{"id":26444,"date":"2026-02-02T16:00:58","date_gmt":"2026-02-02T15:00:58","guid":{"rendered":"https:\/\/cyberinsights.iainfraser.net\/?p=26444"},"modified":"2026-02-10T13:38:59","modified_gmt":"2026-02-10T12:38:59","slug":"generative-ai-skills-traing-event","status":"publish","type":"post","link":"https:\/\/smecyberinsights.co.uk\/index.php\/2026\/02\/02\/generative-ai-skills-traing-event\/","title":{"rendered":"SME Cyber Event: &#8220;Designing Training for Fast-Changing Labor Markets: Generative AI Skills&#8221;"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26444\" class=\"elementor elementor-26444\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8b1fee e-flex e-con-boxed e-con e-parent\" data-id=\"e8b1fee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-41f574e8 e-con-full e-flex e-con e-child\" data-id=\"41f574e8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7812d4c elementor-widget__width-initial elementor-widget elementor-widget-image-carousel\" data-id=\"7812d4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;none&quot;,&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;slides_to_show&quot;:&quot;6&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"CYBERPartners\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners1_NordVPN.png\" alt=\"Partners1_NordVPN\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners3_R3.png\" alt=\"Partners3_R3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners2_Zoho.png\" alt=\"Partners2_Zoho\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners4_Plesk.png\" alt=\"Partners4_Plesk\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Partners7_Passware.png\" alt=\"Partners7_Passware\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/03\/Red_Button_Slider.png\" alt=\"Red_Button_Slider\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/04\/ogo2.png\" alt=\"ogo2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 8\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/12\/Securus_Working_300x250-e1765538235404.png\" alt=\"Detection. Connection. Protection: Why Securus Belongs at the Core of Every Modern SME Security Strategy\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2b9fb88c e-con-full e-flex e-con e-parent\" data-id=\"2b9fb88c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-73a546de e-con-full e-flex e-con e-child\" data-id=\"73a546de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76429f4f elementor-widget elementor-widget-image\" data-id=\"76429f4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/www.iainfraser.net\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"435\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg\" class=\"attachment-large size-large wp-image-26445\" alt=\"SME Cyber Event: &quot;Designing Training for Fast-Changing Labor Markets: Insights from the Generative AI Skills Academy&quot;\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg 1000w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel-300x204.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel-768x521.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Rawpixel<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28a5eb8c e-con-full e-flex e-con e-child\" data-id=\"28a5eb8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26e9a08c elementor-widget elementor-widget-image\" data-id=\"26e9a08c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&#038;offerid=572706.47&#038;subid=0&#038;type=4\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/elementor\/thumbs\/nordvpn-internet-security-privacy-relipaxyqawaqksc50pdwo7qqkvyshutlw3mi11kzo.png\" title=\"nordvpn-internet-security-privacy\" alt=\"nordvpn-internet-security-privacy\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1612aa2f elementor-widget elementor-widget-wp-widget-text\" data-id=\"1612aa2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Helping Keep Small Business CYBERSafe!<br \/>\n<\/strong>Gibraltar: Monday 02 February 2026 at 16:00 CET<\/p>\n<p><b>SME Cyber Event: &#8220;<strong>Designing Training for Fast-Changing Labor Markets: Insights from the Generative AI Skills Academy<\/strong>&#8220;<\/b><br \/>\nBy: <a href=\"https:\/\/www.google.com\/search?client=opera&amp;q=iain+%2B+cybersecurity&amp;sourceid=opera&amp;ie=UTF-8&amp;oe=UTF-8\" target=\"_blank\" rel=\"noopener\">Iain Fraser<\/a> &#8211; <a