{"id":34582,"date":"2025-02-03T11:13:20","date_gmt":"2025-02-03T10:13:20","guid":{"rendered":"https:\/\/www.uni.lu\/fstm-en\/?post_type=conferences&#038;p=34582"},"modified":"2025-02-04T15:18:14","modified_gmt":"2025-02-04T14:18:14","slug":"previous-editions","status":"publish","type":"conferences","link":"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/","title":{"rendered":"Previous editions"},"content":{"rendered":"<div class=\"section py-0 static\">\n<section class=\"py-0 wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><!-- SecondaryNavigationMirror --><div class=\"js-secondary-nav--sticky wp-block-unilux-blocks-secondary-navigation\" id=\"c53e59d2-5d94-4f3d-ba2f-1be75839a6f2\">\n    <nav id=\"secondary-navigation\" role=\"navigation\" aria-label=\"Secondary menu\" class=\"secondary-nav\">\n        <button class=\"secondary-nav__button btn btn-solid--primary w-full\" aria-expanded=\"false\" aria-controls=\"secondary-navigation__list\" title=\"The selected page is Overview\" type=\"button\">\n            <span class=\"btn__name mr-auto\">Overview<\/span>\n            <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n                <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-down\" \/>\n            <\/svg>\n        <\/button>\n\n        <ul id=\"secondary-navigation__list\" class=\"secondary-nav__list\">\n            <li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Overview<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/programme\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Programme <\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/speakers-and-abstracts\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Speakers and Abstracts<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/practical-information\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Practical information<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/registration\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Registration<\/span>\n    <\/a>\n<\/li>\n<li class=\"secondary-nav__item\">\n    <a href=\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/\" target=\"\" rel=\"noreferrer noopener\" class=\"secondary-nav__link \">\n        <svg aria-hidden=\"true\" focusable=\"false\" class=\"icon icon-outline icon--xs\">\n            <use xlink:href=\"https:\/\/www.uni.lu\/wp-content\/themes\/unilux-theme\/assets\/images\/icons\/icons-outline.svg#icon--arrow-right\" \/>\n        <\/svg>\n        <span class=\"secondary-nav__name\">Previous editions<\/span>\n    <\/a>\n<\/li>\n        <\/ul>\n    <\/nav>\n<\/div>\n<!-- end SecondaryNavigationMirror -->\n\n<div class=\"wp-block-unilux-blocks-spacer is-spacer-size-md\"><\/div>\n\n\n<h2 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"previous-editions\"\n    >\nPrevious editions<\/h2>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2024-new-trends-in-ai-and-cybersecurity-presentations\"\n    >\nEdition 2024: New trends in AI and Cybersecurity Presentations:\u00a0 <\/h5>\n\n\n\n<p><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/Catalin%20Tiganila.pdf\">Catalin Tiganila  (Artificial Intelligence Audit and Risk Management Toolkit)<br><\/a><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/Mohamed%20Fawzi.pdf\">Mohamed Fawzi (Securing AI: Similar or Different?)<\/a><\/p>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2023-social-engineering-and-online-deception-presentations\"\n    >\nEdition 2023: Social Engineering and Online Deception\u00a0 Presentations:\u00a0 <\/h5>\n\n\n\n<p><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/Dark%20Patterns%20-%20V4.1%20Final-Vincent%20Legeleux.pptx\">Vincent Legeleux (Dark Patterns \/ Deceptive Designs)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/Fake_news_v2.pptx\">Xavier Herm\u00e8s (Fake news \u2013 A fight against modern propaganda and fast disinformation?)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/Presentation_RedTeam_2023.pdf\">Sylvain Leconte (\u00c0 la d\u00e9couverte des exercices Red Team)<\/a><\/p>\n\n\n\n<p><strong>Jean-Louis Huynen <\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/2023-06-02%20-%20Coping%20with%20social%20engineering%20on%20a%20daily%20basis.pptx\">Lars Weber (Coping with social engineering)<\/a><\/p>\n\n\n\n<p><strong>Sabika Ishaq and Anusha Moonshiram <\/strong><\/p>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2022-demystifying-the-dark-web-challenges-and-threats-presentations\"\n    >\n<strong>Edition 2022: Demystifying\u00a0the Dark Web: Challenges and Threats<\/strong>\u00a0 <strong>Presentations:<\/strong><br><\/h5>\n\n\n\n<p><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/alexandre_dulaunoy.pdf\">Alexandre Dulaunoy (AIL Framework for Analysis of Information