{"id":13231,"date":"2023-02-09T16:10:36","date_gmt":"2023-02-09T16:10:36","guid":{"rendered":"https:\/\/www.cyber40.it\/cybersecurity-finally-starts-with-prevention\/"},"modified":"2023-02-09T16:10:36","modified_gmt":"2023-02-09T16:10:36","slug":"cybersecurity-finally-starts-with-prevention","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/","title":{"rendered":"Cybersecurity (Finally) Starts with Prevention"},"content":{"rendered":"<p>Today, major investments in cybersecurity are directed more toward threat control and monitoring tools than response and response. This is also confirmed by an increased culture of companies on the topic, as our Director of Operations, Matteo Lucchetti explained during an interview for <strong>Automazione Industriale<\/strong> magazine. <\/p>\n<p>Read the Full Article: <a href=\"http:\/\/cyber.local\/wp-content\/uploads\/2023\/02\/La-Cybersecurity-Finalmente-parte-dalla-prevenzione.pdf\">Cybersecurity (Finally) Starts with Prevention<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, major investments in cybersecurity are directed more toward threat control and monitoring tools than response and response. This is also confirmed by an increased culture of companies on the topic, as our Director of Operations, Matteo Lucchetti explained during&#8230;<\/p>\n","protected":false},"author":11,"featured_media":11073,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":0,"footnotes":""},"categories":[611],"tags":[],"class_list":["post-13231","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity (Finally) Starts with Prevention - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity (Finally) Starts with Prevention - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Today, major investments in cybersecurity are directed more toward threat control and monitoring tools than response and response. This is also confirmed by an increased culture of companies on the topic, as our Director of Operations, Matteo Lucchetti explained during...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-09T16:10:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1125\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"Cybersecurity (Finally) Starts with Prevention\",\"datePublished\":\"2023-02-09T16:10:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/\"},\"wordCount\":60,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/\",\"name\":\"Cybersecurity (Finally) Starts with Prevention - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png\",\"datePublished\":\"2023-02-09T16:10:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png\",\"width\":1125,\"height\":1125,\"caption\":\"Copia di webinar 28 ottobre quadrato 2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity (Finally) Starts with Prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity (Finally) Starts with Prevention - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity (Finally) Starts with Prevention - Cyber 4.0","og_description":"Today, major investments in cybersecurity are directed more toward threat control and monitoring tools than response and response. This is also confirmed by an increased culture of companies on the topic, as our Director of Operations, Matteo Lucchetti explained during...","og_url":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/","og_site_name":"Cyber 4.0","article_published_time":"2023-02-09T16:10:36+00:00","og_image":[{"width":1125,"height":1125,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png","type":"image\/png"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"Cybersecurity (Finally) Starts with Prevention","datePublished":"2023-02-09T16:10:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/"},"wordCount":60,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/","url":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/","name":"Cybersecurity (Finally) Starts with Prevention - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png","datePublished":"2023-02-09T16:10:36+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2.png","width":1125,"height":1125,"caption":"Copia di webinar 28 ottobre quadrato 2"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/cybersecurity-finally-starts-with-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity (Finally) Starts with Prevention"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":611,"label":"News"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Copia-di-webinar-28-ottobre-quadrato-2-1024x1024.png",1024,1024,true],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":611,"name":"News","slug":"news-en","term_group":0,"term_taxonomy_id":611,"taxonomy":"category","description":"","parent":0,"count":128,"filter":"raw","term_order":"0","cat_ID":611,"category_count":128,"category_description":"","cat_name":"News","category_nicename":"news-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13231"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13231\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11073"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13231"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13231"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}