{"id":41975,"date":"2017-07-09T18:54:18","date_gmt":"2017-07-09T22:54:18","guid":{"rendered":"https:\/\/www.cyberark.com\/cisoview\/"},"modified":"2024-03-19T05:41:16","modified_gmt":"2024-03-19T09:41:16","slug":"cisoview","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/it\/cisoview\/","title":{"rendered":"CISOView"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text]<\/p>\n<h1>CISO view<\/h1>\n<h2>Guida peer-to-peer indipendente dei CISO leader nel settore.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8221;Scarica subito&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresources%2Fwhite-papers%2Fciso-view-protezione-degli-accessi-privilegiati-in-un-modello-zero-trust-riassunto-esecutivo|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">Informazioni sulla serie di report CISO View<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column width=&#8221;2\/3&#8243; offset=&#8221;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>La serie di report CISO View, sviluppata in collaborazione con la societ\u00e0 di ricerca indipendente Robinson Insight, riunisce i principali CISO che condividono informazioni tra pari per aiutare i team di sicurezza a sviluppare programmi efficaci di cybersecurity.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 seesaw cybv2-pad-btm&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above wistia_embed&#8221;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_aswr8gsmnr videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Proteggere gli accessi privilegiati mentre si passa all&#8217;approccio Zero Trust<\/h4>\n<p>La trasformazione digitale e la mobilit\u00e0 aziendale stanno rapidamente erodendo il modello tradizionale basato sul perimetro. Man mano che il perimetro sparisce, come possono le aziende proteggere l&#8217;accesso alle loro risorse pi\u00f9 preziose &#8211; dati, applicazioni e infrastrutture &#8211; on-premise o sul cloud?<\/p>\n<p>Abbiamo intervistato un panel di 12 CISO Global 1000 sul mutevole quadro dei rischi, incluse le tecniche di attacco in evoluzione che prendono di mira gli accessi privilegiati. Questi ci hanno offerto raccomandazioni specifiche per mitigare i rischi utilizzando un modello Zero Trust. Questo report \u00e8 uno dei primi a offrire informazioni pratiche e operative ai CISO e ai loro team sull&#8217;implementazione di un modello Zero Trust.<\/p>\n<p>Un complemento di questo report \u00e8\u00a0<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/the-ciso-view-2021-survey-zero-trust-and-privileged-access\">The CISO View 2021 Survey: Zero Trust and Privileged Access<\/a>. Dopo aver ascoltato il nostro panel, volevamo sapere se la pi\u00f9 grande comunit\u00e0 di sicurezza condividesse le sue prospettive. Pertanto, abbiamo intervistato 100 responsabili della sicurezza di grandi aziende (1 miliardo di $+ di ricavi annui) in merito alle loro prospettive. I partecipanti al sondaggio e il panel suggeriscono entrambi un ampio consenso sul valore dell&#8217;approccio Zero Trust e un crescente senso di urgenza per la protezione degli accessi privilegiati.[\/vc_column_text][vc_btn title=&#8221;Leggi il report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-md-center&#8221;][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">Altri report della serie<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Protezione degli accessi privilegiati nell&#8217;automazione di processo robotizzata<\/h4>\n<h6 class=\"vc_custom_heading\">Protezione dei flussi di lavoro RPA<\/h6>\n<p>L&#8217;automazione robotizzata di processo (RPA) \u00e8 un percorso accelerato per accrescere efficienza, produttivit\u00e0 e qualit\u00e0. Dal punto di vista della cybersecurity, tuttavia, RPA introduce una nuova e allettante superficie di attacco a causa della proliferazione di accessi privilegiati e ci\u00f2 pu\u00f2 destare preoccupazione.<\/p>\n<p>Questo report CISO View esamina problematiche come: Quali tecniche possono essere utilizzate da un attaccante per violare gli accessi privilegiati in un sistema RPA? Quali sono i rischi pi\u00f9 significativi? Quali controlli sono i pi\u00f9 utili e praticabili? Quali sono i fattori principali di successo quando si lavora con stakeholder aziendali?[\/vc_column_text][vc_btn title=&#8221;Leggi il report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresources%2Fwhite-papers%2Fciso-view-protezione-degli-accessi-privilegiati-nella-robotic-process-automation|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_n1cxswixdq videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_rl2yohwgz5 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Protezione degli accessi privilegiati<\/h4>\n<h6 class=\"vc_custom_heading\">Protezione degli ambienti DevOps e Cloud<\/h6>\n<p>I vantaggi che derivano dalla velocit\u00e0 di sviluppo del software e dall&#8217;automazione delle IT operation sono evidenti: time-to-market pi\u00f9 rapido e costi inferiori. Ma quali sono i rischi? Come si fa a proteggere gli ambienti DevOps e cloud in modo completo?<\/p>\n<p>Questo report di ricerca CISO View \u00e8 il risultato delle esperienze dei CISO di societ\u00e0 Global 1000 e di professionisti della sicurezza e tecnici esperti che hanno adattato e protetto ambienti DevOps.