{"id":8179,"date":"2014-07-31T00:36:56","date_gmt":"2014-07-31T00:36:56","guid":{"rendered":"https:\/\/mann.vamtam.com\/?post_type=tribe_events&amp;eventDate=2017-08-31#038;p=8140"},"modified":"2014-07-31T00:36:56","modified_gmt":"2014-07-31T00:36:56","slug":"rochester-security-summit","status":"publish","type":"tribe_events","link":"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/","title":{"rendered":"Rochester Security Summit"},"content":{"rendered":"<div class=\"fl-builder-content fl-builder-content-8179 fl-builder-global-templates-locked\" data-post-id=\"8179\"><div class=\"fl-row fl-row-full-width fl-row-bg-none fl-node-59ef35540e0a1 fl-row-bg-attachment-scroll\" data-node=\"59ef35540e0a1\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-59ef35540dd9b\" data-node=\"59ef35540dd9b\">\n\t\t\t<div class=\"fl-col fl-node-59ef35540de70 fl-col-has-cols\" data-node=\"59ef35540de70\">\n\t<div class=\"fl-col-content fl-node-content\">\n<div class=\"fl-col-group fl-node-5b3b48f23a01f fl-col-group-nested\" data-node=\"5b3b48f23a01f\">\n\t\t\t<div class=\"fl-col fl-node-5b3b48f23a225 fl-col-small\" data-node=\"5b3b48f23a225\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-vamtam-heading fl-node-5b3b48fa26756\" data-node=\"5b3b48fa26756\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"vamtam-heading \">\n\t\n\t\n\t<span class=\"vamtam-heading-text\">Background to<br>this event<\/br><\/span>\n\n\t\n\t<\/h2>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5b3b48f23a267 fl-col-small\" data-node=\"5b3b48f23a267\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-vamtam-heading fl-node-5b3b48fe6cafd\" data-node=\"5b3b48fe6cafd\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"vamtam-heading \">\n\t\n\t\n\t<span class=\"vamtam-heading-text\">Structure of<br>the event<\/br><\/span>\n\n\t\n\t<\/h2>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n\t<\/div>\n\n<div class=\"fl-col-group fl-node-59ef35540de1e\" data-node=\"59ef35540de1e\">\n\t\t\t<div class=\"fl-col fl-node-59ef35540dfe5 fl-col-small\" data-node=\"59ef35540dfe5\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-rich-text fl-node-59ef35540e064\" data-node=\"59ef35540e064\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>The Rochester Security Summit takes place each year in Rochester, NY, USA. These events feature great locally sourced speakers and panels who aim to educate delegates in cyber security and IT.<\/p>\n<p>These events, which we suspect happen each year, have a particular focus within Information Security. One of their most recent events looked at \u201cBusiness Continuity and Growth\u201d which was a two-day event \u201cuniting business leaders, finance, real estate, insurance, risk and legal professionals to discuss the steps on protecting your company against cyber attacks\u201d. The focus would have been for New Yorkers operating SME\u2019s.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-59ef35540e025 fl-col-small\" data-node=\"59ef35540e025\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-rich-text fl-node-59ef35540df5e\" data-node=\"59ef35540df5e\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>\u25ce Understand the principles of combustion processes<br \/>\n\u25ce Differentiate between the types and applications<br \/>\n\u25ce Understand security requirements<br \/>\n\u25ce Comprehend ISO ratings and terminologies<br \/>\n\u25ce Explain the various security cams components and their functions<br \/>\n\u25ce Understand the generator principles and construction<br \/>\n\u25ce Review plant layout requirements for single and multiple units<br \/>\n\u25ce Learn about associated control panels and operation<br \/>\n\u25ce Comprehend the testing and commissioning procedures<br \/>\n\u25ce Understand plant performance troubleshooting techniques<br \/>\n\u25ce Learn and apply good maintenance practices<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>These events feature great locally sourced speakers and panels who aim to educate delegates in cyber security and IT.