{"id":710,"date":"2023-10-10T15:35:59","date_gmt":"2023-10-10T13:35:59","guid":{"rendered":"https:\/\/www.smeup.com\/landing\/?page_id=710"},"modified":"2025-03-20T10:35:57","modified_gmt":"2025-03-20T09:35:57","slug":"edu-week-security-soc","status":"publish","type":"page","link":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/","title":{"rendered":"Webinar: ICS Security Soc"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"710\" class=\"elementor elementor-710\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8270f05 e-con-full e-flex e-con e-parent\" data-id=\"8270f05\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7dad81f elementor-widget elementor-widget-spacer\" data-id=\"7dad81f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6f2949 elementor-widget elementor-widget-heading\" data-id=\"f6f2949\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SPECIALE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0c9752 elementor-widget elementor-widget-gradient_heading\" data-id=\"b0c9752\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"gradient_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\n            <h1 class=\"gradient-text\">\n                CYBER SECURITY            <\/h1>\n\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1e68d3b e-flex e-con-boxed e-con e-parent\" data-id=\"1e68d3b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b71b24c elementor-widget elementor-widget-heading\" data-id=\"b71b24c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SICUREZZA\nINFORMATICA\nCOMPLETA?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-829a635 elementor-widget elementor-widget-heading\" data-id=\"829a635\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00c9 possibile con l'i-SOC di Cyberoo!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2752e0 elementor-widget elementor-widget-heading\" data-id=\"b2752e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SFIDE, SOLUZIONI E STRATEGIE PER LA DIFESA DELLA TUA AZIENDA.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-700b5fb e-flex e-con-boxed e-con e-parent\" data-id=\"700b5fb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07542fa elementor-widget elementor-widget-text-editor\" data-id=\"07542fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ti sei perso il Webinar?<br \/>Scopri i materiali condivisi durante l&#8217;evento.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div data-color=\"#A50017,#058A9C,#A50017,#058A9C\" class=\"elementor-element elementor-element-fc55db2 elementor-align-center raven-animated-gradient-yes elementor-widget elementor-widget-raven-button\" data-id=\"fc55db2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;turn_to_popup_action_button&quot;:&quot;no&quot;}\" data-widget_type=\"raven-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-widget-wrapper\">\n\t\t\t<a class=\"raven-button raven-button-widget-normal-effect-none  raven-button-text-align-center raven-button-link elementor-animation-shrink\" href=\"https:\/\/www.smeup.com\/eventi\/evento\/webinar-cybersecurity-soc-edu-week-4\/\">\t\t\t\t<div class=\"raven-button-overlay\" data-background-size=\"300% 100%\" data-animation-name=\"AnimatedGradientBgLeft\" class=\"raven-animated-gradient\" data-angle=\"90deg\" data-speed=\"2s\" data-color=\"#A50017,#058A9C,#A50017,#058A9C\" style=\"background-image : linear-gradient( 90deg,#A50017,#058A9C,#A50017,#058A9C );animation-duration: 2s;animation-name: AnimatedGradientBgLeft;background-size: 300% 100%;\"><\/div>\n\t\t\t\t<span class=\"raven-button-content\">\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"button-text-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"raven-button-texts-wrapper\">\n\t\t\t\t\t\t\t<div class=\"button-text\">\n\t\t\t\t\t\t\t\t<span class=\"raven-button-text\">\n\t\t\t\t\t\t\t\t\tSCARICA I MATERIALI\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"raven-button-icon raven-button-icon-position-right\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/a>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7346b28 e-flex e-con-boxed e-con e-parent\" data-id=\"7346b28\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d167f5 elementor-widget elementor-widget-text-editor\" data-id=\"9d167f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">Il <strong>SOC<\/strong> \u00e8 il cuore pulsante della difesa cibernetica di un&#8217;organizzazione. \u00c8 il <strong>luogo in cui i professionisti della sicurezza informatica lavorano h.24 per identificare, mitigare e rispondere alle minacce digitali in tempo reale.<\/strong><\/p><p style=\"text-align: center;\"><strong>L&#8217;i-SOC di Cyberoo<\/strong> costituisce un notevole esempio di come un&#8217;organizzazione possa fronteggiare con successo le crescenti sfide nel campo della sicurezza informatica, poich\u00e9 <strong>si fonda su una collaborazione sinergica tra Intelligenza Artificiale e esperti di sicurezza informatica altamente qualificati.