際際滷shows by User: massimilianomasi1 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: massimilianomasi1 / Wed, 11 Oct 2023 09:02:21 GMT 際際滷Share feed for 際際滷shows by User: massimilianomasi1 Cybersecurity Task Force at ASECAP Days 2023 /slideshow/cybersecurity-task-force-at-asecap-days-2023/262040781 masi-asecap-2023-231011090221-b68493a4
Results of the Cybersecurity Task Force at ASECAP Days]]>

Results of the Cybersecurity Task Force at ASECAP Days]]>
Wed, 11 Oct 2023 09:02:21 GMT /slideshow/cybersecurity-task-force-at-asecap-days-2023/262040781 massimilianomasi1@slideshare.net(massimilianomasi1) Cybersecurity Task Force at ASECAP Days 2023 massimilianomasi1 Results of the Cybersecurity Task Force at ASECAP Days <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/masi-asecap-2023-231011090221-b68493a4-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Results of the Cybersecurity Task Force at ASECAP Days
Cybersecurity Task Force at ASECAP Days 2023 from Massimiliano Masi
]]>
20 0 https://cdn.slidesharecdn.com/ss_thumbnails/masi-asecap-2023-231011090221-b68493a4-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing Critical Infrastructures with a cybersecurity digital twin /slideshow/securing-critical-infrastructures-with-a-cybersecurity-digital-twin/258576175 ieeecbi2023keynote1-230623084603-9179098d
Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the "collaborative intelligent transport system") and how the security measures are evaluated with an specific architectural view. ]]>

Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the "collaborative intelligent transport system") and how the security measures are evaluated with an specific architectural view. ]]>
Fri, 23 Jun 2023 08:46:03 GMT /slideshow/securing-critical-infrastructures-with-a-cybersecurity-digital-twin/258576175 massimilianomasi1@slideshare.net(massimilianomasi1) Securing Critical Infrastructures with a cybersecurity digital twin massimilianomasi1 Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the "collaborative intelligent transport system") and how the security measures are evaluated with an specific architectural view. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ieeecbi2023keynote1-230623084603-9179098d-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the &quot;collaborative intelligent transport system&quot;) and how the security measures are evaluated with an specific architectural view.
Securing Critical Infrastructures with a cybersecurity digital twin from Massimiliano Masi
]]>
109 0 https://cdn.slidesharecdn.com/ss_thumbnails/ieeecbi2023keynote1-230623084603-9179098d-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A Cybersecurity Digital Twin for Critical Infrastructure Protection /massimilianomasi1/a-cybersecurity-digital-twin-for-critical-infrastructure-protection poem21-211128162530
A way to build a high fidelity digital twin for a industrial control system using Enterprise Architecture]]>

A way to build a high fidelity digital twin for a industrial control system using Enterprise Architecture]]>
Sun, 28 Nov 2021 16:25:29 GMT /massimilianomasi1/a-cybersecurity-digital-twin-for-critical-infrastructure-protection massimilianomasi1@slideshare.net(massimilianomasi1) A Cybersecurity Digital Twin for Critical Infrastructure Protection massimilianomasi1 A way to build a high fidelity digital twin for a industrial control system using Enterprise Architecture <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/poem21-211128162530-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A way to build a high fidelity digital twin for a industrial control system using Enterprise Architecture
A Cybersecurity Digital Twin for Critical Infrastructure Protection from Massimiliano Masi
]]>
169 0 https://cdn.slidesharecdn.com/ss_thumbnails/poem21-211128162530-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin /slideshow/enabling-a-zero-trust-architecture-in-smart-grids-through-a-digital-twin/250236184 slie-210919190558
Thinking the smart grid as a mesh architecture, and then, by using the sidecar pattern, creating the digital twin for cybersecurity automatically]]>

