{"id":13933,"date":"2021-03-15T16:25:25","date_gmt":"2021-03-15T15:25:25","guid":{"rendered":"https:\/\/www.myecole.it\/ooc\/?page_id=13933"},"modified":"2022-08-23T11:23:59","modified_gmt":"2022-08-23T09:23:59","slug":"la-cybersecurity-nellimpresa-interconnessa","status":"publish","type":"page","link":"https:\/\/www.myecole.it\/ooc\/area-sanita\/area-digital\/la-cybersecurity-nellimpresa-interconnessa\/","title":{"rendered":"La Cybersecurity nell&#8217;impresa interconnessa"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"13933\" class=\"elementor elementor-13933\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d2262a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d2262a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9ebf0eb\" data-id=\"9ebf0eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-894b9e7 elementor-widget elementor-widget-shortcode\" data-id=\"894b9e7\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-shortcode\"><br \/>Widget not in any sidebars<br \/><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c7130ac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7130ac\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ca436e\" data-id=\"3ca436e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba53300 elementor-widget elementor-widget-lae-heading\" data-id=\"ba53300\" data-element_type=\"widget\" data-widget_type=\"lae-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n   <!--       -->\n\n        <div class=\"lae-heading lae-style2 lae-alignleft\" >\n\n            \n                <div class=\"lae-subtitle\">percorsi formativi - area digital<\/div>\n\n            \n            <h1 class=\"lae-title\">La Cybersecurity nell'impresa interconnessa<\/h1>\n\n            \n        <\/div>\n\n        \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f75b379 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f75b379\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66924e5\" data-id=\"66924e5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50afc8a elementor-widget elementor-widget-text-editor\" data-id=\"50afc8a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>La quarta rivoluzione industriale (Industry 4.0) tocca oggi tutte le imprese, siano esse impegnate nella produzione manifatturiera, nei processi continui o nella gestione di impianti di pubblica utilit\u00e0. \u00c8 quindi indispensabile conoscerne i numerosi vantaggi portati da Industry 4.0 ma anche le possibili minacce come gli attacchi informatici che possono arrivare a colpire il cuore della produzione di un\u2019azienda. Il corso si rivolge al management e, in generale, a coloro che gestiscono i sistemi di controllo, informatici e gestionali di un\u2019azienda interconnessa secondo il modello Industry 4.0 che vogliono apprendere gli strumenti per la valutazione dei rischi di cyber security secondo l\u2019applicazione della norma IEC 62443.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b6d95c elementor-widget elementor-widget-toggle\" data-id=\"1b6d95c\" data-element_type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-toggle\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2871\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-2871\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">OBIETTIVI FORMATIVI<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2871\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2871\"><ul>\n<li>\n<p>Fornire le conoscenze sui numerosi vantaggi portati da Industry 4.0 ma anche le possibili minacce<\/p>\n<\/li>\n<li>\n<p>Fornire le conoscenze sull\u2019applicazione della norma IEC 62443<\/p>\n<\/li>\n<\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2872\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-2872\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">METODOLOGIA DIDATTICA<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2872\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2872\"><p>L\u2019attivit\u00e0 formativa offerta presenta lezioni frontali<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2873\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-2873\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">DESTINATARI<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2873\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2873\"><ul>\n<li>\n<p>Management aziendale<\/p>\n<\/li>\n<li>\n<p>Responsabile produzione e pianificazione<\/p>\n<\/li>\n<\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2874\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"tab\" aria-controls=\"elementor-tab-content-2874\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">PROGRAMMA<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2874\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2874\"><p><strong>Prima giornata<\/strong><\/p>\n<table style=\"border-collapse: collapse;width: 99.1364%;height: 125px\">\n<tbody>\n<tr style=\"height: 48px\">\n<td style=\"width: 17.7192%;height: 16px;text-align: center;vertical-align: middle\">8.30-9.00<\/td>\n<td style=\"width: 81.4172%;height: 16px;text-align: left;vertical-align: middle\"><em>Registrazione dei partecipanti<\/em><\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 17.7192%;height: 10px;text-align: center;vertical-align: middle\">9.00-10.00<\/td>\n<td style=\"width: 81.4172%;height: 10px;text-align: left;vertical-align: middle\">Introduzione alla Cybersecurity: assets, vulnerabilit\u00e0, minacce<\/td>\n<\/tr>\n<tr style=\"height: 57px\">\n<td style=\"width: 17.7192%;height: 57px;text-align: center;vertical-align: middle\">10.00-11.00<\/td>\n<td style=\"width: 81.4172%;height: 57px;text-align: left;vertical-align: middle\">Information Technology e Operation Technology<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">11.00-12.