{"id":13253,"date":"2022-07-28T13:17:20","date_gmt":"2022-07-28T13:17:20","guid":{"rendered":"https:\/\/www.cyber40.it\/an-isac-for-smes\/"},"modified":"2022-07-28T13:17:20","modified_gmt":"2022-07-28T13:17:20","slug":"an-isac-for-smes","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/","title":{"rendered":"An ISAC for SMEs?"},"content":{"rendered":"<p>The proposal emerges from the third meeting of the webinar series on the National Cybersecurity Strategy, organized by Cyber 4.0 in collaboration with National Cybersecurity Agency, dedicated to the topic of public-private information sharing.<br \/>\nThe third meeting of the webinar series that Cyber 4.0, in collaboration with ACN, is devoting to delving into some of the important aspects of the National Cybersecurity Strategy was held on <strong>Wednesday, July 20.<\/strong><br \/>\nThe seminar focused on the theme of <strong>public-private information sharing<\/strong>, with reference both to the activities of the <strong>national CSIRT<\/strong> as a collector and distributor of information on ongoing or suspected attacks and as a channel of contact with law enforcement agencies, and to the <strong>initiatives planned at the level of the National Cybersecurity Strategy<\/strong>, with particular reference to the creation of the national<strong>Information Sharing and Analysis Center<\/strong> (hereinafter also ISAC) and <strong>sectoral ISACs<\/strong>.<br \/>\nISACs are nonprofit organizations that provide:<\/p>\n<ul>\n<li>Provide a <strong>centralized resource<\/strong> for gathering information regarding cyber threats and incidents;<\/li>\n<li>Encourage and enable the <strong>two-way exchange<\/strong> between the private and public worlds of such information;<\/li>\n<li>Foster the <strong>sharing of experience<\/strong>, knowledge and analysis regarding cyber threats and incidents, as well as benchmark <em>best practices<\/em> for mitigating and countering cyber attacks.<\/li>\n<\/ul>\n<p>For more details, please refer to the European Union Agency for Cybersecurity (ENISA) <a href=\"https:\/\/www.enisa.europa.eu\/topics\/national-cyber-security-strategies\/information-sharing\">web page<\/a> on ISACs.<\/p>\n<p>The opening remarks by the National Cybersecurity Agency outlined the many initiatives underway or planned to foster information sharing, operational and contextual, between public agencies and private organizations.<\/p>\n<p>In particular, Actions #34 and #35 of the National Strategy were mentioned, relating to:<\/p>\n<ul>\n<li><strong>Establish an ISAC at ACN<\/strong>, tasked with coordinating the collection and analysis of higher-value added operational and strategic information produced by the various national cyber services. The facility will be linked to the European network of ISACs contributing to the realization of the &#8220;European CyberShield,&#8221; envisioned by the EU Cybersecurity Strategy. <\/li>\n<li><strong>Promote the creation of sectoral ISACs integrated with ACN&#8217;s ISAC<\/strong>, including through public-private initiatives, so as to foster the enhancement of information and best-practice exchange to serve government and domestic industry.<\/li>\n<\/ul>\n<p>The intervention by <strong>CNAIPIC<\/strong> (Postal and Communications Police) reconfirmed the substantial role that information sharing has played with public agencies and private organizations since its establishment. <strong>The cyber threat is by its very nature asymmetrical and multifaceted<\/strong>, and the time and possibilities for attackers always outweigh the time and possibilities for prevention and counteraction. With the aim of <strong>making this collaboration permanent and activating a daily channel of communication<\/strong>, the Postal Police has long since initiated the signing of Conventions with relevant entities. <\/p>\n<p>Experts from the private sector then spoke, representing entities that have developed successful public-private information sharing experiences nationwide.<\/p>\n<p>These were the main insights that emerged during the seminar:<\/p>\n<ul>\n<li>The impetus that will come from the implementation of the National Cybersecurity Strategy will bring to fruition a <strong>model of public-private collaboration that has hitherto been absent on a national scale<\/strong> but has been realized in some virtuous sectors such as banking. ACN&#8217;s essential leadership role will need to be assisted by sector organizations and entities that are already characterized by the implementation of an operational model of collaboration between public institutions and the private world. <\/li>\n<li><strong>Cybersecurity should not be framed as a competitive field<\/strong>, and the return value of <strong>making system<\/strong> and sharing information even with potential actors in the same business sector should be emphasized. In this context, <strong>initiatives to increase<\/strong> trust (trust) among members of the same information sharing network is a basic element on which to build permanent mechanisms of exchange and collaboration. <\/li>\n<li>Therefore, it is <strong>important to have a third party<\/strong> that can act as a <strong>guarantor of<\/strong> the exchange of information, that can neutrally filter and route communications, that can-if requested-anonymize reporting sources, verify their trustworthiness, that carries out trust-building and one-to-one knowledge initiatives of the members of its constituency, and that defines and implements appropriate and uniform rules of engagement.<\/li>\n<li>The number of reports of attacks, either ongoing or suspected, that may affect counterparts in an information sharing community is very high. It becomes not only appropriate but necessary to<strong>use technical solutions and international standards<\/strong> for structured information exchange, such as the MISP standard. This also enables direct dialogue with enterprise SIEM systems.  <\/li>\n<li>The experience developed by CERTFin in this regard has enabled the development of effective <strong>sharing of indicators of compromise (IOCs)<\/strong> and structured information on cyber fraud, organized by severity levels and according to a TLP protocol.<\/li>\n<li>It is important to <strong>build a reporting system<\/strong> of the managed alerts, which allows periodic reports to be extracted that are useful both in terms of cyber threat intelligence and in terms of scenario interpretation and adjustment of corporate prevention and protection policies.