Let's discuss your project
Tell us what you need and we will reply within a few working hours with the next steps. If you prefer, call us or message us on WhatsApp. We handle requests relating to cybersecurity, compliance, certifications, safety, software, AI and operational support.
Complete the form:
we will respond quickly
Select one or more areas, describe the context and indicate the urgency. The form generates an email request ready to be sent to UESE.
Direct channels
Prefer to speak immediately? We are available on business days and also arrange online meetings.
Demo or initial assessment?
The introductory demo helps clarify needs and feasibility. The light initial assessment is more structured: it can include a brief document review, operational priorities and a 30/60/90 roadmap.
Useful documents
If you already have policies, organisation charts, estimates, specifications, inventories or sample datasets, send them straight away: they help shorten timelines and make the first discussion more concrete.
Un initial conversation
Già Orientato all’Azione
The initial contact is not only informative: it helps us quickly understand context, risks, priorities and possible next steps.
NIS2 / cybersecurity / GuardianSOC
Scope check, critical functions, supply chain, minimum policies, incident management, logging, playbooks and short PoCs when useful.
ISO / compliance / 231
Scope, gaps, essential documentation, baseline controls, roles and first actions for compliance alignment and readiness.
Software / AI / automations
Analysis of current workflows, bottlenecks, available datasets or documents, integration options and an initial operational backlog.
CESG / Sustainability
Double materiality, CSRD/ESRS scope, KPIs, data sources and initial assumptions for collection and governance.
Safety / CQSA / SOA
Document status, near misses, training, QHSE integration, OG/OS requirements, evidence and critical deadlines.
Output tipico
Mini report, gap checklist, 30/60/90 priorities, minimum actions, prerequisites, estimated effort and proposed next step.
“Critical” support
for security incidents
In the event of compromise, ransomware, data breach, BEC or blocked services, indicate “Critical” in the message and use phone or WhatsApp to speed up the response.
0–60 min
Triage, collection of initial evidence, urgent containment and activation of a secure coordination channel.
Entro 24h
Initial assessment, telemetry, timeline, hardening, blocks on email, cloud, firewall, EDR and identity.
24–72h
Recovery, remediation, incident report, IOCs, lessons learned and a 30/60/90-day plan.
Privacy & breach
If personal data is involved, we also support the assessment of notifications and required communications.
Locations, directorates
and nationwide coverage
UESE operates across the entire country, with operational offices in several cities and availability for online meetings.
Main contact details
Head office: Piazza Trivulziana 4/A, 20126 Milano (IT)
Phone: 02 5656 8416
24/7 switchboard: 02 4013 5037
Email: info@uese.eu
Operational directorates
Technical Directorate: Corso of the Popolo 58/B, 30172 Venezia
Training Centre: Piazza XXVII Ottobre 54, 30173 Venezia
Commercial Directorate: Via Guantai new 11, 80133 Napoli
The most useful answers
before contacting us
A clear summary of the questions that arise most often about demos, assessments, critical support and data protection.
Posso richiedere una demo o un initial assessment?+
Introductory demo: it helps clarify needs and feasibility, usually in a 30–60 minute call with concise next steps.
Light initial assessment: it is more structured and can include 1–2 technical calls, a brief document review and a mini report with key gaps, risks and a 30/60/90 roadmap.
Che cosa vi serve da parte mia for partire bene?+
- 1–2 stakeholders lato technical, legale o Coverage.
- Key documents available even in draft form: policies, organisation chart, specifications, estimates, inventories and datasets.
- Clear indication of priority: Critical / High / Medium / Low.
Gestite incidents di security?+
Yes. In urgent cases, use phone or WhatsApp and clearly indicate “Critical”.
- Ransomware, crypto-locker, account compromessi.
- Data breach, unauthorised access, BEC and phishing with fraudulent transfers.
- Blocked servers or services, anomalous traffic, reports from clients or authorities.
Come proteggete i miei dati?+
We apply the principles of minimisation, accountability and privacy by design/by default.
- Encryption in transit and, where applicable, at rest.
- MFA/SSO, least privilege and environment segregation.
- Hardening, patching and 3-2-1 backup with restore tests.
- Logging, anomaly monitoring and SOC integration where applicable.
Write to us today,
we will reply with the next steps
You can contact us for a demo, an initial assessment, a technical request or urgent support. If you already have material available, send it straight away: it will make the discussion far more concrete.