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be2b732 elementor-widget elementor-widget-text-editor\" data-id=\"be2b732\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Quali temi affronteremo nel webinar?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d014672 e-flex e-con-boxed e-con e-parent\" data-id=\"d014672\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04e851d elementor-widget elementor-widget-text-editor\" data-id=\"04e851d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p style=\"text-align: left;\"><strong>Cos&#8217;\u00e8 un SOC e perch\u00e9 \u00e8 importante:<\/strong>\nil SOC \u00e8 essenziale per qualsiasi organizzazione, indipendentemente dalle dimensioni. Condivideremo l&#8217;esperienza di Cyberoo.<\/p>\n<p style=\"text-align: left;\"><strong>Le minacce cyber emergenti:<\/strong>\nesamineremo le minacce informatiche pi\u00f9 recenti e discuteremo come un SOC pu\u00f2 rilevarle e affrontarle in modo proattivo.<\/p>\n<p style=\"text-align: left;\"><strong>La tecnologia e le soluzioni utilizzate da Cyberoo:<\/strong>\ntecnologie avanzate e soluzioni di sicurezza che Cyberoo utilizza per mantenere al sicuro i propri clienti.<\/p>\n<p style=\"text-align: left;\"><strong>Best Practices e suggerimenti:<\/strong>\ncome implementare un SOC efficace all&#8217;interno della tua organizzazione.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58fe22b elementor-widget elementor-widget-heading\" data-id=\"58fe22b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">APPROFONDISCI ALTRI ARGOMENTI NELL\u2019AMBITO CYBERSECURITY\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d0dc749 e-flex e-con-boxed e-con e-parent\" data-id=\"d0dc749\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div data-speed=\"3s\" data-background-size=\"300% 100%\" data-animation-name=\"AnimatedGradientBgLeft\" data-angle=\"90deg\" data-color=\"#A50017,#058A9C,#A50017,#058A9C\" class=\"elementor-element elementor-element-98b2c39 e-con-full raven-animated-gradient-yes e-flex e-con e-child\" data-id=\"98b2c39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e45501b elementor-widget elementor-widget-gradient_heading\" data-id=\"e45501b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"gradient_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\n            <h1 class=\"gradient-text\">\n                Le nuove frontiere \nper la difesa della sicurezza informatica? L\u2019AI e i Big Data!\n            <\/h1>\n\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9a1084 elementor-widget elementor-widget-text-editor\" data-id=\"f9a1084\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Come sfruttare l\u2019intelligenza artificiale e i big data per una sicurezza completa.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fb9b58 elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-raven-button\" data-id=\"8fb9b58\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;turn_to_popup_action_button&quot;:&quot;no&quot;}\" data-widget_type=\"raven-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-widget-wrapper\">\n\t\t\t<a class=\"raven-button raven-button-widget-normal-effect-none  raven-button-text-align-center raven-button-link elementor-animation-shrink\" href=\"#popupwebinarba16novembre\">\t\t\t\t<div class=\"raven-button-overlay\" ><\/div>\n\t\t\t\t<span class=\"raven-button-content\">\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"button-text-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"raven-button-texts-wrapper\">\n\t\t\t\t\t\t\t<div class=\"button-text\">\n\t\t\t\t\t\t\t\t<span class=\"raven-button-text\">\n\t\t\t\t\t\t\t\t\tSCARICA IL WHITE PAPER\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"raven-button-icon raven-button-icon-position-right\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/a>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-961aca2 e-con-full e-flex e-con e-child\" data-id=\"961aca2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d457bc elementor-widget elementor-widget-gradient_heading\" data-id=\"8d457bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"gradient_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\n            <h1 class=\"gradient-text\">\n                SOC: cos\u2019\u00e8 e perch\u00e9 da solo non basta?\n            <\/h1>\n\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e6db309 elementor-widget elementor-widget-text-editor\" data-id=\"e6db309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La sicurezza informatica \u00e8 cruciale per le aziende di tutte le dimensioni che devono affrontare minacce sempre pi\u00f9 complesse. Il SOC \u00e8 una risposta chiave, ma \u00e8 sufficiente da solo?