Thinking the smart grid as a mesh architecture, and then, by using the sidecar pattern, creating the digital twin for cybersecurity automatically]]>
Sun, 19 Sep 2021 19:05:58 GMT /slideshow/enabling-a-zero-trust-architecture-in-smart-grids-through-a-digital-twin/250236184 massimilianomasi1@slideshare.net(massimilianomasi1) Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin massimilianomasi1 Thinking the smart grid as a mesh architecture, and then, by using the sidecar pattern, creating the digital twin for cybersecurity automatically <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slie-210919190558-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Thinking the smart grid as a mesh architecture, and then, by using the sidecar pattern, creating the digital twin for cybersecurity automatically
Enabling a Zero Trust Architecture in Smart Grids through a Digital Twin from Massimiliano Masi
]]>
162 0 https://cdn.slidesharecdn.com/ss_thumbnails/slie-210919190558-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security and Safety by Design in the Internet of Actors an Architectural Approach /slideshow/security-and-safety-by-design-in-the-internet-of-actors-an-architectural-approach/239720406 sbpmoneslides-201203103709
Extending the Internet of Actors with an ADM. Presentation for the S-BPM ONE 2020 conference. ]]>

Extending the Internet of Actors with an ADM. Presentation for the S-BPM ONE 2020 conference. ]]>
Thu, 03 Dec 2020 10:37:09 GMT /slideshow/security-and-safety-by-design-in-the-internet-of-actors-an-architectural-approach/239720406 massimilianomasi1@slideshare.net(massimilianomasi1) Security and Safety by Design in the Internet of Actors an Architectural Approach massimilianomasi1 Extending the Internet of Actors with an ADM. Presentation for the S-BPM ONE 2020 conference. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sbpmoneslides-201203103709-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Extending the Internet of Actors with an ADM. Presentation for the S-BPM ONE 2020 conference.
Security and Safety by Design in the Internet of Actors an Architectural Approach from Massimiliano Masi
]]>
51 0 https://cdn.slidesharecdn.com/ss_thumbnails/sbpmoneslides-201203103709-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Achieving Interoperability Through IHE /slideshow/achieving-interoperability-through-ihe/238852232 slie-201013081905
Invited talk, Special Session on IEEE/UL P2933. How to avoid the standard lock-in e vendor lock-in using enterprise architectures]]>

Invited talk, Special Session on IEEE/UL P2933. How to avoid the standard lock-in e vendor lock-in using enterprise architectures]]>
Tue, 13 Oct 2020 08:19:05 GMT /slideshow/achieving-interoperability-through-ihe/238852232 massimilianomasi1@slideshare.net(massimilianomasi1) Achieving Interoperability Through IHE massimilianomasi1 Invited talk, Special Session on IEEE/UL P2933. How to avoid the standard lock-in e vendor lock-in using enterprise architectures <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slie-201013081905-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Invited talk, Special Session on IEEE/UL P2933. How to avoid the standard lock-in e vendor lock-in using enterprise architectures
Achieving Interoperability Through IHE from Massimiliano Masi
]]>
96 0 https://cdn.slidesharecdn.com/ss_thumbnails/slie-201013081905-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach /slideshow/securing-mobile-ehealth-environments-by-design-a-holistic-architectural-approach/186180518 hmptslidesehpwas-191024080018
際際滷s for the eHPWAS 2019 confernce]]>

際際滷s for the eHPWAS 2019 confernce]]>
Thu, 24 Oct 2019 08:00:18 GMT /slideshow/securing-mobile-ehealth-environments-by-design-a-holistic-architectural-approach/186180518 massimilianomasi1@slideshare.net(massimilianomasi1) Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach massimilianomasi1 際際滷s for the eHPWAS 2019 confernce <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hmptslidesehpwas-191024080018-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷s for the eHPWAS 2019 confernce
Securing Mobile e-Health Environments by Design: A Holistic Architectural Approach from Massimiliano Masi
]]>
50 0 https://cdn.slidesharecdn.com/ss_thumbnails/hmptslidesehpwas-191024080018-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Enabling Security-by-design in Smart Grids: An architecture-based approach /slideshow/enabling-securitybydesign-in-smart-grids-an-architecturebased-approach/183528621 hmsp-dsogri-slides-191018091403
Use an architectural approach to provide security-based design in Smart Grids, with influence from the healthcare world. 際際滷s preseted in DSOGRI.org workshop in Naples. ]]>

