Organization


ITASEC19 is organized by










In cooperation with

About ITASEC19

The Italian Conference on CyberSecurity (ITASEC) is an annual event supported and organized by the


The 2019 edition will take place in Pisa, from February 12th to February 15th; it will gather Italian researchers and professionals working in the field of cybersecurity, from both private and public sectors and include academia, industries, research institutions, and government.

SAVE THE DATE

  • Workshop & Tutorial Day: February 12
  • Conference: February 13-15


The Workshop & Tutorial Day will consist of:

  • Scientific workshops, gathering specialists on hot and advanced topics in cybersecurity;
  • Tutorials, focusing on cybersecurity related aspects of potential interest to the conference attendees at large.

The Conference will include parallel and concurrent tracks:

  • Scientific & Technical track, with scientific and technical contributions on all the aspects of cybersecurity, including interdisciplinary and multidisciplinary hot topics;
  • Stakeholder track, that will include Keynote Speeches, Invited Talks, Vision Speeches, Panels, and Special Sessions;
  • Demo track: prototypes developed by industries, and research groups will be presented;
  • Start-up track: a stage for domestic cybersecurity startups;
  • Vendor sessions track: commercial products from the event’s sponsors will be presented.


Registration

Registration is mandatory and the access to the conference place will be granted to registered people, only. Here in after registration can be done on site, only.

Note: At least one author for each accepted paper (demo) in the Scientific Technical (Demo) track will have to cover a FULL Conference registration. For authors with multiple accepted papers one FULL Conference registration per accepted paper (demo) will be required.

WORKSHOP AND TUTORIAL DAY– Feb 12th

It includes:

  • Full access to ALL the events occurring on Feb 12th, including the Workshops and the Tutorials. The events of interest have to be selected while registering
  • Conference bag
  • Proceedings and teaching materials related to the selected events
  • Lunch on Feb 12th
  • Coffee and Tea Break on Feb 12th
  • Welcome Reception on Feb 12th at the CNR location.

Costs:

  • 100€: Until Jan 31th
  • 150€: From Jan 31th to Feb 8th
  • 250€: On-site



FULL CONFERENCE REGISTRATION– Feb 13th- 15th

It includes:

  • Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Special Day on Start-ups, the Scientific & Technical Track, the Demo Track, and the Exhibition Space
  • Conference bag
  • Conference proceedings
  • Lunches
  • Coffee and Tea Break
  • Welcome Reception on Feb 12th at the CNR location.
  • Social Dinner on Feb 14th at Arsenali Repubblicani, including the great spectacular show “Bosch, Brueghel, Arcimboldo”, with its magical and dream-like atmospheres that envelop the attendees and fully immerse them in the artworks through a combination of images, music, and technology.

Costs:

  • 300€: Until Jan 31th
  • 500€: From Jan 31th to Feb 8th
  • 700€: On-site


STUDENT FULL CONFERENCE REGISTRATION– Feb 13th- 15th

It includes:

  • Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Special Day on Start-ups, the Scientific & Technical Track, the Demo Track, and the Exhibition Space
  • Conference bag
  • Conference proceedings
  • Lunches
  • Coffee and Tea Break
  • Welcome Reception on Feb 12th at the CNR location.

It does not includes:

  • Social Dinner on Feb 14th at Arsenali Repubblicani.

Costs:

  • 200€: Until Jan 31th
  • 300€: From Jan 31th to Feb 8th
  • 400€: On-site



MILITARY & LAW ENFORCEMENT FORCE FULL CONFERENCE REGISTRATION– Feb 13th- 15th

It includes:

  • Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Special Day on Start-ups, the Scientific & Technical Track, the Demo Track, and the Exhibition Space
  • Conference bag
  • Conference proceedings
  • Lunches
  • Coffee and Tea Break
  • Welcome Reception on Feb 12th at the CNR location.

It does not includes:

  • Social Dinner on Feb 14th at Arsenali Repubblicani.

Costs:

  • 200€: Until Jan 31th
  • 300€: From Jan 31th to Feb 8th
  • 400€: On-site



ONE-DAY FULL CONFERENCE REGISTRATION – Feb 13th, 14th, 15th

It includes:

  • Full access to ALL the events for the whole Conference, including the Stakeholder Space, the Special Day on Start-ups, the Scientific & Technical Track, the Demo Track, and the Exhibition Space
  • Conference bag
  • Conference proceedings
  • Lunches
  • Coffee and Tea Break
  • Welcome Reception on Feb 12th at the CNR location.

