{"id":4739,"date":"2025-05-09T11:01:28","date_gmt":"2025-05-09T09:01:28","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=4739"},"modified":"2026-02-24T13:19:41","modified_gmt":"2026-02-24T12:19:41","slug":"cybersecurityday-2022","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/cybersecurityday-2022\/","title":{"rendered":"CyberSecurityDay 2022"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"4739\" class=\"elementor elementor-4739\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0760f2a elementor-widget elementor-widget-spacer\" data-id=\"0760f2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CyberSecurityDay<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d96ee1 elementor-widget elementor-widget-heading\" data-id=\"0d96ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2022<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9eda6f0 elementor-widget elementor-widget-text-editor\" data-id=\"9eda6f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jesenn\u00e1 5, 040 01 Ko\u0161ice<br \/>Faculty of Science, UPJ\u0160<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-702b473 e-flex e-con-boxed e-con e-child\" data-id=\"702b473\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf9e9d6 elementor-widget elementor-widget-button\" data-id=\"cf9e9d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#jar\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Spring<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83a2ef7 elementor-widget elementor-widget-button\" data-id=\"83a2ef7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#jesen-ke\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Autumn<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3836ae elementor-widget elementor-widget-spacer\" data-id=\"d3836ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb735f2 elementor-hidden-desktop elementor-hidden-laptop e-flex e-con-boxed e-con e-parent\" data-id=\"cb735f2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8ff214f e-flex e-con-boxed e-con e-child\" data-id=\"8ff214f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c073000 elementor-widget elementor-widget-spacer\" data-id=\"c073000\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55b334b elementor-widget elementor-widget-heading\" data-id=\"55b334b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CyberSecurity<br>Day<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4db756 elementor-widget elementor-widget-heading\" data-id=\"e4db756\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2022<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b080473 elementor-widget elementor-widget-text-editor\" data-id=\"b080473\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jesenn\u00e1 5, 040 01 Ko\u0161ice<br \/>Faculty of Science, UPJ\u0160<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6f12bd e-flex e-con-boxed e-con e-child\" data-id=\"b6f12bd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-878e7ef elementor-widget elementor-widget-button\" data-id=\"878e7ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#jar\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Spring<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b31e4e3 elementor-widget elementor-widget-button\" data-id=\"b31e4e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#jesen-ke\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Autumn<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f27fa76 elementor-widget elementor-widget-spacer\" data-id=\"f27fa76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87736eb e-flex e-con-boxed e-con e-parent\" data-id=\"87736eb\" data-element_type=\"container\" data-e-type=\"container\" id=\"jar\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76e18fd elementor-widget elementor-widget-spacer\" data-id=\"76e18fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86bb4ca elementor-widget elementor-widget-heading\" data-id=\"86bb4ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Spring CyberSecurityDay 2022<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27cce5b elementor-widget elementor-widget-heading\" data-id=\"27cce5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4.6. 2022<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a5b80d elementor-widget elementor-widget-spacer\" data-id=\"4a5b80d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-460b307 elementor-widget elementor-widget-text-editor\" data-id=\"460b307\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Practical <span style=\"color: #e87a00;\">workshops<\/span> based on real-world experiences in <span style=\"color: #0c3a76;\">resolving computer security incidents<\/span>. An opportunity to talk to people who are professionally involved in <span style=\"color: #0c3a76;\">information and cybersecurity<\/span>, <span style=\"color: #e87a00;\">to meet new people, and compete for interesting prizes<\/span>.