<?xml version="1.0" encoding="UTF-8"?>
<!-- Questa sitemap è stata generata dinamicamente il 4 Aprile 2026 alle 1:13 da All in One SEO v4.8.1 - il primo plugin SEO di WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.cybersecurity360summit.it/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cybersecurity 360 Summit</title>
		<link><![CDATA[https://www.cybersecurity360summit.it]]></link>
		<description><![CDATA[Cybersecurity 360 Summit]]></description>
		<lastBuildDate><![CDATA[Wed, 04 Sep 2024 10:15:29 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.cybersecurity360summit.it/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 10:15:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/diventa-partner/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/diventa-partner/]]></link>
			<title>Diventa partner</title>
			<pubDate><![CDATA[Tue, 01 Apr 2025 13:44:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/manconi-davide/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/manconi-davide/]]></link>
			<title>Manconi Davide</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:10:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/ivano-gabrielli-2/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/ivano-gabrielli-2/]]></link>
			<title>Gabrielli Ivano</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:10:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/porzio-pasquale/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/porzio-pasquale/]]></link>
			<title>Frattasi Bruno</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:10:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/razzante-ranieri/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/razzante-ranieri/]]></link>
			<title>Razzante Ranieri</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:09:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/franchina-luisa/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/franchina-luisa/]]></link>
			<title>Franchina Luisa</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:06:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/ugoste-fabio/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/ugoste-fabio/]]></link>
			<title>Ugoste Fabio</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:05:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/visconti-valerio/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/visconti-valerio/]]></link>
			<title>Visconti Valerio</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:04:48 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/bavazzano-marco/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/bavazzano-marco/]]></link>
			<title>Bavazzano Marco</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:04:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/chittaro-andrea/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/chittaro-andrea/]]></link>
			<title>Chittaro Andrea</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:03:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/chi-siamo/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/chi-siamo/]]></link>
			<title>Chi siamo</title>
			<pubDate><![CDATA[Fri, 31 Jan 2025 12:25:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/diomede-nicla/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/diomede-nicla/]]></link>
			<title>Diomede Nicla</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:03:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/livelli-federica-m-r/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/livelli-federica-m-r/]]></link>
			<title>Livelli Federica M.R.</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:03:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/edizione_precedente/attacchi-che-evolvono-scenari-che-cambiano-xiii-edizione/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/edizione_precedente/attacchi-che-evolvono-scenari-che-cambiano-xiii-edizione/]]></link>
			<title>Attacchi che evolvono, scenari che cambiano &#8211; XIII edizione</title>
			<pubDate><![CDATA[Wed, 04 Sep 2024 09:30:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/rassega-yuri/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/rassega-yuri/]]></link>
			<title>Rassega Yuri</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:02:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/bottinelli-elena/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/bottinelli-elena/]]></link>
			<title>Bottinelli Elena</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:01:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/rossi-alessandro/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/rossi-alessandro/]]></link>
			<title>Rossi Alessandro</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:01:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/vercesi-stefano/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/vercesi-stefano/]]></link>
			<title>Vercesi Stefano</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:01:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/scorza-guido/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/scorza-guido/]]></link>
