{"id":15974,"date":"2026-05-21T15:52:06","date_gmt":"2026-05-21T15:52:06","guid":{"rendered":"https:\/\/www.cyber40.it\/data-power-governance-security-and-defense-of-intellectual-property\/"},"modified":"2026-05-22T07:32:35","modified_gmt":"2026-05-22T07:32:35","slug":"data-power-governance-security-and-defense-of-intellectual-property","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/","title":{"rendered":"Data Power: Governance, Security and Defense of Intellectual Property"},"content":{"rendered":"\n<p>Generative artificial intelligence is redefining the way data is produced, validated, used and protected, turning it into a <strong>strategic asset for security, innovation and competitiveness<\/strong>. <\/p>\n\n<p>In a context where threats are becoming more rapid, automated, and difficult to intercept, and where intellectual property enters directly into the life cycle of AI systems, the webinar &#8220;<strong>Data Power: Governance, Security, and Intellectual Property Defense<\/strong>&#8221; offered a discussion among institutions, academia, and industry on new challenges related to data governance and cybersecurity.<\/p>\n\n<p>Promoted as part of the series of seminars organized by the <strong><a href=\"https:\/\/www.mimit.gov.it\/it\/\">Ministry of Business and Made in Italy<\/a><\/strong> with <strong>Cyber 4.0<\/strong> and the <strong>Graduate School of Specialization in Telecommunications,<\/strong> the meeting is part of an in-depth study dedicated to the transformations of cybersecurity in a rapidly evolving technological and regulatory framework.<\/p>\n\n<p>Opening the proceedings was <strong>Matteo Lucchetti,<\/strong> <em>chief operating officer of Cyber 4.0<\/em>, who highlighted how the<strong>intersection of artificial intelligence, cybersecurity and intellectual property is opening up new areas of criticality <\/strong>related to data management and the use of content in model training processes. &#8220;<em> Artificial intelligence systems are being trained on huge amounts of content, which is often protected by copyright and intellectual property rights<\/em>,&#8221; Lucchetti noted, drawing attention to both the issue of<strong>using data for model training<\/strong> and the still open issues related to the <strong>ownership of AI-generated outputs<\/strong> and <strong>liability in the event of<\/strong> content <strong>infringement<\/strong> or misuse. <\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Generative AI, data and new risk surfaces<\/strong><\/h2>\n\n<p>In recent years, the spread of generative artificial intelligence has made it even more evident that data is not just a technical resource, but a central element in the security and resilience of digital systems. AI amplifies processing and automation capabilities, but at the same time it broadens the attack surface and <strong>makes it more complex to distinguish authentic content from synthetic or manipulated content<\/strong>. <\/p>\n\n<p>During the webinar, <strong>Giuseppe F. Italiano<\/strong>, <em>Pro-Rector for Artificial Intelligence and Digital Skills<\/em> at the <strong><a href=\"https:\/\/www.luiss.it\">LUISS<\/a><\/strong>, emphasized how GenAI has opened <strong>a new phase for cybersecurity<\/strong>. Vulnerabilities no longer affect only software and infrastructure, but extend to the entire information ecosystem, from training data to the outputs produced by models. <\/p>\n\n<p>Against this backdrop is also the <strong>issue of privacy and protection of content used for training<\/strong>. The point is no longer just technical, but also legal and strategic: figuring out how to balance innovation, data access and rights protection is now an integral part of digital security. <\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Intellectual property and copyright: an unresolved issue<\/strong><\/h2>\n\n<p><strong>Maria Chiara Cesarani<\/strong>, <em>Legal Advisor for Studio Torta<\/em>, also addressed these issues, recalling some of the <strong>main international case law cases<\/strong> related to the use of protected content in generative AI training processes. The speech highlighted the growing tension between the need to <strong>protect copyright<\/strong> and the need <strong>not<\/strong> to <strong>limit technological development and innovation<\/strong>. <\/p>\n\n<p>In the discussion, the difficulty of defining clear boundaries in an ecosystem where models learn from huge amounts of content and generate new outputs from pre-existing materials became clear. In this scenario, the paradigm of fair use was invoked as a possible balancing point between access to data and protection of rights holders. <\/p>\n\n<p>Rounding out the picture, <strong>Gustavo Ghidini<\/strong>, <em>Professor Emeritus of the University of Milan<\/em>, recalled how artistic, scientific and technological culture has developed historically through the reuse of previous contributions. The current crux, he noted, is to find a sustainable balance between this dynamic of innovation and the need to ensure economic protection for rights holders. <\/p>\n\n<p>From here emerges <strong>one of the most sensitive issues in the debate<\/strong>: the ownership of AI-generated outputs. The issue is already at the center of international decisions and litigation that are gradually <strong>defining the boundaries of protection<\/strong>, highlighting the extent to which jurisprudence is being called upon to clarify not only the responsibilities associated with models, but also the very importance of attributing an author or owner to the content produced. Against this backdrop, <strong>the regulatory framework remains fragmented and evolving<\/strong>, necessitating an approach capable of accompanying innovation without stifling it.  <\/p>\n\n<p>The seminar also highlighted the fragmentation of regulatory responses globally, with Europe, the United States and China taking different approaches, making it difficult to build shared international standards. In this regard, <strong>Alessandro De Parolis<\/strong>, <em>MIMIT Patent Application Examiner<\/em>, recalled the role of bodies such as the <strong><a href=\"https:\/\/www.wipo.int\/portal\/en\/index.html\">WIPO <\/a><\/strong>to facilitate comparison and build common references on the implications of AI with respect to intellectual property. <\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Data governance and reference models<\/strong><\/h2>\n\n<p>Another central point that emerged from the discussion concerned data governance. <strong>Antonio Minunno<\/strong>, <em>IT manager<\/em> of the <strong><a href=\"https:\/\/www.chips.it\">Chips-IT Foundation<\/a><\/strong>, recalled the need to consider data as an asset to be designed, guarded and protected <strong>throughout its life cycle<\/strong>. In this perspective,<strong>data governance is not a separate issue from security, but its prerequisite:<\/strong> rules, accountability, access control and continuous monitoring become indispensable tools to reduce the risk of compromise and ensure the reliability of information. <\/p>\n\n<p><strong>Gianni Amato<\/strong>, <em>Head of CERT<\/em> at <strong><a href=\"https:\/\/www.agid.gov.it\/it\">AGID<\/a><\/strong>, emphasized data quality with an effective summary: &#8220;<em>Data is not oil, but it must be like water: transparent, always available and unpolluted<\/em>.&#8221; To support this approach, an application case was presented based on OpenAI tools for restoring previously obfuscated data, demonstrating how<strong>AI can also be used to protect and recover information<\/strong>. <\/p>\n\n<p>Cross-cutting themes also included the need to <strong>move beyond traditional cybersecurity models.<\/strong> In a context where threats are becoming increasingly automated and dynamic, protection can no longer stop at the infrastructure, but must extend to the entire lifecycle of data and AI models. The <strong>Zero Trust paradigm<\/strong> therefore takes center stage, while the use of AI tools for defensive purposes becomes essential to recognize anomalies, protect data and support incident response.  <\/p>\n\n<p><strong>Upcoming appointments<\/strong><\/p>\n\n<p>The cybersecurity seminar series will continue in June with the webinar &#8220;<strong>Cyber health: digital security for biomedicine and biotechnology<\/strong>.&#8221; More details on the date and program will be available in the coming days on the Cyber 4.0 and MIMIT website and social channels. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Generative artificial intelligence is redefining the way data is produced, validated, used and protected, turning it into a strategic asset for security, innovation and competitiveness. In a context where threats are becoming more rapid, automated, and difficult to intercept, and&#8230;<\/p>\n","protected":false},"author":17,"featured_media":15969,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":2,"footnotes":""},"categories":[614,611],"tags":[632,618,616,706,617],"class_list":["post-15974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en","category-news-en","tag-ai-en","tag-cyber-en","tag-cybersecurity-en","tag-datapower","tag-mimit-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Power: Governance, Security and Defense of Intellectual Property - Cyber 4.0<\/title>\n<meta name=\"description\" content=\"The webinar &quot;Data Power: Governance, Security and Intellectual Property Defense&quot; offered a discussion between institutions, academia and.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Power: Governance, Security and Defense of Intellectual Property - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"The webinar &quot;Data Power: Governance, Security and Intellectual Property Defense&quot; offered a discussion between institutions, academia and.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-21T15:52:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-22T07:32:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"giovanna buono\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"giovanna buono\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/\"},\"author\":{\"name\":\"giovanna buono\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\"},\"headline\":\"Data Power: Governance, Security and Defense of Intellectual Property\",\"datePublished\":\"2026-05-21T15:52:06+00:00\",\"dateModified\":\"2026-05-22T07:32:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/\"},\"wordCount\":983,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg\",\"keywords\":[\"AI\",\"Cyber\",\"Cybersecurity\",\"DataPower\",\"MIMIT\"],\"articleSection\":[\"Insights\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/\",\"name\":\"Data Power: Governance, Security and Defense of Intellectual Property - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg\",\"datePublished\":\"2026-05-21T15:52:06+00:00\",\"dateModified\":\"2026-05-22T07:32:35+00:00\",\"description\":\"The webinar \\\"Data Power: Governance, Security and Intellectual Property Defense\\\" offered a discussion between institutions, academia and.