It does not includes:

  • Social Dinner on Feb 14th at Arsenali Repubblicani.

Costs:

  • 90€: Until Jan 31th
  • 150€: From Jan 31th to Feb 8th
  • 150€: On-site



ONE-DAY STAKEHOLDER SPACE, ONLY, REGISTRATION– Feb 12th, 13th, 14th, 15th

It includes:

  • Full access, on the chosen day only, to the events of the Stakeholder Space, to the Special Day on Start-ups (if applicable), and to the Exhibition Space
  • Coffee and Tea Break on the chosen day

It does not includes:

  • Conference bag
  • Full access to the Scientific & Technical Track and to the Demo Track
  • Conference proceedings
  • Social Dinner on Feb 14th at Arsenali Repubblicani.
  • Welcome Reception on Feb 12th at the CNR location.

Costs:

  • Free of charge

Chairs


General co-Chairs

Marco Conti

Rocco De Nicola

Paolo Prinetto

Scientific and Technical Program Chair

Pierpaolo Degano (Program Chair)

Fabio Martinelli (Demo, Tutorial, Workshop Chair)

Tutorial co-Chair

Mauro Barni

Demo co-Chairs

Gianluca Dini

Pericle Perazzo

Workshop co-Chairs

Alessandro Piva

Tommaso Zoppi

Finance Chair

Paolo Prinetto

Ceremonial Chair

Marco Conti

Website Chair

Fabio Benedetti

Organization Chair

Angela Miola

Registration Chair

Giuseppe Airò Farulla

Secretary Chair

Gabriella Caramagno

Media Chair

Arturo Di Corinto

Advertising/Brand Identity/Communication Chair

Angela Miola

Sponsorship co-Chairs

Gabriella Caramagno

Angela Miola

Vendor Session Chair

Gabriella Caramagno

Innovation - Startup day co-Chairs

Marco Baldi

Giulio Busulini

Gabriele Costa

Luigi Martino

Committees


Scientific and Technical Program Committee

Chair

Pierpaolo Degano (Univ. di Pisa)

Members

Maurizio Aiello (IEIIT-CNR, Genova)

Alessandro Armando (Univ. di Genova)

Antonio Barili (Univ. di Pavia)

Massimo Bartoletti (Univ. di Cagliari)

Giampaolo Bella (Univ. Catania)

Francesco Bergadano (Univ. di Torino)

Stefano Bistarelli (Univ. di Perugia)

Nicola Blefari Melazzi (CNIT, Univ. di Roma Tor Vergata)

Andrea Bondavalli (Univ. di Firenze)

Francesco Buccafurri (Univ. di Reggio Calabria)

Paolo Ciancarini (Univ. di Bologna)

Marco Conti (IIT CNR, Pisa)

Mauro Conti (Univ. di Padova)

Domenico Cotroneo (Univ. di Napoli, Federico II)

Bruno Crispo (Univ. di Trento)

Franco Davoli (CNIT, Univ. di Genova)

Rocco De Nicola (IMT, Lucca)

Camil Demetrescu (Sapienza Univ. di Roma)

Alfredo De Santis (Univ. di Salerno)

Felicita Di Giandomenico (ISTI-CNR, Pisa)

Gianluca Dini (Univ. di Pisa)

Luca Durante (IEIIT, CNR Torino)

Elena Ferrari (Univ. dell'Insubria)

Riccardo Focardi (Univ. Ca'Foscari, Venezia)

Giorgio Giacinto (Univ. di Cagliari)

Franco Guida (Fondazione Ugo Bordoni, Roma)

Antonio Lioy (Politecnico di Torino)

Giuseppe Lo Re (Univ. di Palermo)

Giuseppe Manco (ICAR-CNR, Cosenza)

Fabio Martinelli (IIT-CNR, Pisa)

Isabella Mastroeni (Univ. di Verona)

Marino Miculan (Univ. di Udine)

Francesco Palmieri (Univ. di Salerno)

Stefano Panzieri (Univ. di Roma Tre)

Francesco Parisi-Presicce (Sapienza Univ. di Roma)

