Smells like IoT spirit
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
MIT Technology Review
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
Security Summit 2026
Milano
Mattia Epifani
Dark Reading
Chiara Bertolotti, Mattia Epifani, Giovanni Lagorio
ItaSec 2026
Cagliari
Mattia Epifani
IISFA Forum 2025
Roma
Mattia Epifani
Rest in Pixel (Speck&Tech)
Trento
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Mattia Epifani
Dark Reading
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
Security Summit 2026
Milano
Mattia Epifani
Dark Reading
Chiara Bertolotti, Mattia Epifani, Giovanni Lagorio
ItaSec 2026
Cagliari
Mattia Epifani
IISFA Forum 2025
Roma
Mattia Epifani
Rest in Pixel (Speck&Tech)
Trento
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Mattia Epifani
Forum ICT Security 2016
Roma
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
Security Summit 2026
Milano
Mattia Epifani
Dark Reading
Chiara Bertolotti, Mattia Epifani, Giovanni Lagorio
ItaSec 2026
Cagliari
Mattia Epifani
IISFA Forum 2025
Roma
Mattia Epifani
Rest in Pixel (Speck&Tech)
Trento
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Mattia Epifani
2024
Radio 24
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
Security Summit 2026
Milano
Mattia Epifani
Dark Reading
Chiara Bertolotti, Mattia Epifani, Giovanni Lagorio
ItaSec 2026
Cagliari
Mattia Epifani
IISFA Forum 2025
Roma
Mattia Epifani
Rest in Pixel (Speck&Tech)
Trento
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Mattia Epifani
2024
Radio 24
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
Security Summit 2026
Milano
Mattia Epifani
Dark Reading
Chiara Bertolotti, Mattia Epifani, Giovanni Lagorio
ItaSec 2026
Cagliari
Mattia Epifani
IISFA Forum 2025
Roma
Mattia Epifani
Rest in Pixel (Speck&Tech)
Trento
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Mattia Epifani
ICT Security Magazine
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
Security Summit 2026
Milano
Mattia Epifani
Dark Reading
Chiara Bertolotti, Mattia Epifani, Giovanni Lagorio
ItaSec 2026
Cagliari
Mattia Epifani
IISFA Forum 2025
Roma
Mattia Epifani
Rest in Pixel (Speck&Tech)
Trento
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Mattia Epifani
Cybercrime Conference 2014
Roma
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
Security Summit 2026
Milano
Mattia Epifani
Dark Reading
Chiara Bertolotti, Mattia Epifani, Giovanni Lagorio
ItaSec 2026
Cagliari
Mattia Epifani
IISFA Forum 2025
Roma
Mattia Epifani
Rest in Pixel (Speck&Tech)
Trento
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.
Mattia Epifani
Forensic Focus
Mattia Epifani
RSA Conference 2026
San Francisco
Mattia Epifani
Security Summit 2026
Milano
Mattia Epifani
Dark Reading
Chiara Bertolotti, Mattia Epifani, Giovanni Lagorio
ItaSec 2026
Cagliari
Mattia Epifani
IISFA Forum 2025
Roma
Mattia Epifani
Rest in Pixel (Speck&Tech)
Trento
Identification, storage, analysis and documentation of the data extracted from devices (computer, server, smartphone, network, cloud, social network) in order to present digital evidence in civil and criminal proceedings.
Implementation of rules and system policies suited to the reconstruction of the facts in case of an accident in order to optimize the process for a successful digital forensics analysis
Incident response is an organized approach to addressing and managing the aftermath of a security breach or attack.
Implementation of rules and policies specific to mobile devices connected to the corporate network, in order to prevent or mitigate any incidents. Security analysis of mobile enterprise applications.