{"id":13050,"date":"2024-11-20T10:20:46","date_gmt":"2024-11-20T10:20:46","guid":{"rendered":"https:\/\/www.cyber40.it\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/"},"modified":"2025-05-27T12:52:29","modified_gmt":"2025-05-27T12:52:29","slug":"digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/","title":{"rendered":"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable"},"content":{"rendered":"\n<p>During the <strong>22nd ICT Security Forum<\/strong>, the Roundtable dedicated to Digital Health and NRP brought together leading experts in the field with the aim of analyzing the strategic role of cybersecurity and emerging technologies in the digital transformation of the Italian health system.<\/p>\n\n<p>Moderated by <strong>Stefania Stefanelli<\/strong>, Lawyer and Associate Professor of Private Law at the University of Perugia, the <em>panel <\/em>featured:<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Mario A. Bochicchio<\/strong>, University of Bari, CINI Digital Health National Lab;<\/li>\n\n\n\n<li><strong>Alessio Gerbaldi<\/strong>, Head of Research and Innovation at the Cyber 4.0 Competence Center;<\/li>\n\n\n\n<li><strong>Andrea Margheri<\/strong>, Head of the Industrial and Technology Projects Division of the Industrial, Technology and Research Programs Service of the National Cybersecurity Agency;<\/li>\n\n\n\n<li><strong>Matteo Montesi<\/strong>, Director UOC ICT Systems of ASL Roma 3;<\/li>\n\n\n\n<li><strong>Mauro Moruzzi<\/strong>, Department for Digital Transformation at the Prime Minister&#8217;s Office &#8211; Program Manager for the Organization of Digital Health Services<\/li>\n<\/ul>\n\n<p>The discussion delved into the systemic challenges and opportunities arising from the adoption of advanced technology solutions to ensure safer, more resilient and efficient healthcare infrastructures.<\/p>\n\n<p>For Cyber 4.0, <strong>Alessio Gerbaldi<\/strong> &#8216;s talk was on the topic. <em><strong>&#8220;Digital Health: Technological Innovation and Strategic Projects.&#8221;<\/strong><\/em><\/p>\n\n<h6 class=\"wp-block-heading has-theme-palette-3-color has-text-color has-link-color wp-elements-9455fb665d1e265536c5098a2a0aec45\" style=\"font-size:18px\">Cyber 4.0 presented the strategic projects funded through the Next-Gen EU funding, focusing on key areas such as pharmaceutical supply chain security, home rehabilitation, advanced diagnostics, and medical device integration.Agreeing with the other <em>panelists<\/em>, Gerbaldi emphasized the importance of technological innovation both to improve the quality of care and to protect the healthcare system from growing digital threats.<\/h6>\n\n<figure class=\"wp-block-image\" id=\"attachment_19687\"><img decoding=\"async\" src=\"https:\/\/www.ictsecuritymagazine.com\/wp-content\/uploads\/LEO00288.jpg\" alt=\"Digital health and Next-Gen EU funding, the role of cybersecurity and new technologies: Alessio Gerbaldi, Head of Research and Innovation at the Cyber 4.0 Competence Center.\" class=\"wp-image-19687\"\/><figcaption class=\"wp-element-caption\">Alessio Gerbaldi, Head of Research and Innovation, Cyber 4.0 Competence Center<\/figcaption><\/figure>\n\n<p>He then detailed some advanced telemedicine projects that enable patients to receive treatment and rehabilitative care directly at home, reducing waiting times and improving the efficiency of the healthcare system. Integration of telemedicine with wearable devices and remote sensors comes to the rescue in this regard, enabling constant monitoring of patients&#8217; health conditions and providing physicians with real-time information to tailor care to each individual&#8217;s specific needs. <\/p>\n\n<p>Gerbaldi also addressed the issue of cybersecurity, highlighting how protecting data and infrastructure is key to ensuring business continuity and public trust in digital services. He stressed the need to develop technological solutions that not only improve the effectiveness of care, but are also secure and resilient to cyber attacks. In addition, he highlighted the importance of collaboration between research organizations, technology companies and healthcare institutions to create an innovative ecosystem that can effectively respond to the challenges of digital healthcare.  <\/p>\n\n<p>Finally, he discussed the role of continuing education for healthcare staff, emphasizing that the adoption of new technologies requires adequate skills development. He proposed the creation of specific training programs for the use of <em>blockchain <\/em>and artificial intelligence to ensure that staff are prepared to take full advantage of the potential of these technologies. Only through a combination of technological innovation, security and training will it be possible to build a more efficient, secure and patient-oriented healthcare system.  <\/p>\n\n<p><a href=\"https:\/\/www.ictsecuritymagazine.com\/notizie\/sanita-digitale-resiliente\/\"><strong>Click here to read the full article in ICT Security Magazine<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the 22nd ICT Security Forum, the Roundtable dedicated to Digital Health and NRP brought together leading experts in the field with the aim of analyzing the strategic role of cybersecurity and emerging technologies in the digital transformation of the&#8230;<\/p>\n","protected":false},"author":17,"featured_media":12886,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":4,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-13050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"During the 22nd ICT Security Forum, the Roundtable dedicated to Digital Health and NRP brought together leading experts in the field with the aim of analyzing the strategic role of cybersecurity and emerging technologies in the digital transformation of the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-20T10:20:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-27T12:52:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"giovanna buono\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"giovanna buono\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/\"},\"author\":{\"name\":\"giovanna buono\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\"},\"headline\":\"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable\",\"datePublished\":\"2024-11-20T10:20:46+00:00\",\"dateModified\":\"2025-05-27T12:52:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/\"},\"wordCount\":506,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/\",\"name\":\"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg\",\"datePublished\":\"2024-11-20T10:20:46+00:00\",\"dateModified\":\"2025-05-27T12:52:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg\",\"width\":900,\"height\":600,\"caption\":\"Alessio\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\",\"name\":\"giovanna buono\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"caption\":\"giovanna buono\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber40\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/","og_locale":"en_US","og_type":"article","og_title":"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable - Cyber 4.0","og_description":"During the 22nd ICT Security Forum, the Roundtable dedicated to Digital Health and NRP brought together leading experts in the field with the aim of analyzing the strategic role of cybersecurity and emerging technologies in the digital transformation of the...","og_url":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/","og_site_name":"Cyber 4.0","article_published_time":"2024-11-20T10:20:46+00:00","article_modified_time":"2025-05-27T12:52:29+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg","type":"image\/jpeg"}],"author":"giovanna buono","twitter_card":"summary_large_image","twitter_misc":{"Written by":"giovanna buono","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/"},"author":{"name":"giovanna buono","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f"},"headline":"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable","datePublished":"2024-11-20T10:20:46+00:00","dateModified":"2025-05-27T12:52:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/"},"wordCount":506,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg","articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/","url":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/","name":"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg","datePublished":"2024-11-20T10:20:46+00:00","dateModified":"2025-05-27T12:52:29+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg","width":900,"height":600,"caption":"Alessio"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/digital-health-and-nrp-ict-security-magazine-publishes-the-report-on-the-ict-security-forum-roundtable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Digital Health and Next-Gen EU funding : ICT Security Magazine publishes the report on the ICT Security Forum Roundtable"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f","name":"giovanna buono","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","caption":"giovanna buono"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"}]}},"taxonomy_info":{"category":[{"value":614,"label":"Insights"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/11\/Alessio.jpeg",900,600,false],"author_info":{"display_name":"giovanna buono","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"},"comment_info":"","category_info":[{"term_id":614,"name":"Insights","slug":"insights-en","term_group":0,"term_taxonomy_id":614,"taxonomy":"category","description":"","parent":0,"count":15,"filter":"raw","term_order":"0","cat_ID":614,"category_count":15,"category_description":"","cat_name":"Insights","category_nicename":"insights-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13050"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13050\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/12886"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}