ºÝºÝߣshows by User: markoermacchi / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: markoermacchi / Fri, 02 Nov 2018 13:12:22 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: markoermacchi Blockchain: everyone wants to sell me that - but is that really right for my application? /slideshow/blockchain-everyone-wants-to-sell-me-that-but-is-that-really-right-for-my-application/121548552 csx2018-blockchain-181102131223
Another day, another article praising blockchain’s untapped potential: it will start a new era, revolution the financial system, disrupt every industry and will change the world. Or will it not? and is that really what I need for my next project? After this presentation, you will be able to: - Understand the basic of blockchains as compared to other traditional (both centralized and distributed) technologies such as relational databases and identity management systems. - Identify the characteristics of a potentially successful blockchain project, versus one that should be tackled with "traditional" technology. - What are the main factors that tell an initiative is or is not a good candidate for a blockchain project, and how to find a topic which may be a good candidate within your organization. - How to answer the excessive counter-critiques, such as that there is no good use for blockchains at all. This is obviously not true and there are very good examples of successful projects, from which we can learn the essentials.]]>

Another day, another article praising blockchain’s untapped potential: it will start a new era, revolution the financial system, disrupt every industry and will change the world. Or will it not? and is that really what I need for my next project? After this presentation, you will be able to: - Understand the basic of blockchains as compared to other traditional (both centralized and distributed) technologies such as relational databases and identity management systems. - Identify the characteristics of a potentially successful blockchain project, versus one that should be tackled with "traditional" technology. - What are the main factors that tell an initiative is or is not a good candidate for a blockchain project, and how to find a topic which may be a good candidate within your organization. - How to answer the excessive counter-critiques, such as that there is no good use for blockchains at all. This is obviously not true and there are very good examples of successful projects, from which we can learn the essentials.]]>
Fri, 02 Nov 2018 13:12:22 GMT /slideshow/blockchain-everyone-wants-to-sell-me-that-but-is-that-really-right-for-my-application/121548552 markoermacchi@slideshare.net(markoermacchi) Blockchain: everyone wants to sell me that - but is that really right for my application? markoermacchi Another day, another article praising blockchain’s untapped potential: it will start a new era, revolution the financial system, disrupt every industry and will change the world. Or will it not? and is that really what I need for my next project? After this presentation, you will be able to: - Understand the basic of blockchains as compared to other traditional (both centralized and distributed) technologies such as relational databases and identity management systems. - Identify the characteristics of a potentially successful blockchain project, versus one that should be tackled with "traditional" technology. - What are the main factors that tell an initiative is or is not a good candidate for a blockchain project, and how to find a topic which may be a good candidate within your organization. - How to answer the excessive counter-critiques, such as that there is no good use for blockchains at all. This is obviously not true and there are very good examples of successful projects, from which we can learn the essentials. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/csx2018-blockchain-181102131223-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Another day, another article praising blockchain’s untapped potential: it will start a new era, revolution the financial system, disrupt every industry and will change the world. Or will it not? and is that really what I need for my next project? After this presentation, you will be able to: - Understand the basic of blockchains as compared to other traditional (both centralized and distributed) technologies such as relational databases and identity management systems. - Identify the characteristics of a potentially successful blockchain project, versus one that should be tackled with &quot;traditional&quot; technology. - What are the main factors that tell an initiative is or is not a good candidate for a blockchain project, and how to find a topic which may be a good candidate within your organization. - How to answer the excessive counter-critiques, such as that there is no good use for blockchains at all. This is obviously not true and there are very good examples of successful projects, from which we can learn the essentials.
Blockchain: everyone wants to sell me that - but is that really right for my application? from EQS Group
]]>
365 1 https://cdn.slidesharecdn.com/ss_thumbnails/csx2018-blockchain-181102131223-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Impact of GDPR on Third Party and M&A Security /slideshow/impact-of-gdpr-on-third-party-and-ma-security/121548202 csx2018-gdpr3rdparty-181102130728
GDPR impact has been dissected and examined to death - however, M&A activities, as well as third-party security posture, can be greatly affected as well, and this aspect has not been very often pursued. This session hopes to be useful for that.]]>