<\/li>\n<li>In the context of cybersecurity, <strong>extending the exchange of information beyond the boundaries of one<\/strong> &#8216;s home industry <strong>sector<\/strong> and geographic area assumes paramount importance. Mechanisms of inter-ISAC coordination and\/or with similar entities active in other countries are to be encouraged. Structural in this is the role of the national ISAC as a liaison of the different sectoral ISACs and an interface for international cooperation.  <\/li>\n<li>One issue of interest that remains open is to <strong>determine a way to measure the impact of information sharing initiatives on cybersecurity<\/strong>, so as to target their development and maximize their effectiveness. For while there is no doubt about the practical benefits of belonging to an information sharing network, some variables to be considered as a &#8220;cost&#8221; are certainly the effort required to find and make information available, as well as its corporate sensitivity. <\/li>\n<\/ul>\n<p>The meeting was then an opportunity to launch a <strong>proposal to create an ISAC dedicated explicitly to SMEs, a<\/strong> context that is confirmed to be particularly exposed to information security problems and often underrepresented in system initiatives.<\/p>\n<p>An ISAC for SMEs would provide a<strong> common point of reference for companies<\/strong> that often share issues more related to their size than to their specific industry, and would serve as an aggregation point for sharing incident response experiences and for a collective raising of the level of awareness about ongoing or prospective threats.<\/p>\n<p>In view of the public-private nature of its constituency, and the institutional mandate to support SMEs given to it by the Ministry of Economic Development, as well as the expertise it can bring to bear in managing related initiatives and communications to and from the National Cybersecurity Agency, <strong>Cyber 4.0 certainly represents an important operational context in which to initiate reasoning on the appropriateness of creating an ISAC for SMEs.<\/strong><\/p>\n<p>Webinar presentations are available:<\/p>\n<p><strong>Luca Massarelli<\/strong>, Advisor Agency for National Cybersecurity, <a href=\"http:\/\/cyber.local\/wp-content\/uploads\/2022\/07\/Information-Sharing-e-Collaborazione-Pubblico-Privato.pdf\">Information Sharing and Public-Private Collaboration<\/a><\/p>\n<p><strong>Romano Stasi<\/strong>, CERTFin Chief Operating Officer, <a href=\"http:\/\/cyber.local\/wp-content\/uploads\/2022\/07\/Information-Sharing-e-Public-Private-Partnership.pdf\">Information Sharing and Public-Private Partnerships<\/a>.<\/p>\n<p><strong>Andrea Pugini<\/strong>, Security Governance &amp; Data Protection <a href=\"http:\/\/cyber.local\/wp-content\/uploads\/2022\/07\/Sogei-Information-Sharing.pdf\">Sogei, Sogei Information Sharing<\/a><\/p>\n<p>A <strong>recording of the event<\/strong> is also available by clicking <a href=\"https:\/\/vimeo.com\/732485315\"><strong>here<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The proposal emerges from the third meeting of the webinar series on the National Cybersecurity Strategy, organized by Cyber 4.0 in collaboration with National Cybersecurity Agency, dedicated to the topic of public-private information sharing. The third meeting of the webinar&#8230;<\/p>\n","protected":false},"author":11,"featured_media":11033,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":9,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-13253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>An ISAC for SMEs? - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An ISAC for SMEs? - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"The proposal emerges from the third meeting of the webinar series on the National Cybersecurity Strategy, organized by Cyber 4.0 in collaboration with National Cybersecurity Agency, dedicated to the topic of public-private information sharing. The third meeting of the webinar...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-28T13:17:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"An ISAC for SMEs?\",\"datePublished\":\"2022-07-28T13:17:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/\"},\"wordCount\":1132,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/\",\"name\":\"An ISAC for SMEs? - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png\",\"datePublished\":\"2022-07-28T13:17:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png\",\"width\":600,\"height\":600,\"caption\":\"Articolo un ISAC per le PMI 2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An ISAC for SMEs?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An ISAC for SMEs? - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/","og_locale":"en_US","og_type":"article","og_title":"An ISAC for SMEs? - Cyber 4.0","og_description":"The proposal emerges from the third meeting of the webinar series on the National Cybersecurity Strategy, organized by Cyber 4.0 in collaboration with National Cybersecurity Agency, dedicated to the topic of public-private information sharing. The third meeting of the webinar...","og_url":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/","og_site_name":"Cyber 4.0","article_published_time":"2022-07-28T13:17:20+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png","type":"image\/png"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"An ISAC for SMEs?","datePublished":"2022-07-28T13:17:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/"},"wordCount":1132,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png","articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/","url":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/","name":"An ISAC for SMEs? - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png","datePublished":"2022-07-28T13:17:20+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png","width":600,"height":600,"caption":"Articolo un ISAC per le PMI 2"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/an-isac-for-smes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"An ISAC for SMEs?"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":614,"label":"Insights"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Articolo-un-ISAC-per-le-PMI-2.png",600,600,false],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":614,"name":"Insights","slug":"insights-en","term_group":0,"term_taxonomy_id":614,"taxonomy":"category","description":"","parent":0,"count":15,"filter":"raw","term_order":"0","cat_ID":614,"category_count":15,"category_description":"","cat_name":"Insights","category_nicename":"insights-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13253"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13253\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11033"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}