{"id":14914,"date":"2025-01-16T11:40:09","date_gmt":"2025-01-16T10:40:09","guid":{"rendered":"https:\/\/www.intesys.it\/journal\/?p=14914"},"modified":"2025-03-17T12:10:00","modified_gmt":"2025-03-17T11:10:00","slug":"come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica","status":"publish","type":"post","link":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/","title":{"rendered":"Come aiutiamo i nostri clienti a sviluppare una vera e propria cultura della sicurezza informatica"},"content":{"rendered":"<p><div id='wpig-contents' class='wpig-contents wpig-number-list wpig-no-hierarachy wpig-sidebar-widget wpig-style-1'><span class='wpig-headline'>Indice dei contenuti<\/span><!-- Table of Contents --><div id='wpig-table-of-content' class='wpig-table-of-content' ><ol><li class='stoc-la-sicurezza-informatica-e-unattivita-continuativa'><a href='#stoc-la-sicurezza-informatica-e-unattivita-continuativa'>La sicurezza informatica \u00e8 un\u2019attivit\u00e0 continuativa<\/a><\/li><li class='stoc-software-sicuro-molto-piu-di-una-questione-tecnica'><a href='#stoc-software-sicuro-molto-piu-di-una-questione-tecnica'>Software sicuro, molto pi\u00f9 di una questione tecnica<\/a><\/li><li class='stoc-cultura-della-sicurezza-informatica-dalla-teoria-alla-pratica'><a href='#stoc-cultura-della-sicurezza-informatica-dalla-teoria-alla-pratica'>Cultura della sicurezza informatica, dalla teoria alla pratica<\/a><\/li><li class='stoc-il-nostro-contributo-alla-security-culture-dei-nostri-clienti'><a href='#stoc-il-nostro-contributo-alla-security-culture-dei-nostri-clienti'>Il nostro contributo alla security culture dei nostri clienti<\/a><\/li><\/ol><\/div><!-- END OF Table of Contents --><\/div><\/p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]Le minacce cyber sono in continuo aumento, e il panorama legislativo evolve rapidamente per fronteggiare questo scenario. DORA,<a href=\"https:\/\/www.inetworking.it\/news\/cybersecurity\/nis-2-compliance-quali-strumenti-adottare\/\" target=\"_blank\" rel=\"noopener\"> NIS 2<\/a> e Cyber Resilience Act sono esempi chiari di come le istituzioni europee stiano rafforzando il framework normativo per proteggere le informazioni e i sistemi IT dell\u2019intero tessuto economico continentale.<br \/>\nLe imprese si trovano quindi di fronte a una grande sfida: non solo devono far fronte a un contesto di minacce in costante mutamento, ma devono anche adeguarsi a normative che le obbligano a cambiare, ad evolvere. E come si sa, ogni forma di trasformazione parte dalla cultura.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-la-sicurezza-informatica-e-unattivita-continuativa\" class=\"wpig-heading\">La sicurezza informatica \u00e8 un\u2019attivit\u00e0 continuativa<\/h2>\n<p>Negli anni, all\u2019interno delle imprese si \u00e8 fatta strada un\u2019importante consapevolezza: la <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/condividere-la-cultura-della-sicurezza-del-software\/\">sicurezza del software<\/a> non \u00e8 un task, o meglio un\u2019attivit\u00e0 isolata, ma <strong>deve essere integrata in modo permanente e continuativo nel ciclo di vita delle applicazioni<\/strong>. Il motivo \u00e8 semplicissimo: un software rilasciato oggi con standard di sicurezza adeguati sar\u00e0 certamente vulnerabile domani, e <strong>la sua resilienza dipender\u00e0 da quanto l\u2019azienda \u00e8 stata proattiva su questo versante<\/strong>.