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fb465c elementor-align-center elementor-widget__width-initial elementor-widget elementor-widget-raven-button\" data-id=\"7fb465c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;turn_to_popup_action_button&quot;:&quot;no&quot;}\" data-widget_type=\"raven-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-widget-wrapper\">\n\t\t\t<a class=\"raven-button raven-button-widget-normal-effect-none  raven-button-text-align-center raven-button-link elementor-animation-shrink\" href=\"https:\/\/www.smeup.com\/magazine\/blog\/security-operation-center-soc-cose-e-perche-da-solo-non-basta\/\">\t\t\t\t<div class=\"raven-button-overlay\" ><\/div>\n\t\t\t\t<span class=\"raven-button-content\">\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"button-text-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"raven-button-texts-wrapper\">\n\t\t\t\t\t\t\t<div class=\"button-text\">\n\t\t\t\t\t\t\t\t<span class=\"raven-button-text\">\n\t\t\t\t\t\t\t\t\tLEGGI L'ARTICOLO\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<span class=\"raven-button-icon raven-button-icon-position-right\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/a>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10f7a6c elementor-align-center elementor-widget__width-initial elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-raven-button\" data-id=\"10f7a6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;turn_to_popup_action_button&quot;:&quot;no&quot;}\" data-widget_type=\"raven-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-widget-wrapper\">\n\t\t\t<a class=\"raven-button raven-button-widget-normal-effect-none  raven-button-text-align-center elementor-animation-shrink\">\t\t\t\t<div class=\"raven-button-overlay\" ><\/div>\n\t\t\t\t<span class=\"raven-button-content\">\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"button-text-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"raven-button-texts-wrapper\">\n\t\t\t\t\t\t\t<div class=\"button-text\">\n\t\t\t\t\t\t\t\t<span class=\"raven-button-text\">\n\t\t\t\t\t\t\t\t\tComing Soon...\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t<\/a>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c068fc5 e-con-full e-flex e-con e-parent\" data-id=\"c068fc5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-c57f406 e-con-full e-flex e-con e-child\" data-id=\"c57f406\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-328539a raven-marquee-horizontal raven-marquee-direction-left elementor-widget elementor-widget-raven-text-marquee\" data-id=\"328539a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-text-marquee.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"raven-content-marquee-container\">\n\t\t\t<div class=\"raven-content-marquee\">\n\t\t\t\t<div class=\"raven-marquee-left-gradient-overlay\"><\/div>\t\t\t\t<div class=\"raven-content-marquee-items-wrapper\">\n\t\t\t\t\t\t\t<div class=\"raven-marquee-item elementor-repeater-item-4316d01 elementor-repeater-item-type-text\" id=\"item_4316d01\">\n\t\t\t<span class=\"raven-marquee-text-item \">Scarica i materiali del Webinar<\/span>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"raven-content-marquee-items-wrapper raven-duplicated-content\">\n\t\t\t\t\t\t\t<div class=\"raven-marquee-item elementor-repeater-item-4316d01 elementor-repeater-item-type-text\" id=\"item_4316d01\">\n\t\t\t<span class=\"raven-marquee-text-item \">Scarica i materiali del Webinar<\/span>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"raven-marquee-right-gradient-overlay\"><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SPECIALE CYBER SECURITY SICUREZZA INFORMATICA COMPLETA? \u00c9 possibile con l&#8217;i-SOC di Cyberoo! SFIDE, SOLUZIONI E STRATEGIE PER LA DIFESA DELLA TUA AZIENDA. Ti sei perso il Webinar?Scopri i materiali condivisi durante l&#8217;evento. SCARICA I MATERIALI Il SOC \u00e8 il cuore pulsante della difesa cibernetica di un&#8217;organizzazione. \u00c8 il luogo in cui i professionisti della sicurezza [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":720,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-710","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicurezza informatica completa? \u00c8 possibile con l\u2019i-SOC di Cyberoo<\/title>\n<meta name=\"description\" content=\"Il SOC \u00e8 il luogo in cui i professionisti della sicurezza informatica lavorano h.24 per identificare, mitigare e rispondere alle minacce digitali in tempo reale. Scopri di pi\u00f9 il 16 novembre! Iscriviti al webinar gratuito!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar | Sicurezza informatica completa? \u00c8 possibile con l\u2019i-SOC di Cyberoo\" \/>\n<meta property=\"og:description\" content=\"Il SOC \u00e8 il luogo in cui i professionisti della sicurezza informatica lavorano h.24 per identificare, mitigare e rispondere alle minacce digitali in tempo reale. Scopri di pi\u00f9 il 16 novembre! Iscriviti al webinar gratuito!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"smeup\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-20T09:35:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.smeup.com\/landing\/wp-content\/uploads\/2023\/10\/Today-is-the-day_edu-week-Cybersecurity-SOC_seo-social-1024x538.