{"id":3412,"date":"2026-03-10T16:04:34","date_gmt":"2026-03-10T16:04:34","guid":{"rendered":"https:\/\/im-cybersec.com\/?page_id=3412"},"modified":"2026-03-10T19:38:13","modified_gmt":"2026-03-10T19:38:13","slug":"webinars-events","status":"publish","type":"page","link":"https:\/\/im-cybersec.com\/fr\/webinars-events\/","title":{"rendered":"WEBINARS &#038; EVENTS"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-ffc1542d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-0f41bedb wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-1024x256.png ,https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-scaled.png 780w, https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-scaled.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-1024x256.png\" alt=\"\" class=\"uag-image-3416\" width=\"1024\" height=\"256\" title=\"IM CyberSec \u2013 kopija (7)\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bc9d6916 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:49px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-dfb3575d\"><h2 class=\"uagb-heading-text\"><strong>Gardez une longueur d\u2019avance sur chaque menace gr\u00e2ce \u00e0 nos webinaires<\/strong> &amp; Events<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-51c25cac alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-ef635b2d\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-72e73318\"><h3 class=\"uagb-heading-text\">Webinaire : 5 experts contre 1 menace \u2013 les cyberattaques pilot\u00e9es par l\u2019IA <\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Webinar: 5 Experts, 1 Threat - Defending Endpoints Against AI Hacks (IM CyberSec, Huntress, Action1)\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/m03gUN5xTmw?start=3489&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-9f7f1fec\"><p class=\"uagb-heading-text\">Dans cette session, IM CyberSec, en collaboration avec Huntress et Action1, explore comment l\u2019IA acc\u00e9l\u00e8re les cyberattaques, les rendant plus rapides et plus sophistiqu\u00e9es que jamais. Nos experts pr\u00e9sentent les derni\u00e8res techniques d\u2019attaque et fournissent des conseils pratiques pour aider les organisations \u00e0 d\u00e9tecter les menaces, se d\u00e9fendre et garder une longueur d\u2019avance dans ce paysage de menaces en constante \u00e9volution. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d63c0b81\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-36ad275e\"><h2 class=\"uagb-heading-text\">Notre cha\u00eene YouTube<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-024c482d\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-99799248 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/www.youtube.com\/@IM-CyberSec\" rel=\"follow noopener\" target=\"_blank\" role=\"button\"><div class=\"uagb-button__link\">SUBSCRIBE<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-1084ff69 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-89f63b6c\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-6f86f1ec\"><h3 class=\"uagb-heading-text\">La cybers\u00e9curit\u00e9 rencontre le Wasen<\/h3><\/div>\n\n\n\n<div class=\"wp-block-uagb-image uagb-block-673e5f5a wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58-1024x576.png ,https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58.png 780w, https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58-1024x576.png\" alt=\"\" class=\"uag-image-3430\" width=\"1024\" height=\"576\" title=\"Nenaslovljeni dizajn (58)\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-4ef26cc8\"><p class=\"uagb-heading-text\">Le 1er octobre 2025, IM CyberSec a r\u00e9uni ses clients et partenaires lors du c\u00e9l\u00e8bre \u00e9v\u00e9nement Wasen \u00e0 Stuttgart. Tout en profitant de cette tradition allemande bien connue, nous avons partag\u00e9 des perspectives, discut\u00e9 des derniers d\u00e9fis en mati\u00e8re de cybers\u00e9curit\u00e9 et \u00e9chang\u00e9 des id\u00e9es sur la mani\u00e8re dont les organisations peuvent garder une longueur d\u2019avance face \u00e0 l\u2019\u00e9volution des menaces \u2014 le tout dans une atmosph\u00e8re d\u00e9tendue et festive. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6dfd7c13\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-76e28012\"><h3 class=\"uagb-heading-text\">Webinaire : Mise \u00e0 jour SMA 15.00<\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Quest KACE SMA Update 15.0 \u2013 Live Demo Webinar\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/1E1ofhJyvLE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-be516487\"><p class=\"uagb-heading-text\">Dans ce webinaire, nous explorons les principales mises \u00e0 jour de KACE Systems Management Appliance 15.0 et montrons comment les administrateurs peuvent utiliser les nouvelles fonctionnalit\u00e9s dans leurs flux de travail quotidiens. Nous mettons en avant des tableaux de bord modernes et personnalisables, une priorisation des correctifs plus intelligente avec les scores CVSS\/EPSS, un acc\u00e8s \u00e0 distance am\u00e9lior\u00e9 avec Splashtop, ainsi qu\u2019une journalisation s\u00e9curis\u00e9e et une navigation optimis\u00e9es, avec des conseils pratiques pour simplifier la gestion des appareils et renforcer la s\u00e9curit\u00e9 des endpoints. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c658460f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-85787955\"><h3 class=\"uagb-heading-text\">Webinaire : Qu\u2019est-ce que le Zero Trust ?