{"id":87815,"date":"2023-01-11T18:29:09","date_gmt":"2023-01-11T17:29:09","guid":{"rendered":"https:\/\/www.gpi.it\/backup\/?page_id=87815"},"modified":"2023-04-17T12:23:47","modified_gmt":"2023-04-17T10:23:47","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/www.gpigroup.com\/en\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1553766882955{padding-bottom: 30px !important;}&#8221; el_class=&#8221;text-row my-0&#8243;][vc_column][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\n<div class=\"row asa-title\">\n<div class=\"col-12 col-md-6\">\n<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/05\/asa_Ict.jpg\" class=\"asa-image asa-image-mobile rounded-circle d-md-none d-inline\" alt=\"GPI ICT\" srcset=\"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/05\/asa_Ict.jpg 1024w, https:\/\/www.gpigroup.com\/app\/uploads\/2019\/05\/asa_Ict-300x169.jpg 300w, https:\/\/www.gpigroup.com\/app\/uploads\/2019\/05\/asa_Ict-768x432.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n<div class=\"gpi_signature_title_tech\">\n<h1><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Gestione Risorse Umane&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:641,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;12&quot;:0}\">Cyber Security<\/span><\/h1>\n<\/div>\n<\/div>\n<div class=\"col-12 col-md-6\">\n<div class=\"asa-symbol\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3168 size-large alignnone\" role=\"img\" src=\"https:\/\/www.gpigroup.com\/app\/uploads\/\/2019\/03\/Ict-1.svg\" alt=\"Ict\" width=\"24\" height=\"24\" \/> IT SECURITY AND SERVICES<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;bl-body&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/05\/asa_Ict.jpg\" class=\"asa-image rounded-circle d-md-inline d-none\" alt=\"GPI ICT\" srcset=\"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/05\/asa_Ict.jpg 1024w, https:\/\/www.gpigroup.com\/app\/uploads\/2019\/05\/asa_Ict-300x169.jpg 300w, https:\/\/www.gpigroup.com\/app\/uploads\/2019\/05\/asa_Ict-768x432.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text el_class=&#8221;entice&#8221;]<\/p>\n<h2>A holistic approach to digital risk: analysis, consulting and systems for cyber security and defence.<\/h2>\n<p>[\/vc_column_text][vc_column_text]Cybersecurity is a key strategic business component, an indispensable activity that affects all management and processes of an organisation.<\/p>\n<p>Gpi Cyberdefence fully supports, at strategic and operational levels, the cyber security of public and private organisations.[\/vc_column_text][vc_column_text]<\/p>\n<h3>Our work has a single purpose: to protect your organisation by safeguarding its economic assets, industrial property, reputation and business continuity.<\/h3>\n<p>We help you to:<\/p>\n<ul>\n<li>make information systems and operational structure resilient to attacks,<\/li>\n<li>we train staff so that they do not fall victim to the traps set by cybercriminals,<\/li>\n<li>we make your company compliant with current regulations and industry standards.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h3>Specialisation and multidisciplinarity<\/h3>\n<p>[\/vc_column_text][vc_column_text]We operate as a MSSP &#8211; Managed Security Service Provider, and thanks to sophisticated analysis systems and predictive algorithms, we detect and prevent intrusions and information theft.<\/p>\n<p>To safeguard our customers\u2019 business, we have created specialised divisions, each of which has specific staff, skills and experience.<\/p>\n<p>The operators of Cyberdefence 1, our state-of-the-art Security Operation Centre, are operational and at your disposal 24\/7.[\/vc_column_text][vc_column_text]<\/p>\n<h3>4 AREAS OF ACTIVITY<\/h3>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<ul>\n<li><strong>Cyberdefence Consulting<\/strong>: highly integrated multidisciplinary consultancy<\/li>\n<li><strong>Cyberdefence Management<\/strong>: design and management of cybersecurity activities<\/li>\n<li><strong>Cyberdefence Operation<\/strong>: Operational and technical cybersecurity services<\/li>\n<li><strong>School of Cybersecurity<\/strong>: training for managers and staff<\/li>\n<\/ul>\n<p>IT security is no longer an option, but an unavoidable necessity.<br \/>\nFind out now what we can do for you!