{"id":42864,"date":"2025-02-19T14:47:16","date_gmt":"2025-02-19T14:47:16","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=42864"},"modified":"2025-08-25T15:20:55","modified_gmt":"2025-08-25T15:20:55","slug":"board-training-nis2-level-2","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/","title":{"rendered":"Board training NIS2 Level 2"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; custom_margin=&#8221;150px||||false|false&#8221; custom_padding=&#8221;|||10%|false|false&#8221; custom_padding_tablet=&#8221;|||10%|false|false&#8221; custom_padding_phone=&#8221;|5%||5%|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Inter|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;60px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||||false|false&#8221; header_font_size_tablet=&#8221;60px&#8221; header_font_size_phone=&#8221;42px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Board Training NIS2<br \/>Level 2<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>NIS2 Board Training \/ <span style=\"color: #f18a00;\">Level 2<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_margin_tablet=&#8221;|||0px|false|false&#8221; custom_margin_phone=&#8221;|0px|||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||8px|0px|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_margin_tablet=&#8221;|||0px|false|false&#8221; custom_margin_phone=&#8221;|||0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|10%||0px|false|false&#8221; custom_padding_tablet=&#8221;|5%||5%|false|true&#8221; custom_padding_phone=&#8221;|5%||5%|false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element=&#8221;align-self:center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/NIS2_Login_EN-1-scaled.webp&#8221; alt=&#8221;NIS2_Login_EN&#8221; title_text=&#8221;NIS2_Login_EN&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||120px|true|false&#8221; custom_padding_tablet=&#8221;50px|||0px|false|false&#8221; custom_padding_phone=&#8221;|10px||10px|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; custom_css_main_element=&#8221;align-self:center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Cyber Guru NIS2&#8243; alt=&#8221;Awareness&#8221; icon_placement=&#8221;left&#8221; image_icon_width=&#8221;100%&#8221; content_max_width=&#8221;60px&#8221; image_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h2&#8243; header_font=&#8221;Inter|700|||||||&#8221; header_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_font_size=&#8221;48px&#8221; module_alignment=&#8221;left&#8221; min_height=&#8221;11.4px&#8221; custom_margin=&#8221;||0px|-18px|false|false&#8221; custom_margin_tablet=&#8221;||0px||false|false&#8221; custom_margin_phone=&#8221;25px||0px||false|false&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;||0px|0px|false|false&#8221; header_font_size_tablet=&#8221;48px&#8221; header_font_size_phone=&#8221;36px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; custom_css_blurb_image=&#8221;width:15%;||&#8221; custom_css_blurb_content=&#8221;max-width: none !important;||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22,%22header_text_color%22%93}&#8221;][\/et_pb_blurb][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; text_font_size=&#8221;16px&#8221; custom_margin=&#8221;10px||20px||false|false&#8221; custom_css_main_element=&#8221;font-weight:400;&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8221;]<\/p>\n<p><span><span style=\"color: #000000;\">Level II of the NIS2 course addresses digital protection challenges by combining governance, advanced technologies and cyber risk awareness. It aims to provide skills to manage cyber threats through governance strategies, use of Artificial Intelligence, and real-world case analysis with a focus on regulations, risk management, and attack techniques to strengthen business resilience. The goal of the course is to increase security awareness and create an effective security culture against evolving cyber threats.<\/span> <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;SECTION I&#8221; button_url=&#8221;#section-1&#8243; button_text=&#8221;Read More&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Inter||||||||&#8221; body_font=&#8221;Rubik||||||||&#8221; body_text_align=&#8221;center&#8221; body_line_height=&#8221;0.8em&#8221; background_color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; button_font=&#8221;Inter||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|25px|10px|25px|true|true&#8221; min_height=&#8221;223.4px&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}&#8221;]<\/p>\n<h5><strong>INTEGRATED CYBER SECURITY<\/strong><\/h5>\n<p><strong>3 Lessons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;SECTION II&#8221; button_url=&#8221;#section-2&#8243; button_text=&#8221;Read More&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Inter||||||||&#8221; body_font=&#8221;Rubik||||||||&#8221; body_text_align=&#8221;center&#8221; body_line_height=&#8221;0.8em&#8221; background_color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; button_font=&#8221;Inter||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|25px|10px|25px|true|true&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}&#8221;]<\/p>\n<h5><strong>FROM GOVERNANCE TO AI<\/strong><\/h5>\n<p><strong>3 Lessons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;SECTION III&#8221; button_url=&#8221;#section-3&#8243; button_text=&#8221;Read More&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Inter||||||||&#8221; body_font=&#8221;Rubik||||||||&#8221; body_text_align=&#8221;center&#8221; body_line_height=&#8221;0.8em&#8221; background_color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; button_font=&#8221;Inter||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|25px|10px|25px|true|true&#8221; min_height=&#8221;226.4px&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}&#8221;]<\/p>\n<h5><strong>CYBER CASES.