<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="https://leliocampanile.github.io/feed.xml" rel="self" type="application/atom+xml" /><link href="https://leliocampanile.github.io/" rel="alternate" type="text/html" /><updated>2025-11-21T22:15:46+01:00</updated><id>https://leliocampanile.github.io/feed.xml</id><title type="html">Lelio Campanile</title><subtitle>personal description</subtitle><author><name>Lelio Campanile</name></author><entry><title type="html">Facial Recognition, Privacy, and Airports: Our Take on a Federated Approach</title><link href="https://leliocampanile.github.io/blog/airport-federated-learning-fgcs/" rel="alternate" type="text/html" title="Facial Recognition, Privacy, and Airports: Our Take on a Federated Approach" /><published>2025-11-01T00:00:00+01:00</published><updated>2025-11-01T00:00:00+01:00</updated><id>https://leliocampanile.github.io/blog/airport-federate-learning-fgcs</id><content type="html" xml:base="https://leliocampanile.github.io/blog/airport-federated-learning-fgcs/"><![CDATA[<p>The rapid adoption of facial recognition in airports raises new questions about privacy, data protection, and scalable AI. In our latest research, we propose a multi-level federated learning architecture that improves security and preserves passenger privacy without sacrificing performance.
<!--more--></p>

<p><img src="/images/fgcs-airport-head-line.jpg" alt="Headline Image" /></p>

<h2 id="1-why-talk-about-biometrics-and-privacy-at-airports-today">1. Why Talk About Biometrics and Privacy at Airports Today?</h2>

<p>Airports are rapidly evolving into hyper-automated environments.<br />
From self-service check-in kiosks to biometric boarding gates, <strong>facial recognition systems</strong> are becoming a central element of passenger processing.<br />
These technologies promise convenience, speed, and improved security — but they also raise pressing concerns about <strong>privacy, data control, and surveillance</strong>.</p>

<p>When your face becomes your passport, how is your data stored, processed, and protected?<br />
Can we trust these systems not only to recognize us — but also to respect our rights?</p>

<p>Artificial intelligence (AI) and machine learning play a dual role here.<br />
They power the recognition systems that drive automation, but they also open up new ways to rethink how sensitive data is managed — especially through <strong>Federated Learning (FL)</strong>, which allows AI models to be trained collaboratively <strong>without centralizing personal data</strong>.</p>

<hr />

<h2 id="2-a-federated-architecture-to-protect-biometric-data">2. A Federated Architecture to Protect Biometric Data</h2>

<p>Our recent study, published in <em>Future Generation Computer Systems</em>, explores how a <strong>multi-level federated learning architecture</strong> can safeguard biometric data in airport environments.</p>

<p>Federated Learning shifts the model training process from a central server to distributed devices.<br />
Instead of sending raw data to a central authority, each device (or node) trains a local model and shares only model updates. This approach preserves data locality and significantly reduces exposure.</p>

<p>But what happens when multiple organizations — airlines, airport authorities, and government entities — are involved?<br />
That’s where our architecture comes in.</p>

<p>We designed a <strong>three-tiered system</strong> tailored to the airport context:</p>

<ul>
  <li><strong>Client Level:</strong> Check-in kiosks capture and preprocess biometric data locally.</li>
  <li><strong>Edge Level:</strong> Airline servers act as local aggregators, combining updates from their own kiosks.</li>
  <li><strong>Global Level:</strong> An airport-wide coordinator aggregates models across airlines without ever accessing raw data.</li>
</ul>

<p>This structure supports organizational autonomy, <strong>compliance with data protection laws</strong>, and <strong>scalability</strong> — all critical for real-world deployments.</p>

<p><img src="/images/two-level.png" alt="Architectures Images" title="Figure adapted from Campanile et al., FGCS (2026), CC BY-NC-ND 4.0." /></p>

<hr />

<h2 id="3-privacy-by-design-techniques-we-adopted">3. Privacy by Design: Techniques We Adopted</h2>

<p>From the beginning, our goal was to embed privacy directly into the architecture — not to patch it afterward.<br />
This embodies the <strong>privacy by design</strong> principle.</p>