[\/vc_column_text][vc_btn title=&#8221;Leggi il report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-devops-and-cloud-environments|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw cyb-reverse&#8221;][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-left&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Rapida riduzione del rischio:<\/h4>\n<h6 class=\"vc_custom_heading\">Uno sprint di 30 giorni per proteggere le credenziali privilegiate<\/h6>\n<p>Come si evita una violazione dei dati? In sostanza, per evitare una violazione dei dati \u00e8 necessario sapere quali tecniche vengono utilizzate dagli attaccanti e quali controlli di sicurezza possono fermarli. Questo rapporto di ricerca CISO View osserva dall&#8217;interno le esperienze acquisite in occasione di diverse violazioni di dati di alto profilo e fornisce consigli e un programma Sprint di 30 giorni per favorire la rapida implementazione dei controlli chiave.[\/vc_column_text][vc_btn title=&#8221;Leggi il report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Frapid-risk-reduction-a-30-day-sprint-to-protect-privileged-credentials|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131862\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" alt=\"Rapid Risk Reduction\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 seesaw&#8221;][vc_column width=&#8221;5\/12&#8243; el_class=&#8221;above&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131870\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg\" alt=\"The Balancing Act\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8221;7\/12&#8243; el_class=&#8221;below-right&#8221;][vc_column_text el_class=&#8221;dark&#8221;]<\/p>\n<h4>Un equilibrio delicato:<\/h4>\n<h6 class=\"vc_custom_heading\">CISO View sul miglioramento dei controlli degli accessi privilegiati<\/h6>\n<p>Questo report fornisce una guida pratica per consentire ai CISO di migliorare i controlli degli accessi privilegiati in base alle esperienze concrete di organizzazioni leader. La guida include anche consigli utili per trovare il giusto equilibrio tra consentire e limitare livelli elevati di accesso agli asset informativi.[\/vc_column_text][vc_btn title=&#8221;Leggi il report&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-balancing-act-the-ciso-view-on-improving-privileged-access-controls|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 plp-overview-more-col&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-md-center heading&#8221; offset=&#8221;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"vc_custom_heading cyb-ltr-spc-6\">Informazioni sull\u2019approccio e sul gruppo di ricerca CISO View<\/h3>\n<p class=\"vc_custom_heading\">Oggi le aziende devono far fronte a minacce sempre pi\u00f9 complesse e sofisticate. Noi di CyberArk siamo convinti che la condivisione di conoscenze e indicazioni all&#8217;interno della community dei CISO consentir\u00e0 di rafforzare le strategie di sicurezza e aumentare la protezione delle organizzazioni.<\/p>\n<p class=\"vc_custom_heading\">CyberArk ha commissionato a una societ\u00e0 di ricerca indipendente, Robinson Insight, lo sviluppo di CISO View, che affronta molti argomenti correlati al miglioramento dei controlli degli accessi privilegiati. L&#8217;iniziativa riunisce i CISO di organizzazioni leader a livello mondiale, che condividono le loro competenze sui problemi critici che i responsabili della sicurezza devono affrontare, con l&#8217;obiettivo di definire un prezioso canale di comunicazione e guida tra pari. Di seguito sono indicati alcuni collaboratori ai report attuali e passati e membri del CISO View Research Panel.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131879\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg\" alt=\"Alissa Adbullah\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Alissa (Dott. Jay) Abdullah<\/h4>\n<p>SVP and Deputy Chief Security Officer, Mastercard[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131887\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg\" alt=\"Brad Arkin\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Brad Arkin<\/h4>\n<p>SVP, Chief Security &#038; Trust Officer, Cisco[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131895\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg\" alt=\"Tim Bengson\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Tim Bengson<\/h4>\n<p class=\"vc_custom_heading\">VP, Global Chief Information Security Officer, Kellogg Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131903\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg\" alt=\"Dawn Cappelli\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dawn Cappelli<\/h4>\n<p class=\"vc_custom_heading\">VP, Global Security and Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131911\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg\" alt=\"Melissa Carvalho\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Melissa Carvalho<\/h4>\n<p>VP, Enterprise and Customer Identity and Access Management,<br \/>\nRoyal Bank of Canada (RBC)[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131919\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg\" alt=\"Dave Estlick\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dave Estlick<\/h4>\n<p>Chief Information Security