Use an architectural approach to provide security-based design in Smart Grids, with influence from the healthcare world. 際際滷s preseted in DSOGRI.org workshop in Naples. ]]>
Fri, 18 Oct 2019 09:14:03 GMT /slideshow/enabling-securitybydesign-in-smart-grids-an-architecturebased-approach/183528621 massimilianomasi1@slideshare.net(massimilianomasi1) Enabling Security-by-design in Smart Grids: An architecture-based approach massimilianomasi1 Use an architectural approach to provide security-based design in Smart Grids, with influence from the healthcare world. 際際滷s preseted in DSOGRI.org workshop in Naples. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hmsp-dsogri-slides-191018091403-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Use an architectural approach to provide security-based design in Smart Grids, with influence from the healthcare world. 際際滷s preseted in DSOGRI.org workshop in Naples.
Enabling Security-by-design in Smart Grids: An architecture-based approach from Massimiliano Masi
]]>
66 0 https://cdn.slidesharecdn.com/ss_thumbnails/hmsp-dsogri-slides-191018091403-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip /slideshow/corso-ifts-cybersecurity-expert-attacco-di-armando-e-operazione-black-tulip/152361598 cs4-190628091435
Attacco di Armando ai Google Services del 2006 e operazione black tulip (attacco Gmail Iran)]]>

Attacco di Armando ai Google Services del 2006 e operazione black tulip (attacco Gmail Iran)]]>
Fri, 28 Jun 2019 09:14:35 GMT /slideshow/corso-ifts-cybersecurity-expert-attacco-di-armando-e-operazione-black-tulip/152361598 massimilianomasi1@slideshare.net(massimilianomasi1) Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip massimilianomasi1 Attacco di Armando ai Google Services del 2006 e operazione black tulip (attacco Gmail Iran) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cs4-190628091435-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Attacco di Armando ai Google Services del 2006 e operazione black tulip (attacco Gmail Iran)
Corso IFTS CyberSecurity Expert - Attacco di Armando e Operazione Black Tulip from Massimiliano Masi
]]>
68 3 https://cdn.slidesharecdn.com/ss_thumbnails/cs4-190628091435-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL /slideshow/corso-ifts-cybersecurity-expert-creazione-di-una-ca-con-openssl/152361595 cs3-190628091428
Crezione di una Certification Authority]]>

Crezione di una Certification Authority]]>
Fri, 28 Jun 2019 09:14:28 GMT /slideshow/corso-ifts-cybersecurity-expert-creazione-di-una-ca-con-openssl/152361595 massimilianomasi1@slideshare.net(massimilianomasi1) Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL massimilianomasi1 Crezione di una Certification Authority <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cs3-190628091428-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Crezione di una Certification Authority
Corso IFTS CyberSecurity Expert - Creazione di una CA con OpenSSL from Massimiliano Masi
]]>
47 1 https://cdn.slidesharecdn.com/ss_thumbnails/cs3-190628091428-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici /slideshow/corso-ifts-cybersecurity-expert-cifrai-asimmetrici/152361578 cs2-190628091415
Cifrari Asimmetrici]]>

