Accedi per visualizzare il profilo completo di Gianluca
Piacere di rivederti
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
oppure
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
Milano, Lombardia, Italia
Informazioni di contatto
Accedi per visualizzare il profilo completo di Gianluca
Piacere di rivederti
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
oppure
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
1228 follower
Oltre 500 collegamenti
Accedi per visualizzare il profilo completo di Gianluca
Piacere di rivederti
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
oppure
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
Visualizza i collegamenti in comune con Gianluca
Piacere di rivederti
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
oppure
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
Visualizza i collegamenti in comune con Gianluca
Piacere di rivederti
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
oppure
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
Accedi per visualizzare il profilo completo di Gianluca
Piacere di rivederti
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
oppure
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
Attività
Accedi per visualizzare il profilo completo di Gianluca
Piacere di rivederti
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
oppure
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
-
Sono passati 6 mesi dallo startup di PTSCLAS S.p.a. Tutti assieme, un team coeso e di valore, abbiamo fatto grandi passi con #passione #esperienza…
Sono passati 6 mesi dallo startup di PTSCLAS S.p.a. Tutti assieme, un team coeso e di valore, abbiamo fatto grandi passi con #passione #esperienza…
Consigliato da Gianluca Pancaccini
-
Lettera o telegramma non fa differenza. Tre righe, scritte senza passione, senza rispetto per chi ama questa professione. Caduta di stile e il modo…
Lettera o telegramma non fa differenza. Tre righe, scritte senza passione, senza rispetto per chi ama questa professione. Caduta di stile e il modo…
Consigliato da Gianluca Pancaccini
-
Fin dagli albori di Internet in Italia, IOL ha accompagnato gli italiani nell’era del web. Nel 1996 nasce Arianna, primo motore di ricerca in lingua…
Fin dagli albori di Internet in Italia, IOL ha accompagnato gli italiani nell’era del web. Nel 1996 nasce Arianna, primo motore di ricerca in lingua…
Consigliato da Gianluca Pancaccini
Esperienza e formazione
-
Italiaonline
***
-
***** ******** * ******** ******* *** ****** (********** ***** : *** *.*.*.)
****** *** **********
-
** ***
*** ** **********
-
*********à ** ****
******** *******
-
Vedi l’esperienza completa di Gianluca
Vedi la qualifica, la durata dell’impiego e altro.
Piacere di rivederti
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
oppure
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Lingue
-
English
-
-
Italian
-
Altre attività di Gianluca
-
Thank you for massively inspiring humanity.
Thank you for massively inspiring humanity.
Consigliato da Gianluca Pancaccini
Visualizza il profilo completo di Gianluca
Sign in
Stay updated on your professional world
Cliccando su “Continua” per iscriverti o accedere, accetti il Contratto di licenza, l’Informativa sulla privacy e l’Informativa sui cookie di LinkedIn.
Nuovo utente di LinkedIn? Iscriviti ora
Altri profili simili
-
Diego Rizzi
MilanoCollegati -
Giuseppe Tomarchio
MilanoCollegati -
Roberto Modanesi
MilanoCollegati -
Roberto Giacchi
MilanoCollegati -
Marco Di Jorio
RomaCollegati -
Carlo Castelli Avolio
Las Rozas de MadridCollegati -
carlo castelli avolio
RomaCollegati -
Carlo Castelli Avolio
RomaCollegati -
Fausto Petri
RomaCollegati -
Pietro Castelli
RomaCollegati -
Ardiyanti Widya Paramita
Kota BogorCollegati -
Marco Costaguta
CileCollegati -
Michele Meglio
MilanoCollegati -
Roberto Lentini
San Gregorio di CataniaCollegati -
Ariela Piperno
ItaliaCollegati -
Gionata Matteucci
San Giuliano MilaneseCollegati -
Domenico Puleo
CataniaCollegati -
Salvatore Grasso
CataniaCollegati -
Marco Zangrilli
RomaCollegati -
Marco Fillo
MilanoCollegati
Esplora altri post
-
Jorge Rodríguez López
It is interesting how some ICT trends are affecting the different industries. In this article Gartner analyze 3 important #marketing #B2B trends in 2024 for software technology vendors. 🔄 The importance of reviews and feedback from customers. 🔆How to capitalize #AI-powered software investment. 🚫 Security and data protection in the top of mind of customers concerns. https://lnkd.in/gfZB9UqP.
