{"id":194,"date":"2024-09-05T11:51:36","date_gmt":"2024-09-05T09:51:36","guid":{"rendered":"https:\/\/www.xict.it\/?page_id=194"},"modified":"2026-03-11T15:37:50","modified_gmt":"2026-03-11T14:37:50","slug":"home","status":"publish","type":"page","link":"https:\/\/www.xict.it\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"194\" class=\"elementor elementor-194\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c9f31e e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"1c9f31e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bffbed4 animated-fast elementor-widget elementor-widget-sina_banner_slider\" data-id=\"bffbed4\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"sina_banner_slider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sina-banner-slider owl-carousel\"\r\n\t\tdata-autoplay=\"yes\"\r\n\t\tdata-pause=\"yes\"\r\n\t\tdata-nav=\"yes\"\r\n\t\tdata-dots=\"yes\"\r\n\t\tdata-mouse-drag=\"yes\"\r\n\t\tdata-touch-drag=\"yes\"\r\n\t\tdata-loop=\"yes\"\r\n\t\tdata-speed=\"\"\r\n\t\tdata-part-anim=\"yes\"\r\n\t\tdata-delay=\"5000\">\r\n\r\n\t\t\t\t\t\t\t<div class=\"sina-slider-content sina-bg-cover\" style=\"background-image: url(https:\/\/www.xict.it\/wp-content\/uploads\/2024\/09\/iso27001-banner.png);\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-overlay\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"sina-banner-container elementor-repeater-item-32b093d\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h1 class=\"sina-banner-title sina-anim-invisible\" data-animation=\"animated fadeInLeft\">ISO\/IEC 27001<\/h1>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"sina-banner-subtitle sina-anim-invisible\" data-animation=\"animated fadeInRight\">Information Security<\/h2>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-desc sina-anim-invisible\" data-animation=\"animated fadeInUp\">Supporto alla certificazione e al mantenimento<\/div>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-btns sina-anim-invisible\" data-animation=\"animated fadeInUp\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"sina-banner-pbtn   \"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.xict.it\/index.php\/iso-27001\/\"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>\r\n\t\t\t\t\t\t\t\t\t\t\t\tScopri di pi\u00f9\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"sina-slider-content sina-bg-cover\" style=\"background-image: url(https:\/\/www.xict.it\/wp-content\/uploads\/2024\/09\/dora-banner.png);\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-overlay\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"sina-banner-container elementor-repeater-item-43facb9\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h1 class=\"sina-banner-title sina-anim-invisible\" data-animation=\"animated zoomIn\">DORA<\/h1>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"sina-banner-subtitle sina-anim-invisible\" data-animation=\"animated zoomIn\">Digital Operational Resilience Act<\/h2>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-desc sina-anim-invisible\" data-animation=\"animated fadeInUp\">Guida e supporto alla conformit\u00e0<\/div>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-btns sina-anim-invisible\" data-animation=\"animated lightSpeedIn\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"sina-banner-pbtn   \"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.xict.it\/index.php\/dora\/\"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>\r\n\t\t\t\t\t\t\t\t\t\t\t\tScopri di pi\u00f9\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"sina-slider-content sina-bg-cover\" style=\"background-image: url(https:\/\/www.xict.it\/wp-content\/uploads\/2024\/09\/nis2-banner.webp);\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-overlay\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"sina-banner-container elementor-repeater-item-9deb0bd\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h1 class=\"sina-banner-title sina-anim-invisible\" data-animation=\"animated fadeInLeft\">NIS2<\/h1>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"sina-banner-subtitle sina-anim-invisible\" data-animation=\"animated fadeInRight\">Network and Information Security 2<\/h2>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-desc sina-anim-invisible\" data-animation=\"animated fadeInUp\">Assistenza e supporto per la conformit\u00e0<\/div>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-btns sina-anim-invisible\" data-animation=\"animated fadeInUp\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"sina-banner-pbtn   \"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.xict.it\/index.php\/nis2\/\"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>\r\n\t\t\t\t\t\t\t\t\t\t\t\tScopri di pi\u00f9\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"sina-slider-content sina-bg-cover\" style=\"background-image: url(https:\/\/www.xict.it\/wp-content\/uploads\/2024\/09\/gdpr-slider.webp);\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-overlay\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"sina-banner-container elementor-repeater-item-e3a7cc7\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h1 class=\"sina-banner-title sina-anim-invisible\" data-animation=\"animated fadeInLeft\">GDPR<\/h1>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"sina-banner-subtitle sina-anim-invisible\" data-animation=\"animated fadeInRight\">General Data Protection Regulation<\/h2>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-desc sina-anim-invisible\" data-animation=\"animated fadeInUp\">Supporto e orientamento per la conformit\u00e0.\n\n\n\n\n<\/div>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-btns sina-anim-invisible\" data-animation=\"animated fadeInUp\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"sina-banner-pbtn   \"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.xict.it\/index.php\/gdpr\/\"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>\r\n\t\t\t\t\t\t\t\t\t\t\t\tScopri di pi\u00f9\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"sina-slider-content sina-bg-cover\" style=\"background-image: url(https:\/\/www.xict.it\/wp-content\/uploads\/2024\/09\/tpn-banner.png);\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-overlay\"><\/div>\r\n\t\t\t\t\t\r\n\t\t\t\t\t<div class=\"sina-banner-container elementor-repeater-item-350fdb4\">\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h1 class=\"sina-banner-title sina-anim-invisible\" data-animation=\"animated fadeInLeft\">TPN<\/h1>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"sina-banner-subtitle sina-anim-invisible\" data-animation=\"animated fadeInRight\">Trusted Partner Network<\/h2>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-desc sina-anim-invisible\" data-animation=\"animated fadeInUp\">Assistenza per la certificazione e la sua conservazione.<\/div>\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"sina-banner-btns sina-anim-invisible\" data-animation=\"animated fadeInUp\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"sina-banner-pbtn   \"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\thref=\"https:\/\/www.xict.it\/index.php\/tpn\/\"\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>\r\n\t\t\t\t\t\t\t\t\t\t\t\tScopri di pi\u00f9\t\t\t\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div><!-- .sina-banner-slider -->\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-15ba075 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"15ba075\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ea410f7 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"ea410f7\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29d111f elementor-widget elementor-widget-image\" data-id=\"29d111f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.xict.it\/wp-content\/uploads\/elementor\/thumbs\/Cyber-attacks-qua58uw8yl0edca21ne7afftq2vewvcp1oiatocbz4.png\" title=\"Cyber-attacks\" alt=\"Cyber-attacks\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6dad46 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"c6dad46\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db1cbf9 elementor-widget elementor-widget-heading\" data-id=\"db1cbf9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Gli attacchi informatici prendono di mira le persone, i dati e le tecnologie<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c879ae elementor-widget elementor-widget-text-editor\" data-id=\"4c879ae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">La trasformazione digitale ha ridefinito i perimetri di sicurezza tradizionali. Per fronteggiare attacchi multi-vettore che mirano a utenti, dati e infrastrutture, \u00e8 necessario implementare soluzioni di sicurezza informatica integrate e in grado di adattarsi a un ambiente in continua evoluzione. Per questo motivo noi partiamo dalle procedure che sono alla base del processo per il raggiungimento della certificazione o per la conformit\u00e0 dei protocolli richiesti.