<div data-block="true" data-editor="ck0da" data-offset-key="82f06-0-0">
<div data-offset-key="82f06-0-0">
<div data-block="true" data-editor="f0s5r" data-offset-key="fb8hi-0-0">
<div data-offset-key="fb8hi-0-0">
<div data-block="true" data-editor="a50re" data-offset-key="768rc-0-0">
<div data-offset-key="768rc-0-0">
<div data-block="true" data-editor="7inki" data-offset-key="dgtc6-0-0">
<div data-offset-key="dgtc6-0-0"><span>Oggi parliamo con un hacker di <strong>cyber sicurezza</strong>. Sì, un hacker. E no, non é come te lo immagini. </span></div>
<div data-offset-key="dgtc6-0-0"><span>Lui é <strong>Cristiano Regni</strong>, hacker di professione ed esperto di Cyber Sicurezza. </span></div>
<div data-offset-key="dgtc6-0-0"><span>Andiamo a scoprire come funziona un attacco hacker, cosa rischiamo noi ogni giorno e perché gli stereotipi sugli hacker sono falsi!</span></div>
<ul>
<li data-offset-key="dgtc6-0-0"><span data-offset-key="cjj51-0-0"><a href="http://www.tedxperugia.com">www.tedxperugia.com</a></span></li>
<li data-offset-key="dgtc6-0-0"><strong>follow us</strong><span data-offset-key="elbcr-0-1"> on social: @tedxperugia</span></li>
<li data-offset-key="dgtc6-0-0"><strong>graphics</strong><span data-offset-key="76gnm-0-1"> by </span><em>Paolo Ciarfuglia</em></li>
<li data-offset-key="dgtc6-0-0"><strong>music</strong><span data-offset-key="76gnm-0-4"> by</span><em> Riccardo Lucidi</em></li>
<li data-offset-key="dgtc6-0-0"><strong>produced</strong><span data-offset-key="14uor-0-1"> by</span><em> Alessandro Vagni</em></li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
Podchaser is the ultimate destination for podcast data, search, and discovery. Learn More