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63abb42 elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"63abb42\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;1&quot;,&quot;navigation&quot;:&quot;dots&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Obr\u00e1zkov\u00fd kot\u00fa\u010d\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/1.jpg\" alt=\"1\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/2.jpg\" alt=\"2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/3.jpg\" alt=\"3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/4.jpg\" alt=\"4\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/5.jpg\" alt=\"5\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/6.jpg\" alt=\"6\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/7.jpg\" alt=\"7\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/8.jpg\" alt=\"8\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/9.jpg\" alt=\"9\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/10.jpg\" alt=\"10\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/11.jpg\" alt=\"11\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/12.jpg\" alt=\"12\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-635f63b elementor-widget elementor-widget-spacer\" data-id=\"635f63b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43323be e-flex e-con-boxed e-con e-parent\" data-id=\"43323be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-255c174 elementor-widget elementor-widget-heading\" data-id=\"255c174\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Agenda<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12d5570 elementor-widget elementor-widget-spacer\" data-id=\"12d5570\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2afed79 elementor-hidden-desktop elementor-hidden-laptop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-ucaddon_unlimited_timeline\" data-id=\"2afed79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_unlimited_timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Unlimited Timeline -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Unlimited Timeline *\/\n\n\r\n@keyframes uc_unlimited_timeline_elementor_2afed79__item-animation {\r\n  0% {\r\n            transform:scale(0.7);\r\n        \t        \tfilter: blur(10px);\r\n\t\t\t\r\n    \t    opacity: 0;\r\n  }\r\n  100% {\r\n            transform:scale(1);\r\n        \t            filter: blur(0px);\r\n            \r\n    \t\topacity: 1;\r\n  }\r\n}\r\n\r\n\r\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item{\r\n\topacity:0;\r\n}\r\n\r\n\r\n#uc_unlimited_timeline_elementor_2afed79 .uc-entrance-animate {\r\n  opacity:1;\r\n}\r\n\r\n#uc_unlimited_timeline_elementor_2afed79 .uc-entrance-animate {\r\n\tanimation: uc_unlimited_timeline_elementor_2afed79__item-animation 0.6s cubic-bezier(0.470, 0.000, 0.745, 0.715) both;\r\n}\r\n\r\n\t\t\t\n\n#uc_unlimited_timeline_elementor_2afed79{\n  direction:ltr;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 *{\n  box-sizing:border-box;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item{\n  display:flex;\n  flex-direction:row-reverse;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_icon{\n  display:flex;\n  flex-direction:column;\n  align-items:center;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_icon_line{\n  flex-grow:1;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_icon_line_offset{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_icon_holder{\n  display:flex;\n  justify-content:center;\n  align-items:center;\n  line-height:1em;\n  flex-direction:column;\n  transition: all 0.4s ease-in-out;\n  text-align: center;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_icon_holder svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_content{\n  flex:1;\n  flex-shrink:0;\n  flex-direction:row-reverse;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_spacer{\n  flex:1;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_content_main{\n  flex-grow:1;\n  word-break: break-word;\n  transition: all .3s;\n  position: relative;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_content_main_link{\n  position: absolute;\n  width: 100%;\n  height: 100%;\n  left: 0;\n  top: 0;\n  display: block;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_content{\n  display:flex;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_pointer_spacer{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_icon{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_pointer{  \n  flex-grow:0;\n  flex-shrink:0;\n  margin-top:0px;\n  position:relative;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside{\n  position:relative;\n  clip-path: polygon(0 50%, 100% 0, 100% 100%);\n  transition: all .3s;\n}\n\n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item:last-child .ue_timeline_item_icon_line{\n    display:none;\n  }\n\t\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item:last-child .ue_timeline_item_content{\n  margin-bottom:0px;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_spacer  {\n  display:none;\n}\n\n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item:nth-child(odd)    {\n   flex-direction:row;\n  }\n\n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item:nth-child(odd) .ue_timeline_item_content{\n   flex-direction:row;\n  } \n\n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_spacer  {\n    display:block;\n  }\n\n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item:nth-child(odd) .