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\">Le architetture dei sistemi di controllo, l&#8217;evoluzione del contesto industriale e standard di riferimento<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">12.00-13.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\">Superfici di attacco e modalit\u00e0 di penetrazione<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">13.00-14.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\"><em>Pausa Pranzo<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">14.00-15.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\">Minacce e conseguenze &#8211; gli scenari possibili<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">15.00-18.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\">\n<p>La gestione organica della security: il modello normativo IEC 62433: affidabilit\u00e0, disponibilit\u00e0 e safety<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Seconda giornata<\/strong><\/p>\n<table style=\"border-collapse: collapse;width: 99.1364%;height: 125px\">\n<tbody>\n<tr style=\"height: 48px\">\n<td style=\"width: 17.7192%;height: 16px;text-align: center;vertical-align: middle\">8.30-9.00<\/td>\n<td style=\"width: 81.4172%;height: 16px;text-align: left;vertical-align: middle\"><em>Registrazione dei partecipanti<\/em><\/td>\n<\/tr>\n<tr style=\"height: 55px\">\n<td style=\"width: 17.7192%;height: 10px;text-align: center;vertical-align: middle\">9.00-10.00<\/td>\n<td style=\"width: 81.4172%;height: 10px;text-align: left;vertical-align: middle\">L&#8217;integrazione tra Security e Safety in ambito industriale: il collegamento con i modelli IEC 61511 e 61508<\/td>\n<\/tr>\n<tr style=\"height: 57px\">\n<td style=\"width: 17.7192%;height: 57px;text-align: center;vertical-align: middle\">10.00-11.00<\/td>\n<td style=\"width: 81.4172%;height: 57px;text-align: left;vertical-align: middle\">La valutazione del rischio: metodologie operative<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">11.00-13.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\">La classificazione dei sistemi industriali: zone, condotti, requisiti e livelli di security<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">13.00-14.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\"><em>Pausa Pranzo<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">14.00-15.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\">La verifica delle capacit\u00e0 di protezione dei sistemi: logiche e metodi sperimentali di prova<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">15.00-16.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\">\n<p>CSMS il modello gestionale per la gestione della Security<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 17.7192%;text-align: center;vertical-align: middle\">16.00-18.00<\/td>\n<td style=\"width: 81.4172%;text-align: left;vertical-align: middle\">\n<p>Presentazione esempi applicati della norma IEC 62443 su processi produttivi concreti<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2875\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"tab\" aria-controls=\"elementor-tab-content-2875\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\" class=\"elementor-toggle-title\">DURATA<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2875\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2875\"><p>2 giornate formative<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>percorsi formativi &#8211; area digital La Cybersecurity nell&#8217;impresa interconnessa La quarta rivoluzione industriale (Industry 4.0) tocca oggi tutte le imprese, siano esse impegnate nella produzione manifatturiera, nei processi continui o nella gestione di impianti di pubblica utilit\u00e0. \u00c8 quindi indispensabile conoscerne i numerosi vantaggi portati da Industry 4.0 ma anche le possibili minacce come gli.<\/p>\n","protected":false},"author":12,"featured_media":0,"parent":13583,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-13933","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.myecole.it\/ooc\/wp-json\/wp\/v2\/pages\/13933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.myecole.it\/ooc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.myecole.it\/ooc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.myecole.it\/ooc\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.myecole.it\/ooc\/wp-json\/wp\/v2\/comments?post=13933"}],"version-history":[{"count":0,"href":"https:\/\/www.myecole.it\/ooc\/wp-json\/wp\/v2\/pages\/13933\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.myecole.it\/ooc\/wp-json\/wp\/v2\/pages\/13583"}],"wp:attachment":[{"href":"https:\/\/www.myecole.it\/ooc\/wp-json\/wp\/v2\/media?parent=13933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}