SlideShare a Scribd company logo
1 of 20
Download to read offline
Critical Infrastucture Protection
a strategic opportunity for Countries’
modernization and technological autonomy
Genoa – CPEXPO, Inauguration Day, 29 October 2013

Lorenzo Fiori
Senior Vice President - Strategy

1
Quality of Infrastuctures……..

……….progress, development
and ……..
……… security

2
The digital “evolution / revolution”

1971 : first e-mail

2013 : 144,8 billions of e-mail per day
2015: 1 zettabyte (1021) of data on internet

2020 : 50 billions of devices connected

3
CYBER THREATH:

Enterprise
Natural Resources

Energy: production and grid

Health

Finance and Banking

Internet
Transport

Gov.nt Services
Emergency Services

Defense

SECURITY CHALLENGE ON GLOBAL SCALE
4
Integration & Interoperability
SOA Architecture:
Open, Multi-level, Net-centric

Physical & logical Interoperability

5
Sesar: air traffic interoperability

6
Critical Infrastructure

Interoperability

Relevance

logical

physical

SECURITY
Complexity

physical

logical

Vulnerability

Interdependency

7
8
CNI protection: benefit or cost?

9
Public Private Partnership

10
Estonia

2007

2008
-3,7%

2009
-14,3%

2010
+2,3%

2011
+7,6%

Debito/PIL
(*) tra I più bassi nell’EU 27
Source Eurostat news release 64/2013

2012
+2,0%
-0,3% (*)
11
Observatory on “The Costs of No Action (CNA)” (*)

A new point of view:
from “investment” cost to “not doing” cost
Sector

CNA €/000

Energy

65.800.000

Energy efficency

46.000.000

Highway

102.600.000

Railway

132.400.000

Logistics

73.100.000

Waste

10.100.000

Water

44.300.000

Total CNA

474.300.000

475 bn € in 16 years:
The economical,
environmental and social
cost (missed benefits) of
not doing infrastructures in
Italy

CNA derives from the lack of infrastructures but also from
(*) Source:
their misuse and unavailability
Not only new infrastructures but also technical innovation
and security investments

12
The
Engineers
don’t live!
They
deliver!

13
Opportunity / Objectives

Investment Multiplier
Up to x5

Investment Return
about 2 / 3 years

14
Design Criteria
• Rationality

• Sobriety
• Focalization

• Sustainability
• Semplification

• Re-use
• Divestment
15
Model
Spoke
Spoke

Windmill

Spoke

Hub

Spoke

Banks

Others

Public Stakeholder
Gov. Institutions
accountable for
the CNI
protection

Spoke

Providers

Energy

Catalyser
Preferably a
Private
Stakeholder for
technology,
products and
solutions

Food Chain

TelCo

Transport

Health

Spoke

Spoke

16
The role for the “Catalyser”
•

Identification of new requirements/ needs for security, either physical and
logical / cyber

•

Technology innovation / Technology insertion

•

Maintenance and update of legacy systems

•

CNI operators’ advanced training

•

Secure supply chain

•

Real -time services for threat monitoring / situation awareness

•

Collaboration with Academy and Research Center to assess threath evolution
and countermeasure / preventative tools

Security-by-design, embedded in any new solutions
17
The relevance of incentives

18
Telecom Operators

Public
Entities

Defence

SMB and large
enterprises

Customs
ANSPs

expertise and
customers’ base:

Cyber
Security
& Defence

Social Security

Civil Protection /
Emergency Services
Law Enforcement

Postal services

Banking / Finance
Other Public
Institutions

SOC Chieti

SCOC

HPC

19
Today, Tomorrow, Together

Thanks

for the protection of our critical infrastructures
20

More Related Content

What's hot

CEIPI summer school on IP in Europe 2018 - Presentation IP Strategies in Europe
CEIPI summer school on IP in Europe 2018 - Presentation IP Strategies in EuropeCEIPI summer school on IP in Europe 2018 - Presentation IP Strategies in Europe
CEIPI summer school on IP in Europe 2018 - Presentation IP Strategies in EuropeMIPLM
 