<p>To achieve this, we combined complementary privacy-enhancing techniques:</p>

<ul>
  <li><strong>Differential Privacy (DP):</strong> Adds mathematical noise to model updates, making it difficult to reverse-engineer original data — even if the model is compromised.</li>
  <li><strong>Secure Aggregation (SA):</strong> Ensures that individual updates cannot be accessed by the server, not even during training.</li>
  <li><strong>Privacy Meter:</strong> An open-source tool that audits privacy using <em>membership inference attacks</em> (MIA), simulating how an adversary might guess if someone’s data was part of training.</li>
  <li><strong>Data Protection Impact Assessment (DPIA):</strong> A GDPR-aligned framework for evaluating privacy risks and mitigation strategies.</li>
</ul>

<p>Together, these tools provide both <strong>quantitative</strong> and <strong>qualitative</strong> insights into the system’s privacy guarantees.</p>

<hr />

<h2 id="4-what-we-discovered">4. What We Discovered</h2>

<p>Our experimental evaluation compared three configurations:</p>

<ol>
  <li><strong>Centralized Training:</strong> Highest accuracy but strong vulnerability to inference attacks.</li>
  <li><strong>One-Level FL:</strong> Improved privacy, but organizational bottlenecks limited scalability.</li>
  <li><strong>Two-Level FL with DP and SA:</strong> Slight accuracy drop, but significantly higher robustness and privacy protection.</li>
</ol>

<p>The <strong>Privacy Meter results</strong> confirmed that privacy-preserving mechanisms substantially reduced the risk of data leakage — even under simulated attacks.<br />
The trade-off between accuracy and privacy proved manageable, especially considering the sensitive nature of biometric systems.</p>

<hr />

<p>This research contributes to the broader conversation on <strong>trustworthy AI</strong> — how to design systems that are both powerful and privacy-respecting.</p>

<p>For stakeholders such as airport operators, data protection officers, and public institutions, our architecture offers view about:</p>

<ul>
  <li>Aligns with <strong>GDPR principles</strong> (data minimization, security by design);</li>
  <li>Supports <strong>decentralized governance</strong> across multiple organizations;</li>
  <li>Is <strong>adaptable</strong> to other sensitive domains such as healthcare and smart cities.</li>
</ul>

<p>As airports and public infrastructures continue to adopt AI-driven automation, our work shows that <strong>privacy and performance do not have to be mutually exclusive</strong>.</p>

<p>Future developments will explore:</p>
<ul>
  <li>Formal verification of security properties,</li>
  <li>Real-world deployment pilots, and</li>
  <li>Integration with advanced cryptographic protocols.</li>
</ul>

<hr />

<p><strong>Read the full open-access paper <a href="https://www.sciencedirect.com/science/article/pii/S0167739X25005114">here</a></strong></p>

<p>cite it:</p>

<p><span id="CAMPANILE2026108217">Campanile, L., de Biase, M. S., &amp; Marulli, F. (2026). Design and evaluation of a privacy-preserving multi-level federated learning architecture for airport biometric check-in. <i>Future Generation Computer Systems</i>, <i>176</i>, 108217. https://doi.org/https://doi.org/10.1016/j.future.2025.108217</span></p>

<hr />

<p><em>Published in</em> <strong>Future Generation Computer Systems</strong>, <em>Elsevier (2026)</em><br />
<strong>Authors:</strong> Lelio Campanile, Maria Stella De Biase, Fiammetta Marulli<br />
<em>Department of Mathematics and Physics, Università della Campania “L. Vanvitelli”</em></p>]]></content><author><name>Lelio Campanile</name></author><category term="Federated Learning" /><category term="Privacy" /><category term="research" /><category term="AI" /><category term="ML" /><category term="FL" /><summary type="html"><![CDATA[The rapid adoption of facial recognition in airports raises new questions about privacy, data protection, and scalable AI. In our latest research, we propose a multi-level federated learning architecture that improves security and preserves passenger privacy without sacrificing performance.]]></summary></entry><entry><title type="html">Announcing AI4EIoT-2026: Special Session on Artificial Intelligence for Emerging IoT Systems</title><link href="https://leliocampanile.github.io/AI4EIoT-2026/" rel="alternate" type="text/html" title="Announcing AI4EIoT-2026: Special Session on Artificial Intelligence for Emerging IoT Systems" /><published>2025-10-15T00:00:00+02:00</published><updated>2025-10-15T00:00:00+02:00</updated><id>https://leliocampanile.github.io/AI4EIoT-2026</id><content type="html" xml:base="https://leliocampanile.github.io/AI4EIoT-2026/"><![CDATA[<p>I’m pleased to announce that our <strong>Special Session AI4EIoT-2026</strong> on <em>Artificial Intelligence for Emerging IoT Systems</em><br />
has been officially accepted at <strong>IoTBDS 2026</strong>, which will take place in <strong>Benidorm, Spain, from May 21–23, 2026</strong>.</p>

