 2013 ict security
Articolo aprile 2013 ict securityArticolo aprile 2013 ict security
Articolo aprile 2013 ict security
 
Articolo Information Security 17 gen feb 2013 pp 42-45
Articolo Information Security 17 gen feb 2013 pp 42-45Articolo Information Security 17 gen feb 2013 pp 42-45
Articolo Information Security 17 gen feb 2013 pp 42-45
 
Aricolo realtà industriale dic 2016 sulle polizze cyber
Aricolo realtà industriale dic 2016 sulle polizze cyberAricolo realtà industriale dic 2016 sulle polizze cyber
Aricolo realtà industriale dic 2016 sulle polizze cyber
 
Realtà industriale 01 2015
Realtà industriale 01 2015Realtà industriale 01 2015
Realtà industriale 01 2015
 
Convegno Università di Trento Sicurezza nei settori critici
Convegno Università di Trento Sicurezza nei settori criticiConvegno Università di Trento Sicurezza nei settori critici
Convegno Università di Trento Sicurezza nei settori critici
 
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013
Seminario Fondazione Centro Produttivita' Veneto - Vicenza 24 Ottobre 2013
 

Recently uploaded

Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Hung Le
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
ZurliaSoop
 

Recently uploaded (19)

BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf2024 mega trends for the digital workplace - FINAL.pdf
2024 mega trends for the digital workplace - FINAL.pdf
 
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORNLITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
LITTLE ABOUT LESOTHO FROM THE TIME MOSHOESHOE THE FIRST WAS BORN
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
ECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentationECOLOGY OF FISHES.pptx full presentation
ECOLOGY OF FISHES.pptx full presentation
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
Abortion Pills Fahaheel ௹+918133066128💬@ Safe and Effective Mifepristion and ...
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
Using AI to boost productivity for developers
Using AI to boost productivity for developersUsing AI to boost productivity for developers
Using AI to boost productivity for developers
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR"I hear you": Moving beyond empathy in UXR
"I hear you": Moving beyond empathy in UXR
 
The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...The Concession of Asaba International Airport: Balancing Politics and Policy ...
The Concession of Asaba International Airport: Balancing Politics and Policy ...
 

Presentazione Security Challenga 12/9/16 Bologna

  • 1. Security ChallengeSecurity Challenge Bologna 12 Settembre 2016 Luca Moroni Via Virtuosa Founder
  • 2.
  • 3. Validation of business withValidation of business with customerscustomers Via Virtuosa winning strategyVia Virtuosa winning strategy
  • 4. Key point ofKey point of Via VirtuosaVia Virtuosa We Offer:We Offer: • A wide knowledge of the marketA wide knowledge of the market requirements within the NE Italy arearequirements within the NE Italy area • Sale hardening to startup withoutSale hardening to startup without exprerienceexprerience • AgilityAgility • A portfolio of mixed competencesA portfolio of mixed competences • Bottom-up approachBottom-up approach • Segregation of selling productSegregation of selling product • Competence in scoutingCompetence in scouting • Freestandig projectFreestandig project • Guaranteed auditor rotationGuaranteed auditor rotation • Anonymous scoutingAnonymous scouting
  • 5. No innerspaceNo innerspace • 2010-2015: 78 new customers2010-2015: 78 new customers • Revenue 13/14 +15% 14/15Revenue 13/14 +15% 14/15 +17,7%+17,7% • Via Virtuosa is a cybersecurityVia Virtuosa is a cybersecurity brand in the actual businessbrand in the actual business areaarea Seminar “Sicurezza e rete” (Bassano del Grappa – VI - 2001) Talk “Cyber Security Awareness of Critical Infrastructures in North East of Italy: Scenario and Guidelines for self-assessment ” (ISACA SLOVENIA CONFERENCE Ljubljana, Oktober 2016)
  • 6. Future goalsFuture goals Get over the boundariesGet over the boundaries andand Build BridgeheadsBuild Bridgeheads Cyberattach Rank Source: Executive Opinion Survey 2015 Word Economic Forum
  • 7. Future goalsFuture goals Industrialization of brokeringIndustrialization of brokering businessesbusinesses Leaning the business model andLeaning the business model and moving the technical resourcesmoving the technical resources outside (eg. Startup).outside (eg. Startup). Internal core team will be focusedInternal core team will be focused only on technical sales andonly on technical sales and scouting.scouting.
  • 8. Future goalsFuture goals Looking for strong sponsors forLooking for strong sponsors for P.A. and International GroupsP.A. and International Groups escalation.escalation. Offering segregationOffering segregation Security Advisor SearchSecurity Advisor Search ✓
  • 9. Future sponsorsFuture sponsors • Business Angels looking for safeBusiness Angels looking for safe investmentinvestment • Startups seeking an externalStartups seeking an external salesforcesalesforce • EU Companies that are seeking anEU Companies that are seeking an external BU on cybersecurityexternal BU on cybersecurity • EU Vendors that are seeking aEU Vendors that are seeking a segregated auditor whitin oursegregated auditor whitin our territoryterritory
  • 10. IN CASE OF INFORMATION SECURITY PROBLEMS SCRATCH OFF GENTLY WITH COIN Thanks viavirtuosa.com - l.moroni@viavirtuosa.it