Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
UtiliaCS 970x120

Author: Marcello Filacchioni

Marcello Filacchioni

ICT CISO and Cyber Security Manager with over twenty years of experience in the public and private sectors, he has led IT security projects for leading companies. Specialising in risk management, governance and digital transformation, he has collaborated with international vendors and innovative start-ups, contributing to the introduction of advanced cybersecurity solutions. He holds numerous certifications (CISM, CRISC, CISA, PMP, ITIL, CEH, Cisco, Microsoft, VMware) and teaches pro bono in the field of cyber security, combining his passion for technological innovation with his commitment to spreading the culture of digital security.

Profilo LinkedIn
Areas of Expertise Cyber Security Strategy & Governance, Vulnerability Management & Security Operations. 

Current Positions

  • CISO & Head of Cybersecurity – BSG: Responsible for defining security strategy, risk management, and compliance; leading cyber operations; and supporting the business through an integrated approach that combines governance, technology, and people.
  • Pro Bono Lecturer and Public Educator

Core Competencies

  • Cyber Security Governance & Strategy: roadmap definition, security models, GRC, CISO advisory
  • Risk Management & Compliance: ISO/IEC 27001, NIS2, DORA, GDPR, NIST; audits and remediation
  • Certifications: CISM, CRISC, CISA, PMP, ITIL, CEH, Cisco, Microsoft, VMware
  • Security Operations: SOC, incident response, threat detection, vulnerability and patch management
  • Leadership & People Management: multidisciplinary team leadership, mentoring, skills development
  • Business & Stakeholder Management: pre-sales, RFPs, budgeting, KPIs, C-level engagement

Initiatives and Contributions

  • Red Hot Cyber: Author of articles published on Red Hot Cyber.
  • Collaborations: Strategic, executive, and operational support to private companies, public administrations, and startups in the design, implementation, and governance of integrated cybersecurity and risk management programs. Activities include security posture assessment, cyber and operational risk management, compliance with international regulations and standards (e.g., ISO/IEC 27001, NIS2, NIST Framework, DORA), governance model design, protection of critical assets and sensitive data, strengthening organizational resilience, coordination with internal and external stakeholders, and support for executive decision-making and oversight bodies, including in digital transformation and technological innovation contexts.

Professional Vision

Cybersecurity is a strategic business enabler and a core component of modern organizational governance. His vision as a CISO is centered on embedding cybersecurity into corporate decision-making, transforming cyber risk from a purely technical concern into a driver of resilience, operational continuity, and sustainable growth. He promotes a structured, measurable, and sustainable approach to risk management based on effective governance models, compliance with international standards and regulations, protection of critical assets, and the conscious adoption of technological innovation. In his model, the CISO’s role is to guide organizations in building secure and resilient digital ecosystems, while fostering a strong security culture, stakeholder dialogue, and a long-term vision capable of anticipating emerging threats and supporting responsible digital transformation.

Web Resources

Numero di articoli trovati: 24

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform cloud certification into a tool of sovereignty or limit it...

Latin America under digital siege: the numbers that worry experts

In recent months, Latin America and the Caribbean have become the most targeted region by cyberattacks globally, surpassing Africa in terms of overall risk. This data emerges from the latest...

NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by...

BlueNoroff: The Hacker Group Revolutionizing Cybercrime

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by...

CVE-2025-55182 React Server Components Vulnerability Exploited

A recent report from the Google Threat Intelligence Group (GTIG) illustrates the chaotic results of this information dissemination, highlighting how savvy adversaries have already gained a foothold within targeted networks....

Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks

What we wrote in the article " Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin " on Red Hot Cyber on July 23rd...

Digital Crime Among Teenagers: Temporary Involvement

Dutch authorities have published data showing that adolescents' involvement in cybercrime is usually temporary. An analysis prepared by the House of Representatives indicates that early interest in hacking often fades...

Calendar Subscriptions: A Hidden Danger in Your Digital Life

Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can become a real attack channel....

CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers

In recent months, the insider problem has become increasingly important for large companies , and one recent episode involved CrowdStrike. The cybersecurity firm has in fact removed an employee believed...

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...