Paolo Prinetto (Politecnico di Torino)

Silvio Ranise (Fondazione Bruno Kessler)

Luigi Romano (Univ. di Napoli, Parthenope)

Fabio Rugge (ISPI, Milano)

Domenico Saccà (Univ. della Calabria)

Pierangela Samarati (Univ. di Milano)

Roberto Setola (Univ. Campus Bio-Medico, Roma)

Maurizio Tesconi  (IIT-CNR, Pisa)

Corrado Aaron Visaggio (Univ. del Sannio)

Stefano Zanero (Politecnico di Milano)

Roberto Zunino (Univ. di Trento)

Steering Committee

Chair

Paolo Prinetto (Politecnico di Torino)

Members

Alessandro Armando (Univ. di Genova)

Nicola Blefari Melazzi (CNIT & Univ. di Roma Tor Vergata)

Carlo Blundo (Univ. di Salerno)

Andrea Bondavalli (Univ. di Firenze)

Marco Conti (CNR)

Bruno Crispo (Univ. di Trento)

Rocco De Nicola (IMT, Lucca)

Pierpaolo Degano (Univ. di Pisa)

Elena Ferrari (Univ. dell’Insubria)

Riccardo Focardi (Univ. Ca’ Foscari, Venezia)

Antonio Lioy (Politecnico di Torino)

Fabio Martinelli (CNR)

Silvio Migliori (ENEA)

Pierangela Samarati (Univ. di Milano)

Stefano Zanero (Politecnico di Milano)


Demos

Members

Marco Balduzzi (Trend Micro)

Calisto Calisti (IDS Ingegneria dei Sistemi)

Roberto Carbone (Security & Trust Unit, FBK)

Mirko Casadei (Accenture)

Fabio Cocurullo (Leonardo)

Giulia Di Bella (Thales Italia)

Francesco Di Cerbo (SAP)

Emanuele Frontoni (Univ. Politecnica delle Marche)

Luca Guidi (IAMBOO)

Anthony Jeffs (Cisco)

Fabio Lazzini (Sogei)

Giuseppe Lettieri (Univ. di Pisa)

Rocco Mammoliti (Poste Italiane)

Paolo Mori (CNR-IIT)

Gianluigi Pugni (ENEL)

Leonardo Querzoni (Sapienza Univ. di Roma)

Gianluca Varisco (Arduino)


Local Organizing Committee

Chairs

Angela Miola (CINI, Chair)

Adriana Lazzaroni (CNR, Vice-Chair)

Members

Patrizia Andronico (IIT-CNR)

Gabriella Caramagno (CINI)

Raffaella Casarosa (IIT-CNR)

Lina Esposito (CINI)

Eniko Puhl (CINI)

Giulia Severino (IIT-CNR)