Cifrari Asimmetrici]]>
Fri, 28 Jun 2019 09:14:15 GMT /slideshow/corso-ifts-cybersecurity-expert-cifrai-asimmetrici/152361578 massimilianomasi1@slideshare.net(massimilianomasi1) Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici massimilianomasi1 Cifrari Asimmetrici <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cs2-190628091415-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cifrari Asimmetrici
Corso IFTS CyberSecurity Expert - Cifrai Asimmetrici from Massimiliano Masi
]]>
47 1 https://cdn.slidesharecdn.com/ss_thumbnails/cs2-190628091415-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Corso IFTS CyberSecurity Expert /slideshow/corso-ifts-cybersecurity-expert/152361574 cs-190628091406
際際滷 introduttive]]>

際際滷 introduttive]]>
Fri, 28 Jun 2019 09:14:06 GMT /slideshow/corso-ifts-cybersecurity-expert/152361574 massimilianomasi1@slideshare.net(massimilianomasi1) Corso IFTS CyberSecurity Expert massimilianomasi1 際際滷 introduttive <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cs-190628091406-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷 introduttive
Corso IFTS CyberSecurity Expert from Massimiliano Masi
]]>
87 1 https://cdn.slidesharecdn.com/ss_thumbnails/cs-190628091406-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The need for interoperability in blockchain-based initiatives to facilitate clinical trials: a combined IHE/HL7 approach /slideshow/the-need-for-interoperability-in-blockchainbased-initiatives-to-facilitate-clinical-trials-a-combined-ihehl7-approach/123171584 glasgowmasi-181116114642
際際滷s for the IEEE Blockchain Symposium in Glasgow, https://blockchain.ieee.org/standards/clinicaltrialseurope18, https://blockchain.ieee.org/standards/clinicaltrialseurope18/speakers]]>

際際滷s for the IEEE Blockchain Symposium in Glasgow, https://blockchain.ieee.org/standards/clinicaltrialseurope18, https://blockchain.ieee.org/standards/clinicaltrialseurope18/speakers]]>
Fri, 16 Nov 2018 11:46:42 GMT /slideshow/the-need-for-interoperability-in-blockchainbased-initiatives-to-facilitate-clinical-trials-a-combined-ihehl7-approach/123171584 massimilianomasi1@slideshare.net(massimilianomasi1) The need for interoperability in blockchain-based initiatives to facilitate clinical trials: a combined IHE/HL7 approach massimilianomasi1 際際滷s for the IEEE Blockchain Symposium in Glasgow, https://blockchain.ieee.org/standards/clinicaltrialseurope18, https://blockchain.ieee.org/standards/clinicaltrialseurope18/speakers <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/glasgowmasi-181116114642-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷s for the IEEE Blockchain Symposium in Glasgow, https://blockchain.ieee.org/standards/clinicaltrialseurope18, https://blockchain.ieee.org/standards/clinicaltrialseurope18/speakers
The need for interoperability in blockchain-based initiatives to facilitate clinical trials: a combined IHE/HL7 approach from Massimiliano Masi
]]>
256 2 https://cdn.slidesharecdn.com/ss_thumbnails/glasgowmasi-181116114642-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Blockchain Technology - Common Use-Cases /slideshow/blockchain-technology-common-usecases/122547391 a-181109114602
Talk to Himss AsiaPac https://www.himssasiapacconference.org/ehome/287692/753033/]]>

Talk to Himss AsiaPac https://www.himssasiapacconference.org/ehome/287692/753033/]]>
Fri, 09 Nov 2018 11:46:01 GMT /slideshow/blockchain-technology-common-usecases/122547391 massimilianomasi1@slideshare.net(massimilianomasi1) Blockchain Technology - Common Use-Cases massimilianomasi1 Talk to Himss AsiaPac https://www.himssasiapacconference.org/ehome/287692/753033/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/a-181109114602-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Talk to Himss AsiaPac https://www.himssasiapacconference.org/ehome/287692/753033/
Blockchain Technology - Common Use-Cases from Massimiliano Masi
]]>
130 1 https://cdn.slidesharecdn.com/ss_thumbnails/a-181109114602-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Automating Smart Grid Solution Architecture Design /slideshow/automating-smart-grid-solution-architecture-design/121066094 masi-181029125315
際際滷s for the IEEE SmartGridComm 2018 conferences]]>

