Training Event in “OSA COMMUNITY”

Turin, January 10, 2024

at NOVOTEL Corso Giulio Cesare 338/34 Turin

Cyber Crime & Cyber Security
Digital data is increasing exponentially and transversally affects private and business life. Personal data has now become an asset; it constitutes an intangible asset of the individual and the company; privacy regulations and the application of GDPR 2016/679 reinforce this concept.
However, data is increasingly subject to duplication, exfiltration, modification, and counterfeiting for illicit purposes through the use of scientific computer techniques and methodologies related to digital crime, the so-called “Cyber Crime” or, to use an Italian term, “computer crimes.” It is necessary to securely preserve data so that it is recognized over time, objectively guaranteeing reliability and authorship.

Web Reputation:
The online reputation of entrepreneurs and companies is increasingly at risk and threatened; Cyber Security techniques can ensure the protection and immutability of our personal image and that of the company brand. Digital rights will be recognized with scientific methodologies of Digital Forensics, guaranteeing individuals and companies certain evidentiary elements in the legal field by applying scientific “Best Practices” – Law 48/2008 and the right to be forgotten (art. 17 Privacy GDPR) for deletion, de-indexing, de-listing of results present in search engines

Request a consultation for the following Soft and Hard Skills for effective corporate “Governance”, “Risk” assessment, and applying correct regulatory “Compliance”:

“CTO”: The Chief Technology Officer (CTO) holds an executive-level position within a company or other entity where they focus on scientific and technological issues within the organization.

“CISO”: acronym for Chief Information Security Officer, is a security manager who in recent years has been emerging, albeit slowly, as a key figure responsible for the security of information and company assets.

“DPO”: The Data Protection Officer is a professional figure expert in data protection, whose task is to evaluate and organize the management of personal data processing

“CYBER SECURITY CONSULTANT” The security consultant is the one who evaluates software, networks and computer systems, playing both the role of attacker and defender, discovering system weaknesses and finding the best management and resolution strategy for potential threats.

“DIGITAL FORENSICS & MOBILE FORENSICS” Computer forensics expert; The computer forensics expert is primarily responsible for collecting digital evidence that can then be used in an out-of-court, civil/criminal legal proceeding.

The main computer crimes committed today are:

• IDENTITY THEFT;
• VIOLATIONS OF EMAIL ACCOUNTS AND/OR SOCIAL PROFILES;
• UNAUTHORIZED ACCESS TO COMPUTER SYSTEMS;
• SPYWARE AND REMOTE CONTROL OF PHONES-PCs;
• FRAUD ON E-COMMERCE PLATFORMS;
• FRAUD THROUGH CREDITS ON FALSE IBAN PROVIDED THROUGH EMAILS APPARENTLY FROM CLIENT COMPANIES (SO-CALLED “PHISHING”);
• FRAUD THROUGH SMS INTENDED TO OBTAIN RECHARGES, TRANSFERS, MONEY EXFILTRATION FROM BANK ACCOUNTS;
• VIRUS MALWARE – RANSOMWARE RANSOM AND PAYMENT.