{"id":119,"date":"2025-11-26T17:02:11","date_gmt":"2025-11-26T16:02:11","guid":{"rendered":"http:\/\/stag2025.stagcyber.eu\/home\/"},"modified":"2026-01-30T17:36:03","modified_gmt":"2026-01-30T16:36:03","slug":"home","status":"publish","type":"page","link":"https:\/\/www.stagcyber.fr\/it\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"119\" class=\"elementor elementor-119 elementor-2\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df7f2ab elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"df7f2ab\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa1180e elementor-widget elementor-widget-text-editor\" data-id=\"fa1180e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Le informazioni sono la risorsa pi\u00f9 importante in assoluto per le azienda. Gestirle in modo corretto \u00e8 fondamentale per il loro success a lungo termine in un mondo connesso e digitalizzato <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c18174 e-grid e-con-boxed e-con e-parent\" data-id=\"5c18174\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-64df870 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"64df870\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/it\/compliance-e-strategia\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Compliance e strategia\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-tasks\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M139.61 35.5a12 12 0 0 0-17 0L58.93 98.81l-22.7-22.12a12 12 0 0 0-17 0L3.53 92.41a12 12 0 0 0 0 17l47.59 47.4a12.78 12.78 0 0 0 17.61 0l15.59-15.62L156.52 69a12.09 12.09 0 0 0 .09-17zm0 159.19a12 12 0 0 0-17 0l-63.68 63.72-22.7-22.1a12 12 0 0 0-17 0L3.53 252a12 12 0 0 0 0 17L51 316.5a12.77 12.77 0 0 0 17.6 0l15.7-15.69 72.2-72.22a12 12 0 0 0 .09-16.9zM64 368c-26.49 0-48.59 21.5-48.59 48S37.53 464 64 464a48 48 0 0 0 0-96zm432 16H208a16 16 0 0 0-16 16v32a16 16 0 0 0 16 16h288a16 16 0 0 0 16-16v-32a16 16 0 0 0-16-16zm0-320H208a16 16 0 0 0-16 16v32a16 16 0 0 0 16 16h288a16 16 0 0 0 16-16V80a16 16 0 0 0-16-16zm0 160H208a16 16 0 0 0-16 16v32a16 16 0 0 0 16 16h288a16 16 0 0 0 16-16v-32a16 16 0 0 0-16-16z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/it\/compliance-e-strategia\/\" >\n\t\t\t\t\t\t\tCompliance e strategia\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tConsulenza strategica. Governance del patrimonio informativo. Conformit\u00e0 alle normative europee in materia di sicurezza informatica (Cyber Resilience Act, AI Act, GDPR). Implementazione di sistemi di gestione della sicurezza delle informazioni ISO 27001 e ISO 27701.   \n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dba6ce elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"7dba6ce\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/it\/cybersecurity-e-digital-forensics\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Cybersecurity e digital forensics\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-shield-virus\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224,192a16,16,0,1,0,16,16A16,16,0,0,0,224,192ZM466.5,83.68l-192-80A57.4,57.4,0,0,0,256.05,0a57.4,57.4,0,0,0-18.46,3.67l-192,80A47.93,47.93,0,0,0,16,128C16,326.5,130.5,463.72,237.5,508.32a48.09,48.09,0,0,0,36.91,0C360.09,472.61,496,349.3,496,128A48,48,0,0,0,466.5,83.68ZM384,256H371.88c-28.51,0-42.79,34.47-22.63,54.63l8.58,8.57a16,16,0,1,1-22.63,22.63l-8.57-8.58C306.47,313.09,272,327.37,272,355.88V368a16,16,0,0,1-32,0V355.88c0-28.51-34.47-42.79-54.63-22.63l-8.57,8.58a16,16,0,0,1-22.63-22.63l8.58-8.57c20.16-20.16,5.88-54.63-22.63-54.63H128a16,16,0,0,1,0-32h12.12c28.51,0,42.79-34.47,22.63-54.63l-8.58-8.57a16,16,0,0,1,22.63-22.63l8.57,8.58c20.16,20.16,54.63,5.88,54.63-22.63V112a16,16,0,0,1,32,0v12.12c0,28.51,34.47,42.79,54.63,22.63l8.57-8.58a16,16,0,0,1,22.63,22.63l-8.58,8.57C329.09,189.53,343.37,224,371.88,224H384a16,16,0,0,1,0,32Zm-96,0a16,16,0,1,0,16,16A16,16,0,0,0,288,256Z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/it\/cybersecurity-e-digital-forensics\/\" >\n\t\t\t\t\t\t\tCybersecurity e digital forensics\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tImplementazione organizzativa e tecnica della sicurezza delle informazioni e delle cybersecurity interna. Procedure per la preparazione del processo di informatica forense e investigazioni digitali.  \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c91b221 elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"c91b221\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-brain\" viewBox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M208 0c-29.9 0-54.7 20.5-61.8 48.2-.8 0-1.4-.2-2.2-.2-35.3 0-64 28.7-64 64 0 4.8.6 9.5 1.7 14C52.5 138 32 166.6 32 200c0 12.6 3.2 24.3 8.3 34.9C16.3 248.7 0 274.3 0 304c0 33.3 20.4 61.9 49.4 73.9-.9 4.6-1.4 9.3-1.4 14.1 0 39.8 32.2 72 72 72 4.1 0 8.1-.5 12-1.2 9.6 28.5 36.2 49.2 68 49.2 39.8 0 72-32.2 72-72V64c0-35.3-28.7-64-64-64zm368 304c0-29.7-16.3-55.3-40.3-69.1 5.2-10.6 8.3-22.3 8.3-34.9 0-33.4-20.5-62-49.7-74 1-4.5 1.7-9.2 1.7-14 0-35.3-28.7-64-64-64-.8 0-1.5.2-2.2.2C422.7 20.5 397.9 0 368 0c-35.3 0-64 28.6-64 64v376c0 39.8 32.2 72 72 72 31.8 0 58.4-20.7 68-49.2 3.9.7 7.9 1.2 12 1.2 39.8 0 72-32.2 72-72 0-4.8-.5-9.5-1.4-14.1 29-12 49.4-40.6 49.4-73.9z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tImplementazione degli strumenti IA\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSelezione e implementazione degli strumenti basati sull''IA pi\u00f9 adatti per l'organizzazione, tenendo conto degli obiettivi di business, della legislazione vigente e degli aspetti economici. Formazione per l'uso degli strumenti. Intelligenza artificiale per le investigazini e la sicurezza.  \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06c8b8e elementor-view-default elementor-position-top elementor-mobile-position-top elementor-widget elementor-widget-icon-box\" data-id=\"06c8b8e\" data-element_type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/it\/europrogettazione\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Progetti di ricerca e sviuppo\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-university\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M496 128v16a8 8 0 0 1-8 8h-24v12c0 6.627-5.373 12-12 12H60c-6.627 0-12-5.373-12-12v-12H24a8 8 0 0 1-8-8v-16a8 8 0 0 1 4.941-7.392l232-88a7.996 7.996 0 0 1 6.118 0l232 88A8 8 0 0 1 496 128zm-24 304H40c-13.255 0-24 10.745-24 24v16a8 8 0 0 0 8 8h464a8 8 0 0 0 8-8v-16c0-13.255-10.745-24-24-24zM96 192v192H60c-6.627 0-12 5.373-12 12v20h416v-20c0-6.627-5.373-12-12-12h-36V192h-64v192h-64V192h-64v192h-64V192H96z\"><\/path><\/svg>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/it\/europrogettazione\/\" >\n\t\t\t\t\t\t\tProgetti di ricerca e sviuppo\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tRedazione di proposte di progetto e consulenza per programmi di ricerca e sviluppo dell'UE, progetti di innovazione nazionali e internazionali. Gestione di progetti. Programmi di formazione e seminari.  \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5183bc0 e-flex e-con-boxed e-con e-parent\" data-id=\"5183bc0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-446888b elementor-widget elementor-widget-heading\" data-id=\"446888b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Aree di ricerca<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94265a2 e-grid e-con-full e-con e-parent\" data-id=\"94265a2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2744ffe elementor-widget elementor-widget-image\" data-id=\"2744ffe\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.stagcyber.fr\/wp-content\/uploads\/elementor\/thumbs\/AICA2.0cover-e1764756686402-rflwkphf18tnb8z00tje1zw3wa00ga4esrrjm2myps.jpg\" title=\"Screenshot\" alt=\"Screenshot\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8668bc6 