<\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Webinar: Zero Trust - How Secure Are Your Endpoints\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/GXvXftnn1oQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-db090cdb\"><p class=\"uagb-heading-text\">Lors de cette session, IM CyberSec dirige la discussion sur les raisons pour lesquelles le mod\u00e8le de s\u00e9curit\u00e9 traditionnel \u00ab ch\u00e2teau et douve \u00bb n\u2019est plus efficace dans les environnements cloud modernes. Nous pr\u00e9sentons l\u2019approche Zero Trust, en montrant comment v\u00e9rifier chaque utilisateur et appareil, s\u00e9curiser les endpoints et prot\u00e9ger les donn\u00e9es dans un monde sans p\u00e9rim\u00e8tre. Nos experts invit\u00e9s d\u2019Action1 interviennent \u00e0 la fin pour partager des perspectives suppl\u00e9mentaires et des conseils pratiques pour mettre en \u0153uvre des strat\u00e9gies Zero Trust. <\/p><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-24cc8c16 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Be Ahead of Every Threat With Our Webinars &amp; Events Webinar: 5 Experts against 1 Threat &#8211; AI-Driver Cyber Attacks In this session, IM CyberSec together with Huntress and Action1, explore how AI is accelerating cyber attacks, making them faster and more sophisticated than ever. Our experts share the latest attack techniques and provide practical [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3153,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-site-content-layout":"normal-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3412","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WEBINARS &amp; EVENTS - IM CyberSec<\/title>\n<meta name=\"description\" content=\"Don&#039;t Want to be Hacked or Need a Strategy? Let&#039;s Connect! We will respond to your inquiry at the earliest opportunity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/im-cybersec.com\/fr\/webinars-events\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WEBINARS &amp; EVENTS - IM CyberSec\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t Want to be Hacked or Need a Strategy? Let&#039;s Connect! We will respond to your inquiry at the earliest opportunity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/im-cybersec.com\/fr\/webinars-events\/\" \/>\n<meta property=\"og:site_name\" content=\"IM CyberSec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T19:38:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/\",\"url\":\"https:\/\/im-cybersec.com\/webinars-events\/\",\"name\":\"WEBINARS & EVENTS - IM CyberSec\",\"isPartOf\":{\"@id\":\"https:\/\/im-cybersec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"datePublished\":\"2026-03-10T16:04:34+00:00\",\"dateModified\":\"2026-03-10T19:38:13+00:00\",\"description\":\"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity\",\"breadcrumb\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/im-cybersec.com\/webinars-events\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\",\"url\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"contentUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/im-cybersec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WEBINARS &#038; EVENTS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/im-cybersec.com\/#website\",\"url\":\"https:\/\/im-cybersec.com\/\",\"name\":\"IM CyberSec\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/im-cybersec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WEBINARS & EVENTS - IM CyberSec","description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/im-cybersec.com\/fr\/webinars-events\/","og_locale":"fr_FR","og_type":"article","og_title":"WEBINARS & EVENTS - IM CyberSec","og_description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","og_url":"https:\/\/im-cybersec.com\/fr\/webinars-events\/","og_site_name":"IM CyberSec","article_modified_time":"2026-03-10T19:38:13+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/im-cybersec.com\/webinars-events\/","url":"https:\/\/im-cybersec.com\/webinars-events\/","name":"WEBINARS & EVENTS - IM CyberSec","isPartOf":{"@id":"https:\/\/im-cybersec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage"},"image":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage"},"thumbnailUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","datePublished":"2026-03-10T16:04:34+00:00","dateModified":"2026-03-10T19:38:13+00:00","description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","breadcrumb":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/im-cybersec.com\/webinars-events\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage","url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","contentUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/im-cybersec.com\/"},{"@type":"ListItem","position":2,"name":"WEBINARS &#038; EVENTS"}]},{"@type":"WebSite","@id":"https:\/\/im-cybersec.com\/#website","url":"https:\/\/im-cybersec.com\/","name":"IM CyberSec","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/im-cybersec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"uagb_featured_image_src":{"full":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png",2560,2560,false],"thumbnail":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-150x150.png",150,150,true],"medium":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-300x300.png",300,300,true],"medium_large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-768x768.png",768,768,true],"large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1024x1024.png",1024,1024,true],"1536x1536":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1536x1536.png",1536,1536,true],"2048x2048":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-2048x2048.png",2048,2048,true],"trp-custom-language-flag":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-12x12.png",12,12,true]},"uagb_author_info":{"display_name":"anita.xd@yahoo.com","author_link":"https:\/\/im-cybersec.com\/fr\/author\/anita-xdyahoo-com\/"},"uagb_comment_info":0,"uagb_excerpt":"Be Ahead of Every Threat With Our Webinars &amp; Events Webinar: 5 Experts against 1 Threat &#8211; AI-Driver Cyber Attacks In this session, IM CyberSec together with Huntress and Action1, explore how AI is accelerating cyber attacks, making them faster and more sophisticated than ever. Our experts share the latest attack techniques and provide practical\u2026","_links":{"self":[{"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/pages\/3412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/comments?post=3412"}],"version-history":[{"count":13,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/pages\/3412\/revisions"}],"predecessor-version":[{"id":3446,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/pages\/3412\/revisions\/3446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/media\/3153"}],"wp:attachment":[{"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/media?parent=3412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}