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Data Power\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Power: Governance, Security and Defense of Intellectual Property\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f\",\"name\":\"giovanna buono\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g\",\"caption\":\"giovanna buono\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber40\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Power: Governance, Security and Defense of Intellectual Property - Cyber 4.0","description":"The webinar \"Data Power: Governance, Security and Intellectual Property Defense\" offered a discussion between institutions, academia and.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/","og_locale":"en_US","og_type":"article","og_title":"Data Power: Governance, Security and Defense of Intellectual Property - Cyber 4.0","og_description":"The webinar \"Data Power: Governance, Security and Intellectual Property Defense\" offered a discussion between institutions, academia and.","og_url":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/","og_site_name":"Cyber 4.0","article_published_time":"2026-05-21T15:52:06+00:00","article_modified_time":"2026-05-22T07:32:35+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg","type":"image\/jpeg"}],"author":"giovanna buono","twitter_card":"summary_large_image","twitter_misc":{"Written by":"giovanna buono","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/"},"author":{"name":"giovanna buono","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f"},"headline":"Data Power: Governance, Security and Defense of Intellectual Property","datePublished":"2026-05-21T15:52:06+00:00","dateModified":"2026-05-22T07:32:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/"},"wordCount":983,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg","keywords":["AI","Cyber","Cybersecurity","DataPower","MIMIT"],"articleSection":["Insights","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/","url":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/","name":"Data Power: Governance, Security and Defense of Intellectual Property - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg","datePublished":"2026-05-21T15:52:06+00:00","dateModified":"2026-05-22T07:32:35+00:00","description":"The webinar \"Data Power: Governance, Security and Intellectual Property Defense\" offered a discussion between institutions, academia and.","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-scaled.jpg","width":2560,"height":1707,"caption":"Data Power"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/data-power-governance-security-and-defense-of-intellectual-property\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Data Power: Governance, Security and Defense of Intellectual Property"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/d1cfb3a0a515988e98011798f5449a8f","name":"giovanna buono","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d758a31e93ab06d8ab3b5b41bdff4da5d5780d654149caef42d4b264d3855724?s=96&d=mm&r=g","caption":"giovanna buono"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"}]}},"taxonomy_info":{"category":[{"value":614,"label":"Insights"},{"value":611,"label":"News"}],"post_tag":[{"value":632,"label":"AI"},{"value":618,"label":"Cyber"},{"value":616,"label":"Cybersecurity"},{"value":706,"label":"DataPower"},{"value":617,"label":"MIMIT"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2026\/05\/pexels-tima-miroshnichenko-5380642-1024x683.jpg",1024,683,true],"author_info":{"display_name":"giovanna buono","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber40\/"},"comment_info":"","category_info":[{"term_id":614,"name":"Insights","slug":"insights-en","term_group":0,"term_taxonomy_id":614,"taxonomy":"category","description":"","parent":0,"count":16,"filter":"raw","term_order":"0","cat_ID":614,"category_count":16,"category_description":"","cat_name":"Insights","category_nicename":"insights-en","category_parent":0},{"term_id":611,"name":"News","slug":"news-en","term_group":0,"term_taxonomy_id":611,"taxonomy":"category","description":"","parent":0,"count":130,"filter":"raw","term_order":"0","cat_ID":611,"category_count":130,"category_description":"","cat_name":"News","category_nicename":"news-en","category_parent":0}],"tag_info":[{"term_id":632,"name":"AI","slug":"ai-en","term_group":0,"term_taxonomy_id":632,"taxonomy":"post_tag","description":"","parent":0,"count":12,"filter":"raw","term_order":"0"},{"term_id":618,"name":"Cyber","slug":"cyber-en","term_group":0,"term_taxonomy_id":618,"taxonomy":"post_tag","description":"","parent":0,"count":9,"filter":"raw","term_order":"0"},{"term_id":616,"name":"Cybersecurity","slug":"cybersecurity-en","term_group":0,"term_taxonomy_id":616,"taxonomy":"post_tag","description":"","parent":0,"count":32,"filter":"raw","term_order":"0"},{"term_id":706,"name":"DataPower","slug":"datapower","term_group":0,"term_taxonomy_id":706,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":617,"name":"MIMIT","slug":"mimit-en","term_group":0,"term_taxonomy_id":617,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/15974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=15974"}],"version-history":[{"count":3,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/15974\/revisions"}],"predecessor-version":[{"id":15979,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/15974\/revisions\/15979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/15969"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=15974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=15974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=15974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}