{"id":3412,"date":"2026-03-10T16:04:34","date_gmt":"2026-03-10T16:04:34","guid":{"rendered":"https:\/\/im-cybersec.com\/?page_id=3412"},"modified":"2026-03-10T19:38:13","modified_gmt":"2026-03-10T19:38:13","slug":"webinars-events","status":"publish","type":"page","link":"https:\/\/im-cybersec.com\/nl\/webinars-events\/","title":{"rendered":"WEBINARS &#038; EVENTS"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-ffc1542d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-0f41bedb wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-1024x256.png ,https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-scaled.png 780w, https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-scaled.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/IM-CyberSec-\u2013-kopija-7-1024x256.png\" alt=\"\" class=\"uag-image-3416\" width=\"1024\" height=\"256\" title=\"IM CyberSec \u2013 kopija (7)\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bc9d6916 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:49px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-dfb3575d\"><h2 class=\"uagb-heading-text\"><strong>Blijf elke dreiging een stap voor met onze webinars<\/strong> &amp; Events<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-51c25cac alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-ef635b2d\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-72e73318\"><h3 class=\"uagb-heading-text\">Webinar: 5 experts tegen 1 dreiging \u2013 AI-gestuurde cyberaanvallen <\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Webinar: 5 Experts, 1 Threat - Defending Endpoints Against AI Hacks (IM CyberSec, Huntress, Action1)\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/m03gUN5xTmw?start=3489&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-9f7f1fec\"><p class=\"uagb-heading-text\">In deze sessie onderzoeken IM CyberSec samen met Huntress en Action1 hoe AI cyberaanvallen versnelt en ze sneller en geavanceerder maakt dan ooit tevoren. Onze experts delen de nieuwste aanvalstechnieken en geven praktische richtlijnen over hoe organisaties bedreigingen kunnen detecteren, zich kunnen verdedigen en voorop kunnen blijven in dit snel evoluerende dreigingslandschap. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-d63c0b81\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-36ad275e\"><h2 class=\"uagb-heading-text\">Ons YouTube Kanaal<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-024c482d\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-99799248 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/www.youtube.com\/@IM-CyberSec\" rel=\"follow noopener\" target=\"_blank\" role=\"button\"><div class=\"uagb-button__link\">SUBSCRIBE<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-1084ff69 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-container uagb-block-89f63b6c\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-6f86f1ec\"><h3 class=\"uagb-heading-text\">Cybersecurity ontmoet Wasen<\/h3><\/div>\n\n\n\n<div class=\"wp-block-uagb-image uagb-block-673e5f5a wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58-1024x576.png ,https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58.png 780w, https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2026\/03\/Nenaslovljeni-dizajn-58-1024x576.png\" alt=\"\" class=\"uag-image-3430\" width=\"1024\" height=\"576\" title=\"Nenaslovljeni dizajn (58)\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-4ef26cc8\"><p class=\"uagb-heading-text\">Op 1 oktober 2025 bracht IM CyberSec klanten en partners samen tijdens het populaire Wasen-evenement in Stuttgart. Terwijl we genoten van deze bekende Duitse traditie, deelden we inzichten, bespraken we de nieuwste cybersecurity-uitdagingen en wisselden we idee\u00ebn uit over hoe organisaties voorop kunnen blijven lopen bij zich ontwikkelende dreigingen \u2014 allemaal in een ontspannen en feestelijke sfeer. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-6dfd7c13\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-76e28012\"><h3 class=\"uagb-heading-text\">Webinar: KACE SMA-update 15.00<\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Quest KACE SMA Update 15.0 \u2013 Live Demo Webinar\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/1E1ofhJyvLE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-be516487\"><p class=\"uagb-heading-text\">In dit webinar verkennen we de belangrijkste updates in KACE Systems Management Appliance 15.0 en laten we zien hoe beheerders de nieuwe functies in hun dagelijkse workflows kunnen gebruiken. We belichten moderne, aanpasbare dashboards, slimmere patchprioritering met CVSS\/EPSS-scores, verbeterde remote toegang met Splashtop en verbeterde veilige logging en navigatie, met praktische tips om device management te stroomlijnen en endpointbeveiliging te versterken. <\/p><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-c658460f\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-85787955\"><h3 class=\"uagb-heading-text\">Webinar: Wat is de Zero Trust-methode?<\/h3><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container\" style=\"height: 100%;\"><iframe loading=\"lazy\" title=\"Webinar: Zero Trust - How Secure Are Your Endpoints\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/GXvXftnn1oQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-db090cdb\"><p class=\"uagb-heading-text\">In deze sessie leidt IM CyberSec de discussie over waarom het traditionele \u201ckasteel-en-gracht\u201d beveiligingsmodel niet langer effectief is in moderne cloudomgevingen. We behandelen de Zero Trust-aanpak en laten zien hoe elke gebruiker en elk apparaat kan worden geverifieerd, endpoints beveiligd en gegevens beschermd in een wereld zonder perimeters. Onze gastexperts van Action1 voegen aan het einde extra inzichten en praktische tips toe voor het implementeren van Zero Trust-strategie\u00ebn. <\/p><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-24cc8c16 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:53px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Be Ahead of Every Threat With Our Webinars &amp; Events Webinar: 5 Experts against 1 Threat &#8211; AI-Driver Cyber Attacks In this session, IM CyberSec together with Huntress and Action1, explore how AI is accelerating cyber attacks, making them faster and more sophisticated than ever. Our experts share the latest attack techniques and provide practical [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3153,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-site-content-layout":"normal-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3412","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WEBINARS &amp; EVENTS - IM CyberSec<\/title>\n<meta name=\"description\" content=\"Don&#039;t Want to be Hacked or Need a Strategy? Let&#039;s Connect! We will respond to your inquiry at the earliest opportunity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/im-cybersec.com\/nl\/webinars-events\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WEBINARS &amp; EVENTS - IM CyberSec\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t Want to be Hacked or Need a Strategy? Let&#039;s Connect! We will respond to your inquiry at the earliest opportunity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/im-cybersec.com\/nl\/webinars-events\/\" \/>\n<meta property=\"og:site_name\" content=\"IM CyberSec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-10T19:38:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/\",\"url\":\"https:\/\/im-cybersec.com\/webinars-events\/\",\"name\":\"WEBINARS & EVENTS - IM CyberSec\",\"isPartOf\":{\"@id\":\"https:\/\/im-cybersec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"datePublished\":\"2026-03-10T16:04:34+00:00\",\"dateModified\":\"2026-03-10T19:38:13+00:00\",\"description\":\"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity\",\"breadcrumb\":{\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/im-cybersec.com\/webinars-events\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage\",\"url\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"contentUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/im-cybersec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WEBINARS &#038; EVENTS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/im-cybersec.com\/#website\",\"url\":\"https:\/\/im-cybersec.com\/\",\"name\":\"IM CyberSec\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/im-cybersec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WEBINARS & EVENTS - IM CyberSec","description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/im-cybersec.com\/nl\/webinars-events\/","og_locale":"nl_NL","og_type":"article","og_title":"WEBINARS & EVENTS - IM CyberSec","og_description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","og_url":"https:\/\/im-cybersec.com\/nl\/webinars-events\/","og_site_name":"IM CyberSec","article_modified_time":"2026-03-10T19:38:13+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"2 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/im-cybersec.com\/webinars-events\/","url":"https:\/\/im-cybersec.com\/webinars-events\/","name":"WEBINARS & EVENTS - IM CyberSec","isPartOf":{"@id":"https:\/\/im-cybersec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage"},"image":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage"},"thumbnailUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","datePublished":"2026-03-10T16:04:34+00:00","dateModified":"2026-03-10T19:38:13+00:00","description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","breadcrumb":{"@id":"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/im-cybersec.com\/webinars-events\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/im-cybersec.com\/webinars-events\/#primaryimage","url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","contentUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/im-cybersec.com\/webinars-events\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/im-cybersec.com\/"},{"@type":"ListItem","position":2,"name":"WEBINARS &#038; EVENTS"}]},{"@type":"WebSite","@id":"https:\/\/im-cybersec.com\/#website","url":"https:\/\/im-cybersec.com\/","name":"IM CyberSec","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/im-cybersec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"}]}},"uagb_featured_image_src":{"full":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png",2560,2560,false],"thumbnail":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-150x150.png",150,150,true],"medium":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-300x300.png",300,300,true],"medium_large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-768x768.png",768,768,true],"large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1024x1024.png",1024,1024,true],"1536x1536":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1536x1536.png",1536,1536,true],"2048x2048":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-2048x2048.png",2048,2048,true],"trp-custom-language-flag":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-12x12.png",12,12,true]},"uagb_author_info":{"display_name":"anita.xd@yahoo.com","author_link":"https:\/\/im-cybersec.com\/nl\/author\/anita-xdyahoo-com\/"},"uagb_comment_info":0,"uagb_excerpt":"Be Ahead of Every Threat With Our Webinars &amp; Events Webinar: 5 Experts against 1 Threat &#8211; AI-Driver Cyber Attacks In this session, IM CyberSec together with Huntress and Action1, explore how AI is accelerating cyber attacks, making them faster and more sophisticated than ever. Our experts share the latest attack techniques and provide practical&hellip;","_links":{"self":[{"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/3412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/comments?post=3412"}],"version-history":[{"count":13,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/3412\/revisions"}],"predecessor-version":[{"id":3446,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/3412\/revisions\/3446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/media\/3153"}],"wp:attachment":[{"href":"https:\/\/im-cybersec.com\/nl\/wp-json\/wp\/v2\/media?parent=3412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}