{"id":735950,"date":"2024-06-27T13:46:35","date_gmt":"2024-06-27T11:46:35","guid":{"rendered":"https:\/\/academy.asseco.pl\/?post_type=webinar&#038;p=735950"},"modified":"2024-07-11T13:18:53","modified_gmt":"2024-07-11T11:18:53","slug":"webinar-cyberbezpieczenstwo-na-czasie","status":"publish","type":"webinar","link":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/","title":{"rendered":"Cyberbezpiecze\u0144stwo na czasie"},"content":{"rendered":"<section class=\"o-section c-hero c-hero--secondary c-hero--normal  u-color--main-1 u-font--func-1 u-color--error-1 u-color-opacity-0 has-normal-font-size\"id=\"section_1\"\n>\n  \n\n    <div class=\"o-wrapper c-hero__container\">\n          <div class=\"c-breadcrumbs__wrapper o-layout__itemo-flex o-flex--grids u-hidden@less-then-large\">\n    <div class=\"o-flex__item u-flex-12\/12\">\n        <div class=\"c-breadcrumbs\"><span><span><a href=\"https:\/\/academy.asseco.pl\/en\/\">Asseco Academy<\/a><\/span><\/span><\/div>\n    <\/div>\n<\/div>        <div class=\"c-hero__content \">\n\n            <h2 class=\"c-heading c-heading--h1 c-hero__title u-margin-bottom-tiny \"><span style=\"text-shadow: 5px 5px 10px #000000;\">Cyberbezpiecze\u0144stwo na czasie<\/span><\/h2>\n      <div class=\"c-hero__desc\">\n     \n<\/div>            \n      \n                <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"o-section c-simple  has-normal-font-size \"id=\"section_2\"\n  >\n    <div class=\"o-wrapper \">\n    <div class=\"c-simple__container o-flex o-flex--grids o-flex--centered\">\n          <div class=\"c-simple__image o-flex__item    u-flex-6\/12@large   \">\n                                            <img decoding=\"async\" src=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/14500-570x400.jpg\" alt=\"\" class=\" u-image--border-radius   \"\/>\n                                    <\/div>\n          <div class=\"c-simple__content o-flex__item   u-flex-6\/12@large \">\n        <h2 class=\"c-heading c-heading--h2 c-simple__title \"><\/h2>                          <div class=\"c-simple__desc\">\n    <p>Data: <strong>4 lipca 2024<\/strong><br \/>\nGodzina: <strong>18:00 &#8211; 19:30<\/strong><br \/>\nProwadz\u0105cy: <strong>Artur Grygoruk<\/strong><br \/>\nGo\u015b\u0107 specjalny: <strong>Santosh Kumar Singh (EC-Council)<\/strong><\/p>\n \n<\/div>                                  <a\n    href=\"https:\/\/assecods.webex.com\/assecods\/lsr.php?RCID=fa1737554b1b5fb2990e0283f2c2fa9e\"\n    target=\"\"\n        class=\"c-button c-button--error\n                                                                c-simple__cta\n    \"\n    >\n        Obejrzyj nagranie \n    <\/a>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"o-section c-simple c-simple--alternative has-normal-font-size \"id=\"section_3\"\n  >\n    <div class=\"o-wrapper \">\n    <div class=\"c-simple__container o-flex o-flex--grids o-flex--centered\">\n          <div class=\"c-simple__image o-flex__item    u-flex-6\/12@large   \">\n                                            <img decoding=\"async\" src=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/laptop-screen-business-man-coding-software-development-programming-script-cybersecurity-night-computer-research-programmer-it-person-with-html-code-system-data-analysis-570x400.jpg\" alt=\"\" class=\" u-image--border-radius   u-image--box-shadow \"\/>\n                                    <\/div>\n          <div class=\"c-simple__content o-flex__item   u-flex-6\/12@large \">\n        <h2 class=\"c-heading c-heading--h2 c-simple__title \"><\/h2>                          <div class=\"c-simple__desc\">\n    <p>Obecnie, w czasach sztucznej inteligencji, mamy znacznie wi\u0119cej wyzwa\u0144 zwi\u0105zanych z przeprowadzaniem atak\u00f3w <strong>cyberbezpiecze\u0144stwa<\/strong> na krytyczn\u0105 infrastruktur\u0119 biznesow\u0105.<br \/>\n<strong>Sztuczna inteligencja<\/strong> otwiera wiele mo\u017cliwo\u015bci dla tzw. White-Hats (specjalist\u00f3w ds. cyberbezpiecze\u0144stwa), ale te\u017c Black-Hats (cracker\u00f3w i cyberprzest\u0119pc\u00f3w).