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside{ \n   clip-path: polygon(100% 50%, 0 0, 0 100%);\n  }\n\t\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_button{\n\tdisplay: flex;\n  \talign-items: center;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_link{\n\tcursor: pointer;\n  \ttransition: all .3s;\n}\n\n\n.ue_timeline_item_title{\n  font-size:21px;\n}\n\n.ue_text_one, .ue_text_two, .ue_text_three{\n  font-size:14px;\n  line-height:1.1em;\n}\n\n.ue_timeline_item_icon_line_mask, .ue_timeline_item_icon_line_offset_mask {\n  width: 100%;\n  height: 0%;\n  max-height: 100%;\n  will-change: height;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_line_icon_holder{\n  position: relative;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_line_floating_icon,\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_line_floating_icon-offset{\n  position: absolute;\n  bottom: 0;\n  left: 50%;\n  transform: translate(-50%, 0%);\n  opacity: 0;\n  display: none;\n    display: none !important;\n  }\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_floating_icon{\n  display:flex;\n  opacity: 1;\n  justify-content:center;\n  align-items:center;\n  line-height:1em;\n  flex-direction:column;\n  transition: all 0.4s ease-in-out;\n  text-align: center;\n}\n  \n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_image{\nobject-fit: cover;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_content_inside{\n  position:relative;\n}\n\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_content_main{\n  position:relative;\n  overflow:hidden;\n}\n\n\n@media only screen and (max-width: 768px) {\n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item{\n    flex-direction:row-reverse !important;\n  }\n\n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item .ue_timeline_item_content{\n   flex-direction:row-reverse !important;\n  }\n  \n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_spacer  {\n    display:none;\n  }\n  \n  #uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside  { \n   clip-path: polygon(0 50%, 100% 0, 100% 100%) !important;\n  }  \n}\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item_img_wrapper{\n  display: flex;\n}\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item:nth-child(even) .ue_timeline_item_img_wrapper{\n  justify-content: flex-end;\n}\n#uc_unlimited_timeline_elementor_2afed79 .ue_timeline_item:nth-child(odd) .ue_timeline_item_img_wrapper{\n  justify-content: flex-start;\n}\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\n\n<\/style>\n\n<div id=\"uc_unlimited_timeline_elementor_2afed79\" class=\"uc-items-wrapper\"  >\n  \n<div class=\"ue_timeline_item elementor-repeater-item-7cb161f\" id=\"uc_unlimited_timeline_elementor_2afed79_item1\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >8:30 - 9:00<\/div>          <div class=\"ue_timeline_item_subtitle\" >Registration<\/div>\n        <div class=\"ue_timeline_item_text\"><\/div>\t\n      \t          \n        <\/div>\n        <a class=\"ue_timeline_item_content_main_link\" href=\"#\" ><\/a>      <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-69f133f\" id=\"uc_unlimited_timeline_elementor_2afed79_item2\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >9:00 - 9:05<\/div>          <div class=\"ue_timeline_item_subtitle\" >Welcome speech<\/div>\n        <div class=\"ue_timeline_item_text\"><\/div>\t\n      \t          \n        <\/div>\n        <a class=\"ue_timeline_item_content_main_link\" href=\"#\" ><\/a>      <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-dd904b9\" id=\"uc_unlimited_timeline_elementor_2afed79_item3\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >9:05 - 9:50<\/div>          <div class=\"ue_timeline_item_subtitle\" >Lecture<\/div>\n        <div class=\"ue_timeline_item_text\"><\/div>\t\n      \t          \n        <\/div>\n        <a class=\"ue_timeline_item_content_main_link\" href=\"#workshopy\" ><\/a>      <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-93b7ac4\" id=\"uc_unlimited_timeline_elementor_2afed79_item4\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >10:00 - 11:00<\/div>          <div class=\"ue_timeline_item_subtitle\" >1st workshop<\/div>\n        <div class=\"ue_timeline_item_text\"><p>v\u00fdber zo 4 paraleln\u00fdch workshopov<\/p><\/div>\t\n      \t          \n        <\/div>\n        <a class=\"ue_timeline_item_content_main_link\" href=\"#workshopy\" ><\/a>      <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-d843d91\" id=\"uc_unlimited_timeline_elementor_2afed79_item5\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >11:10 - 12:10<\/div>          <div class=\"ue_timeline_item_subtitle\" >2nd workshop<\/div>\n        <div class=\"ue_timeline_item_text\"><p>v\u00fdber zo 4 paraleln\u00fdch workshopov<\/p><\/div>\t\n      \t          \n        <\/div>\n        <a class=\"ue_timeline_item_content_main_link\" href=\"#workshopy\" ><\/a>      <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-0dce03b\" id=\"uc_unlimited_timeline_elementor_2afed79_item6\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >12:20 - 13:00<\/div>          <div class=\"ue_timeline_item_subtitle\" >Pizza and Pub Quiz<\/div>\n        <div class=\"ue_timeline_item_text\"><p>enter to win prizes - not only from IT<\/p><\/div>\t\n      \t          \n        <\/div>\n        <a class=\"ue_timeline_item_content_main_link\" href=\"\" ><\/a>      <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n \n<\/div>\n<!