10
1 commento -
Prageet Anamaya
Cyber security consulting services provide organizations with expertise and solutions to protect their digital assets from cyber threats. These services encompass a wide range of offerings, tailored to meet the specific needs of different businesses and industries. 𝟭. 𝗥𝗶𝘀𝗸 𝗔𝘀𝘀𝗲𝘀𝘀𝗺𝗲𝗻𝘁 𝗮𝗻𝗱 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 • Risk Assessment: Identifying vulnerabilities and potential threats to the organization's information systems. • Risk Management: Developing strategies to mitigate identified risks, including implementing controls and measures to protect assets. 𝟮. 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝘂𝗱𝗶𝘁𝘀 𝗮𝗻𝗱 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 • Security Audits: Conducting thorough examinations of an organization’s security posture to identify weaknesses. • Compliance Services: Ensuring that the organization meets industry standards and regulatory requirements (e.g., GDPR, HIPAA, PCI-DSS). 𝟯. 𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝗧𝗲𝘀𝘁𝗶𝗻𝗴 𝗮𝗻𝗱 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗔𝘀𝘀𝗲𝘀𝘀𝗺𝗲𝗻𝘁𝘀 • Penetration Testing: Simulating cyber attacks to identify and exploit vulnerabilities, providing insights into security weaknesses. • Vulnerability Assessment: Scanning and identifying vulnerabilities in the network, applications, and systems. 𝟰. 𝗜𝗻𝗰𝗶𝗱𝗲𝗻𝘁 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗲 𝗮𝗻𝗱 𝗙𝗼𝗿𝗲𝗻𝘀𝗶𝗰𝘀 • Incident Response: Developing and implementing response plans to effectively manage and mitigate the impact of security incidents. • Digital Forensics: Investigating and analyzing breaches to understand the cause and scope, and to gather evidence for legal proceedings if necessary. 𝟱. 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 𝗮𝗻𝗱 𝗜𝗺𝗽𝗹𝗲𝗺𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻 • Security Architecture Design: Designing robust security frameworks and architectures tailored to the organization’s needs. • Implementation Services: Deploying security solutions such as firewalls, intrusion detection systems, and encryption technologies. 𝟲. 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝘄𝗮𝗿𝗲𝗻𝗲𝘀𝘀 𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴 • Employee Training: Educating staff on best practices for cyber security to reduce the risk of human error leading to breaches. • Phishing Simulations: Conducting simulated phishing attacks to test and improve employee awareness and response. 𝟳. 𝗠𝗮𝗻𝗮𝗴𝗲𝗱 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀 • 24/7 Monitoring: Providing continuous monitoring of networks and systems for suspicious activities. • Managed Detection and Response (MDR): Offering advanced threat detection and response services to quickly address and neutralize threats. #cybersecurity #MDR #Securityawareness #Cyberdefence
2
-
Noah Yaghoubian
In today’s digital age, cyber threats are everywhere. Protect what matters most. Follow these useful steps: 👉 Use Strong, Unique Passwords 👉 Enable Two-Factor Authentication (2FA) 👉 Be Wary of Phishing Scams 👉 Use Secure Networks With Lazer IT Consultants, you can stay one step ahead of cybercriminals. Our state-of-the-art cybersecurity solutions are designed to protect your data, privacy, and peace of mind! Don't wait until it's too late. Protect your digital life today with Lazer IT Consultants. Book your discovery call today! https://lnkd.in/g4ic3z2c Lazer IT Consultants, Cybersecurity You Can Trust!
