{"id":520,"date":"2023-09-29T15:26:54","date_gmt":"2023-09-29T15:26:54","guid":{"rendered":"https:\/\/cysec.unipi.it\/?page_id=520"},"modified":"2023-10-04T13:41:59","modified_gmt":"2023-10-04T13:41:59","slug":"cybersecurity-law-cycle-of-seminars","status":"publish","type":"page","link":"https:\/\/cysec.unipi.it\/?page_id=520","title":{"rendered":"Cybersecurity law: cycle of seminars"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">NIS implementation in Italy<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Speaker<\/strong>: Jacopo Fortuna \u2013 Research fellow at Scuola Superiore Sant\u2019Anna<\/li>\n\n\n\n<li><strong>When<\/strong>: Friday, October 13, at 16:00<\/li>\n\n\n\n<li><strong>Where<\/strong>: <strong><a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ahtG42VPG9Ptfi6NP-Bz92sEYJuUlTPz6WhQ9TajexIs1%40thread.tacv2\/1695887258528?context=%7b%22Tid%22%3a%22c7456b31-a220-47f5-be52-473828670aa1%22%2c%22Oid%22%3a%22a26eeb34-1041-4cb7-97e7-af4e014291cb%22%7d\">online<\/a>.<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Recent development in cybercrime legislation<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Speaker<\/strong>: Gaia Fiorinelli &#8211; Research fellow at Scuola Superiore Sant\u2019Anna<\/li>\n\n\n\n<li><strong>When<\/strong>: Friday, November 3, 16:00 &nbsp;<\/li>\n\n\n\n<li><strong>Where<\/strong>: <strong><a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ahtG42VPG9Ptfi6NP-Bz92sEYJuUlTPz6WhQ9TajexIs1%40thread.tacv2\/1695887258528?context=%7b%22Tid%22%3a%22c7456b31-a220-47f5-be52-473828670aa1%22%2c%22Oid%22%3a%22a26eeb34-1041-4cb7-97e7-af4e014291cb%22%7d\">online<\/a>.<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Risk assessment and data breach management<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Speaker<\/strong>: Karolina Podstawa \u2013 Senior Research Fellow at Maastricht University<\/li>\n\n\n\n<li><strong>When<\/strong>: Friday, November 10 at 16:00<\/li>\n\n\n\n<li><strong>Where<\/strong>: <strong><a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ahtG42VPG9Ptfi6NP-Bz92sEYJuUlTPz6WhQ9TajexIs1%40thread.tacv2\/1695887258528?context=%7b%22Tid%22%3a%22c7456b31-a220-47f5-be52-473828670aa1%22%2c%22Oid%22%3a%22a26eeb34-1041-4cb7-97e7-af4e014291cb%22%7d\">online<\/a>.<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">IoT and liability<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Speaker<\/strong>: Francesca Gennari \u2013 Research Affiliate at Scuola Superiore Sant\u2019Anna<\/li>\n\n\n\n<li><strong>When<\/strong>: Friday, November 17 at 16:00<\/li>\n\n\n\n<li><strong>Where<\/strong>:<strong>&nbsp;<a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ahtG42VPG9Ptfi6NP-Bz92sEYJuUlTPz6WhQ9TajexIs1%40thread.tacv2\/1695887258528?context=%7b%22Tid%22%3a%22c7456b31-a220-47f5-be52-473828670aa1%22%2c%22Oid%22%3a%22a26eeb34-1041-4cb7-97e7-af4e014291cb%22%7d\">online<\/a>.<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Disclosure of Security Vulnerability: an introduction to practices and cybersecurity ethics<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Speaker<\/strong>: Gabriele Lenzini \u2013 Professor at University of Luxembourg<\/li>\n\n\n\n<li><strong>When<\/strong>: Friday, December 1, at 16:00<\/li>\n\n\n\n<li><strong>Where<\/strong>: <a href=\"https:\/\/teams.microsoft.com\/l\/meetup-join\/19%3ahtG42VPG9Ptfi6NP-Bz92sEYJuUlTPz6WhQ9TajexIs1%40thread.tacv2\/1695887258528?context=%7b%22Tid%22%3a%22c7456b31-a220-47f5-be52-473828670aa1%22%2c%22Oid%22%3a%22a26eeb34-1041-4cb7-97e7-af4e014291cb%22%7d\"><strong>online<\/strong><\/a><strong>.<\/strong><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>NIS implementation in Italy Recent development in cybercrime legislation Risk assessment and data breach management IoT and liability Disclosure of&hellip;<\/p>\n<p><a class=\"btn btn-dark btn-sm unipi-read-more-link\" href=\"https:\/\/cysec.unipi.it\/?page_id=520\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-520","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/pages\/520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=520"}],"version-history":[{"count":2,"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/pages\/520\/revisions"}],"predecessor-version":[{"id":525,"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=\/wp\/v2\/pages\/520\/revisions\/525"}],"wp:attachment":[{"href":"https:\/\/cysec.unipi.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}