-- end Unlimited Timeline -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c10d82 elementor-widget elementor-widget-eael-feature-list\" data-id=\"6c10d82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n\t\t\t<ul id=\"eael-feature-list-6c10d82\" class=\"eael-feature-list-items circle stacked  eael-feature-list-vertical\" data-layout-tablet=\"vertical\" data-layout-mobile=\"vertical\">\n\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-d179bc1\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">08:30 - 09:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Registration<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-ade3433\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">09:00 - 09:10<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Welcome speech<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-ee785d7\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">09:10 - 09:50<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Lecture: Bad advice and myths about cybersecurity<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-724f426\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">10:00 - 11:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">1st workshop (selection from 4 parallel workshops)<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-606447f\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-4\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">11:10 - 12:10<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">2nd workshop (selection from 4 parallel workshops)<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-683a8af\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-5\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">12:10 - 13:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Lunch<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-cea7db8\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-6\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">13:00 - 14:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Pubquiz: Competition for interesting prizes, not only from computer science<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-fe61977\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-7\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">14:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">\"Recreational computer science\" - flying with drones, board games, table football, student projects and conversations not only about studying computer science<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a0e279 e-flex e-con-boxed e-con e-child\" data-id=\"5a0e279\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e935516 elementor-widget elementor-widget-spacer\" data-id=\"e935516\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4dd42e elementor-widget elementor-widget-heading\" data-id=\"c4dd42e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Lecture<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bb44252 e-flex e-con-boxed e-con e-child\" data-id=\"bb44252\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf25196 elementor-widget elementor-widget-heading\" data-id=\"cf25196\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Can you outsmart a hacker? <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9e9179 elementor-widget elementor-widget-heading\" data-id=\"b9e9179\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Ter\u00e9zia M\u00e9ze\u0161ov\u00e1, Siemens Healthineers<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd8b6b5 elementor-widget elementor-widget-text-editor\" data-id=\"dd8b6b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Each of us is in contact with various applications every day. We learn through them, we stay in touch with friends, we use them for fun, but also to track how many steps we have taken or how long we have slept. All this data is an interesting target for hackers to monetize or use against us. Therefore, it is important that we as programmers take care of them when developing them. Together, we will discuss what we can do to outsmart hackers and make it as difficult as possible for them to misuse our application.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57fd1e6 elementor-widget elementor-widget-spacer\" data-id=\"57fd1e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad755a4 elementor-widget elementor-widget-heading\" data-id=\"ad755a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Workshops<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cbeb96 e-flex e-con-boxed e-con e-child\" data-id=\"4cbeb96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-315b1ba elementor-widget elementor-widget-heading\" data-id=\"315b1ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fraudulent Message Analysis<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8090ce7 elementor-widget elementor-widget-text-editor\" data-id=\"8090ce7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During the workshop we will take a closer look at real fraudulent messages. Participants will try out the work of a security analyst and will analyze the headers of fraudulent messages, the content as well as malicious links and attachments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20c12a5 e-flex e-con-boxed e-con e-child\" data-id=\"20c12a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f70ff8a elementor-widget elementor-widget-heading\" data-id=\"f70ff8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Network forensics<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c58900 elementor-widget elementor-widget-text-editor\" data-id=\"2c58900\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Participants will try out network communication analysis and become familiar with the basic tools for this analysis. The workshop will analyze the communication between a compromised device and an attacker.