{"id":17892,"date":"2014-07-31T00:36:56","date_gmt":"2014-07-31T00:36:56","guid":{"rendered":"https:\/\/mann.vamtam.com\/?post_type=tribe_events&amp;eventDate=2017-08-31#038;p=8140"},"modified":"2014-07-31T00:36:56","modified_gmt":"2014-07-31T00:36:56","slug":"rochester-security-summit-2","status":"publish","type":"tribe_events","link":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/classes\/rochester-security-summit-2\/","title":{"rendered":"Rochester Security Summit"},"content":{"rendered":"<div class=\"vgblk-rw-wrapper limit-wrapper\"><h2>\n\tBackground to<br \/>this event\n\t<\/h2>\n<h2>\n\tStructure of<br \/>the event\n\t<\/h2>\n\t<p>The Rochester Security Summit takes place each year in Rochester, NY, USA. These events feature great locally sourced speakers and panels who aim to educate delegates in cyber security and IT.<\/p>\n<p>These events, which we suspect happen each year, have a particular focus within Information Security. One of their most recent events looked at \u201cBusiness Continuity and Growth\u201d which was a two-day event \u201cuniting business leaders, finance, real estate, insurance, risk and legal professionals to discuss the steps on protecting your company against cyber attacks\u201d. The focus would have been for New Yorkers operating SME\u2019s.<\/p>\n\t\u25ce Understand the principles of combustion processes<br \/>\n\u25ce Differentiate between the types and applications<br \/>\n\u25ce Understand security requirements<br \/>\n\u25ce Comprehend ISO ratings and terminologies<br \/>\n\u25ce Explain the various security cams components and their functions<br \/>\n\u25ce Understand the generator principles and construction<br \/>\n\u25ce Review plant layout requirements for single and multiple units<br \/>\n\u25ce Learn about associated control panels and operation<br \/>\n\u25ce Comprehend the testing and commissioning procedures<br \/>\n\u25ce Understand plant performance troubleshooting techniques<br \/>\n\u25ce Learn and apply good maintenance practices\n<\/div><!-- .vgblk-rw-wrapper -->","protected":false},"excerpt":{"rendered":"<p>These events feature great locally sourced speakers and panels who aim to educate delegates in cyber security and IT.<\/p>\n","protected":false},"author":1,"featured_media":15813,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"tags":[],"tribe_events_cat":[48,55,67],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/tribe_events\/17892"}],"collection":[{"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/comments?post=17892"}],"version-history":[{"count":0,"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/tribe_events\/17892\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/media\/15813"}],"wp:attachment":[{"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/media?parent=17892"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/tags?post=17892"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"http:\/\/asianpbnhc.megabackupsite.com\/index.php\/wp-json\/wp\/v2\/tribe_events_cat?post=17892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}