<\/p>\n<p>Nonostante questa crescente consapevolezza, molte aziende<strong> si trovano in difficolt\u00e0 quando devono passare dalla teoria alla pratica<\/strong>. La carenza di competenze specifiche, la mancanza di processi consolidati e l\u2019assenza di strumenti adeguati rappresentano ostacoli (molto) significativi, ma \u00e8 proprio qui che un partner come Intesys pu\u00f2 fare la differenza aiutandole a <strong>trasformare l\u2019ideale del software sicuro in una realt\u00e0 concreta<\/strong>, pur con tutta la complessit\u00e0 del caso. In altre parole, Intesys non si limita a fornire e gestire soluzioni tecniche, ma contribuisce alla <strong>costruzione di una vera e propria cultura della sicurezza informatica<\/strong>, diffusa a tutti i livelli dell\u2019organizzazione. Vediamo come, in dettaglio.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<strong>Leggi il nostro documento metodologico di Sviluppo Software Sicuro:<\/strong>[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-software-sicuro-molto-piu-di-una-questione-tecnica\" class=\"wpig-heading\">Software sicuro, molto pi\u00f9 di una questione tecnica<\/h2>\n<p>Quando si parla di <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/software-sicuro-lgsss-nostre-linee-guida\/\">software sicuro<\/a>, \u00e8 facile cadere nell\u2019<strong>errore di considerarlo un tema esclusivamente tecnico<\/strong>, dedicato ai soli sviluppatori e responsabili IT. La realt\u00e0 che rileviamo sul mercato, infatti, \u00e8 ben diversa.<\/p>\n<p>Il primo passo di questa trasformazione parte dall\u2019alto, <strong>dal management aziendale<\/strong>. Sono i vertici a percepire l\u2019urgenza di adottare linee guida strutturate per <strong>garantire la conformit\u00e0 con la normativa in essere<\/strong> (es, <a href=\"https:\/\/dora-info.it\/\" target=\"_blank\" rel=\"noopener\">DORA<\/a> nel mondo finance) e a dover decidere come queste debbano essere applicate. Questo processo di definizione strategica \u00e8 tutt\u2019altro che banale, perch\u00e9 implica scelte complesse, come bilanciare costi e benefici, valutare le implicazioni sul business, creare processi, organizzare e coordinare diversi reparti aziendali.<\/p>\n<p>Intesys pu\u00f2 entrare in azione fin da questa fase, assistendo il management aziendale <strong>nel disegno e nella stesura di linee guida che rappresentino un riferimento chiaro e operativo<\/strong> per gestire la sicurezza informatica a livello aziendale. Le linee guida constano solitamente di due dimensioni:<\/p>\n<ol>\n<li><strong>Una dimensione strategica<\/strong>, in cui si definiscono gli obiettivi e, soprattutto, l\u2019ambito di applicazione delle linee guida stesse (dai soli nuovi progetti a tutto l\u2019ecosistema applicativo aziendale\u2026);<\/li>\n<li><strong>Una dimensione pi\u00f9 tecnica<\/strong>, che esplora le misure che verranno concretamente implementate nei progetti IT, tenendo conto delle specificit\u00e0 di ogni progetto.<\/li>\n<\/ol>\n<p><span class=\"TextRun SCXW110823664 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW110823664 BCX0\">L<\/span><span class=\"NormalTextRun SCXW110823664 BCX0\">a consulenza erogata da Intesys offre <\/span><span class=\"NormalTextRun SCXW110823664 BCX0\">cos\u00ec al management <\/span><span class=\"NormalTextRun SCXW110823664 BCX0\">aziendale <\/span><span class=\"NormalTextRun SCXW110823664 BCX0\">un riferimento concreto, traducendo le complessit\u00e0 normative e strategiche <\/span><\/span><span class=\"TextRun SCXW110823664 BCX0\" lang=\"IT-IT\" xml:lang=\"IT-IT\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW110823664 BCX0\"><strong>in un piano d\u2019azione chiaro e modulabile<\/strong>.