GDPR impact has been dissected and examined to death - however, M&A activities, as well as third-party security posture, can be greatly affected as well, and this aspect has not been very often pursued. This session hopes to be useful for that.]]>
Fri, 02 Nov 2018 13:07:28 GMT /slideshow/impact-of-gdpr-on-third-party-and-ma-security/121548202 markoermacchi@slideshare.net(markoermacchi) Impact of GDPR on Third Party and M&A Security markoermacchi GDPR impact has been dissected and examined to death - however, M&A activities, as well as third-party security posture, can be greatly affected as well, and this aspect has not been very often pursued. This session hopes to be useful for that. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/csx2018-gdpr3rdparty-181102130728-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> GDPR impact has been dissected and examined to death - however, M&amp;A activities, as well as third-party security posture, can be greatly affected as well, and this aspect has not been very often pursued. This session hopes to be useful for that.
Impact of GDPR on Third Party and M&A Security from EQS Group
]]>
367 3 https://cdn.slidesharecdn.com/ss_thumbnails/csx2018-gdpr3rdparty-181102130728-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH /slideshow/mergers-acquisitions-security-isc2-secure-summit-dach/78344773 mandasecuritysecuresummitdach-1-170728135808
It does not have an ISO standard. NIST barely mentions it. Despite hundreds of publications, no dedicated book is in sight. Enterprise Risk Management frameworks barely touch on it - if they even do. A chapter in Tipton's book dating 2007, proprietary solutions and sparse articles is all we have. In 2007 there was no Cloud yet - and that can be both a big help or a major issue in the process. Mergers & Acquisition is a matter left to Business Administration professionals, who don't like thinking about Information Security risks anyway. Information Security for Mergers & Acquisition is often an afterthought and rarely a deciding factor in due diligence exercises - but when your company acquires a new firm every quarter, you need to start thinking about something. This session will propose a simple framework and you will walk away with an actionable material you can start using tomorrow. Learning Objectives: - Understand information security risks and threats connected with merger and acquisition activities, which include months of often precarious IT migrations, a Cloud mess, and legacy services left exposed for months or years. - Understand how Cloud Computing affects information security risks and threats during a merger and acquisition activities, as well as the positive opportunities they can offer. - Why it is important that Information Security is involved in the early phases of due diligence, including during the phases in which the deal is structured and evaluated, and the acquisition model is defined. - Walk home with a simple framework and actionable material they can start using the day after.]]>

It does not have an ISO standard. NIST barely mentions it. Despite hundreds of publications, no dedicated book is in sight. Enterprise Risk Management frameworks barely touch on it - if they even do. A chapter in Tipton's book dating 2007, proprietary solutions and sparse articles is all we have. In 2007 there was no Cloud yet - and that can be both a big help or a major issue in the process. Mergers & Acquisition is a matter left to Business Administration professionals, who don't like thinking about Information Security risks anyway. Information Security for Mergers & Acquisition is often an afterthought and rarely a deciding factor in due diligence exercises - but when your company acquires a new firm every quarter, you need to start thinking about something. This session will propose a simple framework and you will walk away with an actionable material you can start using tomorrow. Learning Objectives: - Understand information security risks and threats connected with merger and acquisition activities, which include months of often precarious IT migrations, a Cloud mess, and legacy services left exposed for months or years. - Understand how Cloud Computing affects information security risks and threats during a merger and acquisition activities, as well as the positive opportunities they can offer. - Why it is important that Information Security is involved in the early phases of due diligence, including during the phases in which the deal is structured and evaluated, and the acquisition model is defined. - Walk home with a simple framework and actionable material they can start using the day after.]]>
Fri, 28 Jul 2017 13:58:08 GMT /slideshow/mergers-acquisitions-security-isc2-secure-summit-dach/78344773 markoermacchi@slideshare.net(markoermacchi) Mergers & Acquisitions security - (ISC)2 Secure Summit DACH markoermacchi It does not have an ISO standard. NIST barely mentions it. Despite hundreds of publications, no dedicated book is in sight. Enterprise Risk Management frameworks barely touch on it - if they even do. A chapter in Tipton's book dating 2007, proprietary solutions and sparse articles is all we have. In 2007 there was no Cloud yet - and that can be both a big help or a major issue in the process. Mergers & Acquisition is a matter left to Business Administration professionals, who don't like thinking about Information Security risks anyway. Information Security for Mergers & Acquisition is often an afterthought and rarely a deciding factor in due diligence exercises - but when your company acquires a new firm every quarter, you need to start thinking about something. This session will propose a simple framework and you will walk away with an actionable material you can start using tomorrow. Learning Objectives: - Understand information security risks and threats connected with merger and acquisition activities, which include months of often precarious IT migrations, a Cloud mess, and legacy services left exposed for months or years. - Understand how Cloud Computing affects information security risks and threats during a merger and acquisition activities, as well as the positive opportunities they can offer. - Why it is important that Information Security is involved in the early phases of due diligence, including during the phases in which the deal is structured and evaluated, and the acquisition model is defined. - Walk home with a simple framework and actionable material they can start using the day after. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mandasecuritysecuresummitdach-1-170728135808-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It does not have an ISO standard. NIST barely mentions it. Despite hundreds of publications, no dedicated book is in sight. Enterprise Risk Management frameworks barely touch on it - if they even do. A chapter in Tipton&#39;s book dating 2007, proprietary solutions and sparse articles is all we have. In 2007 there was no Cloud yet - and that can be both a big help or a major issue in the process. Mergers &amp; Acquisition is a matter left to Business Administration professionals, who don&#39;t like thinking about Information Security risks anyway. Information Security for Mergers &amp; Acquisition is often an afterthought and rarely a deciding factor in due diligence exercises - but when your company acquires a new firm every quarter, you need to start thinking about something. This session will propose a simple framework and you will walk away with an actionable material you can start using tomorrow. Learning Objectives: - Understand information security risks and threats connected with merger and acquisition activities, which include months of often precarious IT migrations, a Cloud mess, and legacy services left exposed for months or years. - Understand how Cloud Computing affects information security risks and threats during a merger and acquisition activities, as well as the positive opportunities they can offer. - Why it is important that Information Security is involved in the early phases of due diligence, including during the phases in which the deal is structured and evaluated, and the acquisition model is defined. - Walk home with a simple framework and actionable material they can start using the day after.
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH from EQS Group
]]>
808 3 https://cdn.slidesharecdn.com/ss_thumbnails/mandasecuritysecuresummitdach-1-170728135808-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
M&A security - E-crime Congress 2017 /slideshow/ma-security-ecrime-congress-2017/78344551 masecuritye-crimecongress-170728135143
Solutions.Information Security During Mergers & Acquisitions: Issues, Safety Measures, and Need-to-Know Solutions. Information security risks and threats connected with mergers and acquisitions, which can include months of often precarious IT migrations and legacy services left exposed; how Cloud computing affects information security risks and threats during merger and acquisition activities, as well as the positive opportunities that they can offer; why Information Security should be involved in the early phases of due diligence, including the phases during which the deal is structured and the acquisition model is defined; a simple framework and actionable material.]]>

