{"id":13265,"date":"2022-07-06T09:23:00","date_gmt":"2022-07-06T09:23:00","guid":{"rendered":"https:\/\/www.cyber40.it\/technology-polling\/"},"modified":"2025-05-16T10:03:28","modified_gmt":"2025-05-16T10:03:28","slug":"technology-polling","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/technology-polling\/","title":{"rendered":"Technology polling"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Technology scrutiny, certification and security assessment<\/h1>\n\n<p>JULY 6, 2022<\/p>\n\n<p>TheNational Cybersecurity StrategyNational Cybersecurity Strategy sets challenging and multifaceted goals that propel Italy to the forefront of the European and international cybersecurity scenario. What impact will it have on priority areas of focus and what are the implementation prospects for practitioners? <\/p>\n\n<p>We will discuss this in the series of 4 webinars &#8220;The National Cybersecurity Strategy: Impacts and Perspectives&#8221; organized by Cyber 4.0 in collaboration with The National Cybersecurity Agency<\/p>\n\n<p>To register for the webinar click <a href=\"https:\/\/zoom.us\/webinar\/register\/7216560625460\/WN_efhZkOIoTWSqheuPlVI5uw\">here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology scrutiny, certification and security assessment JULY 6, 2022 TheNational Cybersecurity StrategyNational Cybersecurity Strategy sets challenging and multifaceted goals that propel Italy to the forefront of the European and international cybersecurity scenario. What impact will it have on priority areas&#8230;<\/p>\n","protected":false},"author":11,"featured_media":11413,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":2,"footnotes":""},"categories":[612],"tags":[],"class_list":["post-13265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-cyber-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Technology polling - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/technology-polling\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technology polling - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Technology scrutiny, certification and security assessment JULY 6, 2022 TheNational Cybersecurity StrategyNational Cybersecurity Strategy sets challenging and multifaceted goals that propel Italy to the forefront of the European and international cybersecurity scenario. What impact will it have on priority areas...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/technology-polling\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-06T09:23:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T10:03:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"Technology polling\",\"datePublished\":\"2022-07-06T09:23:00+00:00\",\"dateModified\":\"2025-05-16T10:03:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/\"},\"wordCount\":83,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png\",\"articleSection\":[\"Cyber 4.0 Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/\",\"name\":\"Technology polling - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png\",\"datePublished\":\"2022-07-06T09:23:00+00:00\",\"dateModified\":\"2025-05-16T10:03:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/technology-polling\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png\",\"width\":800,\"height\":800,\"caption\":\"1 webinar Strategia uai 800x800 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/technology-polling\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology polling\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technology polling - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/technology-polling\/","og_locale":"en_US","og_type":"article","og_title":"Technology polling - Cyber 4.0","og_description":"Technology scrutiny, certification and security assessment JULY 6, 2022 TheNational Cybersecurity StrategyNational Cybersecurity Strategy sets challenging and multifaceted goals that propel Italy to the forefront of the European and international cybersecurity scenario. What impact will it have on priority areas...","og_url":"https:\/\/www.cyber40.it\/en\/technology-polling\/","og_site_name":"Cyber 4.0","article_published_time":"2022-07-06T09:23:00+00:00","article_modified_time":"2025-05-16T10:03:28+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png","type":"image\/png"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"Technology polling","datePublished":"2022-07-06T09:23:00+00:00","dateModified":"2025-05-16T10:03:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/"},"wordCount":83,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png","articleSection":["Cyber 4.0 Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/","url":"https:\/\/www.cyber40.it\/en\/technology-polling\/","name":"Technology polling - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png","datePublished":"2022-07-06T09:23:00+00:00","dateModified":"2025-05-16T10:03:28+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/technology-polling\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png","width":800,"height":800,"caption":"1 webinar Strategia uai 800x800 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/technology-polling\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Technology polling"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":612,"label":"Cyber 4.0 Events"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/07\/1-webinar-Strategia-uai-800x800-1.png",800,800,false],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":612,"name":"Cyber 4.0 Events","slug":"events-cyber-4-0-en","term_group":0,"term_taxonomy_id":612,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":612,"category_count":49,"category_description":"","cat_name":"Cyber 4.0 Events","category_nicename":"events-cyber-4-0-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13265"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13265\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11413"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}