<\/span><\/span><span class=\"EOP SCXW110823664 BCX0\" data-ccp-props=\"{}\">\u00a0<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<strong>Consulta le nostre Linee Guida per lo Sviluppo di Software Sicuro (LGSSS)<\/strong>[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]JTNDJTIxLS1IdWJTcG90JTIwQ2FsbC10by1BY3Rpb24lMjBDb2RlJTIwLS0lM0UlM0NzcGFuJTIwY2xhc3MlM0QlMjJocy1jdGEtd3JhcHBlciUyMiUyMGlkJTNEJTIyaHMtY3RhLXdyYXBwZXItNGY5MmYzOGUtODlhZC00YzI1LTliMjUtMzQwMjYxOGE3ZmUxJTIyJTNFJTNDc3BhbiUyMGNsYXNzJTNEJTIyaHMtY3RhLW5vZGUlMjBocy1jdGEtNGY5MmYzOGUtODlhZC00YzI1LTliMjUtMzQwMjYxOGE3ZmUxJTIyJTIwaWQlM0QlMjJocy1jdGEtNGY5MmYzOGUtODlhZC00YzI1LTliMjUtMzQwMjYxOGE3ZmUxJTIyJTNFJTNDJTIxLS0lNUJpZiUyMGx0ZSUyMElFJTIwOCU1RCUzRSUzQ2RpdiUyMGlkJTNEJTIyaHMtY3RhLWllLWVsZW1lbnQlMjIlM0UlM0MlMkZkaXYlM0UlM0MlMjElNUJlbmRpZiU1RC0tJTNFJTNDYSUyMGhyZWYlM0QlMjJodHRwcyUzQSUyRiUyRmN0YS1yZWRpcmVjdC5odWJzcG90LmNvbSUyRmN0YSUyRnJlZGlyZWN0JTJGNTM1MTAxNSUyRjRmOTJmMzhlLTg5YWQtNGMyNS05YjI1LTM0MDI2MThhN2ZlMSUyMiUyMHRhcmdldCUzRCUyMl9ibGFuayUyMiUyMHJlbCUzRCUyMm5vb3BlbmVyJTIyJTNFJTNDaW1nJTIwY2xhc3MlM0QlMjJocy1jdGEtaW1nJTIyJTIwaWQlM0QlMjJocy1jdGEtaW1nLTRmOTJmMzhlLTg5YWQtNGMyNS05YjI1LTM0MDI2MThhN2ZlMSUyMiUyMHN0eWxlJTNEJTIyYm9yZGVyLXdpZHRoJTNBMHB4JTNCJTIyJTIwc3JjJTNEJTIyaHR0cHMlM0ElMkYlMkZuby1jYWNoZS5odWJzcG90LmNvbSUyRmN0YSUyRmRlZmF1bHQlMkY1MzUxMDE1JTJGNGY5MmYzOGUtODlhZC00YzI1LTliMjUtMzQwMjYxOGE3ZmUxLnBuZyUyMiUyMCUyMGFsdCUzRCUyMkxFR0dJJTIwTEUlMjBOT1NUUkUlMjBMSU5FRSUyMEdVSURBJTIyJTJGJTNFJTNDJTJGYSUzRSUzQyUyRnNwYW4lM0UlM0NzY3JpcHQlMjBjaGFyc2V0JTNEJTIydXRmLTglMjIlMjBzcmMlM0QlMjJodHRwcyUzQSUyRiUyRmpzLmhzY3RhLm5ldCUyRmN0YSUyRmN1cnJlbnQuanMlMjIlM0UlM0MlMkZzY3JpcHQlM0UlM0NzY3JpcHQlMjB0eXBlJTNEJTIydGV4dCUyRmphdmFzY3JpcHQlMjIlM0UlMjBoYnNwdC5jdGEubG9hZCUyODUzNTEwMTUlMkMlMjAlMjc0ZjkyZjM4ZS04OWFkLTRjMjUtOWIyNS0zNDAyNjE4YTdmZTElMjclMkMlMjAlN0IlMjJ1c2VOZXdMb2FkZXIlMjIlM0ElMjJ0cnVlJTIyJTJDJTIycmVnaW9uJTIyJTNBJTIybmExJTIyJTdEJTI5JTNCJTIwJTNDJTJGc2NyaXB0JTNFJTNDJTJGc3BhbiUzRSUzQyUyMS0tJTIwZW5kJTIwSHViU3BvdCUyMENhbGwtdG8tQWN0aW9uJTIwQ29kZSUyMC0tJTNF[\/vc_raw_html][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-cultura-della-sicurezza-informatica-dalla-teoria-alla-pratica\" class=\"wpig-heading\">Cultura della sicurezza informatica, dalla teoria alla pratica<\/h2>\n<p>Una volta definite le linee guida, <strong>l\u2019attenzione si sposta sull\u2019IT, che ha l\u2019onere tutt\u2019altro che banale di tradurle in azioni pratiche<\/strong>. Qui emergono fin da subito sfide di fattibilit\u00e0 e di budget: implementare un framework di <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/software-security-come-realizzare-applicazioni-sicure\/\">software security<\/a> avanzato pu\u00f2 richiedere l\u2019<strong>introduzione di nuove figure professionali, l\u2019acquisto di strumenti dedicati<\/strong> e una revisione dei contratti con i fornitori, che a loro volta dovranno garantire un livello di sicurezza adeguato.<\/p>\n<p>Per affrontare le sfide dell\u2019IT, Intesys supporta le aziende con un approccio strutturato:[\/vc_column_text][nectar_icon_list animate=&#8221;true&#8221; color=&#8221;Extra-Color-3&#8243; direction=&#8221;vertical&#8221; icon_size=&#8221;small&#8221; icon_style=&#8221;no-border&#8221;][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003781911-6&#8243; tab_id=&#8221;1741003781912-9&#8243;]<strong>Progettazione di nuovi processi di lavoro<\/strong>: creiamo e implementiamo processi che tengono conto di tutte le dimensioni, dagli aspetti commerciali a quelli tecnici, fino alla gestione delle relazioni tra diverse entit\u00e0 aziendali.<\/p>\n<p>Promuovere la cultura della sicurezza informatica significa, infatti, superare i tradizionali silos organizzativi, favorendo la collaborazione attiva tra aree aziendali che, per decenni, hanno operato in modo indipendente. Un esempio emblematico \u00e8 <strong>il rapporto tra i reparti IT e legale<\/strong>, laddove quest\u2019ultimo riveste un ruolo fondamentale in un\u2019era di normative sempre pi\u00f9 stringenti. Spesso, i data breach mettono in luce una mancanza di dialogo e coordinamento tra questi team, ed \u00e8 quindi indispensabile <strong>adottare una strategia integrata e condivisa<\/strong>, in cui ciascun dipartimento apporti il proprio contributo all&#8217;obiettivo comune: <strong>proteggere l&#8217;intero ecosistema aziendale<\/strong>.