{"id":13080,"date":"2024-09-04T14:00:43","date_gmt":"2024-09-04T14:00:43","guid":{"rendered":"https:\/\/www.cyber40.it\/cybersecurity-is-a-young-mans-game\/"},"modified":"2025-05-16T09:13:51","modified_gmt":"2025-05-16T09:13:51","slug":"cybersecurity-is-a-young-mans-game","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/","title":{"rendered":"Cybersecurity is a young man&#8217;s game"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><em>Cybersecurity is a young man&#8217;s game<\/em><\/h3>\n\n<h4 class=\"wp-block-heading\"><em>Gamification experiments to raise awareness among youth and companies<\/em><\/h4>\n\n<p><em>Rome Future Week 2024, Home of Emerging Technologies<\/em><\/p>\n\n<p><em>September 20, 2024, 12 noon &#8211; 2 p.m.<\/em><\/p>\n\n<p>A meeting dedicated to <em>gamification<\/em> and video games as an approach to cybersecurity awareness, organized by <strong>Cyber 4.0<\/strong><strong> <\/strong>(National Highly Specialized Competence Center for Cybersecurity), in collaboration with <strong>CTE Rome, Invitalia and IIdea <\/strong>(Italian Interactive Digital Entertainment Association).<\/p>\n\n<p>The event will provide an overview of the market and opportunities in the world of video games and cybersecurity, highlighting, as a point of contact between the two sectors, the spread of <em>gamification<\/em> experiences as a cyber awareness technique.<\/p>\n\n<p>Some of the finalist projects of <strong>Let&#8217;s Cyber Game<\/strong>, the national contest promoted by the <strong>Ministry of Business and Made in Italy<\/strong>, with the support of Cyber 4.0 and Invitalia that allowed participants to design, develop, test and create a video game to educate young people about cybersecurity and countering cybercrime, will be presented as a concrete use case. The three winners of the competition, which involved about one hundred and fifty students from Italy&#8217;s twenty-two ITS Academies belonging to the ICT area, were selected from the ten finalists by the commission of experts appointed by MIMIT and were awarded on the opening day of FORUM PA 2024. <\/p>\n\n<p>The use of <em>gamification<\/em> techniques in the context of cybersecurity awareness activities is an increasingly used approach especially in companies. In addition to the effectiveness of <em>learning-by-doing<\/em>, this approach allows users to increase their level of attention through greater involvement in training activities. Accompanying traditional training modes with <em>gamification<\/em> experiences, it represents to date one of the most comprehensive training methods for spreading cyber awareness.  <\/p>\n\n<p>During the event, which will allow people to try out video games developed by the Let&#8217;s Cyber Game teams, <strong>business matching activities<\/strong> aimed at aspiring entrepreneurs and startups interested in starting and managing projects in the video game and cybersecurity sectors through dedicated one-on-one meetings will also be offered.<\/p>\n\n<h3 class=\"wp-block-heading\"><strong>Agenda<\/strong><\/h3>\n\n<p>12.00<\/p>\n\n<p>Opening remarks:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>The importance of Gamification as an innovative approach to cybersecurity awareness and youth-focused initiatives: the example of Let&#8217;s Cyber Game.<\/li>\n<\/ul>\n\n<p><strong>Matteo Lucchetti <\/strong><em>Chief Operating Officer, Cyber 4.0<\/em><\/p>\n\n<p><strong>Alessandro Calabrese<\/strong><em> <\/em><em>Head of Training and Advisory Cyber 4.0<\/em><\/p>\n\n<p>12.05<\/p>\n\n<p>Institutional Greetings<\/p>\n\n<p><strong>Roberta Serroni, <\/strong><em>Director Division VIII &#8211; Electronic communications networks and services for public and private use, MIMIT<\/em><\/p>\n\n<p>12.10<\/p>\n\n<p>Gamification as a tool for cybersecurity awareness &amp; training in enterprises: effectiveness, market demand and prospects<\/p>\n\n<p><strong>Alessandro Curioni  <\/strong><em>President Di.Gi. Academy<\/em><\/p>\n\n<p>12.20<\/p>\n\n<p>The video game market and business opportunities: megatrend, success story, and use case.  <em>The Italian video game industry and the professionals involved<\/em><\/p>\n\n<p><strong>Alberto Simonetti <\/strong><em>Policy &amp; Public Affairs Manager at IIDEA<\/em><\/p>\n\n<p>12.30<\/p>\n\n<p>Business modeling &amp; planning and startup bootstrapping for aspiring entrepreneurs in the video game and cybersecurity industries: from business idea, to implementation phases.<\/p>\n\n<p><strong>Susanna Zuccarini <\/strong><em>Business Development Specialist, Invitalia<\/em><\/p>\n\n<p>12.40<\/p>\n\n<p>Interview with some of the finalist teams in the Lets&#8217; Cyber Game contest:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>The design and development phase of the demo, subsequent versions and next steps<\/li>\n\n\n\n<li>Live presentation of demos<\/li>\n<\/ul>\n\n<p><strong>Team Shard Tower &#8211; ITS Lazio Digital: <\/strong>Alfredo Campagna, Jacopo Colistra, Federico Salvucci, Francesco Stazi<\/p>\n\n<p><strong>Bean Team &#8211; ITS Rossellini:<\/strong> Simone Serratore<\/p>\n\n<p>13.00<\/p>\n\n<p>Light Lunch, Networking &amp; Demo<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Set up stations to try out Let&#8217;s Cyber Game finalist video games.<\/li>\n\n\n\n<li>Set up dedicated stations for business matching and one-on-one meetings aimed at aspiring entrepreneurs and startups.