{"id":13276,"date":"2022-05-16T09:19:00","date_gmt":"2022-05-16T09:19:00","guid":{"rendered":"https:\/\/www.cyber40.it\/date-breakfast\/"},"modified":"2025-05-16T10:06:13","modified_gmt":"2025-05-16T10:06:13","slug":"date-breakfast","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/date-breakfast\/","title":{"rendered":"Date Breakfast:"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Data Breakfast: Artificial Intelligence Attack, a new frontier for cybersecurity<\/h1>\n\n<p>MAY 16, 2022<\/p>\n\n<p>There is much talk about the interactions between Artificial Intelligence and CyberSecurity.<\/p>\n\n<p>On the one hand are the opportunities for increasingly sophisticated defense and prevention tools capable of recognizing ongoing or potential attack patterns; on the other hand, however, is the use that cyber criminals can make of such techniques, manipulating to their own advantage models for predictive analysis and extraction of useful information to configure targeted attacks.<\/p>\n\n<p>Light will be shed on these issues in the &#8216;Data Breakfast: Artificial Intelligence Attack, a new frontier for cybersecurity,&#8217; the online version breakfast organized as part of the activities of CybersecH &#8211; Cybersecurity hardening for A.I. solutions, an innovation project funded by Cyber 4.0 and coordinated by 3RDPLACE | AI models of Datrix group | AI models, a company of DATRIX | AI solutions Group.<\/p>\n\n<p>The event is scheduled for Monday, May 16 at 9 a.m.<\/p>\n\n<p>Speakers will be Prof. Alessio Maria Braccini (Full Professor at Universit\u00e0 degli Studi della Tuscia and member of the Scientific and Steering Committee of CYBER 4.0 &#8211; Cybersecurity Competence Center ), Matteo Bregonzio, PhD (CTO of Datrix) and Pierluigi Vacca (CPO of Datrix).<\/p>\n\n<p>Register for free at the following link: <a href=\"https:\/\/lnkd.in\/d7ZE53C5\">https:\/\/lnkd.in\/d7ZE53C5<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Breakfast: Artificial Intelligence Attack, a new frontier for cybersecurity MAY 16, 2022 There is much talk about the interactions between Artificial Intelligence and CyberSecurity. On the one hand are the opportunities for increasingly sophisticated defense and prevention tools capable&#8230;<\/p>\n","protected":false},"author":11,"featured_media":11410,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":7,"footnotes":""},"categories":[612],"tags":[],"class_list":["post-13276","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events-cyber-4-0-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Date Breakfast: - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/date-breakfast\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Date Breakfast: - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"Data Breakfast: Artificial Intelligence Attack, a new frontier for cybersecurity MAY 16, 2022 There is much talk about the interactions between Artificial Intelligence and CyberSecurity. On the one hand are the opportunities for increasingly sophisticated defense and prevention tools capable...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/date-breakfast\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-16T09:19:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-16T10:06:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"Date Breakfast:\",\"datePublished\":\"2022-05-16T09:19:00+00:00\",\"dateModified\":\"2025-05-16T10:06:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/\"},\"wordCount\":207,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg\",\"articleSection\":[\"Cyber 4.0 Events\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/\",\"name\":\"Date Breakfast: - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg\",\"datePublished\":\"2022-05-16T09:19:00+00:00\",\"dateModified\":\"2025-05-16T10:06:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/date-breakfast\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg\",\"width\":600,\"height\":600,\"caption\":\"Copia di Post Linkedin 3 copia uai 600x600 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/date-breakfast\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Date Breakfast:\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Date Breakfast: - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/date-breakfast\/","og_locale":"en_US","og_type":"article","og_title":"Date Breakfast: - Cyber 4.0","og_description":"Data Breakfast: Artificial Intelligence Attack, a new frontier for cybersecurity MAY 16, 2022 There is much talk about the interactions between Artificial Intelligence and CyberSecurity. On the one hand are the opportunities for increasingly sophisticated defense and prevention tools capable...","og_url":"https:\/\/www.cyber40.it\/en\/date-breakfast\/","og_site_name":"Cyber 4.0","article_published_time":"2022-05-16T09:19:00+00:00","article_modified_time":"2025-05-16T10:06:13+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg","type":"image\/jpeg"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"Date Breakfast:","datePublished":"2022-05-16T09:19:00+00:00","dateModified":"2025-05-16T10:06:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/"},"wordCount":207,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg","articleSection":["Cyber 4.0 Events"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/","url":"https:\/\/www.cyber40.it\/en\/date-breakfast\/","name":"Date Breakfast: - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg","datePublished":"2022-05-16T09:19:00+00:00","dateModified":"2025-05-16T10:06:13+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/date-breakfast\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg","width":600,"height":600,"caption":"Copia di Post Linkedin 3 copia uai 600x600 1"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/date-breakfast\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Date Breakfast:"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":612,"label":"Cyber 4.0 Events"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/05\/Copia-di-Post-Linkedin-3-copia-uai-600x600-1.jpg",600,600,false],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":612,"name":"Cyber 4.0 Events","slug":"events-cyber-4-0-en","term_group":0,"term_taxonomy_id":612,"taxonomy":"category","description":"","parent":0,"count":50,"filter":"raw","term_order":"0","cat_ID":612,"category_count":50,"category_description":"","cat_name":"Cyber 4.0 Events","category_nicename":"events-cyber-4-0-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13276"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13276\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11410"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}