Solutions.Information Security During Mergers & Acquisitions: Issues, Safety Measures, and Need-to-Know Solutions. Information security risks and threats connected with mergers and acquisitions, which can include months of often precarious IT migrations and legacy services left exposed; how Cloud computing affects information security risks and threats during merger and acquisition activities, as well as the positive opportunities that they can offer; why Information Security should be involved in the early phases of due diligence, including the phases during which the deal is structured and the acquisition model is defined; a simple framework and actionable material.]]>
Fri, 28 Jul 2017 13:51:42 GMT /slideshow/ma-security-ecrime-congress-2017/78344551 markoermacchi@slideshare.net(markoermacchi) M&A security - E-crime Congress 2017 markoermacchi Solutions.Information Security During Mergers & Acquisitions: Issues, Safety Measures, and Need-to-Know Solutions. Information security risks and threats connected with mergers and acquisitions, which can include months of often precarious IT migrations and legacy services left exposed; how Cloud computing affects information security risks and threats during merger and acquisition activities, as well as the positive opportunities that they can offer; why Information Security should be involved in the early phases of due diligence, including the phases during which the deal is structured and the acquisition model is defined; a simple framework and actionable material. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/masecuritye-crimecongress-170728135143-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Solutions.Information Security During Mergers &amp; Acquisitions: Issues, Safety Measures, and Need-to-Know Solutions. Information security risks and threats connected with mergers and acquisitions, which can include months of often precarious IT migrations and legacy services left exposed; how Cloud computing affects information security risks and threats during merger and acquisition activities, as well as the positive opportunities that they can offer; why Information Security should be involved in the early phases of due diligence, including the phases during which the deal is structured and the acquisition model is defined; a simple framework and actionable material.
M&A security - E-crime Congress 2017 from EQS Group
]]>
444 2 https://cdn.slidesharecdn.com/ss_thumbnails/masecuritye-crimecongress-170728135143-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Architecting Security across global networks /slideshow/architecting-security-across-global-networks/64513164 7eed1901-b15f-44a4-a897-05c80159ec72-160729132008
]]>