Dicono di noi

18 Febbraio 2019CORRIERE DELLE COMUNICAZIONICybersecurity, ondata di startup: l’Italia si gioca una partita importante
18 Febbraio 2019CORRIERE DELLE COMUNICAZIONILa certificazione cyber: obiettivi nazionali e quadro europeo
16 Febbraio 2019WIREDSicurezza informatica, chi dovrà certificare i suoi prodotti dagli attacchi cyber?
16 Febbraio 2019FORMICHESicurezza e cyber diplomacy, così può crescere il sistema Italia. Parla l’ambasciatore Talò
15 Febbraio 2019WIREDSicurezza informatica, la Difesa vuole formare hacker di stato
14 Febbraio 2019IL MANIFESTOA Itasec arriva Scion, la proposta di una nuova Internet
14 Febbraio 2019LA STAMPALa ministra Trenta: “Nel 2% di Pil destinato alla Difesa anche gli investimenti in sicurezza informatica”
14 Febbraio 2019CORRIERE DELLE COMUNICAZIONICybersecurity, Baldoni svela la strategia italiana. Obiettivo: mettere in sicurezza reti e servizi
13 Febbraio 2019IL SOLE 24 ORECriminalità informatica, danni per le aziende da 5.200 miliardi di dollari in cinque anni
13 Febbraio 2019ANSAMinistro Trenta, cibernetica nuova frontiera dei conflitti
13 Febbraio 2019FORMICHEVi spiego la strategia cyber del governo. Parla il ministro Trenta
13 Febbraio 2019IL TIRRENOCyber security, il ministro Trenta a Pisa: ''Il virtuale è ormai più reale del reale"
13 Febbraio 2019WIREDSicurezza informatica, la strategia dell’Italia contro gli attacchi hacker
13 Febbraio 2019GONEWSMps sostiene la conferenza nazionale sulla sicurezza informatica a Pisa
13 Febbraio 2019AGENDA DIGITALEL’Italia ha bisogno di una difesa integrata, con un cuore cyber: ecco i passi necessari
13 Febbraio 2019AGENZIA GIORNALISTICA IL VELINOItasec 2019: Trenta, conoscere per prevenire minaccia cyber
13 Febbraio 2019ADN KRONOSKaspersky Lab partecipa a ITASEC19, la conferenza nazionale sulla sicurezza informatica del sistema Italia
13 Febbraio 2019IL CITTADINO ONLINEBanca Mps partecipa a Itasec19
13 Febbraio 2019LA STAMPACybersecurity, a Pisa il think tank nazionale sulla protezione del Paese
12 Febbraio 2019STARTUPITALIAAl via ITASEC19, la terza conferenza nazionale sulla cybersecurity in Italia
12 Febbraio 2019CORRIERE DELLE COMUNICAZIONICybersecurity, “missione” AI per Leonardo. Mosca: “Puntare sulle competenze”
12 Febbraio 2019CYBERSECURITY 360Blockchain, dalla crisi del bitcoin ripartiamo dalla cyber security: ecco come
12 Febbraio 2019ASKANEWSCyber security, ItaSec19 ai nastri partenza
11 Febbraio 2019PISATODAYAl Cnr di Pisa la conferenza nazionale sulla sicurezza informatica del sistema Italia
11 Febbraio 2019PAPERBLOGAl Cnr di Pisa la conferenza nazionale sulla sicurezza informatica del sistema Italia
11 Febbraio 2019GONEWSIl ministro Trenta al Cnr Pisa per la conferenza sulla sicurezza informatica
11 Febbraio 2019QUINEWSPISA.ITAl Cnr la ministra Elisabetta Trenta
11 Febbraio 2019LA NAZIONE PISASicurezza informatica, ricercatori e professionisti uniti per vincere le sfide
11 Febbraio 2019AVIONEWS"Itasec19" a Pisa (12-15 febbraio), evento cybersecurity
11 Febbraio 2019DIFESAONLINEITASEC apre domani a Pisa: la Cybersecurity in Italia esiste?
7 Febbraio 2019IL MANIFESTOTutta l’Italia è in rete, ma chi la protegge?
5 Febbraio 2019KEY4BIZITASEC19, Tiesse presenta le novità in tema software defined networks
31 Gennaio 2019CORRIERE DELLE COMUNICAZIONIPrinetto: “Cybersecurity terreno di sviluppo di nuove competenze”
30 Gennaio 2019LA REPUBBLICADagli hacker alla privacy, sbarca a Pisa il “gotha della cybersecurity”
30 Gennaio 2019CORRIERE DELLA COMUNICAZIONIAttacchi “social” e hacker etici, ecco le nuove frontiere della cybersecurity
30 Gennaio 2019ASKANEWSCyber security, dal 12 al 15 febbario a Pisa 3a edizione di ItaSec
30 Gennaio 2019ANSAA Pisa appuntamento con la cybersecurity
23 Gennaio 2019FORMICHECyber security, temi e protagonisti di ItaSec2019

ITASEC19

Call for Papers

General Information

  • Conference Date: 13-15 February, 2019

The ITASEC19 conference solicits two kinds of submissions:

  • Original, unpublished contributions that will be included in an open-access post proceeding volume of CEUR Workshop Proceedings, indexed by both Scopus and DBLP;;
  • Already published or preliminary work that will not be included in the post proceedings volume.

We particularly encourage submissions on new and emerging topics. Authors are requested to clearly indicate whether their paper should be included in the proceedings volume.

Selected papers may be considered for a special issue or a fast track of either:

  • Journal of Logical and Algebraic Methods in Programming
  • Pervasive and Mobile Computing
  • Computer Communications.

Papers must be in English, formatted in pdf according to the EasyChair style and no longer than 10 pages, excluding bibliography. Extra material exceeding the page limit can be included in a clearly marked appendix of at most 5 pages.