際際滷s for the IEEE SmartGridComm 2018 conferences]]>
Mon, 29 Oct 2018 12:53:15 GMT /slideshow/automating-smart-grid-solution-architecture-design/121066094 massimilianomasi1@slideshare.net(massimilianomasi1) Automating Smart Grid Solution Architecture Design massimilianomasi1 際際滷s for the IEEE SmartGridComm 2018 conferences <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/masi-181029125315-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 際際滷s for the IEEE SmartGridComm 2018 conferences
Automating Smart Grid Solution Architecture Design from Massimiliano Masi
]]>
107 3 https://cdn.slidesharecdn.com/ss_thumbnails/masi-181029125315-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction to Blockchain Technologies /slideshow/introduction-to-blockchain-technologies/96686271 masibitcoinslide-180511080905
This is the introductory material to blockchain that I had at the Firenze Linux User Group meeting http://www.firenze.linux.it/2018/02/il-bitcoin-e-le-altre/]]>

This is the introductory material to blockchain that I had at the Firenze Linux User Group meeting http://www.firenze.linux.it/2018/02/il-bitcoin-e-le-altre/]]>
Fri, 11 May 2018 08:09:05 GMT /slideshow/introduction-to-blockchain-technologies/96686271 massimilianomasi1@slideshare.net(massimilianomasi1) Introduction to Blockchain Technologies massimilianomasi1 This is the introductory material to blockchain that I had at the Firenze Linux User Group meeting http://www.firenze.linux.it/2018/02/il-bitcoin-e-le-altre/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/masibitcoinslide-180511080905-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the introductory material to blockchain that I had at the Firenze Linux User Group meeting http://www.firenze.linux.it/2018/02/il-bitcoin-e-le-altre/
Introduction to Blockchain Technologies from Massimiliano Masi
]]>
106 1 https://cdn.slidesharecdn.com/ss_thumbnails/masibitcoinslide-180511080905-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/ /slideshow/ehealth-2018-httpwwwehealth20xxatprogramblockchain/96685974 ehealth2018-vienna-masi-180511080606
Distributed Ledger Technologies just left the peek of the Gartners Hype Cycle for Emerging technologies of 2017. However the status of the art for Blockchain-based initiatives in healthcare has not yet been reached, mostly due to the lack of knowledge about the need of interoperability amongst blockchain practitioners. Following the adagio The nice thing about standards is that you have so many to choose from, the GrapevineWorld Project brings together DLT technologies in the healthcare context following the rules set by the IHE international standardisation body, whose specifications are the pillars of continental healthcare information exchange. First, this presentation will introduce the IHE governance model. Then it will tackle the benefit of DLTs to introduce the Grapevine research ecosystem.]]>

