﻿{"id":44,"date":"2016-09-08T14:40:13","date_gmt":"2016-09-08T12:40:13","guid":{"rendered":"http:\/\/firstsecurity.it\/?page_id=44"},"modified":"2017-08-01T17:02:53","modified_gmt":"2017-08-01T15:02:53","slug":"press","status":"publish","type":"page","link":"http:\/\/firstsecurity.it\/en\/press\/","title":{"rendered":"Press"},"content":{"rendered":"\n<div class=\"cisc-row\"><div  class=\" cisc-col-md-4 cisc-col-sm-4 cisc-col-xs-12\"><\/p>\n<p><a href=\"http:\/\/firstsecurity.it\/wp-content\/uploads\/2016\/09\/Risk-Management-le-aziende-si-attrezzano_19-12-16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-402 aligncenter\" src=\"http:\/\/firstsecurity.it\/wp-content\/uploads\/2016\/09\/Risk-Management-le-aziende.jpg\" width=\"247\" height=\"350\" srcset=\"http:\/\/firstsecurity.it\/wp-content\/uploads\/2016\/09\/Risk-Management-le-aziende.jpg 400w, http:\/\/firstsecurity.it\/wp-content\/uploads\/2016\/09\/Risk-Management-le-aziende-212x300.jpg 212w\" sizes=\"(max-width: 247px) 100vw, 247px\" \/><\/a><\/p>\n<p><\/div><div  class=\" cisc-col-md-4 cisc-col-sm-4 cisc-col-xs-12\"><\/p>\n<p><a href=\"http:\/\/firstsecurity.it\/wp-content\/uploads\/2017\/07\/Manager-della-sicurezza-ad-agosto-le-nuove-regole-per-la-gestione-dei-rischi.pdf\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-511 size-full\" src=\"http:\/\/firstsecurity.it\/wp-content\/uploads\/2017\/07\/anteprima_Manager-della-sicurezza-1.jpg\" alt=\"\" width=\"247\" height=\"350\" srcset=\"http:\/\/firstsecurity.it\/wp-content\/uploads\/2017\/07\/anteprima_Manager-della-sicurezza-1.jpg 247w, http:\/\/firstsecurity.it\/wp-content\/uploads\/2017\/07\/anteprima_Manager-della-sicurezza-1-212x300.jpg 212w\" sizes=\"(max-width: 247px) 100vw, 247px\" \/><\/a><\/p>\n<p><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":[],"_links":{"self":[{"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/pages\/44"}],"collection":[{"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/comments?post=44"}],"version-history":[{"count":9,"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/pages\/44\/revisions"}],"predecessor-version":[{"id":519,"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/pages\/44\/revisions\/519"}],"wp:attachment":[{"href":"http:\/\/firstsecurity.it\/en\/wp-json\/wp\/v2\/media?parent=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}