{"id":2465,"date":"2024-04-09T12:00:37","date_gmt":"2024-04-09T10:00:37","guid":{"rendered":"https:\/\/industrial-cybersec.com\/?page_id=2465"},"modified":"2024-04-09T17:32:03","modified_gmt":"2024-04-09T15:32:03","slug":"partners-sponsors","status":"publish","type":"page","link":"https:\/\/industrial-cybersec.com\/nl\/partners-sponsors\/","title":{"rendered":"Partners en sponsors"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2465\" class=\"elementor elementor-2465\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-775e90e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"775e90e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ab32cef\" data-id=\"ab32cef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca97fb8 elementor-widget elementor-widget-heading\" data-id=\"ca97fb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Partners en sponsors 2024 <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f4f5f4 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1f4f5f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-67a3256 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"67a3256\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f876fe7\" data-id=\"f876fe7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1f4648b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f4648b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-10bbdac\" data-id=\"10bbdac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d605985 elementor-widget elementor-widget-image\" data-id=\"d605985\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.eutronix.eu\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-4.png\" class=\"attachment-large size-large wp-image-2476\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-4.png 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-4-768x768.png 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-4-1536x1536.png 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-4-2048x2048.png 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/Design-sans-titre-4-12x12.png 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-6d1deac\" data-id=\"6d1deac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f33e905 elementor-widget elementor-widget-image\" data-id=\"f33e905\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.globalsecuritymag.fr\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"2506\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/GlobalSecurityMag-iscf-3-scaled.jpg\" class=\"attachment-large size-large wp-image-647\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/GlobalSecurityMag-iscf-3-scaled.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/GlobalSecurityMag-iscf-3-768x752.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/GlobalSecurityMag-iscf-3-1536x1504.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/GlobalSecurityMag-iscf-3-2048x2005.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/GlobalSecurityMag-iscf-3-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-e343db2\" data-id=\"e343db2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f996a92 elementor-widget elementor-widget-image\" data-id=\"f996a92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.tim-europe.com\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2560\" height=\"2506\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/TimGlobal-iscf-1-scaled.jpg\" class=\"attachment-large size-large wp-image-649\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/TimGlobal-iscf-1-scaled.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/TimGlobal-iscf-1-768x752.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/TimGlobal-iscf-1-1536x1504.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/TimGlobal-iscf-1-2048x2005.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/TimGlobal-iscf-1-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-42cd1a3\" data-id=\"42cd1a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-222bc1b elementor-widget elementor-widget-image\" data-id=\"222bc1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.isaca.org\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2506\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/isaca-iscf-3-scaled.jpg\" class=\"attachment-large size-large wp-image-644\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/isaca-iscf-3-scaled.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/isaca-iscf-3-768x752.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/isaca-iscf-3-1536x1504.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/isaca-iscf-3-2048x2005.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/isaca-iscf-3-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b19af56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b19af56\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-094e3e3\" data-id=\"094e3e3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5492ddf elementor-widget elementor-widget-image\" data-id=\"5492ddf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/synergit.jpg\" class=\"attachment-large size-large wp-image-855\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5ff9bfc\" data-id=\"5ff9bfc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12d8ae0 elementor-widget elementor-widget-image\" data-id=\"12d8ae0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.solutions-magazine.com\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2560\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-ien-scaled.jpg\" class=\"attachment-large size-large wp-image-1428\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-ien-scaled.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-ien-768x768.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-ien-1536x1536.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-ien-2048x2048.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-ien-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-b06ea7c\" data-id=\"b06ea7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b763560 elementor-widget elementor-widget-image\" data-id=\"b763560\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/datacenter-magazine.fr\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2506\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/logo-iscf-scaled.jpg\" class=\"attachment-large size-large wp-image-662\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/logo-iscf-scaled.jpg 2560w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/logo-iscf-768x752.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/logo-iscf-1536x1504.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/logo-iscf-2048x2005.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/logo-iscf-12x12.jpg 12w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-28cc278\" data-id=\"28cc278\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a614f95 elementor-widget elementor-widget-image\" data-id=\"a614f95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.cyberexperts.tech\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-cyber-768x768.jpg\" class=\"attachment-medium_large size-medium_large wp-image-1446\" alt=\"\" srcset=\"https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-cyber-768x768.jpg 768w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-cyber-1536x1536.jpg 1536w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-cyber-2048x2048.jpg 2048w, https:\/\/industrial-cybersec.com\/wp-content\/uploads\/site-cyber-12x12.jpg 12w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-69ec409 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"69ec409\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/www.eventbrite.fr\/e\/billets-icsf-lunch-learn-brussels-2024-880139680477\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Inschrijvingen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Partners &amp; Sponsors 2024 Inscriptions<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2465","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/2465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/comments?post=2465"}],"version-history":[{"count":22,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/2465\/revisions"}],"predecessor-version":[{"id":2517,"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/pages\/2465\/revisions\/2517"}],"wp:attachment":[{"href":"https:\/\/industrial-cybersec.com\/nl\/wp-json\/wp\/v2\/media?parent=2465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}