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e16a182 e-flex e-con-boxed e-con e-child\" data-id=\"e16a182\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d1783e elementor-widget elementor-widget-heading\" data-id=\"3d1783e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to respond to a security incident (malware)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fca8505 elementor-widget elementor-widget-text-editor\" data-id=\"fca8505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Time plays a significant role in responding to a security incident. Identifying malware on a device as far as possible is an important task for security analysts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8177531 e-flex e-con-boxed e-con e-child\" data-id=\"8177531\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68f8322 elementor-widget elementor-widget-heading\" data-id=\"68f8322\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Autonomous vehicles and artificial intelligence methods<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57ed80e elementor-widget elementor-widget-text-editor\" data-id=\"57ed80e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The workshop will introduce artificial intelligence methods and their use in driving autonomous vehicles. In the practical part, we will create a neural network model that can classify photos or images by car type.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68838bc e-flex e-con-boxed e-con e-parent\" data-id=\"68838bc\" data-element_type=\"container\" data-e-type=\"container\" id=\"jesen-ke\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-72e8df9 elementor-widget elementor-widget-spacer\" data-id=\"72e8df9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18b6b00 elementor-widget elementor-widget-heading\" data-id=\"18b6b00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Autumn CyberSecurityDay 2022<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7d0ab5 elementor-widget elementor-widget-heading\" data-id=\"c7d0ab5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">22.10.2022<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c17fce3 elementor-widget elementor-widget-spacer\" data-id=\"c17fce3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b7c54f elementor-widget elementor-widget-text-editor\" data-id=\"7b7c54f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Practical <span style=\"color: #e87a00;\">workshops<\/span> based on real-world experiences in <span style=\"color: #0c3a76;\">resolving computer security incidents<\/span>. An opportunity to talk to people who are professionally involved in <span style=\"color: #0c3a76;\">information and cybersecurity<\/span>, <span style=\"color: #e87a00;\">to meet new people, and compete for interesting prizes<\/span>.<\/strong><\/p><p>The event is carried out as part of the project Learn the basics of information security and educate those around you, with financial support from the SK-NIC Fund.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9b7c78 elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"b9b7c78\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;slides_to_show&quot;:&quot;1&quot;,&quot;navigation&quot;:&quot;dots&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;effect&quot;:&quot;slide&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Obr\u00e1zkov\u00fd kot\u00fa\u010d\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/1.jpg\" alt=\"1\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/2.jpg\" alt=\"2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/3.jpg\" alt=\"3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/4.jpg\" alt=\"4\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/5.jpg\" alt=\"5\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/6.jpg\" alt=\"6\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/7.jpg\" alt=\"7\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/8.jpg\" alt=\"8\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/9.jpg\" alt=\"9\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/10.jpg\" alt=\"10\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/11.jpg\" alt=\"11\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 12\" data-no-translation-aria-label=\"\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/04\/12.jpg\" alt=\"12\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-368ed11 elementor-widget elementor-widget-spacer\" data-id=\"368ed11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3232400 e-flex e-con-boxed e-con e-parent\" data-id=\"3232400\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-231ee26 elementor-widget elementor-widget-heading\" data-id=\"231ee26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Agenda<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fedd6d elementor-widget elementor-widget-spacer\" data-id=\"7fedd6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e88c4c0 elementor-widget elementor-widget-eael-feature-list\" data-id=\"e88c4c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-feature-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n\t\t\t<ul id=\"eael-feature-list-e88c4c0\" class=\"eael-feature-list-items circle stacked  eael-feature-list-vertical\" data-layout-tablet=\"vertical\" data-layout-mobile=\"vertical\">\n\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-d179bc1\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">08:30 - 09:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Registration<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-ade3433\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">09:00 - 09:05<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Welcome speech<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-ee785d7\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">9:05 - 9:50<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\"> Lecture: Anatomy