#OSSPARIS19 - Le projet AI4EU: Construire la plate-forme européenne IA on-dem...
#OSSPARIS19 - Le projet AI4EU: Construire la plate-forme européenne IA on-dem...#OSSPARIS19 - Le projet AI4EU: Construire la plate-forme européenne IA on-dem...
#OSSPARIS19 - Le projet AI4EU: Construire la plate-forme européenne IA on-dem...Paris Open Source Summit
 
Tes leaflet 2013_miriade
Tes leaflet 2013_miriadeTes leaflet 2013_miriade
Tes leaflet 2013_miriadesylvdor
 
The New EU Framework Programme for Research and Innovation
The New EU Framework Programme for Research and InnovationThe New EU Framework Programme for Research and Innovation
The New EU Framework Programme for Research and Innovationmathgear
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkDeutsche Telekom AG
 
Software Engineering and Internet Technologies Laboratory - SEIT lab
Software Engineering and Internet Technologies Laboratory - SEIT labSoftware Engineering and Internet Technologies Laboratory - SEIT lab
Software Engineering and Internet Technologies Laboratory - SEIT labChristos Mettouris
 
Accelerator Enduring Competition Challenge - Session 2
Accelerator Enduring Competition Challenge - Session 2Accelerator Enduring Competition Challenge - Session 2
Accelerator Enduring Competition Challenge - Session 2Heather-Fiona Egan
 
Data Usage Control as enabling factor for new business models in cross-compan...
Data Usage Control as enabling factor for new business models in cross-compan...Data Usage Control as enabling factor for new business models in cross-compan...
Data Usage Control as enabling factor for new business models in cross-compan...Symposium on Society 5.0
 
Current State-of-the-Art Benefits and Challenges of RFID Deployment in Global...
Current State-of-the-Art Benefits and Challenges of RFID Deployment in Global...Current State-of-the-Art Benefits and Challenges of RFID Deployment in Global...
Current State-of-the-Art Benefits and Challenges of RFID Deployment in Global...volkergirrulat
 

What's hot (10)

CEIPI summer school on IP in Europe 2018 - Presentation IP Strategies in Europe
CEIPI summer school on IP in Europe 2018 - Presentation IP Strategies in EuropeCEIPI summer school on IP in Europe 2018 - Presentation IP Strategies in Europe
CEIPI summer school on IP in Europe 2018 - Presentation IP Strategies in Europe
 
#OSSPARIS19 - Le projet AI4EU: Construire la plate-forme européenne IA on-dem...
#OSSPARIS19 - Le projet AI4EU: Construire la plate-forme européenne IA on-dem...#OSSPARIS19 - Le projet AI4EU: Construire la plate-forme européenne IA on-dem...
#OSSPARIS19 - Le projet AI4EU: Construire la plate-forme européenne IA on-dem...
 
Tes leaflet 2013_miriade
Tes leaflet 2013_miriadeTes leaflet 2013_miriade
Tes leaflet 2013_miriade
 
The New EU Framework Programme for Research and Innovation
The New EU Framework Programme for Research and InnovationThe New EU Framework Programme for Research and Innovation
The New EU Framework Programme for Research and Innovation
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
 
Software Engineering and Internet Technologies Laboratory - SEIT lab
Software Engineering and Internet Technologies Laboratory - SEIT labSoftware Engineering and Internet Technologies Laboratory - SEIT lab
Software Engineering and Internet Technologies Laboratory - SEIT lab
 
Accelerator Enduring Competition Challenge - Session 2
Accelerator Enduring Competition Challenge - Session 2Accelerator Enduring Competition Challenge - Session 2
Accelerator Enduring Competition Challenge - Session 2
 
Peyker E Mobility6th April2011
Peyker E Mobility6th April2011Peyker E Mobility6th April2011
Peyker E Mobility6th April2011
 
Data Usage Control as enabling factor for new business models in cross-compan...
Data Usage Control as enabling factor for new business models in cross-compan...Data Usage Control as enabling factor for new business models in cross-compan...
Data Usage Control as enabling factor for new business models in cross-compan...
 
Current State-of-the-Art Benefits and Challenges of RFID Deployment in Global...
Current State-of-the-Art Benefits and Challenges of RFID Deployment in Global...Current State-of-the-Art Benefits and Challenges of RFID Deployment in Global...
Current State-of-the-Art Benefits and Challenges of RFID Deployment in Global...
 