<p>This new edition continues the tradition of the previous AI4IoT sessions (2020–2025),<br />
expanding its focus to include <strong>LLMs, Explainable AI, and Generative AI</strong> for the design of <strong>trustworthy, scalable, and domain-aware IoT systems</strong>.</p>

<hr />

<h2 id="scope">Scope</h2>

<p>The Internet of Things (IoT) is evolving into a pervasive, intelligent, and interconnected ecosystem where data-driven AI enables adaptive, secure, and sustainable decision-making.<br />
Artificial Intelligence — including <strong>Deep Learning</strong>, <strong>Explainable and Trustworthy AI</strong>, and more recently <strong>Large Language Models (LLMs)</strong> — is transforming the design and operation of IoT and <strong>Cyber-Physical Systems (CPS)</strong>, enabling distributed intelligence at the edge, in the cloud, and across hybrid environments.</p>

<p>This special session aims to explore <strong>emerging challenges, opportunities, and methodologies</strong> at the intersection of AI and IoT, focusing on <strong>trustworthiness, scalability, sustainability, and cross-domain applicability</strong>.<br />
Particular attention is given to <strong>federated and edge learning</strong>, <strong>energy-efficient AI</strong>, <strong>XAI</strong>, and the role of <strong>LLMs and Generative AI</strong> in making IoT systems more adaptive, explainable, and capable of simulating real-world processes.</p>

<p>We also encourage submissions from <strong>industrial, civil, and process engineering domains</strong>, where AI-enhanced IoT is revolutionizing monitoring, control, and predictive maintenance.</p>

<hr />

<h2 id="topics-of-interest">Topics of Interest</h2>

<h3 id="area-1-core-aiiot-integration">AREA 1: Core AI–IoT Integration</h3>
<ul>
  <li>Distributed, Federated, and Continual Learning for IoT Systems</li>
  <li>Edge AI and TinyML for Real-time and Energy-efficient Intelligence</li>
  <li>AI-driven Security, Privacy, and Resilience in IoT Networks</li>
  <li>Digital Twins and Predictive Maintenance for Smart Environments</li>
  <li>AI–IoT Integration for Environmental and Urban Sustainability</li>
</ul>

<h3 id="area-2-emerging-ai-paradigms">AREA 2: Emerging AI Paradigms</h3>
<ul>
  <li>Explainable and Trustworthy AI in IoT and CPS</li>
  <li>Large Language Models for Real-world IoT and Multimodal Environments</li>
  <li>Generative AI for Simulation, Synthetic Data, and System Optimization</li>
  <li>Graph Neural Networks for Complex System Modeling</li>
  <li>Reinforcement Learning for Adaptive and Autonomous IoT Agents</li>
</ul>

<h3 id="area-3-cross-domain-and-applied-intelligence">AREA 3: Cross-Domain and Applied Intelligence</h3>
<ul>
  <li>AI and IoT in Smart Cities, Civil Engineering, and Environmental Monitoring</li>
  <li>AI and IoT for Industrial, Process, and Chemical Engineering</li>
  <li>Human-centered and Emotion-aware IoT Applications</li>
  <li>Integration of AI, IoT, and Blockchain for Secure Ecosystems</li>
  <li>Energy-aware AI and Sustainable IoT Infrastructures</li>
</ul>

<hr />

<h2 id="-important-dates">📅 Important Dates</h2>

<table>
  <thead>
    <tr>
      <th>Event</th>
      <th>Date</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td><strong>Paper Submission</strong></td>
      <td>March 24, 2026</td>
    </tr>
    <tr>
      <td><strong>Authors Notification</strong></td>
      <td>April 7, 2026</td>
    </tr>
    <tr>
      <td><strong>Camera Ready &amp; Registration</strong></td>
      <td>April 15, 2026</td>
    </tr>
    <tr>
      <td><strong>Conference Dates</strong></td>
      <td>May 21–23, 2026</td>
    </tr>
    <tr>
      <td><strong>Location</strong></td>
      <td>Benidorm, Spain</td>
    </tr>
  </tbody>
</table>

