{"id":19178,"date":"2024-11-06T10:07:46","date_gmt":"2024-11-06T09:07:46","guid":{"rendered":"https:\/\/sits.com\/events\/nis2-expedition\/"},"modified":"2025-01-24T09:18:43","modified_gmt":"2025-01-24T08:18:43","slug":"nis2-expedition","status":"publish","type":"events","link":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/","title":{"rendered":"NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<span class=\"TextRun SCXW230210246 BCX2\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW230210246 BCX2\">Die NIS2-Richtlinie der EU setzt neue Standards und fordert regelm\u00e4\u00dfige \u00dcberpr\u00fcfungen auf Schwachstellen. Unser Webinar bietet Ihnen die Chance, die Anforderungen der NIS2-Richtlinie kennenzulernen und zu verstehen, warum deren Umsetzung<\/span> <span class=\"NormalTextRun SCXW230210246 BCX2\">mittels Penetrationstests <\/span><span class=\"NormalTextRun SCXW230210246 BCX2\">f\u00fcr den Schutz Ihrer IT-Infrastruktur unerl\u00e4sslich ist.<\/span><\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<b><span data-contrast=\"auto\">Warum Sie teilnehmen sollten:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Insider-Wissen: <\/span><\/b><span data-contrast=\"auto\">Erfahren Sie alles Wichtige von unseren Experten zur NIS2-Richtlinie.<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Praktische Einblicke: <\/span><\/b><span data-contrast=\"auto\">Lernen Sie, wie Sie Penetrationstests effektiv durchf\u00fchren.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Experten-Tipps: <\/span><\/b><span data-contrast=\"auto\">Erhalten Sie sofort umsetzbare Empfehlungen.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text]<b><span data-contrast=\"auto\">Agenda:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">1. NIS2-Richtlinie und Anforderungen<\/span><\/b><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">\u00dcberblick: Was ist die NIS2-Richtlinie und warum ist sie wichtig?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Penetrationstests: Spezifische Anforderungen von NIS2 und deren effektive Umsetzung.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><strong>2. Arten von Penetrationstests<\/strong><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Vorstellung der verschiedenen Penetrationstests und ihren Ziele: IT-Infrastrukturen, Anwendungen, Netzwerke, Remote Access, Mobile Apps, APIs, industrielle Anlagen, Social Engineering und mehr.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Durchf\u00fchrung: Systempr\u00fcfung und Identifikation angreifbarer Bereiche.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Empfehlungen: Sofort umsetzbare Tipps zu Technik, Organisation und Regeln.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">3. Q&amp;A mit unseren Experten<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Die Erf\u00fcllung der NIS2-Richtlinie ist ein entscheidender Schritt, um die Sicherheit und Resilienz Ihrer IT-Systeme zu gew\u00e4hrleisten. In diesem Webinar erhalten Sie nicht nur theoretisches Wissen, sondern auch praktische Einblicke und Strategien, um Ihre IT-Infrastruktur zu st\u00e4rken.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Die NIS2-Richtlinie der EU setzt neue Standards und fordert regelm\u00e4\u00dfige \u00dcberpr\u00fcfungen auf Schwachstellen. Unser Webinar bietet Ihnen die Chance, die Anforderungen der NIS2-Richtlinie kennenzulernen und zu verstehen, warum deren Umsetzung mittels Penetrationstests f\u00fcr den Schutz Ihrer IT-Infrastruktur unerl\u00e4sslich ist.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Warum Sie teilnehmen sollten:\u00a0 Insider-Wissen: Erfahren Sie alles Wichtige von unseren Experten zur NIS2-Richtlinie. Praktische Einblicke: Lernen [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":12752,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"video_categories":[328],"class_list":["post-19178","events","type-events","status-publish","has-post-thumbnail","hentry","video_categories-nis2-ch"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests - SITS<\/title>\n<meta name=\"description\" content=\"\u25b6 Jetzt anmelden zu unserem Webinar: NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests - SITS\" \/>\n<meta property=\"og:description\" content=\"\u25b6 Jetzt anmelden zu unserem Webinar: NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-24T08:18:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement6_NIS2MS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1334\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/\",\"name\":\"NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests - SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement6_NIS2MS.jpg\",\"datePublished\":\"2024-11-06T09:07:46+00:00\",\"dateModified\":\"2025-01-24T08:18:43+00:00\",\"description\":\"\u25b6 Jetzt anmelden zu unserem Webinar: NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#breadcrumb\"},\"inLanguage\":\"de-CH\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement6_NIS2MS.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement6_NIS2MS.jpg\",\"width\":1334,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-CH\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests - SITS","description":"\u25b6 Jetzt anmelden zu unserem Webinar: NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests - SITS","og_description":"\u25b6 Jetzt anmelden zu unserem Webinar: NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests!","og_url":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/","og_site_name":"SITS","article_modified_time":"2025-01-24T08:18:43+00:00","og_image":[{"width":1334,"height":1440,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement6_NIS2MS.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/","url":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/","name":"NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests - SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement6_NIS2MS.jpg","datePublished":"2024-11-06T09:07:46+00:00","dateModified":"2025-01-24T08:18:43+00:00","description":"\u25b6 Jetzt anmelden zu unserem Webinar: NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#breadcrumb"},"inLanguage":"de-CH","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/"]}]},{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement6_NIS2MS.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement6_NIS2MS.jpg","width":1334,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/ch\/events\/nis2-expedition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/ch\/"},{"@type":"ListItem","position":2,"name":"NIS2-Expedition: Entdecken Sie die verborgenen Schwachstellen Ihrer Systeme durch Penetrationstests"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/ch\/#website","url":"https:\/\/sits.friendventure.dev\/ch\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-CH"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/ch\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/ch\/","logo":{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/events\/19178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/types\/events"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":4,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/events\/19178\/revisions"}],"predecessor-version":[{"id":19507,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/events\/19178\/revisions\/19507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/media\/12752"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/media?parent=19178"}],"wp:term":[{"taxonomy":"video_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/video_categories?post=19178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}