of a Cybersecurity Attack (Ladislav Ba\u010do, ESET) <\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-724f426\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">10:00 - 11:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">1st workshop (selection from 4 parallel workshops)<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-05e592d\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-4\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">11:00 - 11:10<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Prest\u00e1vka<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-606447f\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-5\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">11:10 - 12:10<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">2nd workshop (selection from 4 parallel workshops)<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-5797737\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-6\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">12:10 - 13:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Lunch<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t                <li class=\"eael-feature-list-item elementor-repeater-item-683a8af\">\n                    \n\t\t\t\t\t\t<div class=\"eael-feature-list-icon-box\">\n\t\t\t\t\t\t\t<div class=\"eael-feature-list-icon-inner\">\n\n\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-7\">\n\n\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"eael-feature-list-content-box\">\n                            <h5 class=\"eael-feature-list-title\">13:00 - 14:00<\/h5>\t\t\t\t\t\t<p class=\"eael-feature-list-content\">Pub Quiz (s\u00fa\u0165a\u017e o zauj\u00edmav\u00e9 ceny nielen z oblasti informatiky)<\/p>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c19b63 e-flex e-con-boxed e-con e-child\" data-id=\"2c19b63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-151781f elementor-widget elementor-widget-spacer\" data-id=\"151781f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4739aaf elementor-widget elementor-widget-heading\" data-id=\"4739aaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Lecture<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-801bf3a e-flex e-con-boxed e-con e-child\" data-id=\"801bf3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a357cec elementor-widget elementor-widget-heading\" data-id=\"a357cec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Anatomy of a Cybersecurity Attack<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3726682 elementor-widget elementor-widget-heading\" data-id=\"3726682\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Ladislav Ba\u010do, ESET<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9df247 elementor-widget elementor-widget-text-editor\" data-id=\"a9df247\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This lecture will take a closer look at the anatomy of a cybersecurity attack (cyber kill chain). It will include a demonstration of an attack where the attacker finds available email addresses, sends an infected PDF file, and then runs the meterpreter program. During the lecture, we will work with recorded network traffic. We will talk about the possibility of detecting attacks not only at the device level (e.g. using anti-malware programs), but also from the perspective of network traffic analysis.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c67c2ab elementor-widget elementor-widget-spacer\" data-id=\"c67c2ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-960617f elementor-widget elementor-widget-heading\" data-id=\"960617f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Workshops<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6dfa467 e-flex e-con-boxed e-con e-child\" data-id=\"6dfa467\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2fc421 elementor-widget elementor-widget-heading\" data-id=\"f2fc421\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Mail as an attack vector<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-294f8b6 elementor-widget elementor-widget-heading\" data-id=\"294f8b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Peter Matej, eMsec<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb3b104 elementor-widget elementor-widget-text-editor\" data-id=\"fb3b104\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDespite the existence of various communication tools, from tools for voice calls and video conferencing to messaging applications, chat tools to file sharing and various collaboration tools, mail remains the most frequently used tool. This also makes it an object of interest for cybercriminals and one of the main attack vectors. We will look at how mail works, how and why it can be abused, and how phishing campaigns take place. We will show several simple tools for controlling mail communication and discuss the future development of mail communication and phishing campaigns.