
Massimiliano Graziani
Master Consultant in the following activities
- Security Assessment
- Incident Handling
- Digital Forensics (DEFR Manager & DES of ISO27037)
- Fraud Management (prevention, investigation, accountability)
- Vulnerability Assessment
- Penetration Test
- Cyber Investigation & Warfare
- OSINT also in the darkweb
My work is my passion, every person who has worked with me has grown and made me grow.
Each project simple or difficult was engaged always with the conviction of the objective, looking for the most effective solution with humility, learning to listen others and making team, each cohesive team is always winning.
After over 20 years of work the market ask to have some professional certifications, at today I joined:
EC-Council Computer Hacking Forensic Investigator (CHFI)
EC-Council Certified Ethical Hacker (CEH)
IICFIP Certified Forensic Investigation Professional (CFIP)
ACFE Certified Fraud Examiner (CFE)
IISFA Certified Information Forensics Investigator (CIFI)
ISECOM Osstmm Professional Security Analyst (OPSA)
AccessData Certified Examiner (ACE)
IICFIP Certified Digital Forensics Professional (CDFP)
Bsi Lead Auditor BS7799-2:2002 (ISO 27001:2013)
Tenable Certified Nessus User (TCNU)
I have also many years of experience using professional hardware and software equipment for capturing and analyze digital evidence as Logicube Forensic Falcon and all others since MD5, Guidance Tableau (all), CRU WiebeTech (all), Mediaclone Superimager Field, Cellebrite UFED and software as AccessData FTK, XWays Forensics, Encase and many others. My experience has allowed me to become a teacher in many universities and law enforcement departments.
Founder member of ONIF, IISFA and OWASP Italian Chapter.
Pasts:
Head of the Digital Forensics LAB of Akhela
Implementation of SIEM guidelines of the Central Bank of Lebanon
Operative Course Teacher: Computer Forensics and Logicube Dossier at the School of Tax Police
Technical Consultant at the Public Prosecutor's Office
Antivirus Researcher since 1992, first in Italy to perform a comparative test on the antivirus.
NCO career Air Force since 1989
- Security Assessment
- Incident Handling
- Digital Forensics (DEFR Manager & DES of ISO27037)
- Fraud Management (prevention, investigation, accountability)
- Vulnerability Assessment
- Penetration Test
- Cyber Investigation & Warfare
- OSINT also in the darkweb
My work is my passion, every person who has worked with me has grown and made me grow.
Each project simple or difficult was engaged always with the conviction of the objective, looking for the most effective solution with humility, learning to listen others and making team, each cohesive team is always winning.
After over 20 years of work the market ask to have some professional certifications, at today I joined:
EC-Council Computer Hacking Forensic Investigator (CHFI)
EC-Council Certified Ethical Hacker (CEH)
IICFIP Certified Forensic Investigation Professional (CFIP)
ACFE Certified Fraud Examiner (CFE)
IISFA Certified Information Forensics Investigator (CIFI)
ISECOM Osstmm Professional Security Analyst (OPSA)
AccessData Certified Examiner (ACE)
IICFIP Certified Digital Forensics Professional (CDFP)
Bsi Lead Auditor BS7799-2:2002 (ISO 27001:2013)
Tenable Certified Nessus User (TCNU)
I have also many years of experience using professional hardware and software equipment for capturing and analyze digital evidence as Logicube Forensic Falcon and all others since MD5, Guidance Tableau (all), CRU WiebeTech (all), Mediaclone Superimager Field, Cellebrite UFED and software as AccessData FTK, XWays Forensics, Encase and many others. My experience has allowed me to become a teacher in many universities and law enforcement departments.
Founder member of ONIF, IISFA and OWASP Italian Chapter.
Pasts:
Head of the Digital Forensics LAB of Akhela
Implementation of SIEM guidelines of the Central Bank of Lebanon
Operative Course Teacher: Computer Forensics and Logicube Dossier at the School of Tax Police
Technical Consultant at the Public Prosecutor's Office
Antivirus Researcher since 1992, first in Italy to perform a comparative test on the antivirus.
