{"id":124,"date":"2018-02-09T08:40:16","date_gmt":"2018-02-09T03:40:16","guid":{"rendered":"http:\/\/conference.blackseacybersecurity.net\/2018\/?page_id=124"},"modified":"2018-02-09T08:52:47","modified_gmt":"2018-02-09T03:52:47","slug":"bscysec-2017-archive","status":"publish","type":"page","link":"https:\/\/conference.blackseacybersecurity.net\/2018\/bscysec-2017-archive\/","title":{"rendered":"BSCySec 2017 archive"},"content":{"rendered":"<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-1\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/27-CMU-Gabriel-Raicu-Closing.mp4?_=1\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/27-CMU-Gabriel-Raicu-Closing.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/27-CMU-Gabriel-Raicu-Closing.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-2\" width=\"525\" height=\"394\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/26-PolFront-Laurentiu-Costache.mp4?_=2\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/26-PolFront-Laurentiu-Costache.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/26-PolFront-Laurentiu-Costache.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-3\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/23-GSP-Marius-Olariu.mp4?_=3\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/23-GSP-Marius-Olariu.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/23-GSP-Marius-Olariu.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-4\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/22-Delloite-Roel-van-Rijsewijk.mp4?_=4\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/22-Delloite-Roel-van-Rijsewijk.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/22-Delloite-Roel-van-Rijsewijk.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-5\" width=\"525\" height=\"394\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/20-ABS-Paul-Walters.mp4?_=5\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/20-ABS-Paul-Walters.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/20-ABS-Paul-Walters.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-6\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/18-Check-Point-Daniel-Purdila.mp4?_=6\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/18-Check-Point-Daniel-Purdila.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/18-Check-Point-Daniel-Purdila.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-7\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/15-CISCO-Dan-Gavojdea.mp4?_=7\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/15-CISCO-Dan-Gavojdea.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/15-CISCO-Dan-Gavojdea.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-8\" width=\"525\" height=\"394\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/13-Lloyds-Register-Horia-Dristaru.mp4?_=8\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/13-Lloyds-Register-Horia-Dristaru.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/13-Lloyds-Register-Horia-Dristaru.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-9\" width=\"525\" height=\"363\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/12-Charles-Taylor-Philip-Stephenson.mp4?_=9\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/12-Charles-Taylor-Philip-Stephenson.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/12-Charles-Taylor-Philip-Stephenson.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-10\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/11-FORTINET-Bogdan-Zapca.mp4?_=10\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/11-FORTINET-Bogdan-Zapca.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/11-FORTINET-Bogdan-Zapca.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-11\" width=\"525\" height=\"394\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/10-TheFraudTube-Darren-Hodder.mp4?_=11\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/10-TheFraudTube-Darren-Hodder.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/10-TheFraudTube-Darren-Hodder.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-12\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/09-Oxford-Systems-John-McCarthy.mp4?_=12\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/09-Oxford-Systems-John-McCarthy.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/09-Oxford-Systems-John-McCarthy.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-13\" width=\"525\" height=\"394\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/08-CERT.RO-Daniel-Ionita.mp4?_=13\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/08-CERT.RO-Daniel-Ionita.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/08-CERT.RO-Daniel-Ionita.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-14\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/06-CMU-Gabriel-Raicu-Intro.mp4?_=14\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/06-CMU-Gabriel-Raicu-Intro.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/06-CMU-Gabriel-Raicu-Intro.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-15\" width=\"525\" height=\"394\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/05-BBFA-Patrick-Curry.mp4?_=15\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/05-BBFA-Patrick-Curry.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/05-BBFA-Patrick-Curry.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-16\" width=\"525\" height=\"295\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/04-BIMCO-Phil-Tinsley.mp4?_=16\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/04-BIMCO-Phil-Tinsley.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/04-BIMCO-Phil-Tinsley.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-17\" width=\"525\" height=\"394\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/00-RNA-Mihai-Staicu.mp4?_=17\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/00-RNA-Mihai-Staicu.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/00-RNA-Mihai-Staicu.mp4<\/a><\/video><\/div>\n<div style=\"width: 525px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-124-18\" width=\"525\" height=\"315\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/BSCySec2018.mp4?_=18\" \/><a href=\"http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/BSCySec2018.mp4\">http:\/\/conference.blackseacybersecurity.net\/2018\/wp-content\/uploads\/sites\/3\/2018\/02\/BSCySec2018.mp4<\/a><\/video><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-124","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/conference.blackseacybersecurity.net\/2018\/wp-json\/wp\/v2\/pages\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conference.blackseacybersecurity.net\/2018\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conference.blackseacybersecurity.net\/2018\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conference.blackseacybersecurity.net\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.blackseacybersecurity.net\/2018\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":2,"href":"https:\/\/conference.blackseacybersecurity.net\/2018\/wp-json\/wp\/v2\/pages\/124\/revisions"}],"predecessor-version":[{"id":131,"href":"https:\/\/conference.blackseacybersecurity.net\/2018\/wp-json\/wp\/v2\/pages\/124\/revisions\/131"}],"wp:attachment":[{"href":"https:\/\/conference.blackseacybersecurity.net\/2018\/wp-json\/wp\/v2\/media?parent=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}