<\/strong><\/h5>\n<p><strong>4 Lessons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;SECTION IV&#8221; button_url=&#8221;#section-4&#8243; button_text=&#8221;Read More&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h4&#8243; header_font=&#8221;Inter||||||||&#8221; body_font=&#8221;Rubik||||||||&#8221; body_text_align=&#8221;center&#8221; body_line_height=&#8221;0.8em&#8221; background_color=&#8221;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;16px&#8221; button_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;5px&#8221; button_font=&#8221;Inter||||||||&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|25px|10px|25px|true|true&#8221; min_height=&#8221;225.4px&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22background_color%22%93,%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_text_color%22%93}&#8221;]<\/p>\n<h5><strong>SECURITY AWARENESS<\/strong><\/h5>\n<p><strong>6 Lessons<\/strong><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_padding=&#8221;0px||0px||true|false&#8221; custom_padding_tablet=&#8221;0px||0px||true|false&#8221; custom_padding_phone=&#8221;0px||0px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; module_id=&#8221;section-1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; <span>INTEGRATED CYBER SECURITY<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 1 &#8211; <span>SUPPLY CHAIN SECURITY<\/span><\/span><br \/><span>Supply chain security is crucial in cyber risk, as emphasized by NIS2 and security frameworks. Supply chain management requires cybersecurity involvement already in partner selection and a strategy that includes pre-testing, vulnerability analysis, and penetration testing prior to integration. Contracts and NDAs must formalize security requirements and provide for ongoing audits.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; <span>INTEGRATED CYBER SECURITY<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 2 &#8211; <span>THE DIGITAL IDENTITY<\/span><\/span><br \/><span>Digital Identity is the new security perimeter for organizations, and the Zero Trust approach ensures secure access by authenticating and authorizing every operation according to the principles of least privilege and need-to-know, preventing risks related to technology layering and excessive permissions. Key tools such as Directory Service for identity management, IAM for application permissions, PAM for administrative access, and Conditional Access. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION I &#8211; <span>INTEGRATED CYBER SECURITY<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 3 &#8211; <span>SECURITY BY DESIGN<\/span><\/span><br \/><span>The principle of Security by Design requires that security be integrated from the design phase of software, infrastructure and processes, safeguarding confidentiality, integrity, availability and resilience of data. This rigorous and disciplined approach is essential to reduce cyber risks and the cost of subsequent interventions, applying to every phase from conception to delivery, including context and risk analysis, definition of security requirements, and treatment and acceptance of residual risk. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; module_id=&#8221;section-2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION II &#8211; <span>FROM GOVERNANCE TO AI<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 1 &#8211; <\/span><span style=\"color: #f18a00;\">THE PEOPLE.<\/span><br \/><span>Managing cyber risk requires not only technological solutions, but also governance and people involvement. The Cybersecurity Governance Framework, consisting of guidelines, policies and procedures, organizes rules to protect data and infrastructure. However, inappropriate behavior can undermine security investments.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION II &#8211; <span>FROM GOVERNANCE TO AI<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 2 &#8211; <\/span><span style=\"color: #f18a00;\">THE CLOUD<\/span><br \/><span>In the past, cloud strategy aimed to reduce costs by divesting data centers, but technological and economic complexity has made this approach obsolete. Today, with digital transformation, the cloud is indispensable to ensure speed and flexibility. Companies are adopting a &#8220;Cloud Economy&#8221; based on modular and reusable components, adapting to time to market and designing agile and temporary services.    <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION II &#8211; <span>FROM GOVERNANCE TO AI<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 3 &#8211; <span>AI AND CYBERSECURITY<\/span><\/span><br \/><span>Artificial Intelligence is revolutionizing cybersecurity, with Machine Learning and language modeling (LLM) tools that analyze large volumes of data, reduce false positives, and support activities such as security control selection, policy writing, and regulatory navigation. AI agents can complement or replace first-level teams in Security Operation Centers, accelerating threat response, and improve Threat Intelligence to prevent attacks.   <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; module_id=&#8221;section-3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION III &#8211; <span>CYBER CASES<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 1 &#8211; <span>DEEPFAKE AND MANIPULATION<\/span><\/span><br \/><span>An ultra-realistic deepfake of the CEO appears in a video, announcing a fake acquisition. The company&#8217;s stock plummets and the Board is forced to take swift action. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION III &#8211; <span>CYBER CASES<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 2 &#8211; <span>ATTACK ON PERSONAL DEVICES<\/span><\/span><br \/><span>A board member accesses the corporate network from his outdated personal tablet. Malware infiltrates systems, allowing hackers to spy on strategic meetings. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION III &#8211; <span>CYBER CASES<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 3 &#8211; <span>TARGETED PHISHING<\/span><\/span><br \/><span>A Board member receives a well-structured email, apparently from a strategic partner, with an infected attachment. Upon opening the file, hackers gain access to confidential Board documents. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION III &#8211; <span>CYBER CASES<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 4 &#8211; <span>INSIDER THREAT<\/span><\/span><br \/><span>A senior executive begins to behave suspiciously. Shortly thereafter, he is found to have exfiltrated sensitive data on business strategies and sold it to a competitor or hostile state actor. The company suffers serious competitive damage and risks legal repercussions.  <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 1 &#8211; <span>ADVANCED SPEAR PHISHING<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">Spear Phishing is an advanced cyber attack technique that targets specific people with highly personalized emails or messages. Hackers gather information about victims from social media, websites, or data breaches, making the communications extremely credible. The goal is to induce the target to click on malicious links, download malware, or provide confidential credentials.  <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 2 &#8211; <span>AI AND DATA PROTECTION<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">Artificial Intelligence is transforming data management and protection, but it also raises crucial privacy and security challenges. AI algorithms analyze huge volumes of information, optimizing cybersecurity with advanced threat detection, reduction of false positives, and automation of attack response.   <\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; module_id=&#8221;section-4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 3 &#8211; <span>SOCIAL ENGINEERING<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">Social Engineering is an attack technique that uses psychological manipulation to gain access to confidential information, business systems, or sensitive resources. Hackers do not attack technology directly, but infiltrate organizations by exploiting employees&#8217; trust, inattention, or psychological pressure&#8230; <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 4 &#8211; <span>BRING YOUR OWN DEVICE (BYOD)<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">BYOD allows personal devices to be used to access corporate networks and data, improving flexibility and productivity. However, this practice introduces significant cybersecurity risks, as personal laptops, smartphones and tablets often fail to meet corporate security standards. Without proper controls, BYOD can expose the company to malware, data theft and unauthorized access.    <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 5 &#8211; <span>AUTHENTICATION <\/span> <\/span><br \/><span>Authentication systems protect access to networks, data and business applications, ensuring that only authorized users can operate. Traditional password-based methods are increasingly vulnerable to phishing, brute force and credential stuffing, making a more secure approach necessary. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;50px||||false|false&#8221; custom_padding_tablet=&#8221;50px||||false|false&#8221; custom_padding_phone=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; box_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Inter||||||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>SECTION IV &#8211; <span>SECURITY AWARENESS<\/span><\/h5>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik||||||||&#8221; text_orientation=&#8221;center&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LESSON 6 &#8211; <span>ADVERSARIAL ATTACK<\/span><\/span><\/p>\n<div class=\"ewa-rteLine\" style=\"text-align: left;\">Adversarial Attacks are sophisticated attacks that manipulate Artificial Intelligence (AI) models by inputting deceptive data to alter their behavior. These attacks exploit vulnerabilities in Machine Learning algorithms, inducing errors in facial recognition, threat analysis, or automated cybersecurity systems. <\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8221; alt=&#8221;More&#8221; title_text=&#8221;More&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-200px&#8221; horizontal_offset=&#8221;85px&#8221; vertical_offset_tablet=&#8221;-55px&#8221; vertical_offset_phone=&#8221;-90px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-55px&#8221; horizontal_offset_phone=&#8221;-50px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; position_origin_a_tablet=&#8221;top_left&#8221; position_origin_a_phone=&#8221;top_left&#8221; position_origin_a_last_edited=&#8221;on|phone&#8221; position_origin_f_tablet=&#8221;&#8221; position_origin_f_phone=&#8221;&#8221; position_origin_f_last_edited=&#8221;on|phone&#8221; position_origin_r_tablet=&#8221;&#8221; position_origin_r_phone=&#8221;&#8221; position_origin_r_last_edited=&#8221;on|phone&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;||||false|false&#8221; positioning_tablet=&#8221;absolute&#8221; positioning_phone=&#8221;absolute&#8221; positioning_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; admin_label=&#8221;Row&#8221; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;70px|170px|0px|170px|false|true&#8221; custom_padding_tablet=&#8221;|100px||100px|false|true&#8221; custom_padding_phone=&#8221;70px|20px|0px|20px|false|true&#8221; border_radii=&#8221;off|10px|10px||&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;0px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Rubik|300|||||||&#8221; text_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8221;20px&#8221; header_2_font=&#8221;Inter|700|||||||&#8221; header_2_text_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;58px&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;||25px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221; header_2_font_size_tablet=&#8221;48px&#8221; header_2_font_size_phone=&#8221;32px&#8221; header_2_font_size_last_edited=&#8221;on|phone&#8221; header_2_line_height_tablet=&#8221;58px&#8221; header_2_line_height_phone=&#8221;35px&#8221; header_2_line_height_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Would you like to know more?