<\/p>\n","protected":false},"author":1,"featured_media":15813,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"_price":"","_stock":"","_tribe_ticket_header":"14914","_tribe_default_ticket_provider":"Tribe__Tickets__Commerce__PayPal__Main","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"0","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":[],"_tribe_ticket_has_attendee_info_fields":false,"_tribe_events_status":"","_tribe_events_status_reason":""},"tags":[],"tribe_events_cat":[28,31,37],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.13 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rochester Security Summit - oucf<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rochester Security Summit - oucf\" \/>\n<meta property=\"og:description\" content=\"These events feature great locally sourced speakers and panels who aim to educate delegates in cyber security and IT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/\" \/>\n<meta property=\"og:site_name\" content=\"oucf\" \/>\n<meta property=\"og:image\" content=\"https:\/\/oucf.mcor.co.in\/wp-content\/uploads\/2018\/06\/dark-header-9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/\",\"url\":\"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/\",\"name\":\"Rochester Security Summit - oucf\",\"isPartOf\":{\"@id\":\"https:\/\/oucf.mcor.co.in\/#website\"},\"datePublished\":\"2014-07-31T00:36:56+00:00\",\"dateModified\":\"2014-07-31T00:36:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/oucf.mcor.co.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/oucf.mcor.co.in\/index.php\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Rochester Security Summit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/oucf.mcor.co.in\/#website\",\"url\":\"https:\/\/oucf.mcor.co.in\/\",\"name\":\"oucf\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/oucf.mcor.co.in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/oucf.mcor.co.in\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/oucf.mcor.co.in\/#organization\",\"name\":\"oucf\",\"url\":\"https:\/\/oucf.mcor.co.in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/oucf.mcor.co.in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/oucf.mcor.co.in\/wp-content\/uploads\/2021\/06\/Logo-2022.svg\",\"contentUrl\":\"https:\/\/oucf.mcor.co.in\/wp-content\/uploads\/2021\/06\/Logo-2022.svg\",\"width\":344,\"height\":32,\"caption\":\"oucf\"},\"image\":{\"@id\":\"https:\/\/oucf.mcor.co.in\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rochester Security Summit - oucf","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/","og_locale":"en_US","og_type":"article","og_title":"Rochester Security Summit - oucf","og_description":"These events feature great locally sourced speakers and panels who aim to educate delegates in cyber security and IT.","og_url":"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/","og_site_name":"oucf","og_image":[{"width":1300,"height":400,"url":"https:\/\/oucf.mcor.co.in\/wp-content\/uploads\/2018\/06\/dark-header-9.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/","url":"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/","name":"Rochester Security Summit - oucf","isPartOf":{"@id":"https:\/\/oucf.mcor.co.in\/#website"},"datePublished":"2014-07-31T00:36:56+00:00","dateModified":"2014-07-31T00:36:56+00:00","breadcrumb":{"@id":"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/oucf.mcor.co.in\/index.php\/classes\/rochester-security-summit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/oucf.mcor.co.in\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/oucf.mcor.co.in\/index.php\/events\/"},{"@type":"ListItem","position":3,"name":"Rochester Security Summit"}]},{"@type":"WebSite","@id":"https:\/\/oucf.mcor.co.in\/#website","url":"https:\/\/oucf.mcor.co.in\/","name":"oucf","description":"","publisher":{"@id":"https:\/\/oucf.mcor.co.in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oucf.mcor.co.in\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/oucf.mcor.co.in\/#organization","name":"oucf","url":"https:\/\/oucf.mcor.co.in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/oucf.mcor.co.in\/#\/schema\/logo\/image\/","url":"https:\/\/oucf.mcor.co.in\/wp-content\/uploads\/2021\/06\/Logo-2022.svg","contentUrl":"https:\/\/oucf.mcor.co.in\/wp-content\/uploads\/2021\/06\/Logo-2022.svg","width":344,"height":32,"caption":"oucf"},"image":{"@id":"https:\/\/oucf.mcor.co.in\/#\/schema\/logo\/image\/"}}]}},"ticketed":["rsvp"],"_links":{"self":[{"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/tribe_events\/8179"}],"collection":[{"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=8179"}],"version-history":[{"count":0,"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/tribe_events\/8179\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/media\/15813"}],"wp:attachment":[{"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=8179"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=8179"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/oucf.mcor.co.in\/index.php\/wp-json\/wp\/v2\/tribe_events_cat?post=8179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}