<hr />

<h2 id="official-website-and-submission">Official Website and Submission</h2>

<p><a href="https://iotbds.scitevents.org/AI4EIoTs.aspx">AI4EIoTs @ IoTBDS 2026</a></p>

<hr />

<p>We warmly invite researchers and practitioners to contribute their latest results,<br />
visionary ideas, and case studies.</p>

<p>Submissions are welcome through the <a href="https://iotbds.scitevents.org/AI4EIoTs.aspx">IoTBDS - AI4EIoT submission portal</a>.</p>

<p><em>(Organized by Lelio Campanile (It’s me!), University of Campania “Luigi Vanvitelli”, and Fiammetta Marulli, University of  Campania “Luigi Vanvitelli”.)</em></p>]]></content><author><name>Lelio Campanile</name></author><category term="IoT" /><category term="Artificial Intelligence" /><category term="Edge Computing" /><category term="LLM" /><category term="XAI" /><category term="Generative AI" /><category term="Federated Learning" /><category term="workshop" /><category term="conference" /><summary type="html"><![CDATA[The AI4EIoT Special Session returns at IoTBDS 2026 — exploring AI, LLMs, and Generative Intelligence for next-generation IoT and cyber-physical systems.]]></summary></entry><entry><title type="html">Using iPad as a Python Development Client with Mac, Tailscale, and VS Code</title><link href="https://leliocampanile.github.io/blog/ipad-remote-workflow/" rel="alternate" type="text/html" title="Using iPad as a Python Development Client with Mac, Tailscale, and VS Code" /><published>2025-09-27T00:00:00+02:00</published><updated>2025-09-27T00:00:00+02:00</updated><id>https://leliocampanile.github.io/blog/ipad_remote_workflow</id><content type="html" xml:base="https://leliocampanile.github.io/blog/ipad-remote-workflow/"><![CDATA[<h2 id="introduction">Introduction</h2>
<p>With <strong>iPadOS 26</strong>, Apple has pushed the iPad closer to being a true productivity device. The new multitasking capabilities, better keyboard support, and a more powerful Safari engine (with extended PWA and WebAssembly features) have unlocked possibilities that were not feasible before.</p>

<p>Yet, when it comes to <strong>software development</strong>, the iPad still falls short. You cannot freely install Python packages, run full IDEs, or access a native terminal environment. The solution is to treat the iPad as a <strong>lightweight client</strong> and delegate the heavy lifting to a proper development machine — in my case, my <strong>Mac at home</strong>.<br />
<!--more--></p>

<p>In this post I’ll describe the workflow I implemented to make this possible: the Mac acts as a full-featured development server, while the iPad connects securely through <strong>Tailscale</strong>. On top of that connection, I can choose between two main approaches: a lightweight <strong>Blink/Blink Code</strong> setup for quick edits, or a <strong>VS Code Remote Tunnel</strong> session for a complete IDE experience. Addictionaly you can enable screen sharing on your manc ed use a fullVNC client from iPad to connect.</p>

<h2 id="workflow-architecture">Workflow Architecture</h2>

<p>The architecture is straightforward:</p>

<ul>
  <li>The <strong>Mac stays on at home</strong>, running Python, Conda, and VS Code.</li>
  <li>The <strong>iPad connects via Tailscale</strong>, which places both devices in the same private VPN.</li>
  <li>On the iPad, I can:
    <ul>
      <li>Use <strong>Blink / Blink Code</strong> for terminal and quick file edits.</li>
      <li>Launch <strong>VS Code Tunnel</strong> and connect via <a href="https://vscode.dev">vscode.dev</a> for a full IDE.</li>
      <li>Optionally use a VNC Client if you need your full mac enviromental on the go</li>
    </ul>
  </li>
</ul>

<h2 id="preparing-the-mac">Preparing the Mac</h2>

<h3 id="enabling-ssh-access">Enabling SSH access</h3>

<p>The first step is enabling SSH access. From <strong>System Settings &gt; General &gt; Sharing</strong>, I enabled <em>Remote Login</em>. Then I configured the <code class="language-plaintext highlighter-rouge">~/.ssh/authorized_keys</code> file to include the public key generated directly in Blink on the iPad, so I can log in without typing my macOS password each time. Create the SSH folder and authorized keys file if they don’t exist:</p>

