{"id":6286,"date":"2020-01-09T04:10:53","date_gmt":"2020-01-09T04:10:53","guid":{"rendered":"https:\/\/csector.eu\/?page_id=6286"},"modified":"2024-11-07T10:13:28","modified_gmt":"2024-11-07T10:13:28","slug":"progetto","status":"publish","type":"page","link":"https:\/\/csector.eu\/it\/progetto\/","title":{"rendered":"Progetto"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6286\" class=\"elementor elementor-6286 elementor-1579\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f3cbd8 elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f3cbd8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9fc2569 ot-flex-column-vertical\" data-id=\"9fc2569\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-925ee15 elementor-widget elementor-widget-iheading\" data-id=\"925ee15\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/Titolo del progetto<\/span>\r\n\t        <h4 class=\"main-heading\">Formazione sulla sicurezza informatica delle tecnologie operative (OT)\n<\/h4>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-850e6c6 elementor-widget elementor-widget-iheading\" data-id=\"850e6c6\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/Progetto No.<\/span>\r\n\t        <h4 class=\"main-heading\">2022-1-AT01-KA220-VET-000087608 <\/h4>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f326aa elementor-widget elementor-widget-text-editor\" data-id=\"5f326aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"w-full border-b border-black\/10 dark:border-gray-900\/50 text-gray-800 dark:text-gray-100 group bg-gray-50 dark:bg-[#444654]\"><div class=\"text-base gap-6 m-auto md:max-w-2xl lg:max-w-2xl xl:max-w-3xl p-4 md:py-6 flex lg:px-0\"><div class=\"relative flex w-full flex-col lg:w-[calc(100%-115px)]\"><div class=\"min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap\"><div class=\"request-:r0:-0 markdown prose break-words dark:prose-invert dark\"><p>La formazione sulla sicurezza informatica della tecnologie operative (OT) \u00e8 un tipo di formazione focalizzato su come proteggere i sistemi di controllo industriale, come quelli utilizzati nelle industrie pi\u00f9 rilevanti (es. infrastrutture energetiche), dalle minacce informatiche. Questa formazione copre argomenti come l&#8217;identificazione delle vulnerabilit\u00e0 nei sistemi tecnologici operativi, l&#8217;attuazione di misure di sicurezza per prevenire gli attacchi e lo sviluppo di piani di risposta agli incidenti al fine di mitigare rapidamente ed efficacemente l&#8217;impatto di eventuali attacchi informatici andati a segno.<\/p><p><strong>L&#8217;obiettivo di questa formazione \u00e8 aiutare le organizzazioni a rendere &#8220;&#8221;resilienti&#8221;&#8221; i loro sistemi tecnologici operativi, assicurando che possano continuare a funzionare correttamente di fronte a potenziali minacce informatiche.<\/strong><\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7564da8 ot-flex-column-vertical\" data-id=\"7564da8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c97a89f elementor-section-full_width ot-layout_block elementor-section-height-default elementor-section-height-default\" data-id=\"c97a89f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ee166a8 ot-flex-column-vertical\" data-id=\"ee166a8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3bd0bf1 elementor-widget elementor-widget-iimagebox1\" data-id=\"3bd0bf1\" data-element_type=\"widget\" data-widget_type=\"iimagebox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<a class=\"ot-image-box\" >\r\n\t\t\t<div class=\"overlay\">\r\n\t        \t<h4>Identificare le vulnerabilit\u00e0 nei sistemi <br>tecnologici operativi<\/h4>\r\n\t\t\t<\/div>\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/engitech.s3.amazonaws.com\/images\/image-box1.jpg\" alt=\"Identificare le vulnerabilit\u00e0 nei sistemi &lt;br&gt;tecnologici operativi\">\r\n\t\t<\/a>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f732a9b elementor-widget elementor-widget-iimagebox1\" data-id=\"f732a9b\" data-element_type=\"widget\" data-widget_type=\"iimagebox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<a class=\"ot-image-box\" >\r\n\t\t\t<div class=\"overlay\">\r\n\t        \t<h4>Sviluppare piani <br> di risposta agli