{"id":141,"date":"2020-01-30T06:20:23","date_gmt":"2020-01-30T06:20:23","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=141"},"modified":"2020-02-05T08:23:18","modified_gmt":"2020-02-05T08:23:18","slug":"national-cyber-security-strategies-eu-efta","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/national-cyber-security-strategies-eu-efta\/","title":{"rendered":"National Cyber Security Strategies &#8211; EU &#038; EFTA"},"content":{"rendered":"\n<p>Innovation in cybersecurity is a key enabler to facilitate progress, boost employment in the cybersecurity sector and  growth of EU GDP. See an interactive map of a  lists all the documents of National Cyber Security Strategies in the EU  together with their strategic objectives.<a href=\"https:\/\/www.enisa.europa.eu\/topics\/national-cyber-security-strategies\/ncss-map\/national-cyber-security-strategies-interactive-map\"> Read More<\/a><\/p>\n\n\n\n<p> iTM covers all aspects of cybersecurity from Home cyber security managed   solutions to automated, manage threat intelligence, forensic   investigations and cyber security training. Our objective is to support   organisations and consumers at every step of their cyber maturity   journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Innovation in cybersecurity is a key enabler to facilitate progress, boost employment in the cybersecurity sector and growth of EU GDP. See an interactive map of a lists all the documents of National Cyber Security Strategies in the EU together with their strategic objectives. Read More iTM covers all aspects of cybersecurity from Home cyber &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/national-cyber-security-strategies-eu-efta\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;National Cyber Security Strategies &#8211; EU &#038; EFTA&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[18],"tags":[],"class_list":["post-141","post","type-post","status-publish","format-standard","hentry","category-cyber-security-best-practice"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":2,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":151,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/141\/revisions\/151"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}