NCO career Air Force since 1989
less
Related Authors
MONICA MASSARI
Università degli Studi di Milano - State University of Milan (Italy)
STEFANIA STEFANELLI
Università degli Studi di Perugia
Francesco Di Lisa
Università del Molise
Alberto Cappellini
Università degli Studi di Firenze (University of Florence)
Andrea Paselli
Università di Bologna
marco mayer
LUISS Guido Carli
InterestsView All (6)
Uploads
Papers by Massimiliano Graziani
• Chi sono i veri HACKER, chi i Cybercriminali e i Cybercop
• ISECOM 12 Dispense in italiano per “diventare” Ethical Hacker
• Principi fondamentali di VAPT
• Cenni alle metodologie OSSTMM e OWASP
• Crimine Organizzato… V2.0
• Nuovi hardware, nuove minacce…
L’esperienza sul campo e l’evoluzione
Ethical hacker metodologie internazionali, regole di ingaggio
Normativa nazionale e problematiche legali
2)Surface Web, Deep Web e Dark Web
3)Strumenti OSINT
4)Siti Web OSINT
5)Investigare sotto copertura, VPN e TOR
6)Buscador è morto, nasce Trace Labs VM
7)Un giro sul Dark Web tramite i link Hunchly
2) Accenni alla ISO27037
3) Evoluzione degli strumenti hardware professionali
4) Evoluzione degli strumenti software professionali
5) Live Forensics e Sniper Forensics
6) Qualche esempio pratico
Il ruolo del computer
Tipologie di Computer Forensics
La formazione della “prova informatica”
Best practices e consigli utili
La catena di custodia
Cenni sulla Legge 48
L’alibi informatico
Dati, metadati e l’utilità dell’HASH
Video sull’uso pratico di un write blocker
Caratteristiche di software open e free per la C.F
2 scuole di pensiero sull’uso di software open o closed, pro e contro
FONDAMENTI DELLE BEST PRACTICE AZIENDALI E RUOLO DELLA POLICY AZIENDALE
Ideazione e coordinamento Massimiliano Graziani
Autori: Massimiliano Graziani, Gerardo Costabile, Giuseppe Mazzaraco, Attilio De Bernardo, Mario Marras
Talks by Massimiliano Graziani
Conference Presentations by Massimiliano Graziani
• Chi sono i veri HACKER, chi i Cybercriminali e i Cybercop
• ISECOM 12 Dispense in italiano per “diventare” Ethical Hacker
• Principi fondamentali di VAPT
• Cenni alle metodologie OSSTMM e OWASP
• Crimine Organizzato… V2.0
• Nuovi hardware, nuove minacce…
L’esperienza sul campo e l’evoluzione
Ethical hacker metodologie internazionali, regole di ingaggio
Normativa nazionale e problematiche legali
2)Surface Web, Deep Web e Dark Web
3)Strumenti OSINT
4)Siti Web OSINT
5)Investigare sotto copertura, VPN e TOR
6)Buscador è morto, nasce Trace Labs VM
7)Un giro sul Dark Web tramite i link Hunchly
2) Accenni alla ISO27037
3) Evoluzione degli strumenti hardware professionali
4) Evoluzione degli strumenti software professionali
5) Live Forensics e Sniper Forensics
6) Qualche esempio pratico
Il ruolo del computer
Tipologie di Computer Forensics
La formazione della “prova informatica”
Best practices e consigli utili
La catena di custodia
Cenni sulla Legge 48
L’alibi informatico
Dati, metadati e l’utilità dell’HASH
Video sull’uso pratico di un write blocker
Caratteristiche di software open e free per la C.F
2 scuole di pensiero sull’uso di software open o closed, pro e contro
FONDAMENTI DELLE BEST PRACTICE AZIENDALI E RUOLO DELLA POLICY AZIENDALE
Ideazione e coordinamento Massimiliano Graziani
Autori: Massimiliano Graziani, Gerardo Costabile, Giuseppe Mazzaraco, Attilio De Bernardo, Mario Marras