{"id":2836,"date":"2022-11-13T17:29:57","date_gmt":"2022-11-13T17:29:57","guid":{"rendered":"https:\/\/www.cigre.nl\/c0-critical-infrastructure-and-cybersecurity-session\/"},"modified":"2024-04-30T11:59:40","modified_gmt":"2024-04-30T11:59:40","slug":"c0-critical-infrastructure-and-cybersecurity-session","status":"publish","type":"page","link":"https:\/\/www.cigre.nl\/en\/c0-critical-infrastructure-and-cybersecurity-session\/","title":{"rendered":"C0 critical infrastructure and cybersecurity session"},"content":{"rendered":"\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Academic-view-on-resilience-Peter-Palensky.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Insluiting van Academic-view-on-resilience-Peter-Palensky..\"><\/object><a id=\"wp-block-file--media-613ac971-3a41-46c5-b8cb-2eabec2e2db1\" href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Academic-view-on-resilience-Peter-Palensky.pdf\">Academic-view-on-resilience-Peter-Palensky<\/a><a href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Academic-view-on-resilience-Peter-Palensky.pdf\" class=\"wp-block-file__button\" download=\"\" aria-describedby=\"wp-block-file--media-613ac971-3a41-46c5-b8cb-2eabec2e2db1\">Download<\/a><\/div>\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Cyber-security-and-the-future-grid-operation-Matija-Naglic-and-Danny-Klaar.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Insluiting van Cyber-security-and-the-future-grid-operation-Matija-Naglic-and-Danny-Klaar..\"><\/object><a id=\"wp-block-file--media-a9191e90-57d8-4538-9df2-1c61a2ea8d17\" href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Cyber-security-and-the-future-grid-operation-Matija-Naglic-and-Danny-Klaar.pdf\">Cyber-security-and-the-future-grid-operation-Matija-Naglic-and-Danny-Klaar<\/a><a href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Cyber-security-and-the-future-grid-operation-Matija-Naglic-and-Danny-Klaar.pdf\" class=\"wp-block-file__button\" download=\"\" aria-describedby=\"wp-block-file--media-a9191e90-57d8-4538-9df2-1c61a2ea8d17\">Download<\/a><\/div>\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Cybersecurity-and-Power-System-Planning-Maksym-Semenyuk.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Insluiting van Cybersecurity-and-Power-System-Planning-Maksym-Semenyuk..\"><\/object><a id=\"wp-block-file--media-9a11e8d8-b0e8-4024-adef-435732402a7a\" href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Cybersecurity-and-Power-System-Planning-Maksym-Semenyuk.pdf\">Cybersecurity-and-Power-System-Planning-Maksym-Semenyuk<\/a><a href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Cybersecurity-and-Power-System-Planning-Maksym-Semenyuk.pdf\" class=\"wp-block-file__button\" download=\"\" aria-describedby=\"wp-block-file--media-9a11e8d8-b0e8-4024-adef-435732402a7a\">Download<\/a><\/div>\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/D2-Information-Systems-and-Telecommunication-Amadou-Louh-and-Alex-Stefanov.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Insluiting van D2-Information-Systems-and-Telecommunication-Amadou-Louh-and-Alex-Stefanov..\"><\/object><a id=\"wp-block-file--media-89a60ba7-0324-4d66-b48f-71865090f45d\" href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/D2-Information-Systems-and-Telecommunication-Amadou-Louh-and-Alex-Stefanov.pdf\">D2-Information-Systems-and-Telecommunication-Amadou-Louh-and-Alex-Stefanov<\/a><a href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/D2-Information-Systems-and-Telecommunication-Amadou-Louh-and-Alex-Stefanov.pdf\" class=\"wp-block-file__button\" download=\"\" aria-describedby=\"wp-block-file--media-89a60ba7-0324-4d66-b48f-71865090f45d\">Download<\/a><\/div>\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Network-code-on-cybersecurity-Maarten-Hoeve.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Insluiting van Network-code-on-cybersecurity-Maarten-Hoeve..\"><\/object><a id=\"wp-block-file--media-2743f820-87a7-4726-ba2d-4f6c449deb20\" href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Network-code-on-cybersecurity-Maarten-Hoeve.pdf\">Network-code-on-cybersecurity-Maarten-Hoeve<\/a><a href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Network-code-on-cybersecurity-Maarten-Hoeve.pdf\" class=\"wp-block-file__button\" download=\"\" aria-describedby=\"wp-block-file--media-2743f820-87a7-4726-ba2d-4f6c449deb20\">Download<\/a><\/div>\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Resilience-in-markets-and-active-distribution-systems-Thijs-Slot-and-Bart-Luijkx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Insluiting van Resilience-in-markets-and-active-distribution-systems-Thijs-Slot-and-Bart-Luijkx..\"><\/object><a id=\"wp-block-file--media-9a1dbc07-3fd9-43c2-8388-19997cf89b6c\" href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Resilience-in-markets-and-active-distribution-systems-Thijs-Slot-and-Bart-Luijkx.pdf\">Resilience-in-markets-and-active-distribution-systems-Thijs-Slot-and-Bart-Luijkx<\/a><a href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Resilience-in-markets-and-active-distribution-systems-Thijs-Slot-and-Bart-Luijkx.pdf\" class=\"wp-block-file__button\" download=\"\" aria-describedby=\"wp-block-file--media-9a1dbc07-3fd9-43c2-8388-19997cf89b6c\">Download<\/a><\/div>\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/TSO-views-on-resilience-Danny-Klaar.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Insluiting van TSO-views-on-resilience-Danny-Klaar..\"><\/object><a id=\"wp-block-file--media-494bf2e6-9af3-4b54-a4a1-13a7b6262efc\" href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/TSO-views-on-resilience-Danny-Klaar.pdf\">TSO-views-on-resilience-Danny-Klaar<\/a><a href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/TSO-views-on-resilience-Danny-Klaar.pdf\" class=\"wp-block-file__button\" download=\"\" aria-describedby=\"wp-block-file--media-494bf2e6-9af3-4b54-a4a1-13a7b6262efc\">Download<\/a><\/div>\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Utility-Cyber-Security-Implementation-Jalal-Bouhdada-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Insluiting van Utility-Cyber-Security-Implementation-Jalal-Bouhdada-1..\"><\/object><a id=\"wp-block-file--media-5796aaa4-b315-4218-a546-d7e32898b302\" href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Utility-Cyber-Security-Implementation-Jalal-Bouhdada-1.pdf\">Utility-Cyber-Security-Implementation-Jalal-Bouhdada-1<\/a><a href=\"https:\/\/www.cigre.nl\/wp-content\/uploads\/2022\/11\/Utility-Cyber-Security-Implementation-Jalal-Bouhdada-1.pdf\" class=\"wp-block-file__button\" download=\"\" aria-describedby=\"wp-block-file--media-5796aaa4-b315-4218-a546-d7e32898b302\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2836","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cigre.nl\/en\/wp-json\/wp\/v2\/pages\/2836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cigre.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cigre.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cigre.nl\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cigre.nl\/en\/wp-json\/wp\/v2\/comments?post=2836"}],"version-history":[{"count":1,"href":"https:\/\/www.cigre.nl\/en\/wp-json\/wp\/v2\/pages\/2836\/revisions"}],"predecessor-version":[{"id":2837,"href":"https:\/\/www.cigre.nl\/en\/wp-json\/wp\/v2\/pages\/2836\/revisions\/2837"}],"wp:attachment":[{"href":"https:\/\/www.cigre.nl\/en\/wp-json\/wp\/v2\/media?parent=2836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}