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf5d2e3 e-flex e-con-boxed e-con e-child\" data-id=\"cf5d2e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e546b7a elementor-widget elementor-widget-heading\" data-id=\"e546b7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How we searched for missing people - OSINT in practice<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7381beb elementor-widget elementor-widget-heading\" data-id=\"7381beb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Zuzana Hennelov\u00e1, CSIRT-UPJS<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-238ea65 elementor-widget elementor-widget-text-editor\" data-id=\"238ea65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Open source intelligence (OSINT) significantly helps in information and cybersecurity. During the workshop we will show you how it is possible to search for missing people using OSINT. We will try out several basic tools for searching for  relevant information about people (email addresses, user accounts, photos). <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc4aef6 e-flex e-con-boxed e-con e-child\" data-id=\"dc4aef6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6f342b elementor-widget elementor-widget-heading\" data-id=\"a6f342b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fraudulent Message Analysis<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e495a2 elementor-widget elementor-widget-heading\" data-id=\"6e495a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Monika Rapav\u00e1, CSIRT-UPJS<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9f1de0 elementor-widget elementor-widget-text-editor\" data-id=\"c9f1de0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During the workshop we will take a closer look at real fraudulent messages. Participants will try out the work of a security analyst and will analyze the headers of fraudulent messages, the content as well as malicious links and attachments.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23f8b50 e-flex e-con-boxed e-con e-child\" data-id=\"23f8b50\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c4d492 elementor-widget elementor-widget-heading\" data-id=\"7c4d492\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Introduction to Forensic Analysis of Operational Memory<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f05af75 elementor-widget elementor-widget-heading\" data-id=\"f05af75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Eva Markov\u00e1, UPJ\u0160\/ESET<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-865a441 elementor-widget elementor-widget-text-editor\" data-id=\"865a441\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Forensic analysis of operational memory is an important part of resolving security incidents. We can obtain a lot of important information related to a security incident from it. The goal of this workshop is to show the way in which memory is secured. We will show several examples of information that we can extract from it, which can help in the investigation itself.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82ad01a e-con-full e-flex e-con e-child\" data-id=\"82ad01a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1aeaec elementor-widget elementor-widget-heading\" data-id=\"b1aeaec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to respond to malicious code (malware)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d98601d elementor-widget elementor-widget-heading\" data-id=\"d98601d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Michal \u0160afranko, IstroSec\/CSIRT-UPJS<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-814469d elementor-widget elementor-widget-text-editor\" data-id=\"814469d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Time plays a significant role in responding to a security incident. How to quickly identify malware on a device is an important task for security analysts. During the workshop we will show you where to look for important digital traces and tools to identify and analyze these traces in the Windows operating system.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a5ac009 e-flex e-con-boxed e-con e-parent\" data-id=\"a5ac009\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ed0d55 elementor-widget elementor-widget-spacer\" data-id=\"4ed0d55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6eafb70 elementor-widget elementor-widget-heading\" data-id=\"6eafb70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Support of CSD 2022<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3420b82 gallery-spacing-custom logo-gallery elementor-widget elementor-widget-image-gallery\" data-id=\"3420b82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-gallery.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-gallery\">\n\t\t\t<div id='gallery-1' class='gallery galleryid-4739 gallery-columns-6 gallery-size-full'><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"3420b82\" data-elementor-lightbox-title=\"csirt-logo420-250\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTMxMywidXJsIjoiaHR0cHM6XC9cL2N5YmVyYXdhcmVuZXNzLnNrXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8xMFwvY3NpcnQtbG9nbzQyMC0yNTAuanBnIiwic2xpZGVzaG93IjoiMzQyMGI4MiJ9\" href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/10\/csirt-logo420-250.jpg'><img fetchpriority=\"high\" decoding=\"async\" width=\"420\" height=\"250\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/10\/csirt-logo420-250.