Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
HackTheBox 970x120 1

Author: Marcello Filacchioni

Marcello Filacchioni

ICT CISO and Cyber Security Manager with over twenty years of experience in the public and private sectors, he has led IT security projects for leading companies. Specialising in risk management, governance and digital transformation, he has collaborated with international vendors and innovative start-ups, contributing to the introduction of advanced cybersecurity solutions. He holds numerous certifications (CISM, CRISC, CISA, PMP, ITIL, CEH, Cisco, Microsoft, VMware) and teaches pro bono in the field of cyber security, combining his passion for technological innovation with his commitment to spreading the culture of digital security.

Profilo LinkedIn
Areas of Expertise Cyber Security Strategy & Governance, Vulnerability Management & Security Operations. 

Current Positions

  • CISO & Head of Cybersecurity – BSG: Responsible for defining security strategy, risk management, and compliance; leading cyber operations; and supporting the business through an integrated approach that combines governance, technology, and people.
  • Pro Bono Lecturer and Public Educator

Core Competencies

  • Cyber Security Governance & Strategy: roadmap definition, security models, GRC, CISO advisory
  • Risk Management & Compliance: ISO/IEC 27001, NIS2, DORA, GDPR, NIST; audits and remediation
  • Certifications: CISM, CRISC, CISA, PMP, ITIL, CEH, Cisco, Microsoft, VMware
  • Security Operations: SOC, incident response, threat detection, vulnerability and patch management
  • Leadership & People Management: multidisciplinary team leadership, mentoring, skills development
  • Business & Stakeholder Management: pre-sales, RFPs, budgeting, KPIs, C-level engagement

Initiatives and Contributions

  • Red Hot Cyber: Author of articles published on Red Hot Cyber.
  • Collaborations: Strategic, executive, and operational support to private companies, public administrations, and startups in the design, implementation, and governance of integrated cybersecurity and risk management programs. Activities include security posture assessment, cyber and operational risk management, compliance with international regulations and standards (e.g., ISO/IEC 27001, NIS2, NIST Framework, DORA), governance model design, protection of critical assets and sensitive data, strengthening organizational resilience, coordination with internal and external stakeholders, and support for executive decision-making and oversight bodies, including in digital transformation and technological innovation contexts.

Professional Vision

Cybersecurity is a strategic business enabler and a core component of modern organizational governance. His vision as a CISO is centered on embedding cybersecurity into corporate decision-making, transforming cyber risk from a purely technical concern into a driver of resilience, operational continuity, and sustainable growth. He promotes a structured, measurable, and sustainable approach to risk management based on effective governance models, compliance with international standards and regulations, protection of critical assets, and the conscious adoption of technological innovation. In his model, the CISO’s role is to guide organizations in building secure and resilient digital ecosystems, while fostering a strong security culture, stakeholder dialogue, and a long-term vision capable of anticipating emerging threats and supporting responsible digital transformation.

Web Resources

Numero di articoli trovati: 24

Do you have Teams? You’re a Target! The Microsoft Platform is Targeted by States and Criminals

The Microsoft Teams collaboration platform has become a popular target for attackers, as its widespread adoption has made it a high-value target. Messaging, calling, and screen-sharing features are being exploited...

11 death sentences for online fraud. China deals a severe blow to cybercrime

Amid China's long battle against cross-border fraud, authorities have issued a verdict in one of the most high-profile cases in recent years. It concerns a large-scale criminal network operating in...

Beyond the Screen: The Postal Police Event for a Healthy Life Beyond Social Media

The Red Hot Cyber Community had the opportunity to participate in "Beyond the Screen," the Postal Police's important initiative for young people on October 2nd , with the aim of...

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...

A manifesto after 72 hours! Will cybercriminals really retreat?

Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collective statement, published on BreachForums, is the most explicit message from the...

Attention seniors! Ruthless hacker scam: Criminal hackers steal your life savings.

According to the New York State Attorney General's Office, the primary target of criminal hackers is the elderly and those close to that age. The criminal scenario usually begins with...

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence

In today's cybersecurity landscape, one of the most worrying trends is the abuse of legitimate messaging platforms for malicious purposes. Telegram in particular is increasingly being exploited by criminal groups...

New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals

In recent years, a particularly insidious form of phishing has become widespread: Quishing or QRishing, a strategy based on the use of QR codes containing malicious links that, once scanned,...

Netshacker: Retrogaming e Hacking Reale su Commodore 64

In the Commodore 64 gaming landscape, Netshacker stands out as a project that challenges the conventions of modern gaming, taking gamers back to the roots of 1980s home computing. This...

Transparency and Resilience: NIST Publishes Meta-Framework to Change Supply Chain Management

The National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), has introduced a decentralized data approach to help manufacturers and critical infrastructure sectors protect...