<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code><span class="nb">mkdir</span> <span class="nt">-p</span> ~/.ssh
<span class="nb">chmod </span>700 ~/.ssh
nano ~/.ssh/authorized_keys
<span class="nb">chmod </span>600 ~/.ssh/authorized_keys
</code></pre></div></div>

<p>Paste here the public key generated from Blink (iPad).</p>

<h3 id="install-tools">Install tools</h3>

<p>Next, I installed <strong>Tailscale</strong> with <a href="https://brew.sh">Homebrew</a>, tht it is the easiest way to install and manage development tools on macOS. and logged in with my account. The Mac was automatically assigned a private IP address (<code class="language-plaintext highlighter-rouge">100.x.y.z</code>) reachable only inside the Tailscale network. To prevent the machine from sleeping, I installed <strong>Caffeine</strong>, though Amphetamine or even the built-in <code class="language-plaintext highlighter-rouge">caffeinate -dimsu</code> command would work just as well.</p>

<p>Finally, I added <strong>Mosh</strong> and <strong>tmux</strong>. Mosh allows stable connections even if the network changes (for instance, switching from Wi-Fi to 5G), while tmux lets me detach and resume sessions without losing state.</p>

<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>brew update

<span class="c"># --- Network &amp; Remote Access ---</span>
brew <span class="nb">install</span> <span class="nt">--cask</span> tailscale    <span class="c"># Secure VPN with WireGuard</span>
brew <span class="nb">install </span>mosh                <span class="c"># Stable SSH replacement</span>
brew <span class="nb">install </span>tmux                <span class="c"># Persistent terminal sessions</span>

<span class="c"># --- Development Tools ---</span>
brew <span class="nb">install </span>git                 <span class="c"># Version control</span>
brew <span class="nb">install</span> <span class="nt">--cask</span> visual-studio-code  <span class="c"># VS Code app</span>

<span class="c"># --- Utilities ---</span>
brew <span class="nb">install</span> <span class="nt">--cask</span> caffeine     <span class="c"># Prevents Mac from sleeping</span>
</code></pre></div></div>

<p>You can check everything is working by running:</p>

<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>tailscale version
mosh <span class="nt">--version</span>
tmux <span class="nt">-V</span>
code <span class="nt">--version</span>
</code></pre></div></div>

<h3 id="setting-up-tailscale">Setting up Tailscale</h3>

<p>Once Tailscale is installed, start it and login with your Google account or Github account, you can find Tailscale app in your application folder and once opened in the mac menubar. If everything is set up fine then</p>

<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>tailscale ip
</code></pre></div></div>

<p>it will show you up the ip address assigned by Tailscale. It should look like 100.x.y.z. This is the address you’ll use to connect from the iPad.</p>

<h3 id="optional-stuff">Optional stuff:</h3>

<p>You can prevent macOS from sleeping using Caffeine (a menubar app).
Once launched, click the coffee cup icon — the Mac stays awake indefinitely.</p>

<p>Alternatively, from Terminal:</p>

<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>caffeinate <span class="nt">-dimsu</span>
</code></pre></div></div>
<p>This keeps the machine awake as long as the process is running.</p>

<p>Mosh replaces SSH for more reliable terminal connections.
tmux allows you to detach and reattach to sessions easily.</p>

<h2 id="configuring-the-ipad">Configuring the iPad</h2>

<p>On the iPad, I installed the <strong>Tailscale app</strong> and logged in with the same account. Now the iPad and Mac are on the same virtual LAN.</p>

<p>For terminal access, I rely on <strong>Blink</strong>. For quick edits I use <strong>Blink Code</strong>, which provides an editor with SFTP integration plus an embedded terminal. My <code class="language-plaintext highlighter-rouge">~/.ssh/config</code> is set up like this:</p>

<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>Host macbook
    HostName 100.x.y.z
    User myuser
    IdentityFile ~/.ssh/id_ed25519
    ServerAliveInterval 60
</code></pre></div></div>

<p>Connect with:</p>

<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>ssh macbook
</code></pre></div></div>

<p>or use mosh:</p>
<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>mosh <span class="nt">--server</span><span class="o">=</span>/opt/homebrew/bin/mosh-server macbook
</code></pre></div></div>