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003781943-5&#8243; tab_id=&#8221;1741003781943-6&#8243;]<strong>Identificazione delle figure professionali<\/strong> necessarie per governare i nuovi processi. Per esempio, \u00e8 fondamentale la presenza di professionisti in grado di valutare la rispondenza di tutte le analisi tecniche alle linee guida definite precedentemente.[\/nectar_icon_list_item][nectar_icon_list_item icon_type=&#8221;numerical&#8221; text_full_html=&#8221;html&#8221; title=&#8221;List Item&#8221; id=&#8221;1741003781983-2&#8243; tab_id=&#8221;1741003781983-1&#8243;]<strong>Definizione delle linee guida operative per i team tecnici<\/strong> e supporto, mediante tool (es, analisi statica del codice, sistemi per il controllo delle dipendenze), esperienza e professionalit\u00e0 dedicate, alle <strong>creazione di un<a href=\"https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/ciclo-di-vita-del-software\/\" target=\"_blank\" rel=\"noopener\"> ciclo di vita del software<\/a><\/strong>. In questa fase, vengono valutati i <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/come-definire-i-requisiti-di-sicurezza-informatica-nello-sviluppo-software\/\">requisiti di sicurezza informatica<\/a> e definite le checklist che diventeranno parte integrante del lavoro quotidiano dei team tecnici, garantendo che la <strong>sicurezza sia valutata e monitorata in ogni momento dell\u2019iter di sviluppo<\/strong>.[\/nectar_icon_list_item][\/nectar_icon_list][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]Un aspetto spesso trascurato, ma fondamentale, \u00e8 <strong>la fase di test<\/strong>. Tradizionalmente, i test di sicurezza venivano eseguiti raramente e\/o solo a valle dello sviluppo. In Intesys, invece, promuoviamo <strong>l\u2019integrazione continua del security testing nei processi di sviluppo<\/strong> per far s\u00ec che ogni nuova versione del software risponda agli standard pi\u00f9 elevati.<\/p>\n<p>Infine, nella nostra visione <strong>la sicurezza non si esaurisce con il rilascio del software<\/strong>. Intesys aiuta le aziende a monitorare le applicazioni in produzione e a implementare processi di aggiornamento che consentano di prevenire le vulnerabilit\u00e0 future. L\u2019obiettivo \u00e8 garantire che <strong>gli sviluppatori lavorino su asset gi\u00e0 selezionati e validati<\/strong>, centralizzando e standardizzando gli strumenti utilizzati per massimizzarne la protezione.[\/vc_column_text][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<strong>Consulta il documento di Assessment per Sviluppo Software Sicuro:<\/strong>[\/vc_column_text][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; top_margin=&#8221;30&#8243; bottom_margin=&#8221;30&#8243; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in&#8221; animation_easing=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]<em>Ilario Gavioli, General Manager di Intesys, parla di Sicurezza del Software a ESICONF2025. <\/em><em>Guarda il video completo e scopri come creiamo applicazioni sicure sin dalla fase di progettazione, garantendo al contempo qualit\u00e0 e sostenibilit\u00e0 dei costi.<\/em>[\/vc_column_text][vc_video link=&#8221;https:\/\/www.youtube.com\/watch?v=qsKyoH8dfic&#8221; align=&#8221;center&#8221; css=&#8221;&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h2 id=\"stoc-il-nostro-contributo-alla-security-culture-dei-nostri-clienti\" class=\"wpig-heading\">Il nostro contributo alla security culture dei nostri clienti<\/h2>\n<p>Con l\u2019approccio descritto in questo articolo, siamo certi di <strong>contribuire allo sviluppo della cultura della sicurezza informatica nelle organizzazioni con cui lavoriamo<\/strong>, rendendola una dimensione centrale, un pilastro strategico su cui costruire un ecosistema digitale solido.