<\/p>\n<p>Na ca\u0142e szcz\u0119\u015bcie, nie jeste\u015bmy bezsilni. S\u0105 nowe regulacje \u2013 <strong>DORA i NIS2.<\/strong> S\u0105 nowe narz\u0119dzia i techniki do identyfikacji, wykrywania, ochrony i zapobiegania cyber zagro\u017ceniom ju\u017c na wczesnym etapie cyklu \u017cycia rozwoju systemu\/ produktu\/ us\u0142ugi. Chcemy promowa\u0107 dobre praktyki w obszarze cyberbezpiecze\u0144stwa.<\/p>\n \n<\/div>                              <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n<section class=\"o-section c-simple  has-normal-font-size \"id=\"section_4\"\n  >\n    <div class=\"o-wrapper \">\n    <div class=\"c-simple__container o-flex o-flex--grids o-flex--centered\">\n          <div class=\"c-simple__image o-flex__item    u-flex-6\/12@large   \">\n                                            <img decoding=\"async\" src=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/video-communication-woman-with-colleagues-freelancer-workplace-uses-laptop-computer-company-report-570x400.jpg\" alt=\"\" class=\" u-image--border-radius   u-image--box-shadow \"\/>\n                                    <\/div>\n          <div class=\"c-simple__content o-flex__item   u-flex-6\/12@large \">\n        <h2 class=\"c-heading c-heading--h2 c-simple__title \"><\/h2>                          <div class=\"c-simple__desc\">\n    <p>Go\u015bciem na webinarze b\u0119dzie <strong>Santosh Kumar Singh<\/strong> reprezentuj\u0105cy naszego <strong>Partnera EC-Council,<\/strong> globalnego dostawcy szkole\u0144 i warsztat\u00f3w z cyberbezpiecze\u0144stwa. Ten fragment webinaru b\u0119dzie prowadzony w j\u0119zyku angielskim i referowany przez prowadz\u0105cego na j\u0119zyk polski.<\/p>\n<p>Webinar jest dedykowany szczeg\u00f3lnie specjalistom ds. cyberbezpiecze\u0144stwa oraz osobom aspiruj\u0105cym do tej roli, administratorom sieci i IT, in\u017cynierom systemowym, pracownikom SOC, administratorom witryn www oraz pracownikom IT d\u0105\u017c\u0105cym do pog\u0142\u0119biania swojej wiedzy i umiej\u0119tno\u015bci w obszarze cyberbezpiecze\u0144stwa.<\/p>\n \n<\/div>                              <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group alignfull\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\"><div class=\"u-flex-12\/12\"><div class=\"o-wrapper u-padding-horizontal-none\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Obecnie, w czasach sztucznej inteligencji, mamy znacznie wi\u0119cej wyzwa\u0144 zwi\u0105zanych z przeprowadzaniem atak\u00f3w cyberbezpiecze\u0144stwa na krytyczn\u0105 infrastruktur\u0119 biznesow\u0105.<\/p>\n","protected":false},"featured_media":735953,"parent":0,"menu_order":34,"template":"","class_list":["post-735950","webinar","type-webinar","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberbezpiecze\u0144stwo na czasie<\/title>\n<meta name=\"description\" content=\"Obecnie, w czasach sztucznej inteligencji, mamy znacznie wi\u0119cej wyzwa\u0144 zwi\u0105zanych z przeprowadzaniem atak\u00f3w cyberbezpiecze\u0144stwa na krytyczn\u0105 infrastruktur\u0119 biznesow\u0105.Sztuczna inteligencja otwiera wiele mo\u017cliwo\u015bci dla tzw. White-Hats (specjalist\u00f3w ds. cyberbezpiecze\u0144stwa), ale te\u017c Black-Hats (cracker\u00f3w i cyberprzest\u0119pc\u00f3w).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberbezpiecze\u0144stwo na czasie\" \/>\n<meta property=\"og:description\" content=\"Obecnie, w czasach sztucznej inteligencji, mamy znacznie wi\u0119cej wyzwa\u0144 zwi\u0105zanych z przeprowadzaniem atak\u00f3w cyberbezpiecze\u0144stwa na krytyczn\u0105 infrastruktur\u0119 biznesow\u0105.Sztuczna inteligencja otwiera wiele mo\u017cliwo\u015bci dla tzw. White-Hats (specjalist\u00f3w ds. cyberbezpiecze\u0144stwa), ale te\u017c Black-Hats (cracker\u00f3w i cyberprzest\u0119pc\u00f3w).