Leaks) <\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/dalia_khader.pdf\">Dalia Khader (Winning the Cyber War: Good vs Evil)&nbsp;<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/ised.uni.lu\/uploads\/images\/patrick_wheeler.pdf\">Patrick Wheeler (How to act \/ react correctly, negotiating with hackers)&nbsp;&nbsp;<\/a><\/p>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2021-impact-of-covid-19-on-cybersecurity-national-review-and-associated-challenges-presentations\"\n    >\nEdition 2021:\u00a0 Impact of Covid-19 on Cybersecurity: national review and associated challenges Presentations:<\/h5>\n\n\n\n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Nicolas%20Mayer,%20C%C3%A9dric%20Mauny%20and%20Yves%20le%20Traon_Welcome%20speeches.pdf\">Nicolas Mayer, C\u00e9dric Mauny and Yves le Traon_Welcome speeches.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Bruno%20Halopeau_Cyberattacks%20on%20healthcare.pdf\">Bruno Halopeau_Cyberattacks on healthcare.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Alexandre%20Dulaunoy_MISP%20Covid-19%20platform.pdf\">Alexandre Dulaunoy_MISP Covid-19 platform.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Werner%20Ansorge_Best%20practices%20BCMS.pdf\">Werner Ansorge_Best practices BCMS.pdf<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong>Article:&nbsp;<\/strong><a href=\"https:\/\/wwwen.uni.lu\/fstm\/news\/how_to_manage_the_impact_of_covid_19_on_cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;How to manage the impact of Covid-19 on cybersecurity?&#8221;<\/a><\/p>\n\n\n\n<p><strong>Recording<\/strong>:&nbsp;Link:&nbsp;<a href=\"https:\/\/unilu.webex.com\/unilu\/ldr.php?RCID=792fcdc599ac47b590b8eeca1678efd3\">https:\/\/unilu.webex.com\/unilu\/ldr.php?RCID=792fcdc599ac47b590b8eeca1678efd3<\/a>&nbsp;(Password: jT7erP72)<\/p>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2019-new-challenges-for-ciso-artificial-intelligence-emerging-technologies-and-regulations-programme-programme-ised-2019-pdf-presentations\"\n    >\nEdition 2019:\u00a0New challenges for CISO: Artificial intelligence, emerging technologies and regulations Programme:\u00a0Programme ISED 2019.pdf <br>Presentations:\u00a0<\/h5>\n\n\n\n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Yves%20le%20Traon%20&amp;%20Nicolas%20Mayer_Introduction%20ISED%202019.pdf\">Yves le Traon &amp; Nicolas Mayer_Introduction ISED 2019.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/T%C3%A9gawend%C3%A9%20Bissyand%C3%A9_Machine%20learning%20in%20a%20nutshell.pdf\">T\u00e9gawend\u00e9 Bissyand\u00e9_Machine learning in a nutshell.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Anne%20Goujon_AI%20in%20banks-the%20business%20innovation%20viewpoint.pdf\">Anne Goujon_AI in banks-the business innovation viewpoint.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Gr%C3%A9gory%20Nou_AI%20in%20banks-the%20CISO%20viewpoint.pdf\">Gr\u00e9gory Nou_AI in banks-the CISO viewpoint.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/David%20Hagen_AI%20in%20banks-the%20regulator%20viewpoint.pdf\">David Hagen_AI in banks-the regulator viewpoint.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Jean-Yves%20Mathieu_Signed,%20sealed,%20delivered%E2%80%A6%20digitally%20-%20the%20legal%20value%20of%20digital%20exchanges.pdf\">Jean-Yves Mathieu_Signed, sealed, delivered\u2026 digitally &#8211; the legal value of digital exchanges.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Emanuel%20Tanase_New%20technologies-buzzwords%20or%20true%20CISO%20helpers.pdf\">Emanuel Tanase_New technologies-buzzwords or true CISO helpers.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ISED%202019\/Tewfik%20Toum_AI%20for%20Cybersecurity-Separating%20the%20wheat%20from%20the%20chaff.pdf\">Tewfik Toum_AI for Cybersecurity-Separating the wheat from the chaff.pdf<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong>Article:&nbsp;<\/strong><a href=\"https:\/\/wwwen.uni.lu\/fstm\/news\/how_can_ai_help_security_managers\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;How can AI help security managers?&#8221;<\/a><\/p>\n\n\n\n<p><strong>Pictures:&nbsp;<\/strong><a href=\"https:\/\/www.facebook.com\/fstm.uni.lu\/photos\/?tab=album&amp;album_id=2914441775240344\" target=\"_blank\" rel=\"noreferrer noopener\">pictures ISED 2019<\/a><\/p>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2018-internet-of-things-security-challenges-and-opportunitiesprogramme-programme-ised-2018-pdf-presentations\"\n    >\nEdition 2018:\u00a0Internet of Things: security challenges and opportunities<br>Programme:\u00a0Programme ISED 2018.pdf <br>Presentations: <\/h5>\n\n\n\n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ised%202018\/Nicolas%20Mayer%20and%20Jun%20Pang_Introduction%20ISED%202018.pdf\">Nicolas Mayer and Jun Pang_Introduction ISED 2018.