Important Dates

  • 18 November 2018: Paper submission -- STRICT
  • 20 December 2018: Paper notification of acceptance/rejection
  • 15 January 2019: Camera ready version of the accepted papers
  • 13-15 February 2019: Conference


Paper Submission



ITASEC19

Call for Workshops

General Information

  • Workshop Day: 12 February, 2019

Researchers and practitioners are invited to submit proposals for workshops to be held in conjunction with the ITASEC19 conference. The purpose of workshops is to provide a forum for exchanging opinions, presenting ideas, and discussing preliminary results in an interactive atmosphere.

Proposals should include:

  • The workshop name and a short description (150 words) of the workshop, to be posted on the conference web site;
  • A brief account of topics, scope and significance of the workshop (if possible include information about past editions);
  • Information about the procedure for selecting papers and/or presentations, the dissemination plan, the expected number of participants, and the planned workshop format.


Responsibilities

The ITASEC19 organization provides:

  • A link on the ITASEC19 site
  • Management of registration for participants
  • Setup of meeting space and related equipment
  • Coffee breaks and workshop lunch arrangements
  • Offer one-day registration to one invited speaker.

The main responsibility of organizing a workshop goes to its chairperson(s); they must:

  • Set up and host a webpage
  • Coordinate deadlines and notifications with the ITASEC19 co-chairs
  • Take care of publicity, call for papers, and submission and review process.


Important Dates

  • Workshop proposals due: 21 October 2018
  • Workshop notification of acceptance: 25 October 2018
  • ITASEC19 workshops: 12 February 2019


Workshop Submission




ITASEC19

Call for Tutorials

General Information

  • Tutorial Day: 12 February, 2019

ITASEC19 seeks applications for full- or half-day tutorials of interest for the cybersecurity community at large. Shorter "embedded tutorials" to be included in the conference program will be considered as well.

Each tutorial proposal should concisely describe the content and objectives of the tutorial, and include:

  • Title
  • Abstract
  • Outline of the tutorial content
  • Intended audience, including possible assumed background of attendees
  • Name, affiliation, email address, and brief biography of the speaker(s)
  • Duration: 1.5 hours (embedded), 3 hours (half-day), 6 hours (full-day).


Important Dates

  • Tutorial proposals due: 18 November, 2018
  • Tutorial notification of acceptance/rejection: 20 December, 2018
  • ITASEC19 Tutorial day: 12 February, 2019


Tutorial Submission




ITASEC19

Call for Demos

General Information

  • Demos: 13-15 February, 2019

ITASEC19 seeks applications for demonstrations of prototypes or operational systems in any of the areas identified in the scope of the Science &Technology main track. The proposers are expected to prepare a poster and to perform a live demonstration. Demonstrations will provide opportunities to exchange ideas gained from implementing cybersecurity systems and to obtain feedback from expert users.

Demonstration submissions must be in English, formatted in pdf according to the EasyChair style and no longer than 5 pages, excluding bibliography. They should present the objectives and the findings addressed by the demonstration; a walk-through of the actual demonstration should be provided in a clearly marked appendix of at most 5 pages. Commercial demos will not be considered.


Important Dates

  • Demo proposals due: 18 November, 2018
  • Demo notification of acceptance/rejection: 20 December, 2018
  • ITASEC19 Demos tracks: 12 February, 2019


Submission



Program committee

  • Marco Balduzzi (Trend Micro)
  • Calisto Calisti (IDS Ingegneria dei Sistemi)
  • Roberto Carbone (Security & Trust Unit, FBK)
  • Mirko Casadei (Accenture)
  • Fabio Cocurullo (Leonardo)
  • Giulia Di Bella (Thales Italia)
  • Francesco Di Cerbo (SAP)
  • Emanuele Frontoni (Univ. Politecnica delle Marche)
  • Luca Guidi (IAMBOO)
  • Anthony Jeffs (Cisco)
  • Fabio Lazzini (Sogei)
  • Giuseppe Lettieri (Univ. di Pisa)
  • Rocco Mammoliti (Poste Italiane)
  • Paolo Mori (CNR-IIT)
  • Gianluigi Pugni (ENEL)
  • Leonardo Querzoni (Sapienza Univ. di Roma)
  • Gianluca Varisco (Arduino)




ITASEC19

Call for Start-up

General Information

  • Start-up Presentations: 13-15 February, 2019

ITASEC19 will also include special sessions on domestic cybersecurity startups. During these sessions, startups will present their ongoing activities in the field of cybersecurity. Activities include, but are not limited to, emerging technologies, open issues and challenges, innovative products and novel application fields.