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/\" \/>\n<meta property=\"og:site_name\" content=\"Asseco Academy\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-11T11:18:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2022\/07\/triathlon-running-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"724\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2022\/07\/triathlon-running-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/\",\"url\":\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/\",\"name\":\"Cyberbezpiecze\u0144stwo na czasie\",\"isPartOf\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/padlock-icon-within-complex-interface-cyber-security-network-lines-glowing-dots-symbolizing-data-protection-encryption-information-security-scaled.jpg\",\"datePublished\":\"2024-06-27T11:46:35+00:00\",\"dateModified\":\"2024-07-11T11:18:53+00:00\",\"description\":\"Obecnie, w czasach sztucznej inteligencji, mamy znacznie wi\u0119cej wyzwa\u0144 zwi\u0105zanych z przeprowadzaniem atak\u00f3w cyberbezpiecze\u0144stwa na krytyczn\u0105 infrastruktur\u0119 biznesow\u0105.Sztuczna inteligencja otwiera wiele mo\u017cliwo\u015bci dla tzw. White-Hats (specjalist\u00f3w ds. cyberbezpiecze\u0144stwa), ale te\u017c Black-Hats (cracker\u00f3w i cyberprzest\u0119pc\u00f3w).\",\"breadcrumb\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#primaryimage\",\"url\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/padlock-icon-within-complex-interface-cyber-security-network-lines-glowing-dots-symbolizing-data-protection-encryption-information-security-scaled.jpg\",\"contentUrl\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/padlock-icon-within-complex-interface-cyber-security-network-lines-glowing-dots-symbolizing-data-protection-encryption-information-security-scaled.jpg\",\"width\":2560,\"height\":1435,\"caption\":\"Padlock icon within a complex interface of cyber security network lines and glowing dots, symbolizing data protection, encryption, and information security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Asseco Academy\",\"item\":\"https:\/\/academy.asseco.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar\",\"item\":\"https:\/\/academy.asseco.pl\/en\/webinar\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyberbezpiecze\u0144stwo na czasie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/#website\",\"url\":\"https:\/\/academy.asseco.pl\/en\/\",\"name\":\"Asseco Academy\",\"description\":\"Asseco Academy\",\"publisher\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/academy.asseco.pl\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/#organization\",\"name\":\"Asseco Academy\",\"url\":\"https:\/\/academy.asseco.pl\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/academy.asseco.pl\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2020\/04\/asseco_academy.png\",\"contentUrl\":\"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2020\/04\/asseco_academy.png\",\"width\":197,\"height\":26,\"caption\":\"Asseco Academy\"},\"image\":{\"@id\":\"https:\/\/academy.asseco.pl\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberbezpiecze\u0144stwo na czasie","description":"Obecnie, w czasach sztucznej inteligencji, mamy znacznie wi\u0119cej wyzwa\u0144 zwi\u0105zanych z przeprowadzaniem atak\u00f3w cyberbezpiecze\u0144stwa na krytyczn\u0105 infrastruktur\u0119 biznesow\u0105.Sztuczna inteligencja otwiera wiele mo\u017cliwo\u015bci dla tzw. White-Hats (specjalist\u00f3w ds. cyberbezpiecze\u0144stwa), ale te\u017c Black-Hats (cracker\u00f3w i cyberprzest\u0119pc\u00f3w).