Cybersecurity
As a way to keep our productive plants and internal processes secured and reliable, we pursue digital innovation through a Security by Design approach under continuous process of updating to set guidelines and Cybersecurity solutions ever since the inception of a new project.
Our strategy for cybersecurity and data protection
As a way to keep our productive plants and internal processes secured and reliable, we pursue digital innovation through a Security by Design approach under continuous process of updating to set guidelines and Cybersecurity solutions ever since the inception of a new project. While being fully aware that systems and sensible information are key assets, we constantly asset our strategy on cybersecurity and data protection to safeguard employees, clients, suppliers, and the whole value chain. The challenge we continually face is obviously due to today’s ever-evolving context of cyber threats imposing ongoing revision in the approach to data security and systems security. We work closely with regulatory institutions and authorities in every country we operate in to guarantee ongoing alignment with national norms and local regulations.
Security and systems’ vulnerability assessments are regularly performed on products and business processes impacting on users data, both internally and through third-party assessments. Being fully aware of the crucial role of people in cybercrime prevention, we provide periodically training sessions and we regularly verify internal population progress via tests and simulations. Moreover, we guarantee professional training sessions to our technical staff both on IT and industrial OT systems updates.
The following list synthetizes all processes and organizational structures involved in cyber security and data protection:
- Cyber risk assessment in industrial assets and digital service;
- Cyber security specific processes and safeguards in compliance with international standard and certificate and best practices (ISO/IEC 27001, NIST CSF, IEC 62443, OWASP), as well as sector-specific regulations;
- Use of Security by design frameworks for new solutions development;
- Business continuity and information security management systems;
- Assessment of cyber stability for our third parties;
- Public-private partnership;
- Awareness, Training, Ongoing Training for employees and suppliers;
- Cyber threats detection for suppliers and internal collaboration;
- Continuous evaluation of the safety of services and provided systems;
- Processes and instruments for security in application development;
- Monitoring and incident aid service activated 24/7.
ISO 27001 certification for Information Security
In 2025, we obtained the ISO/IEC 27001 certification, the international standard for information security management systems. Its implementation demonstrates our Group’s ongoing commitment to developing information security in line with our ethical principles, ensuring a safer business environment in support of our customers.
Corporate security policy
Our Information and Communication Technology division includes a cyber security unit reporting to our Chief Information Officer (CIO) guided by the Group’s Chief Information Security Officer (CISO). Priorities of intervention are identified considering ongoing analyses of risks to which our organization is exposed, principles definining our lines of action are set in conformity with our organization’s policy as well as the values by which priorities of intervention are fully in tune with, and binding rules along with best practices.