{"version":"1.0","provider_name":"ICR Evolution","provider_url":"https:\/\/www.icr-evolution.com\/en\/","title":"EVOLUTION TalksCybersecurity, Jordi Ubach - ICR Evolution","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DqJckEbxnM\"><a href=\"https:\/\/www.icr-evolution.com\/en\/resource\/evolution-talkssecutiry-jordi-ubach\/\">EVOLUTION Talks<br><small>Cybersecurity, Jordi Ubach<\/small><\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.icr-evolution.com\/en\/resource\/evolution-talkssecutiry-jordi-ubach\/embed\/#?secret=DqJckEbxnM\" width=\"600\" height=\"338\" title=\"&#8220;EVOLUTION Talks&lt;br&gt;&lt;small&gt;Cybersecurity, Jordi Ubach&lt;\/small&gt;&#8221; &#8212; ICR Evolution\" data-secret=\"DqJckEbxnM\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.icr-evolution.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.icr-evolution.com\/wp-content\/uploads\/2021\/04\/Frame-60-2.png","thumbnail_width":375,"thumbnail_height":302,"description":"Digitization is almost mandatory for many areas of the economy, it implies the use of more and more data and this makes us more vulnerable than ever before. Automation, greater capacity to control production or agility in communications will favor an economic reactivation, but will cybersecurity be challenged by the emerging risks of 5G and [&hellip;]"}