<\/p>\n<p><a href=\"mailto:info@gpicyberdefence.com\">info@gpicyberdefence.com<\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n[vc_row full_width=\"stretch_row\" el_class=\"vision mb-0 gpi-orange-bg\"][vc_column offset=\"vc_col-lg-3 vc_col-xs-12\"][vc_column_text]\n<h4>Contact our sales team<\/h4>[\/vc_column_text][\/vc_column][vc_column width=\"3\/4\" offset=\"vc_col-lg-offset-0 vc_col-sm-offset-3 vc_col-xs-12\"][vc_raw_html]JTVCY29udGFjdC1mb3JtLTclMjBpZCUzRCUyMjY3MTIlMjIlMjB0aXRsZSUzRCUyMkJ1c2luZXNzJTIwbGluZSUyMGZvcm0lMjIlMjBodG1sX2lkJTNEJTIyZ3BpLWNvbnRhY3QtZm9ybSUyMiU1RA==[\/vc_raw_html][\/vc_column][\/vc_row]<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1553766882955{padding-bottom: 30px !important;}&#8221; el_class=&#8221;text-row my-0&#8243;][vc_column][vc_row_inner][vc_column_inner][vc_column_text] Cyber Security IT SECURITY AND SERVICES [\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_class=&#8221;bl-body&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_column_text][\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text el_class=&#8221;entice&#8221;] A holistic approach to digital risk: analysis, consulting and systems for cyber security and defence. [\/vc_column_text][vc_column_text]Cybersecurity is a key strategic business component, an indispensable activity that affects all management and processes of an organisation. Gpi Cyberdefence fully<\/p>\n","protected":false},"author":7,"featured_media":5154,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-87815","page","type-page","status-publish","has-post-thumbnail","hentry","client_type-clinical-administrative-private-healthcare","client_type-clinical-administrative-public-health","client_type-farmacie-territoriali-en","client_type-pubblica-amministrazione-en","client_type-retail-en","client_type-sanita-privata-clinico-amministrativa-en","client_type-sanita-pubblica-clinico-amministrativa-en","page_category-line-of-business","section-offerta","business_line-ict"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security | GPI<\/title>\n<meta name=\"description\" content=\"A holistic approach to digital risk: analysis, consulting and systems for cyber security and defence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gpigroup.com\/en\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security | GPI\" \/>\n<meta property=\"og:description\" content=\"A holistic approach to digital risk: analysis, consulting and systems for cyber security and defence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gpigroup.com\/en\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"GPI\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GruppoGPI\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-17T10:23:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/04\/og-link-preview-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gpigroup.com\/en\/cyber-security\/\",\"url\":\"https:\/\/www.gpigroup.com\/en\/cyber-security\/\",\"name\":\"Cyber Security | GPI\",\"isPartOf\":{\"@id\":\"https:\/\/www.gpigroup.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gpigroup.com\/en\/cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gpigroup.com\/en\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/04\/og-link-preview-1.png\",\"datePublished\":\"2023-01-11T17:29:09+00:00\",\"dateModified\":\"2023-04-17T10:23:47+00:00\",\"description\":\"A holistic approach to digital risk: analysis, consulting and systems for cyber security and defence.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gpigroup.com\/en\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-EN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gpigroup.com\/en\/cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-EN\",\"@id\":\"https:\/\/www.gpigroup.com\/en\/cyber-security\/#primaryimage\",\"url\":\"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/04\/og-link-preview-1.png\",\"contentUrl\":\"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/04\/og-link-preview-1.png\",\"width\":1366,\"height\":768,\"caption\":\"GPI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gpigroup.com\/en\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gpigroup.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gpigroup.com\/en\/#website\",\"url\":\"https:\/\/www.gpigroup.com\/en\/\",\"name\":\"GPI\",\"description\":\"The Healthcare Partner\",\"publisher\":{\"@id\":\"https:\/\/www.gpigroup.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gpigroup.