<\/li>\n<\/ul>\n\n<p>14.00<\/p>\n\n<p>Acknowledgements and closing of the proceedings<\/p>\n\n<p><strong>Matteo Lucchetti<\/strong> <em>Cyber 4.0 chief operating officer<\/em><\/p>\n\n<p><a href=\"https:\/\/www.eventbrite.com\/e\/la-cybersecurity-e-un-gioco-da-ragazzi-tickets-1008368275657\">To participate register here<\/a><\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a young man&#8217;s game Gamification experiments to raise awareness among youth and companies Rome Future Week 2024, Home of Emerging Technologies September 20, 2024, 12 noon &#8211; 2 p.m. A meeting dedicated to gamification and video games as&#8230;<\/p>\n","protected":false},"author":17,"featured_media":12833,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":6,"footnotes":""},"categories":[612],"tags":[],"class_list":["post-13080","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-cyber-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity is a young man&#039;s game - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity is a young man&#039;s game - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is a young man&#8217;s game Gamification experiments to raise awareness among youth and companies Rome Future Week 2024, Home of Emerging Technologies September 20, 2024, 12 noon &#8211; 2 p.m. A meeting dedicated to gamification and video games as...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-04T14:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T09:13:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"giovanna buono\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"giovanna buono\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/\"},\"author\":{\"name\":\"giovanna buono\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\"},\"headline\":\"Cybersecurity is a young man&#8217;s game\",\"datePublished\":\"2024-09-04T14:00:43+00:00\",\"dateModified\":\"2025-05-16T09:13:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/\"},\"wordCount\":575,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png\",\"articleSection\":[\"Cyber 4.0 Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/\",\"name\":\"Cybersecurity is a young man's game - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png\",\"datePublished\":\"2024-09-04T14:00:43+00:00\",\"dateModified\":\"2025-05-16T09:13:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png\",\"width\":1920,\"height\":1080,\"caption\":\"Copia di Rome Future Week 2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity is a young man&#8217;s game\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\",\"name\":\"giovanna buono\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"caption\":\"giovanna buono\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber40\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity is a young man's game - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity is a young man's game - Cyber 4.0","og_description":"Cybersecurity is a young man&#8217;s game Gamification experiments to raise awareness among youth and companies Rome Future Week 2024, Home of Emerging Technologies September 20, 2024, 12 noon &#8211; 2 p.m. A meeting dedicated to gamification and video games as...","og_url":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/","og_site_name":"Cyber 4.0","article_published_time":"2024-09-04T14:00:43+00:00","article_modified_time":"2025-05-16T09:13:51+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png","type":"image\/png"}],"author":"giovanna buono","twitter_card":"summary_large_image","twitter_misc":{"Written by":"giovanna buono","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/"},"author":{"name":"giovanna buono","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f"},"headline":"Cybersecurity is a young man&#8217;s game","datePublished":"2024-09-04T14:00:43+00:00","dateModified":"2025-05-16T09:13:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/"},"wordCount":575,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png","articleSection":["Cyber 4.0 Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/","url":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/","name":"Cybersecurity is a young man's game - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png","datePublished":"2024-09-04T14:00:43+00:00","dateModified":"2025-05-16T09:13:51+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2.png","width":1920,"height":1080,"caption":"Copia di Rome Future Week 2"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-is-a-young-mans-game\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity is a young man&#8217;s game"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f","name":"giovanna buono","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","caption":"giovanna buono"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"}]}},"taxonomy_info":{"category":[{"value":612,"label":"Cyber 4.0 Events"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2024\/09\/Copia-di-Rome-Future-Week-2-1024x576.png",1024,576,true],"author_info":{"display_name":"giovanna buono","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"},"comment_info":"","category_info":[{"term_id":612,"name":"Cyber 4.0 Events","slug":"events-cyber-4-0-en","term_group":0,"term_taxonomy_id":612,"taxonomy":"category","description":"","parent":0,"count":50,"filter":"raw","term_order":"0","cat_ID":612,"category_count":50,"category_description":"","cat_name":"Cyber 4.0 Events","category_nicename":"events-cyber-4-0-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13080"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13080\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/12833"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}