Similar to Critical Infrastucture Protection: a strategic opportunity for countries’ modernization and technological autonomy

Critical Infrastucture Protection - Lorenzo Fiori for CPExpo 2013
Critical Infrastucture Protection - Lorenzo Fiori for CPExpo 2013Critical Infrastucture Protection - Lorenzo Fiori for CPExpo 2013
Critical Infrastucture Protection - Lorenzo Fiori for CPExpo 2013Leonardo
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EUENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EUIJNSA Journal
 
BUILDING THE FUTURE INFRASTRUCTURE DEVELOPMENT TRENDS AND CHALLENGES .pdf
BUILDING THE FUTURE INFRASTRUCTURE DEVELOPMENT TRENDS AND CHALLENGES .pdfBUILDING THE FUTURE INFRASTRUCTURE DEVELOPMENT TRENDS AND CHALLENGES .pdf
BUILDING THE FUTURE INFRASTRUCTURE DEVELOPMENT TRENDS AND CHALLENGES .pdfpulisconstructionsau1
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceDale Butler
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
IoT in Public Sector
IoT in Public Sector IoT in Public Sector
IoT in Public Sector Bessie Wang
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityNeil Dave
 
Operational technology threats in developing countries and possible solution
Operational technology threats in developing countries and possible solutionOperational technology threats in developing countries and possible solution
Operational technology threats in developing countries and possible solutionFaysal Ghauri
 
Industry program panel - SINCONF ACM
Industry program panel - SINCONF ACMIndustry program panel - SINCONF ACM
Industry program panel - SINCONF ACMchristophefeltus
 

Similar to Critical Infrastucture Protection: a strategic opportunity for countries’ modernization and technological autonomy (20)

Critical Infrastucture Protection - Lorenzo Fiori for CPExpo 2013
Critical Infrastucture Protection - Lorenzo Fiori for CPExpo 2013Critical Infrastucture Protection - Lorenzo Fiori for CPExpo 2013
Critical Infrastucture Protection - Lorenzo Fiori for CPExpo 2013
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EUENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
 
BUILDING THE FUTURE INFRASTRUCTURE DEVELOPMENT TRENDS AND CHALLENGES .pdf
BUILDING THE FUTURE INFRASTRUCTURE DEVELOPMENT TRENDS AND CHALLENGES .pdfBUILDING THE FUTURE INFRASTRUCTURE DEVELOPMENT TRENDS AND CHALLENGES .pdf
BUILDING THE FUTURE INFRASTRUCTURE DEVELOPMENT TRENDS AND CHALLENGES .pdf
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
NIS.docx
NIS.docxNIS.docx
NIS.docx
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
IoT in Public Sector
IoT in Public Sector IoT in Public Sector
IoT in Public Sector
 
Indian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic SecurityIndian Market for Video Surveillance and Electronic Security
Indian Market for Video Surveillance and Electronic Security
 
Operational technology threats in developing countries and possible solution
Operational technology threats in developing countries and possible solutionOperational technology threats in developing countries and possible solution
Operational technology threats in developing countries and possible solution
 
Industry program panel - SINCONF ACM
Industry program panel - SINCONF ACMIndustry program panel - SINCONF ACM
Industry program panel - SINCONF ACM
 
Industry program panel
Industry program panelIndustry program panel
Industry program panel
 

More from Community Protection Forum

Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCommunity Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceCommunity Protection Forum
 
Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCommunity Protection Forum
 
Concrete Applications of Interdependency Management
Concrete Applications of Interdependency ManagementConcrete Applications of Interdependency Management
Concrete Applications of Interdependency ManagementCommunity Protection Forum
 

More from Community Protection Forum (20)

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects ExperienceThe DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
 
Geomatics for Disaster Management and Survey
Geomatics for Disaster Management and SurveyGeomatics for Disaster Management and Survey
Geomatics for Disaster Management and Survey
 
Critical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency IssuesCritical Infrastructure Protection and Interdependency Issues
Critical Infrastructure Protection and Interdependency Issues
 
Concrete Applications of Interdependency Management
Concrete Applications of Interdependency ManagementConcrete Applications of Interdependency Management
Concrete Applications of Interdependency Management
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Critical Infrastucture Protection: a strategic opportunity for countries’ modernization and technological autonomy