-
Dian Siswarini
We are proud to show our company’s Q1 performance with stellar results! We managed to achieve: - Total revenue of IDR 8.44 trillion, marking a 12% increase compared to the corresponding period last year (YoY). - EBITDA amounted to IDR 4.45 trillion, showcasing an increase of 24% YoY - EBITDA margin increasing by 5% YoY to 52.8% - And net profit after tax (PAT) reached IDR 547 billion, reflecting an impressive 168% YoY growth. Notably, the contribution of data and digital services revenue to total revenue reached 93%. And, with a quarter-on-quarter increase of quality customers, amounting 57.6 million, we have successfully boosted the usage of services and resulted the traffic increase by 3.2% from Q4 2023 and 18% compared to Q1 2023. As a result, we've seen an uptick in blended ARPU (average revenue per user) to IDR 44 thousand. XL Axiata are committed to achieve 2024 goals & will continuously to meticulously execute network development investments, with a focus on enhancing service quality and accommodating the sustained growth in network usage to be #JadiLebihBaik
629
22 commenti -
Rick Hamilton
In the Catalyst project, "Holistic Intelligence & GenAI to Accelerate 5G Monetization", at Infovista we are exploring innovative ways to empower CSPs through GenAI and 360º intelligence together with TM Forum and industry leaders. Following its presentation at #DTW24, I'd like to take a moment and thank all the incredible champions for their dedication and expertise, including: 🔹 Telecom Italia Information Technology (TI.IT) s.r.l. 🔹 Italgas 🔹 BT Group 🔹 Zain KSA 🔹 Econet Wireless Zimbabwe 🔹 TELUS This project aligns with our mission to drive progress and create value through cutting-edge technologies. By leveraging AI and GenAI, we're not only enhancing 5G monetization but also paving the way for a smarter, more connected future. Let' keep fostering collaboration across the telecom industry, as it allows us to effectively tackle challenges and expand our capacity for innovation. More information: https://lnkd.in/gfn_yYhJ #GenAI #Automation #5GMonetization
77
-
Senad Palislamovic
GRNet’s HellasQCI consortium is ensuring a safe future with #quantumcomputing Together with Nokia, HellasQCI is provding quantum-safe network technologies. See how together the two organizations are helping to ensure a #quantum-secure future for all. and learn more about #Quantum-safe networks here: https://lnkd.in/e4qTkAaF Tags: #Quantumcomputing, #Quantum-safe #Quantum-secure, #Opticalnetworks, #IP/MPLS #Cybersecurity
1
-
Kaneshwaran Govindasamy
The 3GPP Stage 1 Workshop on IMT-2030 Use Cases, held in May 2024, aimed to bring together stakeholders to define potential applications and requirements for the next generation of mobile communication technology, #6G. The GSMA, a global trade body for mobile network operators, likely presented a proposal outlining their perspective on 6G research and development (R&D). The GSMA proposal focused on outlining their vision for 6G R&D. This include: 🟥 Key R&D areas: Identifying critical areas for technological advancements in 6G. Examples include network performance enhancements like higher bandwidth, lower latency, and improved network slicing capabilities. 🟥 Collaboration framework: The GSMA have proposed a framework for collaboration between various stakeholders involved in 6G R&D, including network operators, equipment vendors, research institutions, and regulatory bodies. This would ensure coordinated efforts and avoid duplication. 🟥 Industry needs: The proposal have emphasized the importance of considering industry needs in 6G development. This involve collaborating with different industries to identify specific use cases and ensure the technology addresses their challenges and opportunities. I like Slide 12 - #5G has a long way to go! Five years since first 5G deployments, many operators have not deployed 5G at all. Beyond enhanced mobile broadband, new attributes of 5G, are in 5G Standalone. Only 47 operators have deployed 5G SA, concentrated in 19 countries Follow us on Kaneshwaran Govindasamy and Global 5G Evolution Click comment box. #Subscribe our #youtube channel Check out this week's #5G Conference on XCHANGING IDEAS #49
55
2 commenti -
Craig Lowe
Software Defined-Internet Access (SD-IA) optimizes Internet performance with secure, consistent, fast, and cost-effective routing algorithms. It empowers service providers to deliver feature-rich, managed Internet access and enterprise-grade connectivity. Unlike SD-WAN, SD-IA excels in same IP failover and bandwidth aggregation for resilient, high-speed connections. Key features include Link Bonding for enhanced speed and reliability, Session Proof Failover for uninterrupted data sessions, and Cloud Orchestrator for streamlined network management. SD-IA, a white label solution, amplifies providers’ services by leveraging existing infrastructure for next-gen internet offerings. Enhance connectivity with SD-IA and shift from selling links to offering a managed service. #SDIA #InternetAccess #Connectivity #ManagedService
13
-
WINGS ICT Solutions