<\/p>\n<p>Il nostro principale <strong>valore aggiunto risiede nell\u2019esperienza<\/strong>. Abbiamo intrapreso questo percorso anni fa, molto prima che diventasse una priorit\u00e0 per tante aziende, e abbiamo sviluppato competenze, framework e metodologie per affiancare realt\u00e0 di ogni dimensione e complessit\u00e0 organizzativa. Sebbene, infatti, la sicurezza IT possa essere affrontata in tanti modi diversi, la nostra esperienza ci ha guidati nell\u2019<strong>individuare le best practice pi\u00f9 efficaci, traducendole in un approccio strutturato<\/strong> e al tempo stesso flessibile.<\/p>\n<p>Non da ultimo, un elemento distintivo del nostro approccio \u00e8 la <strong>capacit\u00e0 di gestire in modo integrato tutte le dimensioni che influenzano la sicurezza del software<\/strong>. Grazie alla sinergia tra le due anime del Gruppo Intesys (Intesys e Intesys Networking), siamo in grado di coprire tutto lo spettro di <strong>processi, applicazioni, infrastrutture e architetture<\/strong>, garantendo una visione completa e approfondita della sicurezza dell\u2019ecosistema digitale delle imprese.[\/vc_column_text][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;10&#8243;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; bg_color=&#8221;#0f33ce&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; advanced_gradient_angle=&#8221;0&#8243; overlay_strength=&#8221;0.8&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;padding-4-percent&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; constrain_group_2=&#8221;yes&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; advanced_gradient_angle=&#8221;0&#8243; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; gradient_type=&#8221;default&#8221;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][image_with_animation image_url=&#8221;10304&#8243; image_size=&#8221;full&#8221; animation_type=&#8221;entrance&#8221; animation=&#8221;None&#8221; animation_movement_type=&#8221;transform_y&#8221; hover_animation=&#8221;none&#8221; alignment=&#8221;&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; image_loading=&#8221;default&#8221; max_width=&#8221;custom&#8221; max_width_custom=&#8221;35%&#8221;][\/vc_column_inner][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;5\/6&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text css=&#8221;&#8221; text_direction=&#8221;default&#8221;]\n<h5 id=\"stoc-software-sicuro\" class=\"wpig-heading\">SOFTWARE SICURO<\/h5>\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_custom_heading text=&#8221;Scopri come sviluppiamo<br \/>\nsoluzioni a prova di cyberischio&#8221; font_container=&#8221;tag:h3|font_size:34px|text_align:left|color:%23ffffff|line_height:42px&#8221; use_theme_fonts=&#8221;yes&#8221; css=&#8221;&#8221;][nectar_btn size=&#8221;medium&#8221; open_new_tab=&#8221;true&#8221; button_style=&#8221;see-through-2&#8243; color_override=&#8221;#ffffff&#8221; hover_color_override=&#8221;#17fdb4&#8243; hover_text_color_override=&#8221;#000000&#8243; icon_family=&#8221;none&#8221; text=&#8221;SCOPRI DI PI\u00d9&#8221; margin_top=&#8221;30&#8243; url=&#8221;https:\/\/www.intesys.it\/information-technology\/metodologia-e-approccio\/sviluppo-codice-sicuro\/&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221;&#8230;<\/p>\n","protected":false},"author":121,"featured_media":14930,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[27],"tags":[206,784,233],"class_list":{"0":"post-14914","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information-technology","8":"tag-cybersecurity","9":"tag-secure-coding","10":"tag-development"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sicurezza