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-EN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.gpigroup.com\/en\/#organization\",\"name\":\"GPI S.p.A.\",\"url\":\"https:\/\/www.gpigroup.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-EN\",\"@id\":\"https:\/\/www.gpigroup.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.gpigroup.com\/app\/uploads\/2023\/03\/logo-GPI-2019-1.jpg\",\"contentUrl\":\"https:\/\/www.gpigroup.com\/app\/uploads\/2023\/03\/logo-GPI-2019-1.jpg\",\"width\":1946,\"height\":1945,\"caption\":\"GPI S.p.A.\"},\"image\":{\"@id\":\"https:\/\/www.gpigroup.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/GruppoGPI\/\",\"https:\/\/www.linkedin.com\/company\/gpi-spa\",\"http:\/\/www.youtube.com\/user\/GruppoGPI\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security | GPI","description":"A holistic approach to digital risk: analysis, consulting and systems for cyber security and defence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gpigroup.com\/en\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security | GPI","og_description":"A holistic approach to digital risk: analysis, consulting and systems for cyber security and defence.","og_url":"https:\/\/www.gpigroup.com\/en\/cyber-security\/","og_site_name":"GPI","article_publisher":"https:\/\/www.facebook.com\/GruppoGPI\/","article_modified_time":"2023-04-17T10:23:47+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/04\/og-link-preview-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gpigroup.com\/en\/cyber-security\/","url":"https:\/\/www.gpigroup.com\/en\/cyber-security\/","name":"Cyber Security | GPI","isPartOf":{"@id":"https:\/\/www.gpigroup.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gpigroup.com\/en\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.gpigroup.com\/en\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/04\/og-link-preview-1.png","datePublished":"2023-01-11T17:29:09+00:00","dateModified":"2023-04-17T10:23:47+00:00","description":"A holistic approach to digital risk: analysis, consulting and systems for cyber security and defence.","breadcrumb":{"@id":"https:\/\/www.gpigroup.com\/en\/cyber-security\/#breadcrumb"},"inLanguage":"en-EN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gpigroup.com\/en\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-EN","@id":"https:\/\/www.gpigroup.com\/en\/cyber-security\/#primaryimage","url":"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/04\/og-link-preview-1.png","contentUrl":"https:\/\/www.gpigroup.com\/app\/uploads\/2019\/04\/og-link-preview-1.png","width":1366,"height":768,"caption":"GPI"},{"@type":"BreadcrumbList","@id":"https:\/\/www.gpigroup.com\/en\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gpigroup.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.gpigroup.com\/en\/#website","url":"https:\/\/www.gpigroup.com\/en\/","name":"GPI","description":"The Healthcare Partner","publisher":{"@id":"https:\/\/www.gpigroup.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gpigroup.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-EN"},{"@type":"Organization","@id":"https:\/\/www.gpigroup.com\/en\/#organization","name":"GPI S.p.A.","url":"https:\/\/www.gpigroup.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-EN","@id":"https:\/\/www.gpigroup.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.gpigroup.com\/app\/uploads\/2023\/03\/logo-GPI-2019-1.jpg","contentUrl":"https:\/\/www.gpigroup.com\/app\/uploads\/2023\/03\/logo-GPI-2019-1.jpg","width":1946,"height":1945,"caption":"GPI S.p.A."},"image":{"@id":"https:\/\/www.gpigroup.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GruppoGPI\/","https:\/\/www.linkedin.com\/company\/gpi-spa","http:\/\/www.youtube.com\/user\/GruppoGPI"]}]}},"_links":{"self":[{"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/pages\/87815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/comments?post=87815"}],"version-history":[{"count":9,"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/pages\/87815\/revisions"}],"predecessor-version":[{"id":101352,"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/pages\/87815\/revisions\/101352"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/media\/5154"}],"wp:attachment":[{"href":"https:\/\/www.gpigroup.com\/en\/wp-json\/wp\/v2\/media?parent=87815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}