incidenti<\/h4>\r\n\t\t\t<\/div>\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/engitech.s3.amazonaws.com\/images\/image-box3.jpg\" alt=\"Sviluppare piani &lt;br&gt; di risposta agli incidenti\">\r\n\t\t<\/a>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d9c942d ot-flex-column-vertical\" data-id=\"d9c942d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d52049 elementor-widget elementor-widget-iimagebox1\" data-id=\"0d52049\" data-element_type=\"widget\" data-widget_type=\"iimagebox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<a class=\"ot-image-box\" >\r\n\t\t\t<div class=\"overlay\">\r\n\t        \t<h4>Implementare misure di s<br> icurezza per prevenire attacchi<\/h4>\r\n\t\t\t<\/div>\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/engitech.s3.amazonaws.com\/images\/image-box2.jpg\" alt=\"Implementare misure di s&lt;br&gt; icurezza per prevenire attacchi\">\r\n\t\t<\/a>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf54c53 elementor-widget elementor-widget-iimagebox1\" data-id=\"cf54c53\" data-element_type=\"widget\" data-widget_type=\"iimagebox1.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<a class=\"ot-image-box\" >\r\n\t\t\t<div class=\"overlay\">\r\n\t        \t<h4>Rendere <br> \"resilienti\" i <br> sistemi <br> tecnologici operativi<\/h4>\r\n\t\t\t<\/div>\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/engitech.s3.amazonaws.com\/images\/image-box4.jpg\" alt=\"Rendere &lt;br&gt; &quot;resilienti&quot; i &lt;br&gt; sistemi &lt;br&gt; tecnologici operativi\">\r\n\t\t<\/a>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c70220e ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c70220e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e2aeb84 ot-flex-column-vertical\" data-id=\"e2aeb84\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b02ba58 elementor-widget elementor-widget-iheading\" data-id=\"b02ba58\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        <h2 class=\"main-heading\">GRUPPI TARGET\n<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c75d8b elementor-widget elementor-widget-spacer\" data-id=\"7c75d8b\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1396f3f elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"1396f3f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f6dd3fa ot-flex-column-vertical\" data-id=\"f6dd3fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b1262d elementor-widget elementor-widget-iiconbox2\" data-id=\"8b1262d\" data-element_type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        \t\t        01\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Principali gruppi target<\/h5>\r\n\t            <p>PMI del settore manifatturiero:<br>\nprodotti chimici, prodotti di plastica, tessile e prodotti di cuoio, prodotti alimentari, carta e prodotti in carta, minerali non metalliferi.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2957aca ot-flex-column-vertical\" data-id=\"2957aca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4e42e8 elementor-widget elementor-widget-iiconbox2\" data-id=\"e4e42e8\" data-element_type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        \t\t        02\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Gruppi target secondari<\/h5>\r\n\t            <p>Industria del petrolio e del gas<br>\n(decisori, dipendenti), aviazione, settore marittimo e ferroviario, utilities\n<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-170a49a ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"170a49a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-43f1d1e ot-flex-column-vertical\" data-id=\"43f1d1e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d41fd46 elementor-widget elementor-widget-image\" data-id=\"d41fd46\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1920\" height=\"850\" src=\"https:\/\/csector.eu\/wp-content\/uploads\/2020\/03\/banner-home3.jpg\" class=\"attachment-full size-full wp-image-5530\" alt=\"\" srcset=\"https:\/\/csector.eu\/wp-content\/uploads\/2020\/03\/banner-home3.jpg 1920w, https:\/\/csector.eu\/wp-content\/uploads\/2020\/03\/banner-home3-300x133.jpg 300w, https:\/\/csector.eu\/wp-content\/uploads\/2020\/03\/banner-home3-1024x453.jpg 1024w, https:\/\/csector.eu\/wp-content\/uploads\/2020\/03\/banner-home3-768x340.jpg 768w, https:\/\/csector.eu\/wp-content\/uploads\/2020\/03\/banner-home3-1536x680.jpg 