The Italian Armed Forces Officers’ Club recently hosted the fourth edition of the Innovation Cybersecurity Summit on April 16. Organized by the National Association of Young Innovators (ANGI) and supported by various institutions, including the Office of European Parliament in Italy, this event is considered a crucial gathering in the field of cyber security and defense.
The summit’s focus was on “Perspectives and applications for new assets between cybersecurity, energy defense, and aerospace,” bringing together industry leaders and experts for a day of intense debates. The discussions revolved around the challenges and opportunities of protecting critical sites in the digital age, with Minister Guido Crosetto and Minister Adolfo Urso emphasizing the importance of technological innovation and European Digital Innovation Hubs in strengthening cyber resilience.
ANGI, a leading innovation association in Italy, led by Gabriele Ferrieri, organized the event. The summit was supported by several organizations, including Women4Cyber and various other entities. This year’s theme aimed to address the evolving landscape of cyber threats.
Minister Crosetto highlighted the dualism brought about by technological innovation, stressing the importance of preparedness when utilizing new technologies. Meanwhile, Minister Urso underscored the central role played by European Digital Innovation Poles and specialized competence centers in disseminating knowledge on cyber resilience. President Minardo also stressed the significance of training personnel in cyber defense during his speech at the Defense Commission of Chamber.
Overall, this summit served as an essential platform for dialogue and debate on public safety and investments in enhancing Italy’s ecosystem. Key representatives from various sectors participated, including institutions, companies, academic figures, women4cyber organizations etc., showing support to ANGI for organizing such an important gathering.
The delivery of ANGI’s Manifesto aimed to contribute to protecting critical infrastructure while defending against cyber threats within IT environments.
In conclusion