			<title>Scorza Guido</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:01:08 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/tripodi-massimo/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/tripodi-massimo/]]></link>
			<title>Tripodi Massimo</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 09:00:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/stellati-alessio/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/stellati-alessio/]]></link>
			<title>Stellati Alessio</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 08:59:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/vecchione-michele/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/vecchione-michele/]]></link>
			<title>Vecchione Michele</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 08:58:50 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/calaprice-vittorio/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/calaprice-vittorio/]]></link>
			<title>Calaprice Vittorio</title>
			<pubDate><![CDATA[Thu, 17 Oct 2024 08:58:10 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/usare-lia-per-sviluppare-software-piu-sicuri-ecco-gli-strumenti-giusti/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/usare-lia-per-sviluppare-software-piu-sicuri-ecco-gli-strumenti-giusti/]]></link>
			<title>Usare l’IA per sviluppare software più sicuri: ecco gli strumenti giusti</title>
			<pubDate><![CDATA[Mon, 02 Sep 2024 09:53:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/contenere-limpatto-di-un-incidente-di-sicurezza-ecco-le-soluzioni/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/contenere-limpatto-di-un-incidente-di-sicurezza-ecco-le-soluzioni/]]></link>
			<title>Contenere l’impatto di un incidente di sicurezza: ecco le soluzioni</title>
			<pubDate><![CDATA[Mon, 02 Sep 2024 09:14:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/slide_partner/axitea/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/slide_partner/axitea/]]></link>
			<title>Axitea</title>
			<pubDate><![CDATA[Thu, 28 Mar 2024 16:10:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/ransomware-comprendere-pratiche-e-motivazioni-degli-aggressori-per-difendersi-al-meglio/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/ransomware-comprendere-pratiche-e-motivazioni-degli-aggressori-per-difendersi-al-meglio/]]></link>
			<title>Ransomware: comprendere pratiche e motivazioni degli aggressori per difendersi al meglio</title>
			<pubDate><![CDATA[Mon, 02 Sep 2024 08:55:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/cyber-security-e-sostenibilita-le-direttrici-di-sviluppo-trasparenza-comunita-cultura-e-ambiente/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/cyber-security-e-sostenibilita-le-direttrici-di-sviluppo-trasparenza-comunita-cultura-e-ambiente/]]></link>
			<title>Cyber security e sostenibilità. Le direttrici di sviluppo? Trasparenza, comunità, cultura e ambiente</title>
			<pubDate><![CDATA[Mon, 02 Sep 2024 08:54:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/slide_partner/advens/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/slide_partner/advens/]]></link>
			<title>ADVens</title>
			<pubDate><![CDATA[Thu, 28 Mar 2024 16:09:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/applicazioni-piu-sicure-per-proteggere-servizi-e-dati-aziendali-le-soluzioni/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/applicazioni-piu-sicure-per-proteggere-servizi-e-dati-aziendali-le-soluzioni/]]></link>
			<title>Applicazioni più sicure per proteggere servizi e dati aziendali: le soluzioni</title>
			<pubDate><![CDATA[Mon, 02 Sep 2024 08:51:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/slide_partner/rubrik/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/slide_partner/rubrik/]]></link>
			<title>Rubrik</title>
			<pubDate><![CDATA[Wed, 24 Apr 2024 09:05:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/resilienza-informatica-un-approccio-alla-continuita-aziendale/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/resilienza-informatica-un-approccio-alla-continuita-aziendale/]]></link>
			<title>Resilienza informatica: un approccio alla continuità aziendale</title>
			<pubDate><![CDATA[Mon, 02 Sep 2024 08:49:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/moderatori/anna-cataleta/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/moderatori/anna-cataleta/]]></link>
			<title>Anna Cataleta</title>
			<pubDate><![CDATA[Thu, 18 Apr 2024 12:47:05 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/slide_partner/tim-enterprise/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/slide_partner/tim-enterprise/]]></link>
			<title>TIM Enterprise</title>
			<pubDate><![CDATA[Thu, 09 May 2024 12:36:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/agenda/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/agenda/]]></link>
			<title>Agenda</title>
			<pubDate><![CDATA[Mon, 13 May 2024 12:33:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/cyber-security-e-sostenibilita-punti-di-correlazione-nella-governance-aziendale/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/cyber-security-e-sostenibilita-punti-di-correlazione-nella-governance-aziendale/]]></link>
