{"id":11402,"date":"2025-05-22T14:37:48","date_gmt":"2025-05-22T11:37:48","guid":{"rendered":"https:\/\/aire-edih.eu\/?post_type=tribe_events&#038;p=11402"},"modified":"2025-05-22T14:37:48","modified_gmt":"2025-05-22T11:37:48","slug":"cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take","status":"publish","type":"tribe_events","link":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/","title":{"rendered":"Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?"},"content":{"rendered":"<blockquote>\n<h3>Do you know what cyber threats your company might face and how to prevent them? Would you like to learn more about the possibilities and trends of applying artificial intelligence in industry, as well as the associated risks? We invite you to participate in a training session led by experienced cybersecurity and AI expert Birgy Lorenz. The essential knowledge and tools to protect your business in the age of artificial intelligence are waiting for you.<\/h3>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<p>\ud83d\udcc5\u00a0<strong data-start=\"3\" data-end=\"12\">Date:<\/strong> May 21, Wednesday<\/p>\n<p>\u23f0\u00a0<strong data-start=\"35\" data-end=\"44\">Time:<\/strong> 9:30 AM \u2013 4:00 PM<br data-start=\"62\" data-end=\"65\" \/>\ud83d\udccd\u00a0<strong data-start=\"68\" data-end=\"81\">Location:<\/strong> Mektory, Raja 15, Innovation Hub (Ground floor, Room 031)<\/p>\n<h2><span data-contrast=\"auto\">OBJECTIVES<\/span><\/h2>\n<p>\u27a0\u00a0Increase awareness of cybersecurity threats in the industrial sector.<\/p>\n<p>\u27a0\u00a0Demonstrate the opportunities and risks of AI in relation to data security and production processes.<\/p>\n<p>\u27a0\u00a0Provide tools for risk assessment and implementing better security policies.<\/p>\n<p data-start=\"16\" data-end=\"384\">\u27a0\u00a0Discuss real-life cases on how to strengthen cybersecurity culture and practices within an organization.<\/p>\n<p>Participants who complete the training will receive a continuing education certificate from <strong>Tallinn University of Technology<\/strong>.<\/p>\n<h2><span data-contrast=\"auto\">AGENDA<br \/>\n<\/span><\/h2>\n<p><b><span data-contrast=\"auto\">9:30-10:00 <\/span><\/b>Arrival and coffee\u00a0<b><span data-contrast=\"auto\"><br \/>\n10:00-10:30 <\/span><\/b>Introduction \u2013 expectations and why cybersecurity and AI are critical in industry<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:0,&quot;335559739&quot;:0}\"><br \/>\n<\/span><b><span data-contrast=\"auto\">10:30-12:00 <\/span><\/b>Overview of cybersecurity for industrial companies (cybersecurity in IT-rich environments, the situation in Estonia, a plain-language overview of the Estonian Information Security Standard, key risks, case discussions)<span data-contrast=\"auto\"><br \/>\n<\/span><span data-contrast=\"auto\"><strong>12:00-12:45<\/strong> Lunch break<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><br \/>\n<\/span><span data-contrast=\"auto\"><strong>12:45-14:15<\/strong> AI applications and risks in industry (use cases and threats related to artificial intelligence)<\/span><br \/>\n<strong>14:15-14:30<\/strong> Coffee break<br \/>\n<b><span data-contrast=\"auto\">14:30-16:00 <\/span><\/b>Hands-on session: \u201cPackaging a Security Idea\u201d<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><br \/>\n<\/span><b><span data-contrast=\"auto\">16:00-16:15 <\/span><\/b>Wrap-up and reflection<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><br \/>\n<\/span><\/p>\n<h2>TRAINER<\/h2>\n<p><strong>Birgy Lorenz<\/strong> is a renowned cybersecurity expert and senior researcher at Tallinn University of Technology. She specializes in the fields of cybersecurity and artificial intelligence, with a broader focus across various sectors, including education and youth cyber behavior research.<\/p>\n<p><strong>Birgy is well known for her ability to explain complex technical topics in a clear and engaging way.<\/strong> Her trainings are practical and interactive, providing participants with valuable knowledge and tools that can be immediately applied in their organizations. She is dedicated to promoting a strong cybersecurity culture and developing solutions that enhance security practices, helping organizations better prepare for and respond to today\u2019s cybersecurity challenges.<\/p>\n<h2>TOPICS<\/h2>\n<p><b><span data-contrast=\"auto\">I Introduction <\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Workshop overview: why cybersecurity and AI are critical in industry<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Visual thinking exercise: <em data-start=\"135\" data-end=\"179\">\u201cMy company, my goals, and the path there\u201d<\/em> + mapping <em data-start=\"190\" data-end=\"237\">\u201cWhat can go wrong in an industrial company?\u201d<\/em><\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">II Cybersecurity Overview for Industrial Companies<\/span><\/b><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Cybersecurity in IT-rich environments, the current situation in Estonia, and a quick plain-language overview of the Estonian Information Security Standard<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Key risks: ransomware, data leaks, sabotage<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Ask the expert \u2013 discussion of common concerns and possible solutions<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Case analysis: What could make the situation worse? How could it be prevented or resolved?