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; max_width=&#8221;1440px&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_padding=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_tablet=&#8221;0px|160px|70px|160px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|70px|0px|false|true&#8221; border_radii=&#8221;off|||15px|15px&#8221; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;1px&#8221; box_shadow_vertical=&#8221;20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyIsImVuYWJsZV9odG1sIjoib2ZmIn19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQzNjg4In19@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;DATA SHEET&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;on|phone&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;#f18a00&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjQyNzMxIiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;REQUEST DEMO&#8221; button_alignment=&#8221;center&#8221; button_alignment_tablet=&#8221;center&#8221; button_alignment_phone=&#8221;center&#8221; button_alignment_last_edited=&#8221;off|desktop&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.27.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_color=&#8221;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;3px&#8221; button_font=&#8221;Rubik|||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_margin=&#8221;10px||10px||true|false&#8221; custom_padding=&#8221;12px||12px||true|true&#8221; custom_css_main_element=&#8221;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1440px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8221; alt=&#8221;Discover&#8221; title_text=&#8221;Discover&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; positioning=&#8221;absolute&#8221; position_origin_a=&#8221;bottom_right&#8221; vertical_offset=&#8221;-20px&#8221; horizontal_offset=&#8221;-100px&#8221; vertical_offset_tablet=&#8221;-20px&#8221; vertical_offset_phone=&#8221;-80px&#8221; vertical_offset_last_edited=&#8221;on|phone&#8221; horizontal_offset_tablet=&#8221;-100px&#8221; horizontal_offset_phone=&#8221;-130px&#8221; horizontal_offset_last_edited=&#8221;on|phone&#8221; width=&#8221;25%&#8221; width_tablet=&#8221;25%&#8221; width_phone=&#8221;25%&#8221; width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Board Training NIS2Level 2NIS2 Board Training \/ Level 2Level II of the NIS2 course addresses digital protection challenges by combining governance, advanced technologies and cyber risk awareness. It aims to provide skills to manage cyber threats through governance strategies, use of Artificial Intelligence, and real-world case analysis with a focus on regulations, risk management, and [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-42864","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Board Training NIS2: Affrontare le Minacce Cyber - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Discover the NIS2 Board Training lessons for tackling digital challenges and improving corporate resilience against cyber threats\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Board training NIS2 Level 2\" \/>\n<meta property=\"og:description\" content=\"Discover the NIS2 Board Training lessons for tackling digital challenges and improving corporate resilience against cyber threats\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-25T15:20:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-nis2-level-2\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-nis2-level-2\\\/\",\"name\":\"Board Training NIS2: Affrontare le Minacce Cyber - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"datePublished\":\"2025-02-19T14:47:16+00:00\",\"dateModified\":\"2025-08-25T15:20:55+00:00\",\"description\":\"Discover the NIS2 Board Training lessons for tackling digital challenges and improving corporate resilience against cyber threats\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-nis2-level-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-nis2-level-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/board-training-nis2-level-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Board training NIS2 Level 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Board Training NIS2: Affrontare le Minacce Cyber - Cyber Guru","description":"Discover the NIS2 Board Training lessons for tackling digital challenges and improving corporate resilience against cyber threats","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/","og_locale":"en_US","og_type":"article","og_title":"Board training NIS2 Level 2","og_description":"Discover the NIS2 Board Training lessons for tackling digital challenges and improving corporate resilience against cyber threats","og_url":"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-08-25T15:20:55+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/","url":"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/","name":"Board Training NIS2: Affrontare le Minacce Cyber - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"datePublished":"2025-02-19T14:47:16+00:00","dateModified":"2025-08-25T15:20:55+00:00","description":"Discover the NIS2 Board Training lessons for tackling digital challenges and improving corporate resilience against cyber threats","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/board-training-nis2-level-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Board training NIS2 Level 2"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/42864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=42864"}],"version-history":[{"count":10,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/42864\/revisions"}],"predecessor-version":[{"id":49394,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/pages\/42864\/revisions\/49394"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=42864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}