{"id":13257,"date":"2022-07-22T09:32:00","date_gmt":"2022-07-22T09:32:00","guid":{"rendered":"https:\/\/www.cyber40.it\/training-as-a-strategic-lever-of-cyber-resilience\/"},"modified":"2025-05-16T10:01:22","modified_gmt":"2025-05-16T10:01:22","slug":"training-as-a-strategic-lever-of-cyber-resilience","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/","title":{"rendered":"Training as a strategic lever of cyber resilience"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Training as a strategic lever of cyber resilience<\/h1>\n\n<p>JULY 27, 2022<\/p>\n\n<p>Next webinar on Wednesday, 27 at 4 p.m. with an in-depth look at the topic of cybersecurity training. A priority area of focus for the National Cybersecurity Strategy, the role of training goes beyond upskilling, reskilling and\/or creating new skills, but becomes a true lever of cyber resilience and risk management for a growing number of organizations. <\/p>\n\n<p>Together with ACN, Luiss, Tim and Netgroup, we will analyze the current scenario in academia and the private sector, illustrating the main initiatives underway and highlighting opportunities for growth and enhancement of training plans, including with reference to the recently published Training 4.0 plan.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Training as a strategic lever of cyber resilience JULY 27, 2022 Next webinar on Wednesday, 27 at 4 p.m. with an in-depth look at the topic of cybersecurity training. A priority area of focus for the National Cybersecurity Strategy, the&#8230;<\/p>\n","protected":false},"author":11,"featured_media":11421,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":7,"footnotes":""},"categories":[612],"tags":[],"class_list":["post-13257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-cyber-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Training as a strategic lever of cyber resilience - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Training as a strategic lever of cyber resilience - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Training as a strategic lever of cyber resilience JULY 27, 2022 Next webinar on Wednesday, 27 at 4 p.m. with an in-depth look at the topic of cybersecurity training. A priority area of focus for the National Cybersecurity Strategy, the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-22T09:32:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T10:01:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"Training as a strategic lever of cyber resilience\",\"datePublished\":\"2022-07-22T09:32:00+00:00\",\"dateModified\":\"2025-05-16T10:01:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/\"},\"wordCount\":117,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png\",\"articleSection\":[\"Cyber 4.0 Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/\",\"name\":\"Training as a strategic lever of cyber resilience - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png\",\"datePublished\":\"2022-07-22T09:32:00+00:00\",\"dateModified\":\"2025-05-16T10:01:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png\",\"width\":720,\"height\":720,\"caption\":\"Formazione come leva strategica di cyber resilienza\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Training as a strategic lever of cyber resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Training as a strategic lever of cyber resilience - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/","og_locale":"en_US","og_type":"article","og_title":"Training as a strategic lever of cyber resilience - Cyber 4.0","og_description":"Training as a strategic lever of cyber resilience JULY 27, 2022 Next webinar on Wednesday, 27 at 4 p.m. with an in-depth look at the topic of cybersecurity training. A priority area of focus for the National Cybersecurity Strategy, the...","og_url":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/","og_site_name":"Cyber 4.0","article_published_time":"2022-07-22T09:32:00+00:00","article_modified_time":"2025-05-16T10:01:22+00:00","og_image":[{"width":720,"height":720,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png","type":"image\/png"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"Training as a strategic lever of cyber resilience","datePublished":"2022-07-22T09:32:00+00:00","dateModified":"2025-05-16T10:01:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/"},"wordCount":117,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png","articleSection":["Cyber 4.0 Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/","url":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/","name":"Training as a strategic lever of cyber resilience - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png","datePublished":"2022-07-22T09:32:00+00:00","dateModified":"2025-05-16T10:01:22+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png","width":720,"height":720,"caption":"Formazione come leva strategica di cyber resilienza"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/training-as-a-strategic-lever-of-cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Training as a strategic lever of cyber resilience"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":612,"label":"Cyber 4.0 Events"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/Formazione-come-leva-strategica-di-cyber-resilienza.png",720,720,false],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":612,"name":"Cyber 4.0 Events","slug":"events-cyber-4-0-en","term_group":0,"term_taxonomy_id":612,"taxonomy":"category","description":"","parent":0,"count":50,"filter":"raw","term_order":"0","cat_ID":612,"category_count":50,"category_description":"","cat_name":"Cyber 4.0 Events","category_nicename":"events-cyber-4-0-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13257"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13257\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11421"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}