{"id":17450,"date":"2020-12-29T09:40:35","date_gmt":"2020-12-29T08:40:35","guid":{"rendered":"https:\/\/www.fbk.eu\/?page_id=17450"},"modified":"2024-05-02T16:08:59","modified_gmt":"2024-05-02T14:08:59","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.fbk.eu\/it\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"17450\" class=\"elementor elementor-17450\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61bac43 e-flex e-con-boxed e-con e-parent\" data-id=\"61bac43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4af6ad5 elementor-widget__width-initial elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"4af6ad5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon\" href=\"https:\/\/www.fbk.eu\/wp-content\/uploads\/2024\/05\/2024_FBK_Centro-Cybersecurity_ITA.pdf\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-file-pdf\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d56136 elementor-widget elementor-widget-text-editor\" data-id=\"5d56136\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.fbk.eu\/wp-content\/uploads\/2024\/05\/2024_FBK_Centro-Cybersecurity_ITA.pdf\">Scarica la scheda<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-758f9028 e-flex e-con-boxed e-con e-parent\" data-id=\"758f9028\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fb6240f elementor-widget elementor-widget-text-editor\" data-id=\"1fb6240f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tI vantaggi dell&#8217;innovazione digitale non sono privi di rischi come la perdita del controllo sui dati personali dei cittadini, distorsioni della vita democratica delle nazioni dovute alle fake news e attacchi informatici che minacciano infrastrutture critiche. La pandemia ha fatto avanzare rapidamente un processo di trasformazione digitale preesistente con esperimenti su larga scala nel lavoro e nell&#8217;istruzione a distanza, amplificando al contempo i rischi informatici.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Scarica la scheda I vantaggi dell&#8217;innovazione digitale non sono privi di rischi come la perdita del controllo sui dati personali dei cittadini, distorsioni della vita democratica delle nazioni dovute alle fake news e attacchi informatici che minacciano infrastrutture critiche. La pandemia ha fatto avanzare rapidamente un processo di trasformazione digitale preesistente con esperimenti su larga [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":17638,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/foundation-centers-detail.php","meta":{"footnotes":""},"class_list":["post-17450","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity - FBK<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.fbk.eu\/it\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.fbk.eu\/it\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"FBK\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T14:08:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.fbk.eu\/wp-content\/uploads\/2020\/12\/Cover-Cyber-Security-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"852\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.fbk.eu\/wp-content\/themes\/fbk-foundation\/images\/opengraph-default.png\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/it\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/it\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity - FBK\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/it\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/it\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Cover-Cyber-Security-1.jpg\",\"datePublished\":\"2020-12-29T08:40:35+00:00\",\"dateModified\":\"2024-05-02T14:08:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/it\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.fbk.eu\\\/it\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/it\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Cover-Cyber-Security-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Cover-Cyber-Security-1.jpg\",\"width\":1600,\"height\":852},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/it\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.fbk.eu\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/\",\"name\":\"FBK\",\"description\":\"Fondazione Bruno Kessler\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#organization\",\"name\":\"FBK\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/FBK_For-A-Human-Centered-AI.png\",\"contentUrl\":\"https:\\\/\\\/www.fbk.eu\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/FBK_For-A-Human-Centered-AI.png\",\"width\":549,\"height\":224,\"caption\":\"FBK\"},\"image\":{\"@id\":\"https:\\\/\\\/www.fbk.eu\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity - FBK","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.fbk.eu\/it\/cybersecurity\/","og_locale":"it_IT","og_type":"article","og_url":"https:\/\/www.fbk.eu\/it\/cybersecurity\/","og_site_name":"FBK","article_modified_time":"2024-05-02T14:08:59+00:00","og_image":[{"width":1600,"height":852,"url":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2020\/12\/Cover-Cyber-Security-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/www.fbk.eu\/wp-content\/themes\/fbk-foundation\/images\/opengraph-default.png","twitter_misc":{"Tempo di lettura stimato":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.fbk.eu\/it\/cybersecurity\/","url":"https:\/\/www.fbk.eu\/it\/cybersecurity\/","name":"Cybersecurity - FBK","isPartOf":{"@id":"https:\/\/www.fbk.eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.fbk.eu\/it\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.fbk.eu\/it\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2020\/12\/Cover-Cyber-Security-1.jpg","datePublished":"2020-12-29T08:40:35+00:00","dateModified":"2024-05-02T14:08:59+00:00","breadcrumb":{"@id":"https:\/\/www.fbk.eu\/it\/cybersecurity\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.fbk.eu\/it\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.fbk.eu\/it\/cybersecurity\/#primaryimage","url":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2020\/12\/Cover-Cyber-Security-1.jpg","contentUrl":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2020\/12\/Cover-Cyber-Security-1.jpg","width":1600,"height":852},{"@type":"BreadcrumbList","@id":"https:\/\/www.fbk.eu\/it\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.fbk.eu\/it\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.fbk.eu\/en\/#website","url":"https:\/\/www.fbk.eu\/en\/","name":"FBK","description":"Fondazione Bruno Kessler","publisher":{"@id":"https:\/\/www.fbk.eu\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.fbk.eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.fbk.eu\/en\/#organization","name":"FBK","url":"https:\/\/www.fbk.eu\/en\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.fbk.eu\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2022\/02\/FBK_For-A-Human-Centered-AI.png","contentUrl":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2022\/02\/FBK_For-A-Human-Centered-AI.png","width":549,"height":224,"caption":"FBK"},"image":{"@id":"https:\/\/www.fbk.eu\/en\/#\/schema\/logo\/image\/"}}]}},"meta_box":{"_banners":[],"_boxes":[],"_center_url":"https:\/\/cs.fbk.eu","_center_numbers":[{"number":"","text":""}],"_center_vision":"<span style=\"font-weight: 400;\">Per ridurre i rischi, il punto cruciale \u00e8 il co-sviluppo della tecnologia digitale e della cyber security per favorire la collaborazione tra i diversi stakeholder mediante una\u00a0 combinazione di tecniche per la gestione del rischio informatico (al fine di sviluppare soluzioni di sicurezza\u00a0 altamente innovative che mitighino le vulnerabilit\u00e0 e riducano i rischi degli attacchi) e di gestione della fiducia\u00a0 (per migliorare l\u2019interazione tra persone e tecnologia).<\/span>\r\n\r\n&nbsp;","_center_mission":"<span style=\"font-weight: 400;\">In linea con la mission di FBK, che punta a raggiungere risultati di eccellenza scientifica e a produrre impatto sulla societ\u00e0, il centro CYBERSECURITY mette tali tecniche a disposizione del pi\u00f9 grande numero di organizzazioni, comprese le PMI che costituiscono una parte sostanziale dell'economia dell'UE ma mancano di competenze in materia di sicurezza informatica. Per fare questo, \u00e8 fondamentale incorporare il supporto automatizzato alla valutazione del rischio informatico e della gestione della fiducia con la capacit\u00e0 di produrre suggerimenti operativi per assistere designer, sviluppatori e amministratori di soluzioni ICT nelle loro attivit\u00e0 quotidiane.\u00a0<\/span>","_center_director":{"image":"https:\/\/www.fbk.eu\/wp-content\/uploads\/2020\/12\/Cyber-Security_Silvio-Ranise.jpg","name":"Silvio Ranise","email":"ranise@fbk.eu","phone":"","url":""},"_center_magazine_url":"https:\/\/magazine.fbk.eu\/it\/tags\/cybersicurezza\/","_hubs":[],"_people":[],"_facts":[],"_humanities_and_social_sciences":[],"_companies":[],"_others":[],"_universities":[],"_science_and_technology":[],"_sidebar":""},"_links":{"self":[{"href":"https:\/\/www.fbk.eu\/it\/wp-json\/wp\/v2\/pages\/17450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fbk.eu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fbk.eu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fbk.eu\/it\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fbk.eu\/it\/wp-json\/wp\/v2\/comments?post=17450"}],"version-history":[{"count":0,"href":"https:\/\/www.fbk.eu\/it\/wp-json\/wp\/v2\/pages\/17450\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fbk.eu\/it\/wp-json\/wp\/v2\/media\/17638"}],"wp:attachment":[{"href":"https:\/\/www.fbk.eu\/it\/wp-json\/wp\/v2\/media?parent=17450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}