href=\"https:\/\/www.google.com\/search?q=sme+cybersecurity+journalist&amp;client=firefox-b-d&amp;sca_esv=604417a22f933246&amp;biw=1920&amp;bih=937&amp;sxsrf=ADLYWII9GQo-CShq2VQjmub9bZo3edd4sw%3A1732797372997&amp;ei=vGNIZ_W2PLGgkdUP2Z6JsQc&amp;ved=0ahUKEwj1hIqfhf-JAxUxUKQEHVlPInY4ChDh1QMIDw&amp;uact=5&amp;oq=sme+cybersecurity+journalist&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiHHNtZSBjeWJlcnNlY3VyaXR5IGpvdXJuYWxpc3QyBBAjGCcyCBAAGIAEGKIEMggQABiABBiiBDIIEAAYgAQYogRI4g5QgQhY1AtwAXgBkAEAmAGwAaAB8QSqAQMwLjS4AQPIAQD4AQGYAgOgAtYCwgIHECMYsAMYJ8ICChAAGLADGNYEGEfCAgcQIxiwAhgnmAMAiAYBkAYKkgcDMS4yoAekHQ&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Journalist<\/a><br \/>\nPublished in Collaboration with: <a href=\"https:\/\/nordvpn.com\/special\/?utm_medium=affiliate&amp;utm_term=&amp;utm_content=rv_nShY4wLA-4Baxkk4SZGqT7YGVlX9Mhw&amp;utm_campaign=off15&amp;utm_source=aff8398\" target=\"_blank\" rel=\"noopener\">Nord VPN<\/a><br \/>\n<a href=\"SMECyberInsights.co.uk\">SMECyberInsights.co.uk<\/a><a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/inner-sanctum-2024\/\" target=\"_blank\" rel=\"noopener\"> &#8211;\u00a0<\/a><a href=\"https:\/\/www.google.com\/search?q=SME+Cybersecurity&amp;sca_esv=01731d022ec92237&amp;rlz=1C1FKPE_enES1123ES1124&amp;sxsrf=AHTn8zozW-9dbXRwHlu5zyHfc5aukU6yeQ%3A1747146305898&amp;ei=QVYjaILMNsyKkdUP1teCyQk&amp;ved=0ahUKEwjC8LuX06CNAxVMRaQEHdarIJkQ4dUDCBA&amp;uact=5&amp;oq=SME+Cybersecurity&amp;gs_lp=Egxnd3Mtd2l6LXNlcnAiEVNNRSBDeWJlcnNlY3VyaXR5MgoQIxiABBgnGIoFMgQQIxgnMgQQIxgnMgYQABgHGB4yCxAAGIAEGJECGIoFMggQABgHGAgYHjIIEAAYBxgIGB4yCBAAGAcYCBgeMggQABgHGAgYHjIIEAAYBxgIGB5Iwy9QAFj5JHAAeAGQAQCYAZ0BoAG2A6oBAzAuM7gBA8gBAPgBAZgCA6AC-wPCAgQQABgewgIGEAAYCBgewgIHEAAYgAQYDcICCBAAGAUYDRgemAMAkgcDMC4zoAf9GbIHAzAuM7gH-wPCBwUzLTIuMcgHPg&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">First for SME Cybersecurity<br \/>\n<\/a><a href=\"https:\/\/www.google.com\/search?q=SME+Cyber+Event%3A+Designing+Training+for+Fast-Changing+Labor+Markets%3A+Insights+from+the+Generative+AI+Skills+Academy&amp;sca_esv=9cf1df91a9197cf6&amp;rlz=1C1AJCO_enES1193ES1194&amp;sxsrf=ANbL-n70q7mAnQrH2texPWp4th5YRaAA5g%3A1770114613961&amp;ei=Nc6Bad6vOu_UkdUP7MjN4Ao&amp;ved=0ahUKEwienpvmjr2SAxVvaqQEHWxkE6wQ4dUDCBE&amp;uact=5&amp;oq=SME+Cyber+Event%3A+Designing+Training+for+Fast-Changing+Labor+Markets%3A+Insights+from+the+Generative+AI+Skills+Academy&amp;gs_lp=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-UnADeACQAQCYAQCgAQCqAQC4AQPIAQD4AQH4AQKYAgOgAi-oAhCYAxHxBSul0PWd91crugYGCAEQARgBkgcBM6AHALIHALgHAMIHAzMtM8gHI4AIAA&amp;sclient=gws-wiz-serp\" target=\"_blank\" rel=\"noopener\">Google Indexed on: 020226 at 16:55 CET<\/a><em><br \/>\n#SMECyberInsights\u00a0 #SMECyberAwareness\u00a0 #CyberSafe #SME #SmallBusiness #SMECyberEvent<\/em><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-19e6d011 e-flex e-con-boxed e-con e-parent\" data-id=\"19e6d011\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-493b6417 e-con-full e-flex e-con e-child\" data-id=\"493b6417\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26c7b306 elementor-widget elementor-widget-image\" data-id=\"26c7b306\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/go.nordpass.io\/aff_c?offer_id=488&#038;aff_id=125672&#038;url_id=9356\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"300\" height=\"251\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/09\/Nord-Pass.png\" class=\"attachment-1536x1536 size-1536x1536 wp-image-24870\" alt=\"Nord Pass\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ec35c48 e-con-full e-flex e-con e-child\" data-id=\"5ec35c48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a108bcb elementor-widget elementor-widget-wp-widget-text\" data-id=\"5a108bcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Wednesday 11 February<\/strong>\u00a0at\u00a0<strong>14:00 CET<\/strong> &#8211; <strong>Online Training<\/strong><\/p>\n<p>&#8220;<strong>Designing Training for Fast-Changing Labor Markets: Insights from the Generative AI Skills Academy<\/strong>&#8221;<\/p>\n<p>Organised by the <strong><a href=\"https:\/\/www.digitalsme.eu\/civicrm\/?civiwp=CiviCRM&amp;q=civicrm\/mailing\/url&amp;u=18130&amp;qid=1478134\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.digitalsme.eu\/civicrm\/?civiwp%3DCiviCRM%26q%3Dcivicrm\/mailing\/url%26u%3D18130%26qid%3D1478134&amp;source=gmail&amp;ust=1770130480277000&amp;usg=AOvVaw0x-7kPEBzYr9G014lAKn6H\"><u>Generative AI Skills Academy (GenAISA)<\/u><\/a><\/strong>\u00a0in collaboration with the\u00a0<a href=\"https:\/\/www.digitalsme.eu\/civicrm\/?civiwp=CiviCRM&amp;q=civicrm\/mailing\/url&amp;u=18131&amp;qid=1478134\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.digitalsme.eu\/civicrm\/?civiwp%3DCiviCRM%26q%3Dcivicrm\/mailing\/url%26u%3D18131%26qid%3D1478134&amp;source=gmail&amp;ust=1770130480277000&amp;usg=AOvVaw3n1Ozf0ISXpas_cyyAiW24\"><strong><u>Digital Large Scale Partnership<\/u><\/strong><\/a><strong>\u00a0<\/strong>\u00a0and the\u00a0<a href=\"https:\/\/www.digitalsme.eu\/civicrm\/?civiwp=CiviCRM&amp;q=civicrm\/mailing\/url&amp;u=18132&amp;qid=1478134\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.digitalsme.eu\/civicrm\/?civiwp%3DCiviCRM%26q%3Dcivicrm\/mailing\/url%26u%3D18132%26qid%3D1478134&amp;source=gmail&amp;ust=1770130480277000&amp;usg=AOvVaw36gPtf4Qn2IlXLQVOFvtQS\"><strong><u>Artificial Intelligence Skills Alliance (ARISA)<\/u><\/strong><\/a>.