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ised%202018\/Sylvain%20Kubler_Towards%20open%20Internet%20of%20Things%20ecosystems%20Ambition,%20Challenges%20&amp;%20Opportunities.pdf\">Sylvain Kubler_Towards open Internet of Things ecosystems Ambition, Challenges &amp; Opportunities.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ised%202018\/Alain%20Herrmann_IOT%20and%20Data%20protection.pdf\">Alain Herrmann_IOT and Data protection.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ised%202018\/Alfredo%20Rial%20Duran_Privacy%20in%20the%20Smart%20Grid.pdf\">Alfredo Rial Duran_Privacy in the Smart Grid.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ised%202018\/Carlo%20Harpes_Standardizing%20the%20un-standardizable,%20or%20how%20to%20agree%20on%20the%20IoT.pdf\">Carlo Harpes_Standardizing the un-standardizable, or how to agree on the IoT.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/images\/ised%202018\/Edgar%20Biro_IOT%20and%20Risk%20Management.pdf\">Edgar Biro_IOT and Risk Management.pdf<\/a><\/li>\n<\/ul>\n\n\n\n<p><strong>Article:&nbsp;<a href=\"https:\/\/wwwfr.uni.lu\/fstc\/actualites\/how_to_secure_the_internet_of_things_iot\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;<\/a><\/strong><a href=\"https:\/\/wwwfr.uni.lu\/fstc\/actualites\/how_to_secure_the_internet_of_things_iot\" target=\"_blank\" rel=\"noreferrer noopener\">How to secure the Internet of Things (IoT)?&#8221;<\/a><\/p>\n\n\n\n<p><strong>Pictures:<\/strong><a href=\"https:\/\/www.facebook.com\/pg\/fstc.uni.lu\/photos\/?tab=album&amp;album_id=2172754092742453\" target=\"_blank\" rel=\"noreferrer noopener\">pictures ISED 2018<\/a>&#8211;<\/p>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2017-emerging-regulations-what-you-will-need-to-do-to-be-standard-and-compliant-in-a-close-future\"\n    >\nEdition 2017: &#8220;Emerging regulations: what you will need to do to be standard and compliant in a close future&#8221; <\/h5>\n\n\n\n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\"><strong>Programme:<\/strong>&nbsp;<a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/Edition%202017\/Programme%20ISED%202017.pdf\">Programme ISED 2017.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><strong>Presentations:<\/strong>\n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/Edition%202017\/Towards%20an%20integrated%20regulation%20platform%20in%20Luxembourg_Sebastien%20Pineau_LIST.pdf\">Towards an integrated regulation platform in Luxembourg_Sebastien Pineau_LIST.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/Edition%202017\/Artificial%20Intelligence%20in%20Law%20Trends%20and%20Experience_Mehrad%20Sabetzadeh_UNI%20LU.pdf\">Artificial Intelligence in Law Trends and Experience_Mehrad Sabetzadeh_UNI LU.pdf<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><a href=\"https:\/\/ised.uni.lu\/uploads\/simplex\/Edition%202017\/IOT%20and%20Regulations_Jean%20Goetzinger_CLUSIL.pdf\">IOT and Regulations_Jean Goetzinger_CLUSIL.pdf<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\"><strong>Article:&nbsp;<a href=\"https:\/\/wwwen.uni.lu\/fstc\/actualites\/emerging_regulations_in_ict_anticipating_changes\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;<\/a><\/strong><a href=\"https:\/\/wwwen.uni.lu\/fstc\/actualites\/emerging_regulations_in_ict_anticipating_changes\" target=\"_blank\" rel=\"noreferrer noopener\">Emerging regulations in ICT: anticipating changes&#8221;<\/a><\/li>\n\n\n\n<li class=\"ulux-list-item\"><strong>Pictures:&nbsp;<\/strong><a href=\"https:\/\/www.facebook.com\/pg\/fstc.uni.lu\/photos\/?tab=album&amp;album_id=1675592955791905\" target=\"_blank\" rel=\"noreferrer noopener\">pictures ISED 2017<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2016-how-to-guarantee-security-in-the-realm-of-big-data-analytics\"\n    >\nEdition 2016: &#8220;How to guarantee security in the realm of Big Data &amp; Analytics?&#8221; <\/h5>\n\n\n\n<p>Article: &#8220;<a href=\"https:\/\/wwwen.uni.lu\/fstc\/actualites\/how_to_guarantee_security_in_the_realm_of_big_data_analytics\">How to guarantee security in the realm of Big Data &amp; Analytics?