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/edu-week-security-soc\\\/\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/edu-week-security-soc\\\/\",\"name\":\"Sicurezza informatica completa? \u00c8 possibile con l\u2019i-SOC di Cyberoo\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/edu-week-security-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/edu-week-security-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/smeup-edu-week-SOC-scaled.jpg\",\"datePublished\":\"2023-10-10T13:35:59+00:00\",\"dateModified\":\"2025-03-20T09:35:57+00:00\",\"description\":\"Il SOC \u00e8 il luogo in cui i professionisti della sicurezza informatica lavorano h.24 per identificare, mitigare e rispondere alle minacce digitali in tempo reale. Scopri di pi\u00f9 il 16 novembre! Iscriviti al webinar gratuito!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/edu-week-security-soc\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.smeup.com\\\/landing\\\/edu-week-security-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/edu-week-security-soc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/smeup-edu-week-SOC-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/smeup-edu-week-SOC-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"smeup-edu-week-SOC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/edu-week-security-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar: ICS Security Soc\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/#website\",\"url\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/\",\"name\":\"smeup\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.smeup.com\\\/landing\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sicurezza informatica completa? \u00c8 possibile con l\u2019i-SOC di Cyberoo","description":"Il SOC \u00e8 il luogo in cui i professionisti della sicurezza informatica lavorano h.24 per identificare, mitigare e rispondere alle minacce digitali in tempo reale. Scopri di pi\u00f9 il 16 novembre! Iscriviti al webinar gratuito!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/","og_locale":"it_IT","og_type":"article","og_title":"Webinar | Sicurezza informatica completa? \u00c8 possibile con l\u2019i-SOC di Cyberoo","og_description":"Il SOC \u00e8 il luogo in cui i professionisti della sicurezza informatica lavorano h.24 per identificare, mitigare e rispondere alle minacce digitali in tempo reale. Scopri di pi\u00f9 il 16 novembre! Iscriviti al webinar gratuito!","og_url":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/","og_site_name":"smeup","article_modified_time":"2025-03-20T09:35:57+00:00","og_image":[{"width":1024,"height":538,"url":"https:\/\/www.smeup.com\/landing\/wp-content\/uploads\/2023\/10\/Today-is-the-day_edu-week-Cybersecurity-SOC_seo-social-1024x538.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/","url":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/","name":"Sicurezza informatica completa? \u00c8 possibile con l\u2019i-SOC di Cyberoo","isPartOf":{"@id":"https:\/\/www.smeup.com\/landing\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/#primaryimage"},"image":{"@id":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.smeup.com\/landing\/wp-content\/uploads\/2023\/10\/smeup-edu-week-SOC-scaled.jpg","datePublished":"2023-10-10T13:35:59+00:00","dateModified":"2025-03-20T09:35:57+00:00","description":"Il SOC \u00e8 il luogo in cui i professionisti della sicurezza informatica lavorano h.24 per identificare, mitigare e rispondere alle minacce digitali in tempo reale. Scopri di pi\u00f9 il 16 novembre! Iscriviti al webinar gratuito!","breadcrumb":{"@id":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/#primaryimage","url":"https:\/\/www.smeup.com\/landing\/wp-content\/uploads\/2023\/10\/smeup-edu-week-SOC-scaled.jpg","contentUrl":"https:\/\/www.smeup.com\/landing\/wp-content\/uploads\/2023\/10\/smeup-edu-week-SOC-scaled.jpg","width":2560,"height":1707,"caption":"smeup-edu-week-SOC"},{"@type":"BreadcrumbList","@id":"https:\/\/www.smeup.com\/landing\/edu-week-security-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.smeup.com\/landing\/"},{"@type":"ListItem","position":2,"name":"Webinar: ICS Security Soc"}]},{"@type":"WebSite","@id":"https:\/\/www.smeup.com\/landing\/#website","url":"https:\/\/www.smeup.com\/landing\/","name":"smeup","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.smeup.com\/landing\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"}]}},"_links":{"self":[{"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/pages\/710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/comments?post=710"}],"version-history":[{"count":7,"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/pages\/710\/revisions"}],"predecessor-version":[{"id":3446,"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/pages\/710\/revisions\/3446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/media\/720"}],"wp:attachment":[{"href":"https:\/\/www.smeup.com\/landing\/wp-json\/wp\/v2\/media?parent=710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}