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_1364478019957690763c\">This collaborative workshop will tackle\u00a0<u>whether and how training can keep pace when skills evolve faster than curricula<\/u>. In fast-moving sectors such as AI,\u00a0<strong>technological change\u00a0<\/strong>is rapid, skills requirements shift continuously, and innovation circles are short. Yet, many\u00a0<strong>training programs<\/strong>\u00a0are still designed using linear, content-heavy models that are slow to adapt and increasingly misaligned with\u00a0<strong>labor market needs<\/strong>.<u><\/u><u><\/u>\u00a0<u><\/u><u><\/u><\/p>\n<p class=\"m_1364478019957690763c\">This interactive workshop invites training designers, educators, and decision-makers to explore\u00a0<strong>how training can be redesigned to remain relevant, responsive, and impactful in fast-changing labor markets<\/strong>. Drawing on the experience of\u00a0<strong>GenAISA<\/strong>, the session showcases practical approaches to building training programs that deliver the right skills\u2014at the right time.<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5eaffecd e-flex e-con-boxed e-con e-parent\" data-id=\"5eaffecd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d58398d e-con-full e-flex e-con e-child\" data-id=\"d58398d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a877aef e-con-full e-flex e-con e-child\" data-id=\"a877aef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26ba4a95 elementor-widget elementor-widget-image\" data-id=\"26ba4a95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"640\" height=\"435\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg\" class=\"attachment-large size-large wp-image-26445\" alt=\"SME Cyber Event: &quot;Designing Training for Fast-Changing Labor Markets: Insights from the Generative AI Skills Academy&quot;\" srcset=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg 1000w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel-300x204.jpg 300w, https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel-768x521.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"> Image Credit: Rawpixel<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-529f8b41 elementor-widget elementor-widget-wp-widget-text\" data-id=\"529f8b41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>Why participate?<\/strong><\/p>\n<p>Participants will gain first-hand insights into how\u00a0<strong>modular curricula,\u00a0<\/strong><strong>assessment-first design<\/strong><strong>, and strong industry alignment<\/strong>\u00a0can be combined to create high-impact learning programs that adapt to change. Generative AI serves as a real-world case study, with lessons that are transferable across sectors facing rapid transformation.<\/p>\n<p><strong>What will you learn?<\/strong><\/p>\n<p>By the end of the workshop, participants will:<\/p>\n<p>* Understand the key trends shaping fast-changing labor markets and what they mean for training design<br \/>\n* Learn how to apply skills- and assessment-first design frameworks in practice<br \/>\n* Explore ways to integrate labor market and industry intelligence into curriculum design<br \/>\n* Identify effective assessment and credentialing approaches for evolving skill sets<\/p>\n<p><strong>Who should attend?<\/strong><\/p>\n<p>This workshop is designed for professionals involved in training, education, and skills development, including:<\/p>\n<p>* Training and instructional designers<br \/>\n* VET practitioners<br \/>\n* Higher education faculty and curriculum developers<br \/>\n* Workforce development and reskilling program managers<br \/>\n* Corporate learning and development professionals<br \/>\nPolicymakers and program officers working on digital skills and innovation<br \/>\n* Managers of innovation hubs, accelerators, and skills academies<\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59127043 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"59127043\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.digitalsme.eu\/civicrm\/?civiwp=CiviCRM&#038;q=civicrm\/mailing\/url&#038;u=18129&#038;qid=1478134\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register