{"id":37483,"date":"2025-04-07T15:47:29","date_gmt":"2025-04-07T13:47:29","guid":{"rendered":"https:\/\/www.uni.lu\/fstm-en\/?post_type=events&#038;p=37483"},"modified":"2025-04-14T09:59:42","modified_gmt":"2025-04-14T07:59:42","slug":"cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/","title":{"rendered":"Cybersecurity in the age of 5G: Threats, challenges and strategies"},"content":{"rendered":"\n<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\">\n<p>As digital transformation accelerates, cybersecurity has become a central concern for organisations and individuals alike. The growing interconnection of systems, the rise of cloud computing, and the proliferation of connected devices create an increasingly complex landscape where vulnerabilities multiply. Cyberattacks are no longer isolated incidents but sophisticated, large-scale operations that can disrupt entire industries.<\/p>\n\n\n\n<p>With the emergence of 5G, the stakes are even higher. Faster, more efficient networks promise new opportunities but also introduce new security challenges. The expansion of IoT devices, the evolution of infrastructures, and the broader attack surface demand a reassessment of traditional security strategies. Understanding how to protect information systems in this evolving environment is now more crucial than ever.<\/p>\n\n\n\n<p>To address these critical issues, the <a href=\"https:\/\/www.futurenetworksacademy.eu\/\" target=\"_blank\" rel=\"noreferrer noopener\">Future Network Academy<\/a> presents a conference on &#8220;Cybersecurity in the Age of 5G.&#8221; The conference includes two sessions, organised by the University of Luxembourg and <a href=\"https:\/\/www.univ-lorraine.fr\/en\/univ-lorraine\/\">Universit\u00e9 de Lorraine<\/a> on <strong>30 April and 15 May<\/strong>. Both sessions offer a deep dive into the evolving cybersecurity landscape, shedding light on the risks posed by modern threats and the strategies needed to secure tomorrow\u2019s digital world.<\/p>\n\n\n<div class=\"wp-block-unilux-blocks-spacer is-spacer-size-md\"><\/div>\n\n\n<h3 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"session-1-wednesday-30-april-1500-1700understanding-modern-cyber-threats-and-cybersecurity-principles\"\n    >\nSession 1: Wednesday 30 April, 15:00-17:00<br>Understanding modern cyber threats and cybersecurity principles<\/h3>\n\n\n\n<p>This lecture explores current cyber threats and the fundamental principles of cybersecurity, integrating technical, human, and economic aspects. The objective is to understand the risks and identify best practices to secure information systems.<\/p>\n\n\n<div class=\"wp-block-unilux-blocks-spacer is-spacer-size-sm\"><\/div>\n\n\n<h5 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"programme\"\n    >\nProgramme<\/h5>\n\n\n\n<ul class=\"ulux-list\">\n<li class=\"ulux-list-item\"><strong> Introduction to Cybersecurity and Overview of Attacks:<\/strong> Assessment of cyberattacks, using concrete examples to illustrate the growing threats to IT systems. We will also discuss the economic challenges of cybersecurity and the cost of security breaches for businesses and governments.<\/li>\n\n\n\n<li class=\"ulux-list-item\"><strong>Fundamental Security Principles: <\/strong>This section will cover key concepts such as fail-safe default, the principle of least privilege, and other approaches to limiting the impact of attacks and improving system resilience.<\/li>\n\n\n\n<li class=\"ulux-list-item\"><strong>Authentication and Password Management:<\/strong> We will focus on best practices for choosing and managing passwords, vulnerabilities related to their use, and modern solutions to enhance user authentication.<\/li>\n\n\n\n<li class=\"ulux-list-item\"><strong> Psychological Aspects and Cognitive Biases in Cybersecurity: <\/strong> Social engineering often exploits human biases. We will examine how certain risk assessment errors, such as underestimating specific threats or having excessive confidence in security measures, can be leveraged by attackers.<\/li>\n\n\n\n<li class=\"ulux-list-item\"><strong>Network Security and Known Attack: <\/strong> We will study several attacks targeting network infrastructures, their mechanisms, and existing countermeasures. The case of IoT will be addressed, particularly in relation to distributed DDoS attacks.<\/li>\n\n\n\n<li class=\"ulux-list-item\"><strong>4G\/5G Mobile Network Security: <\/strong>This final section will focus on the 4G and 5G technologies, the security mechanisms that protect them, and potential vulnerabilities. We will also explore some well-known attacks on these infrastructures and their impacts.<\/li>\n<\/ul>\n\n\n\n<p>The first part of this conference is designed for anyone looking to better understand current cyber threats and adopt effective protection strategies against cyber risks.