Another successful live event of WINGS ICT Solutions took place on April 24th, 2024 in the context of the European co-funded project #5GSEAGUL “5G Seamless Roaming for the Greece-Bulgaria Cross-Border Corridor”. The Live Event took place in the border of Greece-Bulgaria in the area of Promachonas Customs. The attendees had the opportunity to experience for the first time in Europe, uninterrupted data and voice services during the handover between commercial mobile networks, that is implemented by the participating network operators COSMOTE and A1BG. Also, advanced connected automated use cases for transport and logistics were showcased by WINGS ICT Solutions through the utilization of #WINGSChariot platform for logistics. Following some years of work we are confident that our WINGSChariot product has achieved a twofold goal: (a) serve as a platform underpinning the transforming of the Industry 4.0 and Logistics, as well as the Energy and Water Sectors; (b) deliver vital use cases leading to human effort reduction, energy / cost efficiency, production speed, improved accuracy in quality checks, reduced energy/resource usage, improvements in packaging and recycling During the event, Dr. Kostas Tsagkaris, Co Founder - General Manager of WINGS ICT Solutions, welcomed all attendees and pointed out the importance of 5G SEAGUL and 5G Corridors and the impact for the economy and the society serving the area of automated transport and logistics. Dr. Andreas Georgakopoulos, Solution Architect in WINGS ICT Solutions, presented the overview of 5G SEAGUL project as well as the benefits of 5G Corridor to the WINGSChariot platform. A live demonstration of WINGSChariot through the usage of commercial mobile networks of the participating operators was showcased as well. #5GSEAGUL has a three-year duration starting from January 2023, is coordinated by WINGS ICT Solutions S.A. with partners COSMOTE and A1BG, mobile network operators from Greece and Bulgaria, respectively. 5G SEAGUL has received funding from the European Union’s Connecting Europe Facility - Digital (CEF-Digital) program supported and implemented by the European Health and Digital Executive Agency (HaDEA). @EU_HaDEA #CEFDigital Stay tuned for more !! #crossbordercorridor #5Gseamlessroaming #customs #Industry4.0 #logistics #transport #livedemonstration
54
1 commento -
Oleksandr Osmud
#Cyberattacks have become a common threat to organizations of all sizes. This comprehensive report delves into the reasons behind cyber attacks, highlighting both financial and non-financial objectives. Financial Motivations 💰 Financial Gain #Ransomware Attacks: #Cybercriminals deploy ransomware to encrypt an organization’s data, demanding a ransom payment for decryption. The average ransom payment increased to $233,817 in 2023, showcasing the lucrative nature of such attacks. #CreditCardTheft: Attacks targeting credit card information involve stealing card details to sell on the black market or use for fraudulent purchases. The global cost of credit card fraud is projected to reach $35.67 billion by 2023. Business Email Compromise (BEC): BEC attacks trick employees into transferring funds to fraudulent accounts. #BEC #EmailScams Intellectual Property Theft Corporate Espionage: Cyber attackers often target sensitive business information, such as trade secrets and proprietary data, to gain a competitive advantage. The theft of intellectual property can result in significant financial losses, estimated to cost U.S. businesses $600 billion annually. #CorporateEspionage #IPTheft Industrial Secrets: Attacks on manufacturing and industrial sectors aim to steal blueprints, product designs, and other critical data, jeopardizing the organization’s competitive edge. #IndustrialCyberSecurity Non-Financial Motivations 🌐 Political and Ideological Goals Hacktivism: Hacktivists launch cyber attacks to promote political or social agendas. This includes defacing websites, leaking sensitive information, and launching distributed denial-of-service (#DDoS) attacks to disrupt services. #Hacktivism #CyberProtests State-Sponsored Attacks: Nation-states conduct cyber espionage to gather intelligence, disrupt critical infrastructure, and influence political outcomes. For instance, the 2017 WannaCry ransomware attack is believed to have been perpetrated by North Korean hackers. #StateSponsoredAttacks #CyberWarfare Disruption and Chaos DDoS Attacks: Cybercriminals use DDoS attacks to overwhelm a network or website, causing service disruptions and financial losses. The average cost of a #DDoS attack on a business is estimated at $2.5 million. #DDoS #NetworkSecurity Malware and Viruses: Malicious software can cause widespread disruption, data loss, and operational downtime. The economic impact of malware attacks is immense, with global damages predicted to reach $10.5 trillion annually by 2025. #Malware #CyberThreats Personal Motives and Insider Threats Disgruntled Employees: Employees with malicious intent can sabotage systems, steal sensitive data, or leak confidential information. Insider threats account for 34% of all data breaches, according to Verizon’s 2022 Data Breach Investigations Report. #InsiderThreats At OMEX Cyber Security Agency, we specialize in providing comprehensive #cybersecurity solutions tailored to your organization’s unique needs.🌐🔒
-
Abdul Munhem YOUSSEF
Internet penetration rate worldwide April 2024, by region. As of April 2024, Northern Europe ranked first by the internet penetration rate, with over 97.4 percent of its population using the internet. Northern America followed, with 96.9 percent. Overall, the global average internet penetration rate was roughly 67.1 percent. The lowest internet penetration rate is in Eastern Africa arround 26.8 %. https://lnkd.in/eVkgpn86
-
Linda Riso
Our @VerizonBusiness CRO of Global Enterprise & Public Sector, Massimo Peselli had some interesting thoughts on innovation and connectivity following Wednesday's Innovation Sessions event at Radio City Music Hall. What is your take on technology's future impact on the entertainment industry?
3