{"id":1382,"date":"2019-07-05T14:10:43","date_gmt":"2019-07-05T11:10:43","guid":{"rendered":"https:\/\/teolupus.com\/?p=1382"},"modified":"2023-02-08T23:46:23","modified_gmt":"2023-02-08T20:46:23","slug":"iso-27001-information-security","status":"publish","type":"post","link":"https:\/\/teolupus.com\/en\/iso-27001-information-security\/","title":{"rendered":"ISO 27001 Information Security Talk Was Organized"},"content":{"rendered":"\r\n<h2>Teolupus Business Talk titled Information Security ISO 27001<\/h2>\r\n<p>It was organized in 3 July 2019 with our speakers Cahit Cengizhan and Cantekin Ertekin.<\/p>\r\n\r\n\r\n\r\n<p>In this event, importance and risks of information security in organizations were presented to professionals.<\/p>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" class=\"wp-image-3873\" src=\"https:\/\/teolupus.com\/wp-content\/uploads\/\/TeolupuIsSohbetleri-3Temmuz2019-1024x1024.jpg\" alt=\"\" title=\"\" srcset=\"https:\/\/teolupus.com\/wp-content\/uploads\/TeolupuIsSohbetleri-3Temmuz2019-1024x1024.jpg 1024w, https:\/\/teolupus.com\/wp-content\/uploads\/TeolupuIsSohbetleri-3Temmuz2019-150x150.jpg 150w, https:\/\/teolupus.com\/wp-content\/uploads\/TeolupuIsSohbetleri-3Temmuz2019-300x300.jpg 300w, https:\/\/teolupus.com\/wp-content\/uploads\/TeolupuIsSohbetleri-3Temmuz2019-768x768.jpg 768w, https:\/\/teolupus.com\/wp-content\/uploads\/TeolupuIsSohbetleri-3Temmuz2019-600x600.jpg 600w, https:\/\/teolupus.com\/wp-content\/uploads\/TeolupuIsSohbetleri-3Temmuz2019.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n","protected":false},"excerpt":{"rendered":"<p>Teolupus Business Talk titled Information Security ISO 27001 It was organized in 3 July 2019 with our speakers Cahit Cengizhan and Cantekin Ertekin. In this event, importance and risks of&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3873,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[203,205,842],"tags":[256,479,478,258,480,236,464],"class_list":{"0":"post-1382","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-internal-audit-and-internal-control","8":"category-news","9":"category-publications","10":"tag-256","11":"tag-importance-of-information-security","12":"tag-information-security","13":"tag-information-security-management-system-isms","14":"tag-iso-27001","15":"tag-risk-management","16":"tag-teolupus-business-talks"},"_links":{"self":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/comments?post=1382"}],"version-history":[{"count":0,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1382\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media\/3873"}],"wp:attachment":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media?parent=1382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/categories?post=1382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/tags?post=1382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}