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/","og_locale":"en_US","og_type":"article","og_title":"Cyberbezpiecze\u0144stwo na czasie","og_description":"Obecnie, w czasach sztucznej inteligencji, mamy znacznie wi\u0119cej wyzwa\u0144 zwi\u0105zanych z przeprowadzaniem atak\u00f3w cyberbezpiecze\u0144stwa na krytyczn\u0105 infrastruktur\u0119 biznesow\u0105.Sztuczna inteligencja otwiera wiele mo\u017cliwo\u015bci dla tzw. White-Hats (specjalist\u00f3w ds. cyberbezpiecze\u0144stwa), ale te\u017c Black-Hats (cracker\u00f3w i cyberprzest\u0119pc\u00f3w).","og_url":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/","og_site_name":"Asseco Academy","article_modified_time":"2024-07-11T11:18:53+00:00","og_image":[{"width":724,"height":483,"url":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2022\/07\/triathlon-running-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2022\/07\/triathlon-running-1.jpg","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/","url":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/","name":"Cyberbezpiecze\u0144stwo na czasie","isPartOf":{"@id":"https:\/\/academy.asseco.pl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#primaryimage"},"image":{"@id":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#primaryimage"},"thumbnailUrl":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/padlock-icon-within-complex-interface-cyber-security-network-lines-glowing-dots-symbolizing-data-protection-encryption-information-security-scaled.jpg","datePublished":"2024-06-27T11:46:35+00:00","dateModified":"2024-07-11T11:18:53+00:00","description":"Obecnie, w czasach sztucznej inteligencji, mamy znacznie wi\u0119cej wyzwa\u0144 zwi\u0105zanych z przeprowadzaniem atak\u00f3w cyberbezpiecze\u0144stwa na krytyczn\u0105 infrastruktur\u0119 biznesow\u0105.Sztuczna inteligencja otwiera wiele mo\u017cliwo\u015bci dla tzw. White-Hats (specjalist\u00f3w ds. cyberbezpiecze\u0144stwa), ale te\u017c Black-Hats (cracker\u00f3w i cyberprzest\u0119pc\u00f3w).","breadcrumb":{"@id":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#primaryimage","url":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/padlock-icon-within-complex-interface-cyber-security-network-lines-glowing-dots-symbolizing-data-protection-encryption-information-security-scaled.jpg","contentUrl":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2024\/06\/padlock-icon-within-complex-interface-cyber-security-network-lines-glowing-dots-symbolizing-data-protection-encryption-information-security-scaled.jpg","width":2560,"height":1435,"caption":"Padlock icon within a complex interface of cyber security network lines and glowing dots, symbolizing data protection, encryption, and information security."},{"@type":"BreadcrumbList","@id":"https:\/\/academy.asseco.pl\/en\/webinar\/webinar-cyberbezpieczenstwo-na-czasie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Asseco Academy","item":"https:\/\/academy.asseco.pl\/en\/"},{"@type":"ListItem","position":2,"name":"Webinar","item":"https:\/\/academy.asseco.pl\/en\/webinar\/"},{"@type":"ListItem","position":3,"name":"Cyberbezpiecze\u0144stwo na czasie"}]},{"@type":"WebSite","@id":"https:\/\/academy.asseco.pl\/en\/#website","url":"https:\/\/academy.asseco.pl\/en\/","name":"Asseco Academy","description":"Asseco Academy","publisher":{"@id":"https:\/\/academy.asseco.pl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/academy.asseco.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/academy.asseco.pl\/en\/#organization","name":"Asseco Academy","url":"https:\/\/academy.asseco.pl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/academy.asseco.pl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2020\/04\/asseco_academy.png","contentUrl":"https:\/\/academy.asseco.pl\/wp-content\/uploads\/2020\/04\/asseco_academy.png","width":197,"height":26,"caption":"Asseco Academy"},"image":{"@id":"https:\/\/academy.asseco.pl\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/webinar\/735950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/webinar"}],"about":[{"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/types\/webinar"}],"version-history":[{"count":0,"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/webinar\/735950\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/media\/735953"}],"wp:attachment":[{"href":"https:\/\/academy.asseco.pl\/en\/wp-json\/wp\/v2\/media?parent=735950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}