			<title>Cyber security e sostenibilità: punti di correlazione nella governance aziendale</title>
			<pubDate><![CDATA[Fri, 21 Jun 2024 09:47:49 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/slide_partner/veracode/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/slide_partner/veracode/]]></link>
			<title>Veracode</title>
			<pubDate><![CDATA[Thu, 28 Mar 2024 16:09:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/ransomware-il-ruolo-di-un-partner-strategico-per-migliorare-la-postura-cyber/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/ransomware-il-ruolo-di-un-partner-strategico-per-migliorare-la-postura-cyber/]]></link>
			<title>Ransomware: il ruolo di un partner strategico per migliorare la postura cyber</title>
			<pubDate><![CDATA[Fri, 21 Jun 2024 09:46:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/identificare-il-nemico-interno-le-soluzioni-per-individuare-e-bloccare-gli-attacchi-insider/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/identificare-il-nemico-interno-le-soluzioni-per-individuare-e-bloccare-gli-attacchi-insider/]]></link>
			<title>Identificare il nemico interno: le soluzioni per individuare e bloccare gli attacchi insider</title>
			<pubDate><![CDATA[Wed, 20 Dec 2023 10:56:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/il-panorama-della-cyber-security-nuove-sfide-e-alleati-nellera-dellintelligenza-artificiale/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/il-panorama-della-cyber-security-nuove-sfide-e-alleati-nellera-dellintelligenza-artificiale/]]></link>
			<title>Il panorama della cyber security: nuove sfide e alleati nell’era dell’intelligenza artificiale</title>
			<pubDate><![CDATA[Wed, 20 Dec 2023 10:51:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/per-una-vera-cyber-resilienza-servono-processi-cyber-strutturati-e-cooperazione-tecnologica/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/per-una-vera-cyber-resilienza-servono-processi-cyber-strutturati-e-cooperazione-tecnologica/]]></link>
			<title>Per una vera cyber resilienza servono processi cyber strutturati e cooperazione tecnologica</title>
			<pubDate><![CDATA[Wed, 20 Dec 2023 10:45:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/cyber-resilienza-condizioni-fondamentali-e-priorita-normative-per-la-sicurezza-delle-organizzazioni/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/cyber-resilienza-condizioni-fondamentali-e-priorita-normative-per-la-sicurezza-delle-organizzazioni/]]></link>
			<title>Cyber resilienza: condizioni fondamentali e priorità normative per la sicurezza delle organizzazioni</title>
			<pubDate><![CDATA[Wed, 20 Dec 2023 09:25:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/moderatori/franco-rossi/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/moderatori/franco-rossi/]]></link>
			<title>Gabriele Faggioli</title>
			<pubDate><![CDATA[Thu, 28 Mar 2024 10:46:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/sfide-e-opportunita-nella-regolamentazione-e-certificazione-della-sicurezza-informatica-in-europa/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/sfide-e-opportunita-nella-regolamentazione-e-certificazione-della-sicurezza-informatica-in-europa/]]></link>
			<title>Sfide e opportunità nella regolamentazione e certificazione della sicurezza informatica in Europa</title>
			<pubDate><![CDATA[Mon, 20 Nov 2023 10:43:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/edizione_precedente/anno-2024-che-cyber-sara-le-tecnologie-e-gli-sviluppi-normativi-xii-edizione/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/edizione_precedente/anno-2024-che-cyber-sara-le-tecnologie-e-gli-sviluppi-normativi-xii-edizione/]]></link>
			<title>Anno 2024, che cyber sarà: le tecnologie e gli sviluppi normativi &#8211; XII edizione</title>
			<pubDate><![CDATA[Mon, 18 Dec 2023 10:48:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/evento/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/evento/]]></link>
			<title>Evento</title>
			<pubDate><![CDATA[Fri, 21 Jun 2024 09:01:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/soluzioni-documentali-strumento-cruciale-per-contrastare-le-minacce-informatiche/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/soluzioni-documentali-strumento-cruciale-per-contrastare-le-minacce-informatiche/]]></link>
			<title>Soluzioni documentali, strumento cruciale per contrastare le minacce informatiche</title>
			<pubDate><![CDATA[Fri, 17 Nov 2023 13:38:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/speaker/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/speaker/]]></link>
			<title>Speaker</title>
			<pubDate><![CDATA[Fri, 12 Apr 2024 15:02:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.cybersecurity360summit.it/partner/detection-reaction-come-elevare-la-sicurezza-aziendale-con-gli-strumenti-basati-sullai/]]></guid>
			<link><![CDATA[https://www.cybersecurity360summit.it/partner/detection-reaction-come-elevare-la-sicurezza-aziendale-con-gli-strumenti-basati-sullai/]]></link>
			<title>Detection &#038; reaction: come elevare la sicurezza aziendale con gli strumenti basati sull’AI</title>
			<pubDate><![CDATA[Fri, 02 Feb 2024 09:42:33 +0000]]></pubDate>
		</item>
				</channel>
</rss>