\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee83dec e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"ee83dec\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-07090b3 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"07090b3\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-891da68 elementor-widget elementor-widget-counter\" data-id=\"891da68\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.23.0 - 05-08-2024 *\/\n.elementor-counter{display:flex;justify-content:center;align-items:stretch;flex-direction:column-reverse}.elementor-counter .elementor-counter-number{flex-grow:var(--counter-number-grow,0)}.elementor-counter .elementor-counter-number-wrapper{flex:1;display:flex;font-size:69px;font-weight:600;line-height:1;text-align:center}.elementor-counter .elementor-counter-number-prefix{text-align:end;flex-grow:var(--counter-prefix-grow,1);white-space:pre-wrap}.elementor-counter .elementor-counter-number-suffix{text-align:start;flex-grow:var(--counter-suffix-grow,1);white-space:pre-wrap}.elementor-counter .elementor-counter-title{flex:1;display:flex;justify-content:center;align-items:center;margin:0;padding:0;font-size:19px;font-weight:400;line-height:2.5}<\/style>\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"74\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1c5039 elementor-widget elementor-widget-text-editor\" data-id=\"b1c5039\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">violazioni dei dati che si basano sullo sfruttamento del fattore umano<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2599148 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"2599148\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cddfe75 elementor-widget elementor-widget-counter\" data-id=\"cddfe75\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"80\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f0408b elementor-widget elementor-widget-text-editor\" data-id=\"9f0408b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">attacchi informatici che iniziano con un accesso non autorizzato delle identit\u00e0 di utenti con privilegi<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9015173 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"9015173\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91e59b9 elementor-widget elementor-widget-counter\" data-id=\"91e59b9\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"95\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a5265d elementor-widget elementor-widget-text-editor\" data-id=\"0a5265d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">problemi di sicurezza informatica causati da un errore umano<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c1c4dc e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"8c1c4dc\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-73dfe2a e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"73dfe2a\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e881f9d elementor-widget elementor-widget-heading\" data-id=\"e881f9d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Competenza tecnica e rigore metodologico al servizio della conformit\u00e0.<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f28e4ad elementor-widget elementor-widget-text-editor\" data-id=\"f28e4ad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p data-path-to-node=\"2\">XICT supporta le organizzazioni nell&#8217;integrazione tra gestione delle infrastrutture IT e adempimenti normativi. Il nostro approccio unisce l&#8217;esperienza operativa dei <b data-path-to-node=\"2\" data-index-in-node=\"166\">System &amp; Network Administrator<\/b> alla metodologia certificata dei <b data-path-to-node=\"2\" data-index-in-node=\"230\">Lead Auditor ISO\/IEC 27001<\/b>.<\/p><p data-path-to-node=\"3\">Non ci limitiamo alla consulenza documentale: operiamo affinch\u00e9 ogni requisito di standard internazionali e direttive europee \u2014 come <b data-path-to-node=\"3\" data-index-in-node=\"133\">ISO 27001<\/b>, <b data-path-to-node=\"3\" data-index-in-node=\"144\">NIS2<\/b>, <b data-path-to-node=\"3\" data-index-in-node=\"150\">DORA<\/b> e <b data-path-to-node=\"3\" data-index-in-node=\"157\">GDPR<\/b> \u2014 trovi riscontro reale nelle configurazioni tecniche di rete e sistemi. Attraverso l&#8217;applicazione dello standard <b data-path-to-node=\"3\" data-index-in-node=\"276\">ISO 17020<\/b>, forniamo asseverazioni basate su evidenze oggettive, garantendo una conformit\u00e0 dimostrabile e una resilienza informatica concreta.<\/p><p data-path-to-node=\"4\">Collaboriamo con le aziende per trasformare gli obblighi di legge in un&#8217;architettura sicura, asseverata e gestita con rigore professionale.