]]>
Fri, 29 Jul 2016 13:20:08 GMT /slideshow/architecting-security-across-global-networks/64513164 markoermacchi@slideshare.net(markoermacchi) Architecting Security across global networks markoermacchi <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/7eed1901-b15f-44a4-a897-05c80159ec72-160729132008-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Architecting Security across global networks from EQS Group
]]>
409 3 https://cdn.slidesharecdn.com/ss_thumbnails/7eed1901-b15f-44a4-a897-05c80159ec72-160729132008-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
313 – Security Challenges in Healthcare IoT - ME /slideshow/313-security-challenges-in-healthcare-iot-me/62761823 c04c0e13-ee4e-43cc-95ee-68942781af66-160606092219
]]>

]]>
Mon, 06 Jun 2016 09:22:19 GMT /slideshow/313-security-challenges-in-healthcare-iot-me/62761823 markoermacchi@slideshare.net(markoermacchi) 313 – Security Challenges in Healthcare IoT - ME markoermacchi <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/c04c0e13-ee4e-43cc-95ee-68942781af66-160606092219-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
313 – Security Challenges in Healthcare IoT - ME from EQS Group
]]>
686 5 https://cdn.slidesharecdn.com/ss_thumbnails/c04c0e13-ee4e-43cc-95ee-68942781af66-160606092219-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Achieving PCI-DSS compliance with network security implementations - April 2011 /slideshow/achieving-pcidss-compliance-with-network-security-implementations-apr-2011/15842603 ermini-achievingpci-dsscompliancewithnetworksecurityimplementations-apr2011-130103102538-phpapp02
How to use network security solutions and technologies to achieve and maintain PCI-DSS compliance.]]>

How to use network security solutions and technologies to achieve and maintain PCI-DSS compliance.]]>
Thu, 03 Jan 2013 10:25:38 GMT /slideshow/achieving-pcidss-compliance-with-network-security-implementations-apr-2011/15842603 markoermacchi@slideshare.net(markoermacchi) Achieving PCI-DSS compliance with network security implementations - April 2011 markoermacchi How to use network security solutions and technologies to achieve and maintain PCI-DSS compliance. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ermini-achievingpci-dsscompliancewithnetworksecurityimplementations-apr2011-130103102538-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to use network security solutions and technologies to achieve and maintain PCI-DSS compliance.
Achieving PCI-DSS compliance with network security implementations - April 2011 from EQS Group
]]>
831 3 https://cdn.slidesharecdn.com/ss_thumbnails/ermini-achievingpci-dsscompliancewithnetworksecurityimplementations-apr2011-130103102538-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Top risks in using NIPS - Brighttalk - July 2010 /slideshow/top-risks-in-using-nips-brighttalk-july-2010/15840153 toprisksinusingnips-brighttalk-july2010-130103064740-phpapp01
Marco Ermini, Network Security Manager will discuss top risks in using Network Intrusion Detection and Prevention.]]>

Marco Ermini, Network Security Manager will discuss top risks in using Network Intrusion Detection and Prevention.]]>
Thu, 03 Jan 2013 06:47:40 GMT /slideshow/top-risks-in-using-nips-brighttalk-july-2010/15840153 markoermacchi@slideshare.net(markoermacchi) Top risks in using NIPS - Brighttalk - July 2010 markoermacchi Marco Ermini, Network Security Manager will discuss top risks in using Network Intrusion Detection and Prevention. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/toprisksinusingnips-brighttalk-july2010-130103064740-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Marco Ermini, Network Security Manager will discuss top risks in using Network Intrusion Detection and Prevention.
Top risks in using NIPS - Brighttalk - July 2010 from EQS Group
]]>
440 2 https://cdn.slidesharecdn.com/ss_thumbnails/toprisksinusingnips-brighttalk-july2010-130103064740-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Best practices in NIPS - IDC Sofia - March 2010 /slideshow/best-practices-in-nips-idc-sofia-march-2010/15839815 ermini-bestpracticesinnips-idcsofia-march2010-v2-130103061634-phpapp01
They were called "Network Intrusion Detection Systems" first - today we call them "Network Intrusion Prevention Systems". Those tools have been around for several years, and are now experiencing a second youth once they are part of new compliance requirements and helps in meet your mitigation measures and policies. But are those systems really useful and provide an effective security tool? Many says, that if not implemented correctly, they can be easily bypassed. Is that true? and so, how should I implement them? Is my current deployment really optimal? Are NIPS really worth their (high) cost? This presentation aims at shredding some light - or at least, to give some tool, to start looking at NIPS from a more realistic point of view, out of the vendors' hype.]]>

