CSA Italian Chapter Summit 2017
During the week of the event it will also be replicated the training model used successfully in the previous edition, or in the pre- and post-day conference will be organized through our Training Partner of specific training courses on Cloud Computing Security (technical, legal issues , organizational, audit, compliance). In a context where the terrorist threat is organized in so-called Cyber Space (eg. With proselytizing actions through social tools and platforms) and organized crime groups and / or would have been, it becomes more effective and efficient through the use of instruments (Social) or cyber weapons (eg. Dos attacks, 0-day exploit, ...) and the police both companies are increasingly careful in finding the best organization and preparation that allows them to effectively counter cyber attacks increasingly sophisticated and extensive.