{"id":2999,"date":"2022-12-06T16:57:23","date_gmt":"2022-12-06T15:57:23","guid":{"rendered":"https:\/\/reteinformaticalavoro.it\/blog\/?p=2999"},"modified":"2022-12-06T16:57:25","modified_gmt":"2022-12-06T15:57:25","slug":"webinar-exploring-cyber-threat-intelligence-cyber-strategy-initiative","status":"publish","type":"post","link":"https:\/\/reteinformaticalavoro.it\/blog\/webinar-exploring-cyber-threat-intelligence-cyber-strategy-initiative\/","title":{"rendered":"Webinar &#8211; Exploring Cyber Threat Intelligence &#8211; Cyber Strategy Initiative"},"content":{"rendered":"\n<p>Durante il Techjobsday 2022 Online, l&#8217;evento tech dedicato al lavoro IT e alle competenze informatiche, anche Cyber Strategy Initiative ha preparato un suo intervento live di 45 minuti dal titolo: <br>\nExploring Cyber Threat Intelligence <br>\n<br>\nRelatore: Vito Lucatorto &#8211; Cyber Strategy Initiative &#8211; Co-founder Cyber Strategy<br>\n<br>\nTe lo sei perso? Riguardalo ora.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Durante il Techjobsday 2022 Online, l&#8217;evento tech dedicato al lavoro IT e alle competenze&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3001,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"video","meta":[],"categories":[369],"tags":[],"_links":{"self":[{"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/posts\/2999"}],"collection":[{"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/comments?post=2999"}],"version-history":[{"count":1,"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/posts\/2999\/revisions"}],"predecessor-version":[{"id":3027,"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/posts\/2999\/revisions\/3027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/media\/3001"}],"wp:attachment":[{"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/media?parent=2999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/categories?post=2999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reteinformaticalavoro.it\/blog\/wp-json\/wp\/v2\/tags?post=2999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}