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/10\/csirt-logo420-250.jpg 420w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/10\/csirt-logo420-250-300x179.jpg 300w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"3420b82\" data-elementor-lightbox-title=\"PriF_color\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI2MCwidXJsIjoiaHR0cHM6XC9cL2N5YmVyYXdhcmVuZXNzLnNrXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8wNVwvUHJpRl9jb2xvci1lMTc1MTM3NTIxNzgwOC5wbmciLCJzbGlkZXNob3ciOiIzNDIwYjgyIn0%3D\" href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/05\/PriF_color-e1751375217808.png'><img decoding=\"async\" width=\"110\" height=\"98\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/05\/PriF_color-e1751375217808.png\" class=\"attachment-full size-full\" alt=\"PF UPJ\u0160\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"3420b82\" data-elementor-lightbox-title=\"upjs_logo12\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTUwLCJ1cmwiOiJodHRwczpcL1wvY3liZXJhd2FyZW5lc3Muc2tcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjJcLzA0XC91cGpzX2xvZ28xMi1lMTc1MTM3NTIwNDk4OC5qcGciLCJzbGlkZXNob3ciOiIzNDIwYjgyIn0%3D\" href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/upjs_logo12-e1751375204988.jpg'><img decoding=\"async\" width=\"110\" height=\"110\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/upjs_logo12-e1751375204988.jpg\" class=\"attachment-full size-full\" alt=\"\" aria-describedby=\"gallery-1-150\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='gallery-1-150'>\n\t\t\t\tPavol Jozef \u0160af\u00e1rik University in Ko\u0161ice\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"3420b82\" data-elementor-lightbox-title=\"cropped-qubit-conference-green.png\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTI4MywidXJsIjoiaHR0cHM6XC9cL2N5YmVyYXdhcmVuZXNzLnNrXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIzXC8wNlwvY3JvcHBlZC1xdWJpdC1jb25mZXJlbmNlLWdyZWVuLnBuZyIsInNsaWRlc2hvdyI6IjM0MjBiODIifQ%3D%3D\" data-elementor-lightbox-description=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/06\/cropped-qubit-conference-green.png\" href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/06\/cropped-qubit-conference-green.png'><img loading=\"lazy\" decoding=\"async\" width=\"507\" height=\"247\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/06\/cropped-qubit-conference-green.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/06\/cropped-qubit-conference-green.png 507w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/06\/cropped-qubit-conference-green-300x146.png 300w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"3420b82\" data-elementor-lightbox-title=\"zive logo COLOR\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NjMyLCJ1cmwiOiJodHRwczpcL1wvY3liZXJhd2FyZW5lc3Muc2tcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjJcLzA3XC9DT0xPUi1lMTc1MTA2NzkwMDQ1Ni5wbmciLCJzbGlkZXNob3ciOiIzNDIwYjgyIn0%3D\" data-elementor-lightbox-description=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/06\/cropped-qubit-conference-green.png\" href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/07\/COLOR-e1751067900456.png'><img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"41\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/07\/COLOR-e1751067900456.png\" class=\"attachment-full size-full\" alt=\"\" \/><\/a>\n\t\t\t<\/div><\/figure><figure class='gallery-item'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-slideshow=\"3420b82\" data-elementor-lightbox-title=\"fond_png\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTQ2LCJ1cmwiOiJodHRwczpcL1wvY3liZXJhd2FyZW5lc3Muc2tcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjJcLzA0XC9mb25kX3BuZy5wbmciLCJzbGlkZXNob3ciOiIzNDIwYjgyIn0%3D\" data-elementor-lightbox-description=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2023\/06\/cropped-qubit-conference-green.png\" href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png.png'><img loading=\"lazy\" decoding=\"async\" width=\"3508\" height=\"2480\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png.png\" class=\"attachment-full size-full\" alt=\"\" aria-describedby=\"gallery-1-146\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png.png 3508w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png-300x212.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png-1024x724.png 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png-768x543.png 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png-1536x1086.png 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png-2048x1448.png 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png-1232x871.png 1232w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2022\/04\/fond_png-1528x1080.png 1528w\" sizes=\"(max-width: 3508px) 100vw, 3508px\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='gallery-1-146'>\n\t\t\t\tFond SK-NIC\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4121723 elementor-widget elementor-widget-spacer\" data-id=\"4121723\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>CyberSecurityDay 2022 Jesenn\u00e1 5, 040 01 Ko\u0161icePr\u00edrodovedeck\u00e1 fakulta, UPJ\u0160 Jarn\u00fd Jesenn\u00fd CyberSecurityDay 2022 Jesenn\u00e1 5, 040 01 Ko\u0161icePr\u00edrodovedeck\u00e1 fakulta, UPJ\u0160 Jarn\u00fd Jesenn\u00fd Jarn\u00fd CyberSecurityDay 2022 4.6. 2022 Praktick\u00e9 workshopy vych\u00e1dzaj\u00face z re\u00e1lnych sk\u00fasenost\u00ed pri rie\u0161en\u00ed po\u010d\u00edta\u010dov\u00fdch bezpe\u010dnostn\u00fdch incidentov. Mo\u017enos\u0165 sa porozpr\u00e1va\u0165 s \u013eu\u010fmi, ktor\u00ed sa profesion\u00e1lne venuj\u00fa informa\u010dnej a kybernetickej bezpe\u010dnosti, spozna\u0165 nov\u00fdch \u013eud\u00ed a [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-4739","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=4739"}],"version-history":[{"count":28,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4739\/revisions"}],"predecessor-version":[{"id":7606,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4739\/revisions\/7606"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=4739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}