Distributed Ledger Technologies just left the peek of the Gartners Hype Cycle for Emerging technologies of 2017. However the status of the art for Blockchain-based initiatives in healthcare has not yet been reached, mostly due to the lack of knowledge about the need of interoperability amongst blockchain practitioners. Following the adagio The nice thing about standards is that you have so many to choose from, the GrapevineWorld Project brings together DLT technologies in the healthcare context following the rules set by the IHE international standardisation body, whose specifications are the pillars of continental healthcare information exchange. First, this presentation will introduce the IHE governance model. Then it will tackle the benefit of DLTs to introduce the Grapevine research ecosystem.]]>
Fri, 11 May 2018 08:06:06 GMT /slideshow/ehealth-2018-httpwwwehealth20xxatprogramblockchain/96685974 massimilianomasi1@slideshare.net(massimilianomasi1) eHealth 2018 http://www.ehealth20xx.at/program-blockchain/ massimilianomasi1 Distributed Ledger Technologies just left the peek of the Gartners Hype Cycle for Emerging technologies of 2017. However the status of the art for Blockchain-based initiatives in healthcare has not yet been reached, mostly due to the lack of knowledge about the need of interoperability amongst blockchain practitioners. Following the adagio The nice thing about standards is that you have so many to choose from, the GrapevineWorld Project brings together DLT technologies in the healthcare context following the rules set by the IHE international standardisation body, whose specifications are the pillars of continental healthcare information exchange. First, this presentation will introduce the IHE governance model. Then it will tackle the benefit of DLTs to introduce the Grapevine research ecosystem. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ehealth2018-vienna-masi-180511080606-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Distributed Ledger Technologies just left the peek of the Gartners Hype Cycle for Emerging technologies of 2017. However the status of the art for Blockchain-based initiatives in healthcare has not yet been reached, mostly due to the lack of knowledge about the need of interoperability amongst blockchain practitioners. Following the adagio The nice thing about standards is that you have so many to choose from, the GrapevineWorld Project brings together DLT technologies in the healthcare context following the rules set by the IHE international standardisation body, whose specifications are the pillars of continental healthcare information exchange. First, this presentation will introduce the IHE governance model. Then it will tackle the benefit of DLTs to introduce the Grapevine research ecosystem.
eHealth 2018 http://www.ehealth20xx.at/program-blockchain/ from Massimiliano Masi
]]>
78 1 https://cdn.slidesharecdn.com/ss_thumbnails/ehealth2018-vienna-masi-180511080606-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A governance model for ubiquitous medical devices accessing eHealth data: the need for standards /slideshow/a-governance-model-for-ubiquitous-medical-devices-accessing-ehealth-data-the-need-for-standards/66365896 masi-160924070409
The Electronic Health Record (EHR) is a reality in almost all the EU and USA regions. The introduction of EHR dramatically reduced the need for paper-based records, thus resulting in an improvement of patient care, including the freedom of movement principle across countries. EHRs contain very sensitive information (Private Healthcare Information, PHI) and they are ruled by several acts and international regulations, defined by each country. Key principles for this sector are interoperability, and security. There are two overarching standards for such security, FHIR and IHE. This short presentation aims at providing an overall status across eHealth Security and Interoperability, common pitfalls, and a description of common architectures, when connecting medical devices to patients EHR.]]>

The Electronic Health Record (EHR) is a reality in almost all the EU and USA regions. The introduction of EHR dramatically reduced the need for paper-based records, thus resulting in an improvement of patient care, including the freedom of movement principle across countries. EHRs contain very sensitive information (Private Healthcare Information, PHI) and they are ruled by several acts and international regulations, defined by each country. Key principles for this sector are interoperability, and security. There are two overarching standards for such security, FHIR and IHE. This short presentation aims at providing an overall status across eHealth Security and Interoperability, common pitfalls, and a description of common architectures, when connecting medical devices to patients EHR.]]>
Sat, 24 Sep 2016 07:04:09 GMT /slideshow/a-governance-model-for-ubiquitous-medical-devices-accessing-ehealth-data-the-need-for-standards/66365896 massimilianomasi1@slideshare.net(massimilianomasi1) A governance model for ubiquitous medical devices accessing eHealth data: the need for standards massimilianomasi1 The Electronic Health Record (EHR) is a reality in almost all the EU and USA regions. The introduction of EHR dramatically reduced the need for paper-based records, thus resulting in an improvement of patient care, including the freedom of movement principle across countries. EHRs contain very sensitive information (Private Healthcare Information, PHI) and they are ruled by several acts and international regulations, defined by each country. Key principles for this sector are interoperability, and security. There are two overarching standards for such security, FHIR and IHE. This short presentation aims at providing an overall status across eHealth Security and Interoperability, common pitfalls, and a description of common architectures, when connecting medical devices to patients EHR. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/masi-160924070409-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Electronic Health Record (EHR) is a reality in almost all the EU and USA regions. The introduction of EHR dramatically reduced the need for paper-based records, thus resulting in an improvement of patient care, including the freedom of movement principle across countries. EHRs contain very sensitive information (Private Healthcare Information, PHI) and they are ruled by several acts and international regulations, defined by each country. Key principles for this sector are interoperability, and security. There are two overarching standards for such security, FHIR and IHE. This short presentation aims at providing an overall status across eHealth Security and Interoperability, common pitfalls, and a description of common architectures, when connecting medical devices to patients EHR.
A governance model for ubiquitous medical devices accessing eHealth data: the need for standards from Massimiliano Masi
]]>
176 3 https://cdn.slidesharecdn.com/ss_thumbnails/masi-160924070409-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Addressing Security and Provide through IHE Profiles /slideshow/medetel-47690543/47690543 o2vggrkvsvytlsk8ucee-signature-4f4f1e67382ff9cd4e6c0307bffb820951561d7516dac89333f68ae727f4996c-poli-150503020505-conversion-gate01
This is the talk that I had at Med-e-Tel 2015, presenting IHE security profiles, how to exploit IHE to fulfill the security needs of local, regional, national, continental, healthcare information exchange]]>