<\/p>\n\n\n\n<ul class=\"wp-block-unilux-blocks-custom-buttons btn-list\"><li class=\"wp-block-unilux-blocks-custom-button\"    aria-disabled=\"false\"\n    >\n    <a\n        role=\"link\"\n        aria-disabled=\"false\"\n                    href=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=lZxaRJ0PU0mdsbxKRd0SIBrTUlNVc0dDjLyENvnlph9UN0pPVENPRkJMOExZUFU4TEc5OEY5UllMMS4u\"\n                target=\"_blank\"\n        class=\"btn btn--primary\"\n            >Register here<\/a>\n<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-unilux-blocks-spacer is-spacer-size-md\"><\/div>\n\n\n<h3 class=\"has-text-align-left wp-block-unilux-blocks-heading\"        id=\"session-2-thursday-15-may-1500-1700hands-on-workshop-strengthening-cybersecurity-through-practice\"\n    >\nSession 2: Thursday 15 May, 15:00-17:00<br>Hands-on workshop \u2013 Strengthening cybersecurity through practice<\/h3>\n\n\n\n<p>The second session of this event will be an interactive workshop, reinforcing key cybersecurity concepts from the first lecture through practice. Participants will work on several scenarios, experimenting with security mechanisms, analysing vulnerabilities, and exploring defensive strategies.<\/p>\n\n\n\n<p>Guided exercises and demonstrations will provide insights into threat detection, risk mitigation, and best practices for protecting digital environments.<\/p>\n\n\n\n<ul class=\"wp-block-unilux-blocks-custom-buttons btn-list\"><li class=\"wp-block-unilux-blocks-custom-button\"    aria-disabled=\"false\"\n    >\n    <a\n        role=\"link\"\n        aria-disabled=\"false\"\n                    href=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=lZxaRJ0PU0mdsbxKRd0SIBrTUlNVc0dDjLyENvnlph9UN0pPVENPRkJMOExZUFU4TEc5OEY5UllMMS4u\"\n                target=\"_blank\"\n        class=\"btn btn--primary\"\n            >Register here<\/a>\n<\/li>\n<\/ul>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":325,"featured_media":37484,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":{"x":0.45,"y":0.41},"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2025-04-30 14:00:00","event_end_date":"2025-05-15 17:00:00","event_speaker_name":"","event_speaker_link":"","event_is_online":false,"event_location":"Belval Campus, Maison du Savoir, Room 2.210","event_street":"2, place de l'Universit\u00e9","event_location_link":"","event_zip_code":"4365","event_city":"Esch-sur-Alzette","event_country":"Luxembourg"},"events-topic":[304],"events-type":[330,329,322],"organisation":[31,29],"authorship":[325],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity in the age of 5G: Threats, challenges and strategies - FSTM events I Uni.lu<\/title>\n<meta name=\"description\" content=\"As digital transformation accelerates, cybersecurity has become a central concern for organisations and individuals alike. The growing interconnection of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in the age of 5G: Threats, challenges and strategies\" \/>\n<meta property=\"og:description\" content=\"As digital transformation accelerates, cybersecurity has become a central concern for organisations and individuals alike. The growing interconnection of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/\" \/>\n<meta property=\"og:site_name\" content=\"FSTM EN\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fstm.uni.lu\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-14T07:59:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2025\/04\/AdobeStock_267969101-min-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/\",\"name\":\"Cybersecurity in the age of 5G: Threats, challenges and strategies - FSTM events I Uni.lu\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2025\/04\/AdobeStock_267969101-min-scaled.jpeg\",\"datePublished\":\"2025-04-07T13:47:29+00:00\",\"dateModified\":\"2025-04-14T07:59:42+00:00\",\"description\":\"As digital transformation accelerates, cybersecurity has become a central concern for organisations and individuals alike. The growing interconnection of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2025\/04\/AdobeStock_267969101-min-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2025\/04\/AdobeStock_267969101-min-scaled.jpeg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Faculty of Science, Technology and Medicine\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/fstm-en\/events\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity in the age of 5G: Threats, challenges and strategies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#website\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/\",\"name\":\"FSTM\",\"description\":\"Faculty of Science, Technology and Medicine I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#organization\"},\"alternateName\":\"Faculty