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5373f23 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"5373f23\" data-element_type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72fe6b5 elementor-widget elementor-widget-image\" data-id=\"72fe6b5\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1429\" height=\"2560\" src=\"https:\/\/www.xict.it\/wp-content\/uploads\/2026\/03\/Gemini_Generated_Image_qnnm3kqnnm3kqnnm-scaled.png\" class=\"attachment-full size-full wp-image-509\" alt=\"\" srcset=\"https:\/\/www.xict.it\/wp-content\/uploads\/2026\/03\/Gemini_Generated_Image_qnnm3kqnnm3kqnnm-scaled.png 1429w, https:\/\/www.xict.it\/wp-content\/uploads\/2026\/03\/Gemini_Generated_Image_qnnm3kqnnm3kqnnm-167x300.png 167w, https:\/\/www.xict.it\/wp-content\/uploads\/2026\/03\/Gemini_Generated_Image_qnnm3kqnnm3kqnnm-572x1024.png 572w, https:\/\/www.xict.it\/wp-content\/uploads\/2026\/03\/Gemini_Generated_Image_qnnm3kqnnm3kqnnm-768x1376.png 768w, https:\/\/www.xict.it\/wp-content\/uploads\/2026\/03\/Gemini_Generated_Image_qnnm3kqnnm3kqnnm-857x1536.png 857w, https:\/\/www.xict.it\/wp-content\/uploads\/2026\/03\/Gemini_Generated_Image_qnnm3kqnnm3kqnnm-1143x2048.png 1143w\" sizes=\"(max-width: 1429px) 100vw, 1429px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 27001 Information Security Supporto alla certificazione e al mantenimento Scopri di pi\u00f9 DORA Digital Operational Resilience Act Guida e supporto alla conformit\u00e0 Scopri di pi\u00f9 NIS2 Network and Information Security 2 Assistenza e supporto per la conformit\u00e0 Scopri di pi\u00f9 GDPR General Data Protection Regulation Supporto e orientamento per la conformit\u00e0. Scopri di pi\u00f9 TPN Trusted Partner Network Assistenza per la certificazione e la sua conservazione. Scopri di pi\u00f9 Gli attacchi informatici prendono di mira le persone, i dati e le tecnologie La trasformazione digitale ha ridefinito i perimetri di sicurezza tradizionali. Per fronteggiare attacchi multi-vettore che mirano a utenti, dati e infrastrutture, \u00e8 necessario implementare soluzioni di sicurezza informatica integrate e in grado di adattarsi a un ambiente in continua evoluzione. Per questo motivo noi partiamo dalle procedure che sono alla base del processo per il raggiungimento della certificazione o per la conformit\u00e0 dei protocolli richiesti.\u00a0 0 % violazioni dei dati che si basano sullo sfruttamento del fattore umano 0 % attacchi informatici che iniziano con un accesso non autorizzato delle identit\u00e0 di utenti con privilegi 0 % problemi di sicurezza informatica causati da un errore umano Competenza tecnica e rigore metodologico al servizio della conformit\u00e0. XICT supporta le organizzazioni nell&#8217;integrazione tra gestione delle infrastrutture IT e adempimenti normativi. Il nostro approccio unisce l&#8217;esperienza operativa dei System &amp; Network Administrator alla metodologia certificata dei Lead Auditor ISO\/IEC 27001. Non ci limitiamo alla consulenza documentale: operiamo affinch\u00e9 ogni requisito di standard internazionali e direttive europee \u2014 come ISO 27001, NIS2, DORA e GDPR \u2014 trovi riscontro reale nelle configurazioni tecniche di rete e sistemi. Attraverso l&#8217;applicazione dello standard ISO 17020, forniamo asseverazioni basate su evidenze oggettive, garantendo una conformit\u00e0 dimostrabile e una resilienza informatica concreta. Collaboriamo con le aziende per trasformare gli obblighi di legge in un&#8217;architettura sicura, asseverata e gestita con rigore professionale.<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"episode_type":"","audio_file":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","date_recorded":"","explicit":"","block":"","filesize_raw":"","footnotes":""},"class_list":["post-194","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.xict.it\/index.php\/wp-json\/wp\/v2\/pages\/194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.xict.it\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.xict.it\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.xict.it\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xict.it\/index.php\/wp-json\/wp\/v2\/comments?post=194"}],"version-history":[{"count":88,"href":"https:\/\/www.xict.it\/index.php\/wp-json\/wp\/v2\/pages\/194\/revisions"}],"predecessor-version":[{"id":512,"href":"https:\/\/www.xict.it\/index.php\/wp-json\/wp\/v2\/pages\/194\/revisions\/512"}],"wp:attachment":[{"href":"https:\/\/www.xict.it\/index.php\/wp-json\/wp\/v2\/media?parent=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}