{"version":"1.0","provider_name":"protinus.nl","provider_url":"https:\/\/oud.protinus.nl\/en","author_name":"floorvanzantvoort","author_url":"https:\/\/oud.protinus.nl\/en\/author\/floorvanzantvoort\/","title":"Cyber Security Visie over AI, NIS2 en samenwerken - protinus.nl","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"AN93hUVDhq\"><a href=\"https:\/\/oud.protinus.nl\/en\/cyber-security-visie-over-ai-nis2-en-samenwerken\/\">Cyber Security Visie over AI, NIS2 en samenwerken<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/oud.protinus.nl\/en\/cyber-security-visie-over-ai-nis2-en-samenwerken\/embed\/#?secret=AN93hUVDhq\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Security Visie over AI, NIS2 en samenwerken&#8221; &#8212; protinus.nl\" data-secret=\"AN93hUVDhq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/oud.protinus.nl\/wp-content\/uploads\/2023\/12\/Scherm\u00adafbeelding-2023-12-05-om-15.19.15-1024x801.png","thumbnail_width":1024,"thumbnail_height":801,"description":"Ongeveer 250 gevulde stoelen, sterke presentaties en veel inhoudelijke gesprekken tussen bezoekers vanuit het hele IT-ecosysteem. Dat was de opbrengst van het event \u2018Cyber Security Visie 2024\u2019 van it2grow en Protinus IT. In het Woudschoten Hotel in Zeist werd er gesproken over de belangrijkste securitytrends voor 2024 en de jaren daarna. De twee thema\u2019s die [&hellip;]"}