1536w, https:\/\/csector.eu\/wp-content\/uploads\/2020\/03\/banner-home3-720x319.jpg 720w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-293ffebc elementor-widget elementor-widget-iserv_box\" data-id=\"293ffebc\" data-element_type=\"widget\" data-widget_type=\"iserv_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"serv-box s1 elementor-animation-\">\r\n\t\t\t\t\t\t<div class=\"icon-main\">\r\n\t\t        <svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-check-double\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M505 174.8l-39.6-39.6c-9.4-9.4-24.6-9.4-33.9 0L192 374.7 80.6 263.2c-9.4-9.4-24.6-9.4-33.9 0L7 302.9c-9.4 9.4-9.4 24.6 0 34L175 505c9.4 9.4 24.6 9.4 33.9 0l296-296.2c9.4-9.5 9.4-24.7.1-34zm-324.3 106c6.2 6.3 16.4 6.3 22.6 0l208-208.2c6.2-6.3 6.2-16.4 0-22.6L366.1 4.7c-6.2-6.3-16.4-6.3-22.6 0L192 156.2l-55.4-55.5c-6.2-6.3-16.4-6.3-22.6 0L68.7 146c-6.2 6.3-6.2 16.4 0 22.6l112 112.2z\"><\/path><\/svg>\t\t\t    \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Link ipertestuali ai risultati del progetto CSecTOR<\/h5>\r\n\t            <div><p><a href=\"https:\/\/csector.eu\/it\/framework-la-sicurezza-informatica-per-le-tecnologie-operative\/\">Metodologia per la sicurezza informatica delle tecnologie operative (OT)<\/a><\/p>\n<p><a href=\"https:\/\/csector.eu\/it\/self-assessment-tool-it\/\">Strumento di autovalutazione della sicurezza informatica delle tecnologie operative (OT)<\/a><\/p>\n<p><a href=\"https:\/\/training.csector.eu\/course\/view.php?id=14\">Corso di formazione sulla sicurezza informatica delle tecnologie operative (OT)<\/a><\/p>\n<p><a href=\"https:\/\/training.csector.eu\/?lang=it\">Piattaforma per la formazione online sulla sicurezza informatica delle OT<\/a><\/p><\/div>\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6a613e7 ot-flex-column-vertical\" data-id=\"6a613e7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a85ab8 elementor-widget elementor-widget-iheading\" data-id=\"2a85ab8\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        <h2 class=\"main-heading\">RISULTATI E PRODOTTI\n<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3c9f961 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"3c9f961\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-75497dc ot-flex-column-vertical\" data-id=\"75497dc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb4d4c4 elementor-widget elementor-widget-ibutton\" data-id=\"eb4d4c4\" data-element_type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"#\" class=\"btn-details\"><i class=\"flaticon-right-arrow-1\"><\/i> LEARN MORE<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-217cb07 ot-view-default elementor-widget elementor-widget-ot-accordions-with-icon\" data-id=\"217cb07\" data-element_type=\"widget\" data-widget_type=\"ot-accordions-with-icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"ot-acc-wrapper ot-acc--with-icon\">\r\n\t\t\t\t\t\t<div class=\"ot-acc-item\">\r\n\t\t\t\t<div class=\"ot-acc-item__trigger flex-middle\" data-tab=\"1\" role=\"tab\" data-default=\"yes\">\r\n\t\t\t\t\t\t\t\t<span class=\"ot-acc-item__icon\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-book\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M448 360V24c0-13.3-10.7-24-24-24H96C43 0 0 43 0 96v320c0 53 43 96 96 96h328c13.3 0 24-10.7 24-24v-16c0-7.5-3.5-14.3-8.9-18.7-4.2-15.4-4.2-59.3 0-74.7 5.4-4.3 8.9-11.1 8.9-18.6zM128 134c0-3.3 2.7-6 6-6h212c3.3 0 6 2.7 6 6v20c0 3.3-2.7 6-6 6H134c-3.3 0-6-2.7-6-6v-20zm0 64c0-3.3 2.7-6 6-6h212c3.3 0 6 2.7 6 6v20c0 3.3-2.7 6-6 6H134c-3.3 0-6-2.7-6-6v-20zm253.4 250H96c-17.7 0-32-14.3-32-32 0-17.6 14.4-32 32-32h285.4c-1.9 17.1-1.9 46.9 0 64z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t\t<h5 class=\"ot-acc-item__title flex-middle\" >Metodologia per la sicurezza informatica delle tecnologie operative (OT) \r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-toggle\">\r\n\t\t\t\t\t\t\t\t<span class=\"down\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t\t<span class=\"up\"><svg class=\"e-font-icon-svg e-far-window-minimize\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M480 480H32c-17.7 0-32-14.3-32-32s14.3-32 32-32h448c17.7 0 32 14.3 32 32s-14.3 32-32 32z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"ot-acc-item__content\">\r\n\t\t\t\t\t<p>La metodologia per la sicurezza informatica delle tecnologie operative (Operational Technology - OT) \u00e8 un approccio sistematico alla protezione dalle minacce informtiche dei sistemi di controllo industriale. Consiste nell'identificare le vulnerabilit\u00e0, attuare misure di sicurezza e sviluppare piani di risposta agli incidenti per conservare la funzionalit\u00e0 di questi sistemi critici.