Startups can submit their proposals as specified below. Submissions must be in English, formatted in pdf according to the EasyChair style and no longer than 3 pages, excluding bibliography. They must include the following information

  • Startup name, description and mission
  • Speaker name and short bio
  • Abstract
  • Description of the presentation
  • Intended audience and requirements.


Important Dates

  • Start-up proposals due: 13 December 2018
  • Start-up notification of acceptance/rejection: 20 December 2018
  • ITASEC19 Start-up tracks: 13-15 February, 2019


Submission




Stakeholder space

The Stakeholder Space shall include selected distinguished:

  • Keynotes Speeches
  • Invited Talks
  • Vision Speeches from Platinun Sponsors
  • Panels
  • Special Sessions, aimed at providing a “stage” for cybersecurity stakeholders





Scientific & Technical Track

The Scientific/Technical Space shall include several kinds of sessions:

  • Scientific sessions: aimed at presenting scientific/technical papers;
  • Demo sessions: aimed at presenting prototypes developed by industries, research centers, and universities.





Demo Track

Demo - 13 February 2019

  • Cybersecurity Language and Education
  • Vulnerability Assessment and Analysis
  • Low-Level and Physical Attacks
  • Defensive and Maintainance Tools
  • Quantum Security




Innovation Start-up - Day

Commercializzazione della ricerca, Innovazione, Start ups

Il ruolo del Cini -Laboratorio Nazionale Cyber security come possibile facilitatore della commercializzazione della ricerca e dello sviluppo tecnologico a beneficio della competitività delle aziende nazionali: Dialogo tra stakeholder nell’ ecosistema innovazione in ambito cyber security research.

Principali argomenti
  • Iniziale mappatura dell’ecosistema nazionale innovazione in ambito cybersecurity research. Overview delle principali iniziative e programmi relative al sostegno del ‘proof of concept’ alla accelerazione impresa
  • Primo tentativo di censimento start up/ spin off in ambito cyber da parte del CINI National Cyber security Lab
  • Mach making tra aziende ( start up, azienda innovativa, spin off ) verso stakeholder finanziari o corporate Innovation
  • La dimensione competitiva del sistema paese in ambito cyber a garanzia della solidità del sistema economico italiano: dalla ricerca alla creazione di impresa.
  • Iniziale raccolta di fabbisogni degli Stakeholders da parte Cini -Laboratorio Nazionale Cyber security e ipotesi di lavoro congiunto (mappatura capacità interne, valorizzazione asset, internazionalizzazione, definizione di un piano strategico, elaborazione di un piano operativo,governance delle operazioni)

Chairs:

  • Marco Baldi
  • Giulio Busulini
  • Gabriele Costa
  • Luigi Martino

Program (click here)
Per visualizzare il programma complessivo, sezionare il giorno "14 febbraio" (nel menu in alto), quindi nel menu "Tracks" a destra selezionare solo "Innovation - Start up day".

Registration (click here)





Tutorial program



Framework 2.0 for Cybersecurity & Data Protection and a Contextualization for GDPR

Chairs:

  • Marco Angelini
  • Claudio Ciccotelli
  • Leonardo Querzoni


Cybersecurity per la Pubblica Amministrazione

Chairs:

  • Carlo Blengino
  • Andrea Valenza
  • Massimo Bartoletti


Recent improvements in biometric spoofing/antispoofing methods and adversarial attacks

Chair:

  • Fabio Scotti


Hiding access patterns (obliviousness and differential privacy)

Chairs:

  • Carlo Blundo
  • Pino Persiano


Building an Emulation Environment for Supporting Security Training and Testing Activities on Complex Networked Systems

Chairs:

  • Mara Sorella
  • Florin Tanasache
  • Silvia Bonomi


Hacking with Metasploit

Chair:

  • Federico Lombardi


La "cura" del dato personale nell'azione delle pubbliche amministrazioni

La normativa a protezione dei dati personali costituisce uno dei cardini della sicurezza informatica. La sicurezza e la "cura" del dato equivalgono oggi alla sicurezza ed alla cura delle persone nell'ambiente digitale ed i principi dettati dal GDPR tutelano molteplici diritti fondamentali della persona.

