{"id":1856,"date":"2023-11-30T11:14:57","date_gmt":"2023-11-30T10:14:57","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=1856"},"modified":"2023-12-16T01:06:58","modified_gmt":"2023-12-16T00:06:58","slug":"presentaties","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/nl\/presentations\/","title":{"rendered":"Presentaties"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1856\" class=\"elementor elementor-1856\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39cb3a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39cb3a0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-c24c344\" data-id=\"c24c344\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-420d94c elementor-widget elementor-widget-image\" data-id=\"420d94c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Incyber-28112023.pdf\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2365\" height=\"2560\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Minalogic_principal_couleur-scaled.jpg\" class=\"attachment-large size-large wp-image-1544\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Minalogic_principal_couleur-scaled.jpg 2365w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Minalogic_principal_couleur-768x831.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Minalogic_principal_couleur-1419x1536.jpg 1419w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Minalogic_principal_couleur-1892x2048.jpg 1892w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Minalogic_principal_couleur-11x12.jpg 11w\" sizes=\"(max-width: 2365px) 100vw, 2365px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-f62052a\" data-id=\"f62052a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b279bb0 elementor-widget elementor-widget-image\" data-id=\"b279bb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/20231129_FRAMATOME-ICSF-Lyon-v1.1.pdf\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1.jpg\" class=\"attachment-large size-large wp-image-1414\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-768x768.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-1536x1536.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-2048x2048.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-38d2933\" data-id=\"38d2933\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b8b6e65 elementor-widget elementor-widget-image\" data-id=\"b8b6e65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICSF-2023-Safety-security-big-DATA-excelsior-safety-final-fr.pdf\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2048\" height=\"683\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/EXSA-SVG_20211112_plus-texte-2048x683-1.png\" class=\"attachment-large size-large wp-image-1611\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/EXSA-SVG_20211112_plus-texte-2048x683-1.png 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/EXSA-SVG_20211112_plus-texte-2048x683-1-768x256.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/EXSA-SVG_20211112_plus-texte-2048x683-1-1536x512.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/EXSA-SVG_20211112_plus-texte-2048x683-1-18x6.png 18w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-ed8f05d\" data-id=\"ed8f05d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f53581 elementor-widget elementor-widget-image\" data-id=\"6f53581\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/PPT-allentis-x-cyberium-Standard-ISA-62443-v2.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-alle-scaled.jpg\" class=\"attachment-large size-large wp-image-1434\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-alle-scaled.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-alle-768x768.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-alle-1536x1536.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-alle-2048x2048.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-alle-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f3349f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f3349f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-e14d051\" data-id=\"e14d051\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7cfd7a elementor-widget elementor-widget-image\" data-id=\"f7cfd7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/ICS-Lyon-Keysight-Roxana-Magdo.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1238\" height=\"373\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BrandRefresh-Keysight-Horizontal-Logo-RGB-Color-1.png\" class=\"attachment-large size-large wp-image-1495\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BrandRefresh-Keysight-Horizontal-Logo-RGB-Color-1.png 1238w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BrandRefresh-Keysight-Horizontal-Logo-RGB-Color-1-768x231.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/BrandRefresh-Keysight-Horizontal-Logo-RGB-Color-1-18x5.png 18w\" sizes=\"(max-width: 1238px) 100vw, 1238px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-19c8d44\" data-id=\"19c8d44\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15b9a8e elementor-widget elementor-widget-image\" data-id=\"15b9a8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Presentation-Algosecure_risque-cyber-industriel-rancongiciels-1.0.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/algosite-1-scaled.jpg\" class=\"attachment-large size-large wp-image-1433\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/algosite-1-scaled.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/algosite-1-768x768.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/algosite-1-1536x1536.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/algosite-1-2048x2048.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/algosite-1-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-d27b5b6\" data-id=\"d27b5b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d3fe76e elementor-widget elementor-widget-image\" data-id=\"d3fe76e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Approche-Industrie-2.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/consciosite-scaled.jpg\" class=\"attachment-large size-large wp-image-1436\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/consciosite-scaled.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/consciosite-768x768.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/consciosite-1536x1536.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/consciosite-2048x2048.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/consciosite-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-143a2ce\" data-id=\"143a2ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45c931d elementor-widget elementor-widget-image\" data-id=\"45c931d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Industrial-CyberSec-Forum-Lyon-IMS-Networks-et-Secureworks-CyberSOC-converge.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-1.jpg\" class=\"attachment-large size-large wp-image-1503\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-1.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-1-768x768.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-1-1536x1536.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-1-2048x2048.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Sans-titre-1-1-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52b495b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52b495b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-c6f555b\" data-id=\"c6f555b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c0fabb8 elementor-widget elementor-widget-image\" data-id=\"c0fabb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Industrial-CyberSec-Forum-Lyon-IMS-Networks-et-Secureworks-CyberSOC-converge.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"447\" height=\"195\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/mimecast-partner-logo-Secureworks.png\" class=\"attachment-large size-large wp-image-1619\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/mimecast-partner-logo-Secureworks.png 447w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/mimecast-partner-logo-Secureworks-18x8.png 18w\" sizes=\"(max-width: 447px) 100vw, 447px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-6b125db\" data-id=\"6b125db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5935338 elementor-widget elementor-widget-image\" data-id=\"5935338\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/SoSafe-Presentation-Hack-the-Brain-FR.pdf\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/sosafe-logo-500x500-1.png\" class=\"attachment-large size-large wp-image-1399\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/sosafe-logo-500x500-1.png 500w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/sosafe-logo-500x500-1-12x12.png 12w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-ead8c4f\" data-id=\"ead8c4f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-top-column elementor-element elementor-element-6c72817\" data-id=\"6c72817\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1856","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/1856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/comments?post=1856"}],"version-history":[{"count":0,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/1856\/revisions"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/media?parent=1856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}