They were called "Network Intrusion Detection Systems" first - today we call them "Network Intrusion Prevention Systems". Those tools have been around for several years, and are now experiencing a second youth once they are part of new compliance requirements and helps in meet your mitigation measures and policies. But are those systems really useful and provide an effective security tool? Many says, that if not implemented correctly, they can be easily bypassed. Is that true? and so, how should I implement them? Is my current deployment really optimal? Are NIPS really worth their (high) cost? This presentation aims at shredding some light - or at least, to give some tool, to start looking at NIPS from a more realistic point of view, out of the vendors' hype.]]>
Thu, 03 Jan 2013 06:16:34 GMT /slideshow/best-practices-in-nips-idc-sofia-march-2010/15839815 markoermacchi@slideshare.net(markoermacchi) Best practices in NIPS - IDC Sofia - March 2010 markoermacchi They were called "Network Intrusion Detection Systems" first - today we call them "Network Intrusion Prevention Systems". Those tools have been around for several years, and are now experiencing a second youth once they are part of new compliance requirements and helps in meet your mitigation measures and policies. But are those systems really useful and provide an effective security tool? Many says, that if not implemented correctly, they can be easily bypassed. Is that true? and so, how should I implement them? Is my current deployment really optimal? Are NIPS really worth their (high) cost? This presentation aims at shredding some light - or at least, to give some tool, to start looking at NIPS from a more realistic point of view, out of the vendors' hype. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ermini-bestpracticesinnips-idcsofia-march2010-v2-130103061634-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> They were called &quot;Network Intrusion Detection Systems&quot; first - today we call them &quot;Network Intrusion Prevention Systems&quot;. Those tools have been around for several years, and are now experiencing a second youth once they are part of new compliance requirements and helps in meet your mitigation measures and policies. But are those systems really useful and provide an effective security tool? Many says, that if not implemented correctly, they can be easily bypassed. Is that true? and so, how should I implement them? Is my current deployment really optimal? Are NIPS really worth their (high) cost? This presentation aims at shredding some light - or at least, to give some tool, to start looking at NIPS from a more realistic point of view, out of the vendors&#39; hype.
Best practices in NIPS - IDC Sofia - March 2010 from EQS Group
]]>
610 3 https://cdn.slidesharecdn.com/ss_thumbnails/ermini-bestpracticesinnips-idcsofia-march2010-v2-130103061634-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Best practices in NIPS - Brighttalk - January 2010 /slideshow/best-practices-in-nips-bright-talk-jan-2010/15839791 bestpracticesinnips-brighttalk-jan2010-130103061447-phpapp02
Marco Ermini, Network Security Manager will discuss his best practices of Network Intrusion Detection and Prevention and deployment of the overall NIDS/NIPS infrastructure and network vulnerability.]]>

Marco Ermini, Network Security Manager will discuss his best practices of Network Intrusion Detection and Prevention and deployment of the overall NIDS/NIPS infrastructure and network vulnerability.]]>
Thu, 03 Jan 2013 06:14:47 GMT /slideshow/best-practices-in-nips-bright-talk-jan-2010/15839791 markoermacchi@slideshare.net(markoermacchi) Best practices in NIPS - Brighttalk - January 2010 markoermacchi Marco Ermini, Network Security Manager will discuss his best practices of Network Intrusion Detection and Prevention and deployment of the overall NIDS/NIPS infrastructure and network vulnerability. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bestpracticesinnips-brighttalk-jan2010-130103061447-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Marco Ermini, Network Security Manager will discuss his best practices of Network Intrusion Detection and Prevention and deployment of the overall NIDS/NIPS infrastructure and network vulnerability.
Best practices in NIPS - Brighttalk - January 2010 from EQS Group
]]>
494 2 https://cdn.slidesharecdn.com/ss_thumbnails/bestpracticesinnips-brighttalk-jan2010-130103061447-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-markoermacchi-48x48.jpg?cb=1635321370 Marco is a Cybersecurity and Information Security Manager and Team Leader; senior security expert; systems and network security architect. Degrees in Philosophy, Mathematics and Computer Science, with over 25 years working experience in ICT, 15 of which spent exclusively in InfoSec and 10 as a consultant at client's sites. www.eqs.com/ https://cdn.slidesharecdn.com/ss_thumbnails/csx2018-blockchain-181102131223-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/blockchain-everyone-wants-to-sell-me-that-but-is-that-really-right-for-my-application/121548552 Blockchain: everyone w... https://cdn.slidesharecdn.com/ss_thumbnails/csx2018-gdpr3rdparty-181102130728-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/impact-of-gdpr-on-third-party-and-ma-security/121548202 Impact of GDPR on Thir... https://cdn.slidesharecdn.com/ss_thumbnails/mandasecuritysecuresummitdach-1-170728135808-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/mergers-acquisitions-security-isc2-secure-summit-dach/78344773 Mergers &amp; Acquisitions...