informatica: come costruire una cultura della sicurezza<\/title>\n<meta name=\"description\" content=\"Scopri come Intesys supporta le aziende nella costruzione di una vera e propria cultura della sicurezza informatica\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicurezza informatica: come costruire una cultura della sicurezza\" \/>\n<meta property=\"og:description\" content=\"Scopri come Intesys supporta le aziende nella costruzione di una vera e propria cultura della sicurezza informatica\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/\" \/>\n<meta property=\"og:site_name\" content=\"Intesys Journal\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-16T10:40:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-17T11:10:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Diego Loro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Diego Loro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/\",\"url\":\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/\",\"name\":\"Sicurezza informatica: come costruire una cultura della sicurezza\",\"isPartOf\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/01\/sicurezza_informatica.png\",\"datePublished\":\"2025-01-16T10:40:09+00:00\",\"dateModified\":\"2025-03-17T11:10:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/52dd46d043a406e9ee10b0a8305d5c66\"},\"description\":\"Scopri come Intesys supporta le aziende nella costruzione di una vera e propria cultura della sicurezza informatica\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#primaryimage\",\"url\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/01\/sicurezza_informatica.png\",\"contentUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/01\/sicurezza_informatica.png\",\"width\":1920,\"height\":1440,\"caption\":\"sicurezza informatica\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intesys.it\/journal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Come aiutiamo i nostri clienti a sviluppare una vera e propria cultura della sicurezza informatica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\",\"url\":\"https:\/\/www.intesys.it\/journal\/\",\"name\":\"Intesys\",\"description\":\"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intesys.it\/journal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/52dd46d043a406e9ee10b0a8305d5c66\",\"name\":\"Diego Loro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8d2163c9e3256465a6f4d461b4605b63e1bcd9ee52bd205caf587b495add8bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8d2163c9e3256465a6f4d461b4605b63e1bcd9ee52bd205caf587b495add8bb?s=96&d=mm&r=g\",\"caption\":\"Diego Loro\"},\"description\":\"Entrato in Intesys nel 2021, mi occupo di Project Management e Service Management. Prima di Intesys, dopo la laurea in ingegneria ho lavorato per 15 anni nel settore IT come Senior Java Developer, Software Architect e Project Manager di progettualit\u00e0 ad alto contenuto tecnologico.