Description: |
In an era characterized by continuously evolving
cyber threats, a robust and reliable approach to
the digital world is a primary necessity.
Cyber Resilience presents truly formidable
challenges that governments, public institutions,
and private entities face. Consequently, Cyber
Security must aim to counter all threats that can
attack data and applications, as structuring a
cyber resilience plan is fundamental to
cybersecurity.
Recent research from scientific institutions
reports the synthesis of a survey of over 600
public executives (CEO, CIO), discussing the
barriers to implementing and maintaining Cyber
Resilience. Titled "An action plan to build cyber
resilience in a world of uncertainty," it focuses
on Cyber Resilience.
This survey is part of a broader research campaign
titled "Preparing Government for Future Shocks,"
which, drawing from the pandemic experience, has
begun to consider those risk situations that could
potentially catch nations unprepared.
In this context, the AFCEA Rome Chapter is
organizing an event titled "From Zero Trust
Security to Adversary Simulation/Emulation:
Passive and Active Cyber Solutions for the Defense
of Digital Systems," to be held on May 28 at the
Casa dell'Aviatore in Rome, to explore and debate
the most effective strategies for protecting data
and critical infrastructures, with contributions
from institutional representatives from the civil
and military sectors, as well as industry
professionals from private companies in the Cyber
field.
The agenda will center on in-depth discussions
about SASE and Zero Trust Access technologies to
enhance security. In particular, Zero Trust Access
is a model that assumes that the security of a
complex network is always at risk from both
external and internal threats, and it does not
assume any intrinsic trust in connections, unlike
the traditional defense paradigm of IT systems.
The conference also aims to represent an
opportunity to present some best practices that
can be effectively integrated to prevent, detect,
and respond to cyber incidents, while ensuring
compliance with current regulations, such as NIS2,
or according to recognized and standardized
methodologies. |