<\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">III AI Applications and Risks in Industry<\/span><\/b><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">AI use cases: predictive maintenance, quality control, process optimization<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">AI-related risks: lack of decision transparency, data misuse, learning from incorrect data<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">How to assess AI risks in companies<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"13\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Critical analysis: What can AI do today and what should not be entrusted to it?<\/li>\n<\/ul>\n<p><b><span data-contrast=\"auto\">IV Creative Session: \u201cPackaging a Security Idea\u201d<\/span><\/b><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Mini-project based on the needs of your company (individually or in teams)<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Problem definition, solution, and presentation<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Peer learning, feedback, and expert discussion<\/li>\n<\/ul>\n<div>\n<h2>TARGET AUDIENCE &amp; PARTICIPATION FEE<\/h2>\n<p>AIRE trainings are intended for <strong>industrial company<\/strong> managers, executives, developers, and other specialists and employees in the industrial sector who want to better understand the importance of cybersecurity and gain practical knowledge about the use of new technological tools. The training is also valuable for companies forming part of the industrial value chain, such as IT service providers, logistics companies, training providers, and others.<\/p>\n<\/div>\n<div>Only legal entities (e.g., using employer information) may participate in the training, and <strong data-start=\"584\" data-end=\"639\">registration is required no later than May 19, 2025<\/strong>.<\/div>\n<p>Participation is registered as <strong data-start=\"673\" data-end=\"686\">state aid<\/strong> for the company. The training is considered <strong data-start=\"731\" data-end=\"749\">de minimis aid<\/strong> in the amount of <strong data-start=\"767\" data-end=\"791\">\u20ac480 per participant<\/strong>. You can check the available de minimis aid balance for your company [here]. By registering for the training, the company confirms its consent to use the aid balance for participation, which will be recorded in the State Aid Register.<\/p>\n<p>Companies from the target group who register will be referred to AIRE\u2019s <a href=\"https:\/\/aire-edih.eu\/en\/service\/digital-maturity-assessment\/\"><strong data-start=\"1100\" data-end=\"1139\">digital maturity assessment service<\/strong><\/a>, and you will be contacted regarding this topic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know what cyber threats your company might face and how to prevent them? Would you like to learn more about the possibilities and trends of applying artificial intelligence [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":11136,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"tags":[],"tribe_events_cat":[56],"class_list":["post-11402","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tribe_events_cat-trainings-2","cat_trainings-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AIRE - Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AIRE - Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?\" \/>\n<meta property=\"og:description\" content=\"Do you know what cyber threats your company might face and how to prevent them? Would you like to learn more about the possibilities and trends of applying artificial intelligence [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/\" \/>\n<meta property=\"og:site_name\" content=\"AIRE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/airoboticsestonia?locale=et_EE\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aire-edih.eu\/2023\/wp-content\/uploads\/2025\/04\/Bannerid-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/en\\\/event\\\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\\\/\",\"url\":\"https:\\\/\\\/aire-edih.eu\\\/en\\\/event\\\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\\\/\",\"name\":\"AIRE - Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/en\\\/event\\\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/en\\\/event\\\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aire-edih.eu\\\/2023\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Bannerid-3.png\",\"datePublished\":\"2025-05-22T11:37:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/en\\\/event\\\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aire-edih.eu\\\/en\\\/event\\\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/en\\\/event\\\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aire-edih.eu\\\/2023\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Bannerid-3.png\",\"contentUrl\":\"https:\\\/\\\/aire-edih.eu\\\/2023\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Bannerid-3.