<\/p>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"ot-acc-item\">\r\n\t\t\t\t<div class=\"ot-acc-item__trigger flex-middle\" data-tab=\"2\" role=\"tab\" data-default=\"\">\r\n\t\t\t\t\t\t\t\t<span class=\"ot-acc-item__icon\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star-half-alt\" viewBox=\"0 0 536 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M508.55 171.51L362.18 150.2 296.77 17.81C290.89 5.98 279.42 0 267.95 0c-11.4 0-22.79 5.9-28.69 17.81l-65.43 132.38-146.38 21.29c-26.25 3.8-36.77 36.09-17.74 54.59l105.89 103-25.06 145.48C86.98 495.33 103.57 512 122.15 512c4.93 0 10-1.17 14.87-3.75l130.95-68.68 130.94 68.7c4.86 2.55 9.92 3.71 14.83 3.71 18.6 0 35.22-16.61 31.66-37.4l-25.03-145.49 105.91-102.98c19.04-18.5 8.52-50.8-17.73-54.6zm-121.74 123.2l-18.12 17.62 4.28 24.88 19.52 113.45-102.13-53.59-22.38-11.74.03-317.19 51.03 103.29 11.18 22.63 25.01 3.64 114.23 16.63-82.65 80.38z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t\t<h5 class=\"ot-acc-item__title flex-middle\" >Strumento di autovalutazione della sicurezza informatica delle tecnologie operative (OT) \r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-toggle\">\r\n\t\t\t\t\t\t\t\t<span class=\"down\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t\t<span class=\"up\"><svg class=\"e-font-icon-svg e-far-window-minimize\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M480 480H32c-17.7 0-32-14.3-32-32s14.3-32 32-32h448c17.7 0 32 14.3 32 32s-14.3 32-32 32z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"ot-acc-item__content\">\r\n\t\t\t\t\t<p>Lo strumento di autovalutazione della sicurezza informatica delle tecnologie operative (OT) \u00e8 uno strumento che le organizzazioni possono utilizzare per valutare l'efficenza delle loro misure di sicurezza informatica per proteggere i sistemi di controllo industriale. Aiuta le organizzazioni a identificare potenziali vulnerabilit\u00e0 e aree per migliorare la loro sicurezza.<\/p>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"ot-acc-item\">\r\n\t\t\t\t<div class=\"ot-acc-item__trigger flex-middle\" data-tab=\"3\" role=\"tab\" data-default=\"\">\r\n\t\t\t\t\t\t\t\t<span class=\"ot-acc-item__icon\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chalkboard-teacher\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M208 352c-2.39 0-4.78.35-7.06 1.09C187.98 357.3 174.35 360 160 360c-14.35 0-27.98-2.7-40.95-6.91-2.28-.74-4.66-1.09-7.05-1.09C49.94 352-.33 402.48 0 464.62.14 490.88 21.73 512 48 512h224c26.27 0 47.86-21.12 48-47.38.33-62.14-49.94-112.62-112-112.62zm-48-32c53.02 0 96-42.98 96-96s-42.98-96-96-96-96 42.98-96 96 42.98 96 96 96zM592 0H208c-26.47 0-48 22.25-48 49.59V96c23.42 0 45.1 6.78 64 17.8V64h352v288h-64v-64H384v64h-76.24c19.1 16.69 33.12 38.73 39.69 64H592c26.47 0 48-22.25 48-49.59V49.59C640 22.25 618.47 0 592 0z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t\t<h5 class=\"ot-acc-item__title flex-middle\" >Corso di formazione sulla sicurezza informatica delle tecnologie operative (OT) \r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-toggle\">\r\n\t\t\t\t\t\t\t\t<span class=\"down\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t\t<span class=\"up\"><svg class=\"e-font-icon-svg e-far-window-minimize\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M480 480H32c-17.7 0-32-14.3-32-32s14.3-32 32-32h448c17.7 0 32 14.3 32 32s-14.3 32-32 32z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"ot-acc-item__content\">\r\n\t\t\t\t\t<div class=\"w-full border-b border-black\/10 dark:border-gray-900\/50 text-gray-800 dark:text-gray-100 group bg-gray-50 dark:bg-[#444654]\"><div class=\"text-base gap-6 m-auto md:max-w-2xl lg:max-w-2xl xl:max-w-3xl p-4 md:py-6 flex lg:px-0\"><div class=\"relative flex w-full flex-col lg:w-[calc(100%-115px)]\"><div class=\"min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap\"><div class=\"request-:r0:-4 markdown prose break-words dark:prose-invert dark\"><p>Il corso di formazione sulla sicurezza informatica delle tecnologie operative (OT) \u00e8 un programma di formazione incentrato sulla protezione dei sistemi di controllo industriale dalle minacce informatiche. Sviluppa argomenti come l'identificazione delle vulnerabilit\u00e0, l'attuazione di misure di sicurezza e lo sviluppo di piani di risposta agli incidenti.