Here \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7daab3a9 e-flex e-con-boxed e-con e-parent\" data-id=\"7daab3a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-69006e5 e-con-full e-flex e-con e-child\" data-id=\"69006e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a14c57f elementor-widget elementor-widget-image\" data-id=\"2a14c57f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/nordvpn.com\/special\/?utm_medium=affiliate&#038;utm_term=&#038;utm_content=rv_nShY4wLA-emnpSewtfAm9zRdw1TNpcw&#038;utm_campaign=off15&#038;utm_source=aff8398\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" width=\"158\" height=\"148\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/09\/Nord.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-25436\" alt=\"Nord\" loading=\"lazy\" decoding=\"async\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1cc91796 e-con-full e-flex e-con e-child\" data-id=\"1cc91796\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ee38771 elementor-widget elementor-widget-wp-widget-text\" data-id=\"5ee38771\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wp-widget-text.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"textwidget\"><p><strong>What is a VPN &amp; Does my SME Need one?<\/strong> A <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPN<\/strong><\/a> is a Virtual Private Network a method of securing your communications credentials. When it comes to <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/09\/26\/definition-of-an-sme\/\" target=\"_blank\" rel=\"noopener\"><strong>SMEs<\/strong><\/a>, the choice of <a href=\"https:\/\/cyberinsights.iainfraser.net\/index.php\/2024\/08\/26\/special-feature-vpn\/\" target=\"_blank\" rel=\"noopener\"><strong>VPNs<\/strong><\/a> can significantly impact the security and efficiency of their operations. <b>NordVPN<\/b> secures your Internet data with military-grade encryption, ensures your activity remains private and helps bypass geographic content restrictions online.\u00a0 \u00a0<strong><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=rv%2fnShY4wLA&amp;offerid=572706.44&amp;subid=0&amp;type=4\" target=\"_blank\" rel=\"noopener\">Join\u00a0NordVPN\u00a0Today and\u00a0Save\u00a0up to\u00a073%\u00a0and Get 3 months\u00a0Extra Free<\/a> &#8211; Rude Not to \u2026!<\/strong><\/p>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ac56d03 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4ac56d03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/nordvpn.com\/special\/?utm_medium=affiliate&#038;utm_term=&#038;utm_content=rv_nShY4wLA-emnpSewtfAm9zRdw1TNpcw&#038;utm_campaign=off15&#038;utm_source=aff8398\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn More \/...<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7bb7f5c e-flex e-con-boxed e-con e-parent\" data-id=\"7bb7f5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23bd146 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"23bd146\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-AI--768x432.jpg\" alt=\"CI_Feature AI\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Attack-Mitigation-10-768x432.jpg\" alt=\"CI_Feature Attack Mitigation (10)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Identity-Theft-4-768x432.jpg\" alt=\"CI_Feature Identity Theft (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cloud-Security-3-768x432.jpg\" alt=\"CI_Feature Cloud Security (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Communications-2-768x432.jpg\" alt=\"CI_Feature Communications (2)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Compliance-8-768x432.jpg\" alt=\"CI_Feature Cyber Compliance (8)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Insurance-7-768x432.jpg\" alt=\"CI_Feature Cyber Insurance (7)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/01\/Copy-of-CI_Feature-Scam-Protection-1-768x432.jpg\" alt=\"Data Recovery: Protecting Business Continuity in a High-Risk Cyber Landscape \u2013 Cyber KPI\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-DDoS-4-768x432.jpg\" alt=\"CI_Feature DDoS (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Email-Security-3-768x432.jpg\" alt=\"CI_Feature Email Security (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-MSPs-6-768x432.jpg\" alt=\"CI_Feature MSPs (6)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"12 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Pen-Testing-768x432.jpg\" alt=\"CI_Feature Pen Testing\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"13 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Phishing-5-768x432.jpg\" alt=\"CI_Feature