{"id":54288,"date":"2014-04-21T07:59:29","date_gmt":"2014-04-21T12:59:29","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?post_type=tribe_events&p=54288"},"modified":"2014-04-21T08:24:16","modified_gmt":"2014-04-21T13:24:16","slug":"curacao-may-2014-concentrated-physical-security-risk-analysis-vulnerability-assessments","status":"publish","type":"tribe_events","link":"https:\/\/ict-pulse.com\/events\/curacao-may-2014-concentrated-physical-security-risk-analysis-vulnerability-assessments\/","title":{"rendered":"Curacao – Concentrated: Physical Security Risk Analysis and Vulnerability Assessments"},"content":{"rendered":"
For this special event in Curacao, Mindshare Resources combined its Core Level and Advanced Level physical security risk analysis and vulnerability assessments seminar into a three-day concentrated seminar.<\/p>\n
This 3 day concentrated seminar will provide valuable information to all those involved in planning, designing, managing, maintaining, analyzing and testing physical security systems.<\/p>\n
For this special event in Curacao, Mindshare Resources combined its Core Level and Advanced Level physical security risk analysis and vulnerability assessments seminar into a three-day concentrated seminar. This 3 […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[126,206,236,196],"class_list":["post-54288","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-curacao","tribe_events_cat-cybercrimecybersecurity-3","tribe_events_cat-ict-tech","tribe_events_cat-seminar","cat_curacao","cat_cybercrimecybersecurity-3","cat_ict-tech","cat_seminar"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=54288"}],"version-history":[{"count":0,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events\/54288\/revisions"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=54288"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=54288"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tribe_events_cat?post=54288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}