<\/a>&#8220;<\/p>\n\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"edition-2015-understanding-data-protection-challenges\"\n    >\nEdition 2015: &#8220;Understanding Data Protection challenges&#8221; <\/h5>\n\n\n\n<p>Programme:&nbsp;<a href=\"https:\/\/wwwen.uni.lu\/universite\/actualites\/evenements\/understanding_data_protection_challenges\"> Programme ISED 2015<\/a><\/p>\n<\/div><\/section>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":121,"featured_media":0,"parent":34557,"menu_order":0,"template":"","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"Information Security Education Day (ISED)","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false},"authorship":[121],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Previous editions - FSTM EN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Previous editions\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/\" \/>\n<meta property=\"og:site_name\" content=\"FSTM EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fstm.uni.lu\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-04T14:18:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/\",\"name\":\"Previous editions - FSTM EN\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#website\"},\"datePublished\":\"2025-02-03T10:13:20+00:00\",\"dateModified\":\"2025-02-04T14:18:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Faculty of Science, Technology and Medicine\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Conferences\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/conferences\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Security Education Day (ISED)\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Previous editions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#website\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/\",\"name\":\"FSTM\",\"description\":\"Faculty of Science, Technology and Medicine I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#organization\"},\"alternateName\":\"Faculty of Science, Technology and Medicine I University of Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fstm-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#organization\",\"name\":\"FSTM - University of Luxembourg I Uni.lu\",\"alternateName\":\"Faculty of Science, Technology and Medicine\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"FSTM - University of Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/fstm.uni.lu\/\",\"https:\/\/www.linkedin.com\/showcase\/fstm-uni-lu\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Previous editions - FSTM EN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/","og_locale":"en_GB","og_type":"article","og_title":"Previous editions","og_url":"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/","og_site_name":"FSTM EN","article_publisher":"https:\/\/www.facebook.com\/fstm.uni.lu\/","article_modified_time":"2025-02-04T14:18:14+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/","url":"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/","name":"Previous editions - FSTM EN","isPartOf":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#website"},"datePublished":"2025-02-03T10:13:20+00:00","dateModified":"2025-02-04T14:18:14+00:00","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/previous-editions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/en"},{"@type":"ListItem","position":2,"name":"Faculty of Science, Technology and Medicine","item":"https:\/\/www.uni.lu\/fstm-en\/"},{"@type":"ListItem","position":3,"name":"Conferences","item":"https:\/\/www.uni.lu\/fstm-en\/conferences\/"},{"@type":"ListItem","position":4,"name":"Information Security Education Day (ISED)","item":"https:\/\/www.uni.lu\/fstm-en\/conferences\/information-security-education-day-ised\/"},{"@type":"ListItem","position":5,"name":"Previous editions"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fstm-en\/#website","url":"https:\/\/www.uni.lu\/fstm-en\/","name":"FSTM","description":"Faculty of Science, Technology and Medicine I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#organization"},"alternateName":"Faculty of Science, Technology and Medicine I University of Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fstm-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fstm-en\/#organization","name":"FSTM - University of Luxembourg I Uni.lu","alternateName":"Faculty of Science, Technology and Medicine","url":"https:\/\/www.uni.lu\/fstm-en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"FSTM - University of Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fstm.uni.lu\/","https:\/\/www.linkedin.com\/showcase\/fstm-uni-lu"]}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/conferences\/34582"}],"collection":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/conferences"}],"about":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/types\/conferences"}],"author":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/121"}],"version-history":[{"count":5,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/conferences\/34582\/revisions"}],"predecessor-version":[{"id":34821,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/conferences\/34582\/revisions\/34821"}],"up":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/conferences\/34557"}],"wp:authorship":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/121"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/media?parent=34582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}