<p>Once connected, you can open tmux sessions or launch your Python projects directly or to whatever you want!</p>

<h2 id="vs-code-tunnel-and-vscodedev">VS Code Tunnel and vscode.dev</h2>

<p>This is the core of our configuration. When I need a full IDE, I rely on VS Code Tunnel on mac and Vs Code server via web</p>

<p>On the mac start the tunnel service:</p>

<div class="language-bash highlighter-rouge"><div class="highlight"><pre class="highlight"><code>code tunnel <span class="nt">--accept-server-license-terms</span>
</code></pre></div></div>

<p>This opens a secure tunnel accessible through vscode.dev and allow you to access to your code on Mac using only a browser and an internet connection.</p>

<p>On the iPad, open Safari, log in with your GitHub account, and select your active tunnel.
You’ll have a complete <strong>VS Code IDE running</strong> in your browser — including extensions, IntelliSense, debugging, and Jupyter notebooks.</p>

<h2 id="remote-desktop-access">Remote Desktop Access</h2>

<p>Sometimes, a graphical interface is helpful.
macOS includes <strong>Screen Sharing (VNC)</strong> by default. You can enable it under System Settings → General → Sharing → Screen Sharing, then set a VNC password.</p>

<p>On the iPad, I use Screens (by Edovia) to connect to my Mac’s Tailscale IP.
It’s smoother than plain VNC, supports shortcuts and gestures, and feels almost native.</p>

<p>Other good options include Jump Desktop (with the “Fluid” protocol) and RealVNC Viewer for a free alternative.</p>

<h2 id="conclusion">Conclusion</h2>

<p>With this setup, the iPad becomes a <strong>professional-grade remote development client</strong>.
Tailscale ensures a private and secure network, SSH and Mosh provide low-latency and reliable sessions, and Blink or VS Code Tunnel let you choose between a minimalist or full-featured workflow.</p>

<p>The result is flexibility: you can travel with only an iPad and still enjoy the power of your Mac at home. This configuration combines the portability of iPadOS with the completeness of a desktop environment — the perfect hybrid for modern Python development.</p>]]></content><author><name>Lelio Campanile</name></author><category term="iPad" /><category term="macOS" /><category term="Tailscale" /><category term="VSCode" /><category term="Blink" /><category term="RemoteDevelopment" /><summary type="html"><![CDATA[Introduction With iPadOS 26, Apple has pushed the iPad closer to being a true productivity device. The new multitasking capabilities, better keyboard support, and a more powerful Safari engine (with extended PWA and WebAssembly features) have unlocked possibilities that were not feasible before. Yet, when it comes to software development, the iPad still falls short. You cannot freely install Python packages, run full IDEs, or access a native terminal environment. The solution is to treat the iPad as a lightweight client and delegate the heavy lifting to a proper development machine — in my case, my Mac at home.]]></summary></entry><entry><title type="html">ITASEC-21 - CyberEquality Panel</title><link href="https://leliocampanile.github.io/blog/itasec21/" rel="alternate" type="text/html" title="ITASEC-21 - CyberEquality Panel" /><published>2021-04-05T00:00:00+02:00</published><updated>2021-04-05T00:00:00+02:00</updated><id>https://leliocampanile.github.io/blog/ITASEC21</id><content type="html" xml:base="https://leliocampanile.github.io/blog/itasec21/"><![CDATA[<p>The Italian Conference on CyberSecurity (<a href="https://itasec.it">ITASEC</a>)  is an annual event supported and organized by the Cybersecurity National Laboratory.</p>

<p>The 2021 edition will be an all-digital conference from April 7th to April 9th, 2021.</p>

<p>During this conference there will be a panel on gender divisions in the IT sector, thanks to an event coordinated by the CyberEquality working group (of which I am a member) of the National Cybersecurity Laboratory, created in 2020 to identify and develop targeted initiatives on the topic. The panel will take place on Friday 9 April from <a href="https://2021.itasec.it/session/15">15.30-16.30</a>.The panel will be in italian and participation is free. If you can, please participate and spread the word.</p>]]></content><author><name>Lelio Campanile</name></author><category term="news" /><category term="conference" /><category term="academic" /><summary type="html"><![CDATA[The Italian Conference on CyberSecurity (ITASEC) is an annual event supported and organized by the Cybersecurity National Laboratory.]]></summary></entry></feed>