of Science, Technology and Medicine I University of Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/fstm-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#organization\",\"name\":\"FSTM - University of Luxembourg I Uni.lu\",\"alternateName\":\"Faculty of Science, Technology and Medicine\",\"url\":\"https:\/\/www.uni.lu\/fstm-en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"FSTM - University of Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/fstm.uni.lu\/\",\"https:\/\/www.linkedin.com\/showcase\/fstm-uni-lu\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity in the age of 5G: Threats, challenges and strategies - FSTM events I Uni.lu","description":"As digital transformation accelerates, cybersecurity has become a central concern for organisations and individuals alike. The growing interconnection of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity in the age of 5G: Threats, challenges and strategies","og_description":"As digital transformation accelerates, cybersecurity has become a central concern for organisations and individuals alike. The growing interconnection of","og_url":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/","og_site_name":"FSTM EN","article_publisher":"https:\/\/www.facebook.com\/fstm.uni.lu\/","article_modified_time":"2025-04-14T07:59:42+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2025\/04\/AdobeStock_267969101-min-scaled.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/","url":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/","name":"Cybersecurity in the age of 5G: Threats, challenges and strategies - FSTM events I Uni.lu","isPartOf":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2025\/04\/AdobeStock_267969101-min-scaled.jpeg","datePublished":"2025-04-07T13:47:29+00:00","dateModified":"2025-04-14T07:59:42+00:00","description":"As digital transformation accelerates, cybersecurity has become a central concern for organisations and individuals alike. The growing interconnection of","breadcrumb":{"@id":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2025\/04\/AdobeStock_267969101-min-scaled.jpeg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2025\/04\/AdobeStock_267969101-min-scaled.jpeg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/fstm-en\/events\/cybersecurity-in-the-age-of-5g-threats-challenges-and-strategies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/en"},{"@type":"ListItem","position":2,"name":"Faculty of Science, Technology and Medicine","item":"https:\/\/www.uni.lu\/fstm-en\/"},{"@type":"ListItem","position":3,"name":"Events","item":"https:\/\/www.uni.lu\/fstm-en\/events\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity in the age of 5G: Threats, challenges and strategies"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/fstm-en\/#website","url":"https:\/\/www.uni.lu\/fstm-en\/","name":"FSTM","description":"Faculty of Science, Technology and Medicine I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#organization"},"alternateName":"Faculty of Science, Technology and Medicine I University of Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/fstm-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/fstm-en\/#organization","name":"FSTM - University of Luxembourg I Uni.lu","alternateName":"Faculty of Science, Technology and Medicine","url":"https:\/\/www.uni.lu\/fstm-en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/4\/2026\/03\/03111650\/FSTM_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"FSTM - University of Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/fstm-en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fstm.uni.lu\/","https:\/\/www.linkedin.com\/showcase\/fstm-uni-lu"]}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/events\/37483"}],"collection":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/types\/events"}],"author":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/325"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/comments?post=37483"}],"version-history":[{"count":6,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/events\/37483\/revisions"}],"predecessor-version":[{"id":41403,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/events\/37483\/revisions\/41403"}],"wp:authorship":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/users\/325"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/media\/37484"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/media?parent=37483"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/events-topic?post=37483"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/events-type?post=37483"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/fstm-en\/wp-json\/wp\/v2\/organisation?post=37483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}