Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
970x20 Itcentric

Author: Stefano Gazzella

Stefano Gazzella

Privacy Officer and Data Protection Officer, serves as Of Counsel for Area Legale. Specializes in personal data protection and, in managing information security within organizations, pays particular attention to issues related to social engineering. Head of the scientific committee of Assoinfluencer, coordinates research, publication, and outreach activities.
As a freelance journalist, writes about topics related to fourth-generation rights, new technologies, and information security.

Profilo LinkedIn
Areas of Expertise Privacy, GDPR, Data Protection Officer, Rights, Legal Affairs, Meme

Stefano Gazzella is a professional in personal data protection and information security, with a solid legal background and a pragmatic approach focused on gaining a deep understanding of problems before defining solutions. He holds a degree in Law and a postgraduate diploma from the School of Specialization for Legal Professions (SSPL). Over the course of his career, he has expanded his professional profile by delving into information security and management systems, integrating legal and technical expertise in a balanced and practical manner.

Positions and Roles

  • Privacy Officer and Data Protection Officer (DPO)
    Supports public and private organizations in managing personal data protection, interpreting privacy regulations, and adopting sustainable and proportionate governance models.
  • Trainer and Instructor in Data Protection and Information Security
    Designs and delivers tailored training programs for organizations and diverse audiences, with a strong focus on human factors and risks related to social engineering.
  • Journalist (Freelance Contributor)
    Engages in reporting and in-depth analysis on fourth-generation rights, emerging technologies, and information security.

Core Competencies

  • Data Protection & Privacy Governance: practical application of the GDPR and accountability principles within organizations.
  • Information Security & Management Systems: integration of information security, organizational processes, and regulatory compliance.
  • Social Engineering and Human Factors: analysis of behaviors and risk dynamics related to human interactions.
  • Experiential Training: design of effective, practical, and measurable learning paths.

Initiatives and Contributions

  • Advanced Training: development of training programs based on simulations, role-playing, and gamification techniques, including LARP (Live Action Role Playing) activities, drawing on over twenty years of experience in this field.
  • Editorial Activity: production of journalistic content and critical analysis on privacy, technology, and security, with a preference for depth over sensationalism.
  • Outreach and Awareness: promotion of a data protection culture grounded in awareness and individual and organizational responsibility.

Professional Vision

He believes in an approach to privacy and information security based on listening, contextual understanding, and critical thinking. He maintains that structured reasoning, lateral analysis, and the ability to interpret the complexity of contemporary technological and social phenomena should be preferred over click-driven logic and instant news.

Web resources

Gdpr Ready
Numero di articoli trovati: 34

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses...

Will this latest article “against” ChatControl be absolutely useless?

We had already discussed the proposed "ChatControl" regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels...

ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed

Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading brands, including Gucci, Balenciaga, and Alexander McQueen. ShinyHunters, the same...

Regulating out-of-office work: a best practice for organizations and beyond.

When talking about information security, we must first take a breath and realize that we need to dive deeper than just computer systems and directly expressed information. It concerns all...

A bug in Google Drive allows access to other people’s files on shared desktops.

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sync files between local and cloud folders....

Cyberstorage: Italian IT Managers’ Response to Ransomware

Cyberstorage: Italian IT managers' response to increasingly sophisticated ransomware. The landscape has changed in recent years: more aggressive ransomware, data exfiltration before encryption, service interruptions due to physical events and...

Italian call center companies leave all audio recordings online

Italian companies that use online telephony platforms (VoIP) based on open-source software such as Asterisk and Vicidial rely on these systems to contact Italian citizens on a daily basis, offering...

The European Union General Court “upholds” the transfer of personal data to the United States. For now

April 1st wasn't an April Fool's joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on the appeal filed for the...

CISO vs. DPO: Collaboration or Cold War in Business?

Managing security is far from simple, it's not something that can be standardized, and above all, it can't be achieved through "solutions." It requires planning, analysis, and the ability to...

New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!

The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists and clients. On August 30, a message appeared on the...