This is the talk that I had at Med-e-Tel 2015, presenting IHE security profiles, how to exploit IHE to fulfill the security needs of local, regional, national, continental, healthcare information exchange]]>
Sun, 03 May 2015 02:05:05 GMT /slideshow/medetel-47690543/47690543 massimilianomasi1@slideshare.net(massimilianomasi1) Addressing Security and Provide through IHE Profiles massimilianomasi1 This is the talk that I had at Med-e-Tel 2015, presenting IHE security profiles, how to exploit IHE to fulfill the security needs of local, regional, national, continental, healthcare information exchange <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/o2vggrkvsvytlsk8ucee-signature-4f4f1e67382ff9cd4e6c0307bffb820951561d7516dac89333f68ae727f4996c-poli-150503020505-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the talk that I had at Med-e-Tel 2015, presenting IHE security profiles, how to exploit IHE to fulfill the security needs of local, regional, national, continental, healthcare information exchange
Addressing Security and Provide through IHE Profiles from Massimiliano Masi
]]>
345 1 https://cdn.slidesharecdn.com/ss_thumbnails/o2vggrkvsvytlsk8ucee-signature-4f4f1e67382ff9cd4e6c0307bffb820951561d7516dac89333f68ae727f4996c-poli-150503020505-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-massimilianomasi1-48x48.jpg?cb=1698226736 Dr. Masi has more than 13 years of experience in IT security. Relevant experience includes specification of IT security measures of the eGP-EGOR and BeS Projects in Austria, and South African eHR.ZA (governmental eHealth initiatives), lead role of epSOS.eu Common Components Development (CCD) and leader of the Core team of the epSOS Security Experts Group, design security aspects of the LHC computing GRID. Dr. Masi has been a member of the OASIS Trust Elevation Committee. Dr. Masi is also the editor of the IHE ITI profile Cross Community Fetch (XCF), and participated in the evaluation of the IHE profiles related to security (e.g., XUA, XUA++, SeR, Access Control White Paper, and ATNA... http://www.mascanc.net/ https://cdn.slidesharecdn.com/ss_thumbnails/masi-asecap-2023-231011090221-b68493a4-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cybersecurity-task-force-at-asecap-days-2023/262040781 Cybersecurity Task For... https://cdn.slidesharecdn.com/ss_thumbnails/ieeecbi2023keynote1-230623084603-9179098d-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/securing-critical-infrastructures-with-a-cybersecurity-digital-twin/258576175 Securing Critical Infr... https://cdn.slidesharecdn.com/ss_thumbnails/poem21-211128162530-thumbnail.jpg?width=320&height=320&fit=bounds massimilianomasi1/a-cybersecurity-digital-twin-for-critical-infrastructure-protection A Cybersecurity Digita...