Courses

Data Breach: Compliance Management under the GDPR

Data Breach: gestione degli adempimenti secondo il GDPR
Data Breach: gestione degli adempimenti secondo il GDPR var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_137_1', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); varRead more

Data Recovery and Digital Forensics Laboratory

Data Recovery and Digital Forensics Laboratory
Data Recovery Digital Forensics Laboratory and var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_125_2', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi125, tpj;Read more

Information Security: information system and website vulnerabilities

Sicurezza Informatica: vulnerabilità sistema informativo e sito web
Sicurezza Informatica: vulnerabilità sistema informativo e sito web var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_119_3', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); varRead more

The protection of corporate know-how

La protezione del know-how aziendale
La protezione del know-how aziendale e le sinergie con gli adempimenti per la conformità al GDPR var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c:Read more

Total Security 4.0

Sicurezza Totale 4.0
L'ABC sulla Physical Cyber Security per i DPO e le PMI (e non solo) Sicurezza Totale 4.0 var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize(Read more

Tools and methods to avoid slipping into greenwashing

Strumenti e metodi per non scivolare nel greenwashing
var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_172_6', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi172, tpj; (function() { if (!/loaded|interactive|complete/.test(document.readyState)) document.addEventListener("DOMContentLoaded",onLoad); elseRead more

Internet of Things (IoT): Privacy and Security

Internet of Things (IoT): Privacy e Sicurezza
Internet of Things (IoT): Privacy e Sicurezza var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_124_7', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi124,Read more

Cybersecurity: protecting the company from human error

Cybersecurity: proteggere l’azienda dall’errore umano
proteggere l'azienda dall'errore umano Cybersecurity: var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_55_8', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi55, tpj; (function()Read more

Documentary system for privacy compliance

Impianto documentale per il rispetto della normativa privacy
Impianto Documentale per il rispetto della normativa privacy var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_149_9', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); varRead more

Cybersecurity and Data Security

Cybersecurity and Data Security
var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_168_10', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi168, tpj; (function() { if (!/loaded|interactive|complete/.test(document.readyState)) document.addEventListener("DOMContentLoaded",onLoad); elseRead more

Business Continuity and operational resilience: designing and implementing solutions

Business Continuity e resilienza operativa: progettazione e implementazione delle soluzioni
var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_148_11', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi148, tpj; (function() { if (!/loaded|interactive|complete/.test(document.readyState)) document.addEventListener("DOMContentLoaded",onLoad); elseRead more

Introduction to SGSI Standards - ISO/IEC 27K

Introduzione alle Norme SGSI – ISO/IEC 27K
Introduzione alle Norme SGSI - ISO/IEC 27K var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_121_12', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi121,Read more

IT Audit: Review of Information Systems

IT Audit: Revisione dei Sistemi Informativi
IT Audit: Revisione dei Sistemi Informativi var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_147_13', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi147, tpj;Read more

IT Security: availability, confidentiality and integrity of goods or assets

IT Security: disponibilità, confidenzialità e integrità dei beni o asset
IT Security: disponibilità, confidenzialità e integrità dei beni o asset var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_146_14', gridwidth: [1536], gridheight: [550], sliderLayout:Read more

Audit and GDPR - UNI EN ISO 19011 Guidelines

Audit e GDPR – UNI EN ISO 19011 Linee guida
UNI EN ISO 19011 Linee guida Audit e GDPR var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_51_15', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'});Read more

Digital Organisation: how to improve productivity using digital tools

Organizzazione Digitale: come migliorare la produttività utilizzando gli strumenti digitali
var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_176_16', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi176, tpj; (function() { if (!/loaded|interactive|complete/.test(document.readyState)) document.addEventListener("DOMContentLoaded",onLoad); elseRead more

Security: safety, security and emergency

Sicurezza: safety, security ed emergency
Sicurezza: safety, security ed emergency var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_118_17', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi118, tpj; (function()Read more

DPIA - Data Protection Impact Assessment

DPIA – Valutazione di impatto sulla protezione dei dati
Valutazione di impatto DPIA sulla protezione dei dati var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_52_18', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); varRead more

Privacy risk analysis

Analisi dei rischi privacy
Analisi dei rischi privacy var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_63_19', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'}); var revapi63, tpj; (function() {Read more

Privacy and GDPR: analysing and mapping business processes

Privacy e GDPR: analisi e mappatura dei processi aziendali
analisi e mappatura dei processi aziendali Privacy e GDPR: var htmlDiv = document.getElementById("rs-plugin-settings-inline-css"); var htmlDivCss=""; if(htmlDiv) { htmlDiv.innerHTML = htmlDiv.innerHTML + htmlDivCss; }else{ var htmlDiv = document.createElement("div"); htmlDiv.innerHTML = "" + htmlDivCss + ""; document.getElementsByTagName("head")[0].appendChild(htmlDiv.childNodes[0]); } if (setREVStartSize!==undefined) setREVStartSize( {c: '#rev_slider_22_20', gridwidth: [1536], gridheight: [550], sliderLayout: 'auto'});Read more

Social

  • Facebook
  • Custom 1
  • Custom 2

Search

Disclaimer

All the contents of this site are protected by current national and international regulations on the protection of Intellectual and Industrial Property. By the term "site", ITER srl, P. I. 09306810962, intends to refer to every technical, graphic and IT element of the site, including, by way of example but not limited to, the software that enables its operation and the relative codes, the contents >> more...

Company data

Registered office:
Piazzetta Guastalla, 11 - 20122 Milan (MI) Fiscal Code/VAT Code: 09306810962
Capital stock: € 10,000 i.v.
CCIAA: MI-2082738
PEC: it**@pe*******.it
ITER is a trade mark patent registered in 1989

Contact

Administrative and operational headquarters:
Alley of Heat, 36
21047 Saronno (VA)
Phone: +39 02 099 98 91
Fax: +39 02 2953 2355


Email: it**@it*********.it