Nella prima parte della sessione esamineremo i principi cardine della normativa a tutela del dato personale, per comprendere non tanto il "come" quanto il "perché" è necessario adottare questo principio di "accountability" che è adesso alla base del "GDPR".

Nella seconda parte affronteremo il tema dei trattamenti nell'ambito delle Pubbliche Autorità. I principi di efficienza e imparzialità, unitamente al principio di trasparenza, impongono da un lato alle Pubbliche Amministrazioni di sfruttare appieno i vantaggi della digitalizzazione, ma nel contempo sono la linfa dell'azione della PA, ma i dati personali non rappresentano utenti, ma persone. La tutela del dato, il suo lecito e corretto trattamento sono la base per un ambiente digitale sicuro e sono il presupposto necessario e indispensabile nell'ambito dei trattamenti delle pubbliche amministrazioni per la corretta attuazione dei diritti fondamentali dei cittadini.

Chair:

  • Carlo Blengino


Web Exploitation

Chair:

  • Andrea Valenza




Workshop program



DLT 2019: 2nd Distributed Ledger Technology Workshop

This workshop is a forum for researchers, developers, and users to discuss issues related to Distributed Ledger Technology and its adoption in research and business scenarios. The primary goal is to foster discussion and cross-fertilisation of ideas among experts in different fields related to DLTs, and thus advance the national and international state-of-the-art. Research, applications, case studies, and experiences concerning DLT are all encouraged.

Chairs:

  • Stefano Bistarelli (Direttore Italian Distributed Ledger Technology Working Group - Università degli Studi Perugia)
  • Paolo Mori (Istituto di Informatica e Telematica del CNR)

Program (click here)

Registration (click here)



First Italian Workshop on CTF Competitions (Capture.IT)

The first Italian workshop on CTF competitions (Capture.IT 2019) aims at gathering practitioners and experts that want to share their experience about the organization of and participation to Capture The Flag (CTF) competitions. The purpose of the workshop is to provide a forum for exchanging opinions, presenting ideas, and lesson learned about the CTF. In particular, Capture.IT aims at attracting the CTF community as well as students and young researchers that are active CTF players or organizers. Another goal is to favour the exchange of ideas and experiences in an interactive and informal atmosphere.

Chair:

  • Gabriele Costa

Program (click here)

Registration



Quantum Secure Communication

Worldwide communications are growing exponentially. A huge and rapidly growing amount of information travels every day through optical fibre networks, to which billions of people have indirect access. From its use in everyday life, such as for making online purchases with credit cards or for internet banking, to more critical scenarios, such as the transmission of sensitive data between partner countries under emergency conditions, the need for absolutely secure communications is unquestioned, all the more so in view of cyber-attacks that are rapidly increasing in scope and complexity.
Quantum Key Distribution (QKD) promises a leap forward. It promises nothing less than the ability to achieve unconditional security in communications, guaranteed by the laws of the universe as opposed to assumptions about available computational power and the rules of computational complexity. Because of this, QKD is currently considered the only technology able to guarantee an absolutely secure solution for the key exchange problem. QKD achieves this by providing a means to distribute an unconditionally-secure key that is used as a one-time pad. Secure keys distributed by QKD can subsequently be used for various applications including secure communications and message authentication over any standard communication channels.

Chair:

  • Francesco Saverio Cataliotti


Collaborative Cyber Threat Management and the CNR cybersecurity observatory

Chair:

  • Gianpiero Costantino


The European Strategy of ECSO: from innovation to access to the marke

Chair:

  • Fabio Martinelli


Comunicare Cybersecurity

Il seminario è specificamente rivolto ai giornalisti, ai blogger, agli studenti che hanno necessità di comprendere i concetti, le idee e la terminologia relativi alle tematiche della sicurezza informatica e della privacy delle comunicazioni. Obiettivo del seminario è favorire l'acquisizione del lessico specialistico e dei concetti relativi alla sfera della Cybersecurity attraverso l’esposizione di fatti di cronaca e delle nozioni informatiche collegate.