\",\"url\":\"https:\/\/www.intesys.it\/journal\/autore\/diego-loro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sicurezza informatica: come costruire una cultura della sicurezza","description":"Scopri come Intesys supporta le aziende nella costruzione di una vera e propria cultura della sicurezza informatica","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/","og_locale":"it_IT","og_type":"article","og_title":"Sicurezza informatica: come costruire una cultura della sicurezza","og_description":"Scopri come Intesys supporta le aziende nella costruzione di una vera e propria cultura della sicurezza informatica","og_url":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/","og_site_name":"Intesys Journal","article_published_time":"2025-01-16T10:40:09+00:00","article_modified_time":"2025-03-17T11:10:00+00:00","og_image":[{"width":600,"height":250,"url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg","type":"image\/jpeg"}],"author":"Diego Loro","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2022\/02\/dem-journal-login-unico-europeo.jpg","twitter_misc":{"Scritto da":"Diego Loro","Tempo di lettura stimato":"10 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/","url":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/","name":"Sicurezza informatica: come costruire una cultura della sicurezza","isPartOf":{"@id":"https:\/\/www.intesys.it\/journal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#primaryimage"},"image":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/01\/sicurezza_informatica.png","datePublished":"2025-01-16T10:40:09+00:00","dateModified":"2025-03-17T11:10:00+00:00","author":{"@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/52dd46d043a406e9ee10b0a8305d5c66"},"description":"Scopri come Intesys supporta le aziende nella costruzione di una vera e propria cultura della sicurezza informatica","breadcrumb":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#primaryimage","url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/01\/sicurezza_informatica.png","contentUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2025\/01\/sicurezza_informatica.png","width":1920,"height":1440,"caption":"sicurezza informatica"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/come-aiutiamo-le-aziende-a-sviluppare-una-cultura-della-sicurezza-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intesys.it\/journal\/"},{"@type":"ListItem","position":2,"name":"Come aiutiamo i nostri clienti a sviluppare una vera e propria cultura della sicurezza informatica"}]},{"@type":"WebSite","@id":"https:\/\/www.intesys.it\/journal\/#website","url":"https:\/\/www.intesys.it\/journal\/","name":"Intesys","description":"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intesys.it\/journal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/52dd46d043a406e9ee10b0a8305d5c66","name":"Diego Loro","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8d2163c9e3256465a6f4d461b4605b63e1bcd9ee52bd205caf587b495add8bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8d2163c9e3256465a6f4d461b4605b63e1bcd9ee52bd205caf587b495add8bb?s=96&d=mm&r=g","caption":"Diego Loro"},"description":"Entrato in Intesys nel 2021, mi occupo di Project Management e Service Management. Prima di Intesys, dopo la laurea in ingegneria ho lavorato per 15 anni nel settore IT come Senior Java Developer, Software Architect e Project Manager di progettualit\u00e0 ad alto contenuto tecnologico.","url":"https:\/\/www.intesys.it\/journal\/autore\/diego-loro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/14914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/users\/121"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/comments?post=14914"}],"version-history":[{"count":10,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/14914\/revisions"}],"predecessor-version":[{"id":15094,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/14914\/revisions\/15094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media\/14930"}],"wp:attachment":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media?parent=14914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/categories?post=14914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/tags?post=14914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}