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/en\\\/event\\\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/aire-edih.eu\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00dcritused\",\"item\":\"https:\\\/\\\/aire-edih.eu\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/#website\",\"url\":\"https:\\\/\\\/aire-edih.eu\\\/\",\"name\":\"AIRE\",\"description\":\"AI &amp; Robotics Estonia\",\"publisher\":{\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aire-edih.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/#organization\",\"name\":\"AIRE\",\"url\":\"https:\\\/\\\/aire-edih.eu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aire-edih.eu\\\/2023\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/AIRE_logo_black.png\",\"contentUrl\":\"https:\\\/\\\/aire-edih.eu\\\/2023\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/AIRE_logo_black.png\",\"width\":1183,\"height\":671,\"caption\":\"AIRE\"},\"image\":{\"@id\":\"https:\\\/\\\/aire-edih.eu\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/airoboticsestonia?locale=et_EE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/77710187\\\/admin\\\/dashboard\\\/?msgControlName=view_message_button&msgConversationId=2-M2ViODQ3ZjEtZTdjYi00NjYyLWI5YjItNThlOWQxMzgxMGU4XzAxMw&msgOverlay=true\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AIRE - Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/","og_locale":"en_US","og_type":"article","og_title":"AIRE - Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?","og_description":"Do you know what cyber threats your company might face and how to prevent them? Would you like to learn more about the possibilities and trends of applying artificial intelligence [&hellip;]","og_url":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/","og_site_name":"AIRE","article_publisher":"https:\/\/www.facebook.com\/airoboticsestonia?locale=et_EE","og_image":[{"width":1920,"height":1080,"url":"https:\/\/aire-edih.eu\/2023\/wp-content\/uploads\/2025\/04\/Bannerid-3.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/","url":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/","name":"AIRE - Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?","isPartOf":{"@id":"https:\/\/aire-edih.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/#primaryimage"},"image":{"@id":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/#primaryimage"},"thumbnailUrl":"https:\/\/aire-edih.eu\/2023\/wp-content\/uploads\/2025\/04\/Bannerid-3.png","datePublished":"2025-05-22T11:37:48+00:00","breadcrumb":{"@id":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/#primaryimage","url":"https:\/\/aire-edih.eu\/2023\/wp-content\/uploads\/2025\/04\/Bannerid-3.png","contentUrl":"https:\/\/aire-edih.eu\/2023\/wp-content\/uploads\/2025\/04\/Bannerid-3.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/aire-edih.eu\/en\/event\/cybersecurity-and-artificial-intelligence-what-steps-should-a-company-take\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aire-edih.eu\/en\/home\/"},{"@type":"ListItem","position":2,"name":"\u00dcritused","item":"https:\/\/aire-edih.eu\/events\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity and Artificial Intelligence \u2013 What Steps Should a Company Take?"}]},{"@type":"WebSite","@id":"https:\/\/aire-edih.eu\/#website","url":"https:\/\/aire-edih.eu\/","name":"AIRE","description":"AI &amp; Robotics Estonia","publisher":{"@id":"https:\/\/aire-edih.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aire-edih.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aire-edih.eu\/#organization","name":"AIRE","url":"https:\/\/aire-edih.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aire-edih.eu\/#\/schema\/logo\/image\/","url":"https:\/\/aire-edih.eu\/2023\/wp-content\/uploads\/2024\/12\/AIRE_logo_black.png","contentUrl":"https:\/\/aire-edih.eu\/2023\/wp-content\/uploads\/2024\/12\/AIRE_logo_black.png","width":1183,"height":671,"caption":"AIRE"},"image":{"@id":"https:\/\/aire-edih.eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/airoboticsestonia?locale=et_EE","https:\/\/www.linkedin.com\/company\/77710187\/admin\/dashboard\/?msgControlName=view_message_button&msgConversationId=2-M2ViODQ3ZjEtZTdjYi00NjYyLWI5YjItNThlOWQxMzgxMGU4XzAxMw&msgOverlay=true"]}]}},"ticketed":false,"_links":{"self":[{"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/tribe_events\/11402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":2,"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/tribe_events\/11402\/revisions"}],"predecessor-version":[{"id":11404,"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/tribe_events\/11402\/revisions\/11404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/media\/11136"}],"wp:attachment":[{"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/media?parent=11402"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/tags?post=11402"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/aire-edih.eu\/en\/wp-json\/wp\/v2\/tribe_events_cat?post=11402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}