<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[NIS 2 e cybersecurity: perché il CdA non può più ignorare il CISO]]></title><description><![CDATA[<p>NIS 2 e cybersecurity: perché il CdA non può più ignorare il CISO</p><p>📌 Link all'articolo : <a href="https://www.redhotcyber.com/post/nis-2-e-cybersecurity-perche-il-cda-non-puo-piu-ignorare-il-ciso/" rel="nofollow noopener noreferrer"><span>https://www.</span><span>redhotcyber.com/post/nis-2-e-c</span><span>ybersecurity-perche-il-cda-non-puo-piu-ignorare-il-ciso/</span></a></p><p>A cura di Paolo Galdieri</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/news" rel="tag">#<span>news</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/governancedellasicurezza" rel="tag">#<span>governancedellasicurezza</span></a> <a href="https://mastodon.bida.im/tags/ciso" rel="tag">#<span>ciso</span></a> <a href="https://mastodon.bida.im/tags/cda" rel="tag">#<span>cda</span></a> <a href="https://mastodon.bida.im/tags/sicurezzainformatica" rel="tag">#<span>sicurezzainformatica</span></a></p>]]></description><link>https://forum.pierobosio.it/topic/2a1232eb-aafa-4a3c-850b-1e6e87f62c6b/nis-2-e-cybersecurity-perché-il-cda-non-può-più-ignorare-il-ciso</link><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 14:04:40 GMT</lastBuildDate><atom:link href="https://forum.pierobosio.it/topic/2a1232eb-aafa-4a3c-850b-1e6e87f62c6b.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 21 Apr 2026 05:57:47 GMT</pubDate><ttl>60</ttl></channel></rss>