Officer, Chipotle[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131927\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg\" alt=\"Peter Fizelle\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Peter Fizelle<\/h4>\n<p>Chief Information Security Officer, Asian Development Bank[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131935\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg\" alt=\"Mike Gordon\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Gordon<\/h4>\n<p class=\"vc_custom_heading\">VP and Chief Information Security Officer, Lockheed Martin Corporation (LMC)<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131943\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg\" alt=\"Omar Khawaja\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Omar Khawaja<\/h4>\n<p>VP and Chief Information Security Officer, Highmark Health[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131951\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg\" alt=\"Olivier Perrault\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Olivier Perrault<\/h4>\n<p>Chief Information Security Officer, Orange Business Services[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131959\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg\" alt=\"Emma Smith\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Emma Smith<\/h4>\n<p>Global Security Director, Vodafone[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131967\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg\" alt=\"Daniel Tse\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Daniel Tse<\/h4>\n<p>Head, Cyber Security, Information &amp; Technology Risk (CSITR), GIC Private Limited[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8221;yes&#8221; el_class=&#8221;cybv2 plp-overview-more-col&#8221;][vc_column width=&#8221;5\/6&#8243; el_class=&#8221;text-md-center heading&#8221; offset=&#8221;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3>Hanno contribuito ai report precedenti anche<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Rob Bening<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer Emeritus, ING Bank<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">David Bruyea<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &amp; Chief Information Security Officer, CIBC<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Connelly<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Lockheed Martin<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Khadir Fayaz<\/h4>\n<p class=\"vc_custom_heading\">Vice President, Global Security Strategy, Engineering &amp; Architecture, Pearson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Gelinne<\/h4>\n<p class=\"vc_custom_heading\">Managing Director, Advisory Cyber Risk Services, Deloitte &amp; Touche<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Fred Gibbins<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &amp; Chief Information Security Officer, American Express Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Charles Gillman<\/h4>\n<p class=\"vc_custom_heading\">Chief Security Officer, NTT Communications &#8211; Cloud Infrastructure Services<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Steve Glynn<\/h4>\n<p class=\"vc_custom_heading\">Global Head of Information Security, ANZ<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mark Grant<\/h4>\n<p class=\"vc_custom_heading\">PhD, CIPP Chief Information Security Officer, CSX Corporation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Gary Harbison<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, Monsanto Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Motes<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Kathy Orner<\/h4>\n<p class=\"vc_custom_heading\">Chief Risk Officer, CWT<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Wilson<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, McKesson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">JD Rogers<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, American Financial Group<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Schramm<\/h4>\n<p class=\"vc_custom_heading\">CISA, CISSP, VP Global Information Risk Management &amp; CIRO, Manulife<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Chun Meng Tee<\/h4>\n<p class=\"vc_custom_heading\">Vice President and Head of Information Security, Singapore Exchange<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Thomas Tschersich<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President, Internal Security &amp; Cyber Defense, T-Systems International<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/6&#8243; el_class=&#8221;cta-box&#8221;][vc_column_text el_class=&#8221;link-arrow-right&#8221;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Munawar Valiji<\/h4>\n<p class=\"vc_custom_heading\">Head of Information Security, News UK<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;cybv2 cybv2-pad-btm text-center&#8221;][vc_column][vc_column_text]*Rappresenta il ruolo al momento della collaborazione.