<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"ot-acc-item\">\r\n\t\t\t\t<div class=\"ot-acc-item__trigger flex-middle\" data-tab=\"4\" role=\"tab\" data-default=\"\">\r\n\t\t\t\t\t\t\t\t<span class=\"ot-acc-item__icon\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-laptop-code\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M255.03 261.65c6.25 6.25 16.38 6.25 22.63 0l11.31-11.31c6.25-6.25 6.25-16.38 0-22.63L253.25 192l35.71-35.72c6.25-6.25 6.25-16.38 0-22.63l-11.31-11.31c-6.25-6.25-16.38-6.25-22.63 0l-58.34 58.34c-6.25 6.25-6.25 16.38 0 22.63l58.35 58.34zm96.01-11.3l11.31 11.31c6.25 6.25 16.38 6.25 22.63 0l58.34-58.34c6.25-6.25 6.25-16.38 0-22.63l-58.34-58.34c-6.25-6.25-16.38-6.25-22.63 0l-11.31 11.31c-6.25 6.25-6.25 16.38 0 22.63L386.75 192l-35.71 35.72c-6.25 6.25-6.25 16.38 0 22.63zM624 416H381.54c-.74 19.81-14.71 32-32.74 32H288c-18.69 0-33.02-17.47-32.77-32H16c-8.8 0-16 7.2-16 16v16c0 35.2 28.8 64 64 64h512c35.2 0 64-28.8 64-64v-16c0-8.8-7.2-16-16-16zM576 48c0-26.4-21.6-48-48-48H112C85.6 0 64 21.6 64 48v336h512V48zm-64 272H128V64h384v256z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t\t<h5 class=\"ot-acc-item__title flex-middle\" >Piattaforma per la formazione online sulla sicurezza informatica delle OT \r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"icon-toggle\">\r\n\t\t\t\t\t\t\t\t<span class=\"down\"><svg class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t\t<span class=\"up\"><svg class=\"e-font-icon-svg e-far-window-minimize\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M480 480H32c-17.7 0-32-14.3-32-32s14.3-32 32-32h448c17.7 0 32 14.3 32 32s-14.3 32-32 32z\"><\/path><\/svg><\/span>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/h5>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"ot-acc-item__content\">\r\n\t\t\t\t\t<div class=\"w-full border-b border-black\/10 dark:border-gray-900\/50 text-gray-800 dark:text-gray-100 group bg-gray-50 dark:bg-[#444654]\"><div class=\"text-base gap-6 m-auto md:max-w-2xl lg:max-w-2xl xl:max-w-3xl p-4 md:py-6 flex lg:px-0\"><div class=\"relative flex w-full flex-col lg:w-[calc(100%-115px)]\"><div class=\"min-h-[20px] flex flex-col items-start gap-4 whitespace-pre-wrap\"><div class=\"request-:r0:-5 markdown prose break-words dark:prose-invert dark\"><p>La piattaforma di e-training sulla sicurezza informatica delle tecnologie operative (OT) \u00e8 una piattaforma online che offre corsi di formazione sulla sicurezza informatica per i sistemi di controllo industriale. Permette agli utenti di apprendere al proprio ritmo e da qualsiasi luogo.<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/Titolo del progetto Formazione sulla sicurezza informatica delle tecnologie operative (OT) \/\/Progetto No. 2022-1-AT01-KA220-VET-000087608 La formazione sulla sicurezza informatica della tecnologie operative (OT) \u00e8 un tipo di formazione focalizzato su come proteggere i sistemi di controllo industriale, come quelli utilizzati nelle industrie pi\u00f9 rilevanti (es. infrastrutture energetiche), dalle minacce informatiche. Questa formazione copre argomenti come [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6286","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/csector.eu\/it\/wp-json\/wp\/v2\/pages\/6286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csector.eu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csector.eu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csector.eu\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csector.eu\/it\/wp-json\/wp\/v2\/comments?post=6286"}],"version-history":[{"count":0,"href":"https:\/\/csector.eu\/it\/wp-json\/wp\/v2\/pages\/6286\/revisions"}],"wp:attachment":[{"href":"https:\/\/csector.eu\/it\/wp-json\/wp\/v2\/media?parent=6286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}