elementor-widget elementor-widget-image\" data-id=\"8668bc6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.stagcyber.fr\/social-network-analysis-in-security-and-law-enforcement\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.stagcyber.fr\/wp-content\/uploads\/elementor\/thumbs\/sna-int-2-e1764756841690-rflwor6egkd3at3de2ikah4jz01wld6t0svszymxxc.jpeg\" title=\"sna-int-2\" alt=\"{&quot;prompt&quot;:&quot;An intelligence officer is looking at a representation of a social network graph in and analysisng it for cues. More space is devoted to the network than the officer. The main hue should be bordeaux red&quot;,&quot;originalPrompt&quot;:&quot;An intelligence officer is looking at a representation of a social network graph in and analysisng it for cues. More space is devoted to the network than the officer. The main hue should be bordeaux red&quot;,&quot;width&quot;:576,&quot;height&quot;:1024,&quot;seed&quot;:42,&quot;model&quot;:&quot;flux&quot;,&quot;enhance&quot;:false,&quot;nologo&quot;:true,&quot;negative_prompt&quot;:&quot;undefined&quot;,&quot;nofeed&quot;:false,&quot;safe&quot;:false,&quot;quality&quot;:&quot;medium&quot;,&quot;image&quot;:[],&quot;transparent&quot;:false,&quot;has_nsfw_concept&quot;:false,&quot;concept&quot;:{&quot;special_scores&quot;:{&quot;0&quot;:0.3869999945163727,&quot;1&quot;:-0.09000000357627869,&quot;2&quot;:-0.11599999666213989},&quot;special_care&quot;:[[0,0.3869999945163727]],&quot;concept_scores&quot;:{&quot;0&quot;:-0.08799999952316284,&quot;1&quot;:-0.08299999684095383,&quot;2&quot;:-0.07400000095367432,&quot;3&quot;:-0.05299999937415123,&quot;4&quot;:-0.08799999952316284,&quot;5&quot;:-0.06599999964237213,&quot;6&quot;:-0.05900000035762787,&quot;7&quot;:-0.06700000166893005,&quot;8&quot;:-0.07100000232458115,&quot;9&quot;:-0.12300000339746475,&quot;10&quot;:-0.0860000029206276,&quot;11&quot;:-0.07599999755620956,&quot;12&quot;:-0.06499999761581421,&quot;13&quot;:-0.09200000017881393,&quot;14&quot;:-0.0949999988079071,&quot;15&quot;:-0.10899999737739563,&quot;16&quot;:-0.09000000357627869},&quot;bad_concepts&quot;:[]},&quot;trackingData&quot;:{&quot;actualModel&quot;:&quot;flux&quot;,&quot;usage&quot;:{&quot;completionImageTokens&quot;:1,&quot;totalTokenCount&quot;:1}}}\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Analisi delle Reti Sociali per le investigazioni digitali<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54fcb68 elementor-widget elementor-widget-image\" data-id=\"54fcb68\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.stagcyber.fr\/wp-content\/uploads\/elementor\/thumbs\/ISSE-2013-e1764756733102-rflwlxntygi4gx6tuumut6qrtdy9i1zsmufd62tglc.webp\" title=\"ISSE-2013\" alt=\"ISSE-2013\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Le informazioni sono la risorsa pi\u00f9 importante in assoluto per le azienda. Gestirle in modo corretto \u00e8 fondamentale per il loro success a lungo termine in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/page_front-page.php","meta":{"footnotes":""},"class_list":["post-119","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.stagcyber.fr\/it\/wp-json\/wp\/v2\/pages\/119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stagcyber.fr\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.stagcyber.fr\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.stagcyber.fr\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stagcyber.fr\/it\/wp-json\/wp\/v2\/comments?post=119"}],"version-history":[{"count":26,"href":"https:\/\/www.stagcyber.fr\/it\/wp-json\/wp\/v2\/pages\/119\/revisions"}],"predecessor-version":[{"id":817,"href":"https:\/\/www.stagcyber.fr\/it\/wp-json\/wp\/v2\/pages\/119\/revisions\/817"}],"wp:attachment":[{"href":"https:\/\/www.stagcyber.fr\/it\/wp-json\/wp\/v2\/media?parent=119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}