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2_talk_to_an_expert&#8221; css=&#8221;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;extra-space&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Inizia<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;new_hpstyle_section9_text&#8221;]<\/p>\n<p style=\"text-align: center;\">Approfitta dell&#8217;esperienza dei CISO pi\u00f9 innovativi del settore per costruire oggi stesso un programma di cybersecurity efficace.<\/p>\n<p>[\/vc_column_text][vc_btn title=&#8221;Scarica subito&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model%2F|&#8221; el_class=&#8221;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] CISO view Guida peer-to-peer indipendente dei CISO leader nel settore. [\/vc_column_text][vc_btn title=&#8221;Scarica subito&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresources%2Fwhite-papers%2Fciso-view-protezione-degli-accessi-privilegiati-in-un-modello-zero-trust-riassunto-esecutivo|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text] Informazioni sulla serie di report&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-41975","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Report CISO: Gestione degli accessi privilegiati per i CISO<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/it\/cisoview\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISOView\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] CISO view Guida peer-to-peer indipendente dei CISO leader nel settore. [\/vc_column_text][vc_btn title=&#8221;Scarica subito&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresources%2Fwhite-papers%2Fciso-view-protezione-degli-accessi-privilegiati-in-un-modello-zero-trust-riassunto-esecutivo|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text] Informazioni sulla serie di report...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/it\/cisoview\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-19T09:41:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/it\/cisoview\/\",\"url\":\"https:\/\/www.cyberark.com\/it\/cisoview\/\",\"name\":\"Report CISO: Gestione degli accessi privilegiati per i CISO\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/cisoview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/cisoview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"datePublished\":\"2017-07-09T22:54:18+00:00\",\"dateModified\":\"2024-03-19T09:41:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/cisoview\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/it\/cisoview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/cisoview\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/it\/cisoview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISOView\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#website\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Report CISO: Gestione degli accessi privilegiati per i CISO","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/it\/cisoview\/","og_locale":"it_IT","og_type":"article","og_title":"CISOView","og_description":"[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 int-hero-noimg dark&#8221;][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;column-1&#8243;][vc_column_text] CISO view Guida peer-to-peer indipendente dei CISO leader nel settore. [\/vc_column_text][vc_btn title=&#8221;Scarica subito&#8221; style=&#8221;custom&#8221; custom_background=&#8221;&#8221; custom_text=&#8221;&#8221; shape=&#8221;square&#8221; link=&#8221;url:https%3A%2F%2Fwww.cyberark.com%2Fit%2Fresources%2Fwhite-papers%2Fciso-view-protezione-degli-accessi-privilegiati-in-un-modello-zero-trust-riassunto-esecutivo|&#8221; el_class=&#8221;cybv2-button-solid&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;cybv2 cybv2-pad-top text-md-center&#8221;][vc_column][vc_column_text] Informazioni sulla serie di report...","og_url":"https:\/\/www.cyberark.com\/it\/cisoview\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-03-19T09:41:16+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tempo di lettura stimato":"11 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/it\/cisoview\/","url":"https:\/\/www.cyberark.com\/it\/cisoview\/","name":"Report CISO: Gestione degli accessi privilegiati per i CISO","isPartOf":{"@id":"https:\/\/www.cyberark.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/it\/cisoview\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/cisoview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","datePublished":"2017-07-09T22:54:18+00:00","dateModified":"2024-03-19T09:41:16+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/it\/cisoview\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/it\/cisoview\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/cisoview\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/it\/cisoview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/it\/"},{"@type":"ListItem","position":2,"name":"CISOView"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/it\/#website","url":"https:\/\/www.cyberark.com\/it\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/it\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/41975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/comments?post=41975"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/pages\/41975\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/media?parent=41975"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/it\/wp-json\/wp\/v2\/product_category?post=41975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}