Phishing (5)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"14 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Ransomware-7-768x432.jpg\" alt=\"CI_Feature Ransomware (7)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"15 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-SaaS-4-768x432.jpg\" alt=\"CI_Feature SaaS (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"16 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Scam-Protection-3-768x432.jpg\" alt=\"CI_Feature Scam Protection (3)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"17 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Smart-Security-4-768x432.jpg\" alt=\"CI_Feature Smart Security (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"18 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-Cyber-Training-4-768x432.jpg\" alt=\"CI_Feature Cyber Training (4)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"19 of 19\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2025\/05\/CI_Feature-The-VPN-3-768x432.jpg\" alt=\"CI_Feature The VPN (3)\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-left\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M646 125C629 125 613 133 604 142L308 442C296 454 292 471 292 487 292 504 296 521 308 533L604 854C617 867 629 875 646 875 663 875 679 871 692 858 704 846 713 829 713 812 713 796 708 779 692 767L438 487 692 225C700 217 708 204 708 187 708 171 704 154 692 142 675 129 663 125 646 125Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-eicon-chevron-right\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M696 533C708 521 713 504 713 487 713 471 708 454 696 446L400 146C388 133 375 125 354 125 338 125 325 129 313 142 300 154 292 171 292 187 292 204 296 221 308 233L563 492 304 771C292 783 288 800 288 817 288 833 296 850 308 863 321 871 338 875 354 875 371 875 388 867 400 854L696 533Z\"><\/path><\/svg>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Rawpixel Image Credit: Rawpixel Register Here \/&#8230; Learn More \/&#8230;<\/p>\n","protected":false},"author":1,"featured_media":26445,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"yes","footnotes":""},"categories":[171],"tags":[602],"ppma_author":[505],"class_list":["post-26444","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-cybertraining-2"],"featured_image_urls":{"full":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg",1000,679,false],"thumbnail":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel-150x150.jpg",150,150,true],"medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel-300x204.jpg",300,204,true],"medium_large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel-768x521.jpg",640,434,true],"large":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg",640,435,false],"1536x1536":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg",1000,679,false],"2048x2048":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg",1000,679,false],"covernews-featured":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel.jpg",1000,679,false],"covernews-medium":["https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2026\/02\/Cyber-Traing-Rawpixel-540x340.jpg",540,340,true]},"author_info":{"display_name":"Cybersecurity Journalist Iain Fraser","author_link":false},"category_info":"<a href=\"https:\/\/smecyberinsights.co.uk\/index.php\/category\/events\/\" rel=\"category tag\">SME CYBER EVENTS<\/a>","tag_info":"SME CYBER EVENTS","comment_count":"0","authors":[{"term_id":505,"user_id":1,"is_guest":0,"slug":"admin_yjdstq4n","display_name":"Cybersecurity Journalist Iain Fraser","avatar_url":{"url":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png","url2x":"https:\/\/smecyberinsights.co.uk\/wp-content\/uploads\/2024\/10\/index_image440-removebg-preview.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/26444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/comments?post=26444"}],"version-history":[{"count":12,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/26444\/revisions"}],"predecessor-version":[{"id":26680,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/posts\/26444\/revisions\/26680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media\/26445"}],"wp:attachment":[{"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/media?parent=26444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/categories?post=26444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/tags?post=26444"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/smecyberinsights.co.uk\/index.php\/wp-json\/wp\/v2\/ppma_author?post=26444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}