Chair:

  • Arturo Di Corinto


Influence Operations in the Cyberspace: Linking Prevention, Response and Resilience

The workshop deals with the issue of “cyber-influence operations”, i.e. the illegitimate or illegal use of information and communication technologies (ICTs) and networked systems to affect an audience’s choices, ideas, opinions, emotions or motivations, and interfere with decision making processes. The workshop consists of two integrated discussion panels, each of which focuses on specific features of “cyber-influence” operations.
The first panel discusses the political and legal implications that these operations raise at the national and international level. It will also feature the presentation of a case study on cyber and information warfare during elections.
The second panel investigates approaches and measures that could be adopted to counter cyber influence operations via social and other online media at the informational, technical/technological, policy and other levels.
The workshop further aims at outlining the actions that governments and other relevant stakeholders could take to prepare, prevent, respond and recover from threats posed by illegitimate or illegal cyber influence operations or campaigns.

Chair:

  • Matteo E. Bonfanti

Program (click here)

Registration (click here)





Vendor sessions

Vendor Sessions are aimed at providing Sponsors with the opportunity to present in a parallel track, product descriptions, case studies, best practices, and user testimonials. Attendance to the Vendor Sections is open to all symposium attendees.

Program


The detailed ITASEC19 program is available here

The proceedings are available here

Program at-a-glance


12 February 2019 - Workshop & Tutorial Day Program (Click here)

13-15 February 2019 – Conference (Click here)

Important Dates

  • 21 October 2018Workshop proposals
  • 25 October 2018Workshop notification of acceptance
  • 18 November 2018Paper submission
  • 18 November 2018Tutorial proposals
  • 18 November 2018Demo proposals
  • 13 December 2018Start-up proposals
  • 20 December 2018Paper notification of acceptance
  • 20 December 2018Tutorial notification of acceptance
  • 20 December 2018Demo notification of acceptance
  • 20 December 2018Start-up notification of acceptance
  • 21 December 2018Early Registration starts
  • 15 January 2019Camera ready version of the accepted Papers
  • 15 January 2019Camera ready version of the accepted Demos
  • 28 January 2019Late Registration opens
  • 31 January 2019Early Registration closes
  • 08 February 2019Late Registration closes
  • 12 February 2019Workshop & Tutorial Day
  • 13-15 February 2019Conference

Venue and Accommodation


Venue

The conference will take place in the Consiglio Nazionale delle Ricerche in via Giuseppe Moruzzi 1, Pisa.

Social Dinner

The Social Dinner will take place in the Arsenali Repubblicani on Feb 14th.

Welcome Reception

The Welcome Reception will take place in the Consiglio Nazionale delle Ricerche in Pisa on Feb 12th.

Directions

From Pisa central railway station:

By walk

By car







From Pisa International Airport:

By car





Parking spaces close to the area:

Via di Pratale

Via Paparelli



I praticelli, via Giovanni Berchet



Accommodation

Following you can find a list of the hotels. In order to book the room with these special rates, please contact directly the hotel mentioning your participation in the event ITASEC19 organized at CNR PISA.

Hotel nameSingleDoubleDouble single useAddress
Blue Shades Aparthotel ****-89 €79 €Via Pasquale Pardi 19, 56121 Pisa PI
Hotel Bologna ****58 €78 €-Via Giuseppe Mazzini 57, 56125 Pisa PI
Grand Hotel Duomo ****-110 €99 €Via Santa Maria 94, 56126 Pisa PI
NH Hotel ****90 €90 €90 €Piazza della Stazione 2, 56125 Pisa PI
Repubblica Marinara ****-94 €76 €Via Carlo Matteucci, 81, 56124 Pisa PI
Hotel San Ranieri ****-110 €95 €Via Filippo Mazzei, 2 - 56124 Pisa PI
B&B hotel ***-62 €52 €Via Scornigiana, 1, 56121 Pisa PI
Royal Victoria ***--55 €Lungarno Pacinotti, 12, 56126 Pisa PI

Sponsorship

Three levels of sponsorships are possible for ITASEC19, characterized by different exposures and recognition: Platinum, Gold, and Silver, respectively.

Please download our sponsorship package for details about the available sponsorship plans. Should you have any question, please contact us by email at: sponsorship@consorzio-cini.it

Platinum Sponsors



Gold Sponsors



Silver Sponsors



Media partner