{"id":37,"date":"2024-09-17T16:29:14","date_gmt":"2024-09-17T16:29:14","guid":{"rendered":"https:\/\/www.red2red.pl\/?page_id=37"},"modified":"2024-10-05T17:04:21","modified_gmt":"2024-10-05T17:04:21","slug":"strefa-wiedzy","status":"publish","type":"page","link":"https:\/\/www.red2red.pl\/?page_id=37","title":{"rendered":"Strefa wiedzy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"37\" class=\"elementor elementor-37\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65dabd9 e-grid e-con-boxed e-con e-parent\" data-id=\"65dabd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b56674b e-grid e-con-full e-con e-child\" data-id=\"b56674b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c545e3d elementor-widget elementor-widget-heading\" data-id=\"c545e3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Dzielenie si\u0119 wiedz\u0105 to nasza misja<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6313271 elementor-widget elementor-widget-text-editor\" data-id=\"6313271\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dzielenie si\u0119 wiedz\u0105 jest g\u0142\u0119boko zakorzenione w naszym DNA. Na tej stronie znajdziesz bogaty zbi\u00f3r materia\u0142\u00f3w z naszych publicznych wyst\u0105pie\u0144. Tomasz Wiertelak regularnie wyst\u0119puje jako prelegent na presti\u017cowych konferencjach i spotkaniach, takich jak PLNOG, Inet Meeting, Konferencja Bezpiecze\u0144stwa Stosowanego CACS w Opolu oraz Konferencje Naukowe organizowane przez Pa\u0144stwow\u0105 Akademi\u0119 Nauk Stosowanych w Che\u0142mie.<\/p><p>Poni\u017cej prezentujemy materia\u0142y z r\u00f3\u017cnych webinar\u00f3w, kt\u00f3re by\u0142y organizowane przez Fundacj\u0119 Instytut Cyberbezpiecze\u0144stwa, firm\u0119 Xopero Software oraz Oktawave. Zach\u0119camy do zapoznania si\u0119 z naszymi zasobami, kt\u00f3re mog\u0105 sta\u0107 si\u0119 \u017ar\u00f3d\u0142em inspiracji i wiedzy<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3123b5f e-grid e-con-boxed e-con e-parent\" data-id=\"3123b5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a5c6ba elementor-widget elementor-widget-heading\" data-id=\"9a5c6ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Budowanie kultury bezpiecze\u0144stwa w firmie <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0cffe8e e-grid e-con-boxed e-con e-parent\" data-id=\"0cffe8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b74b30 elementor-widget elementor-widget-video\" data-id=\"9b74b30\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=l6rw1M89Qo4&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9221202 elementor-widget elementor-widget-text-editor\" data-id=\"9221202\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\">Cyber X Challenges jest seri\u0105 wyj\u0105tkowych spotka\u0144 live podczas kt\u00f3rych omawiane s\u0105 najwa\u017cniejsze wyzwania zwi\u0105zane z cyberbezpiecze\u0144stwem.\u00a0<\/p><p style=\"text-align: left;\">Tematem prezentowanego odcinka s\u0105 wyzwania stoj\u0105ce przed organizacjami, kt\u00f3re planuj\u0105, b\u0105d\u017a s\u0105 w trakcie budowy kultury bezpiecze\u0144stwa w firmie. W dzisiejszych czasach nie mo\u017cliwe jest sprowadzenie tematu bezpiecze\u0144stwa wy\u0142\u0105cznie do technologii, r\u00f3wnie wa\u017cne jest zadbanie o odpowiedni\u0105 wiedz\u0119 naszych pracownik\u00f3w, oraz zaanga\u017cowanie Zarz\u0105d\u00f3w firm w ten proces.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6a373d e-grid e-con-boxed e-con e-parent\" data-id=\"c6a373d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8240ef7 elementor-widget elementor-widget-spacer\" data-id=\"8240ef7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05077f6 e-grid e-con-boxed e-con e-parent\" data-id=\"05077f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8948f58 elementor-widget elementor-widget-heading\" data-id=\"8948f58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak zadba\u0107 o bezpiecze\u0144stwo w chmurze<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-830b88d e-grid e-con-boxed e-con e-parent\" data-id=\"830b88d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2142787 elementor-widget elementor-widget-video\" data-id=\"2142787\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/TxC6QzhjlN8?si=zDx-SEKwAdKFxr97&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa49ca1 elementor-widget elementor-widget-text-editor\" data-id=\"aa49ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zapewnienie bezpiecze\u0144stwa \u015brodowisk chmurowych staje si\u0119 coraz wi\u0119kszym wyzwaniem. Przygotuj si\u0119 na ryzyka p\u0142yn\u0105ce z sieci i nie czekaj na pierwszy ruch atakuj\u0105cych.<\/p><p>Podczas tego webinaru opowiadam o kluczowych aspektach ochrony zasob\u00f3w chmurowych, przytaczam najpopularniejsze cyberataki, a tak\u017ce podpowiadam jak broni\u0107 si\u0119 przed atakami.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be68fff e-grid e-con-boxed e-con e-parent\" data-id=\"be68fff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-078228d elementor-widget elementor-widget-spacer\" data-id=\"078228d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ade5f70 e-grid e-con-boxed e-con e-parent\" data-id=\"ade5f70\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24376ad elementor-widget elementor-widget-heading\" data-id=\"24376ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bezpiecze\u0144stwo \u0142a\u0144cucha dostaw <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb5c442 e-grid e-con-boxed e-con e-parent\" data-id=\"eb5c442\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-450f53e elementor-widget elementor-widget-video\" data-id=\"450f53e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=sm0PwWN-0oY&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb88620 elementor-widget elementor-widget-text-editor\" data-id=\"fb88620\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Webinar &#8222;Bezpiecze\u0144stwo \u0142a\u0144cucha dostaw&#8221; zosta\u0142 przygotowany wsp\u00f3lnie z Wiktorem S\u0119dkowskim dla Fundacji Instytut Cyberbezpiecze\u0144stwa. W tym materiale omawiamy znane incydenty na \u0142a\u0144cuchy dostaw, skutki ich atak\u00f3w, a tak\u017ce m\u00f3wimy o metodach wykrywania i zapobiegania tego typu atakom.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-07868e4 e-grid e-con-boxed e-con e-parent\" data-id=\"07868e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0c4f2f elementor-widget elementor-widget-spacer\" data-id=\"f0c4f2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8eba9dd e-grid e-con-boxed e-con e-parent\" data-id=\"8eba9dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3a6927 elementor-widget elementor-widget-heading\" data-id=\"d3a6927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Bezpiecze\u0144stwo chmury<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d1b693a e-grid e-con-boxed e-con e-parent\" data-id=\"d1b693a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e132c89 elementor-widget elementor-widget-video\" data-id=\"e132c89\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=OQryDEDQ9QI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e1afc8 elementor-widget elementor-widget-text-editor\" data-id=\"6e1afc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jakie s\u0105 najwa\u017cniejsze wyzwania zwi\u0105zane z bezpiecze\u0144stwem danych przetwarzanych w chmurze i jakie \u015brodki bezpiecze\u0144stwa powinny by\u0107 podj\u0119te by zminimalizowa\u0107 ryzyko utraty lub nieautoryzowanego dost\u0119pu do danych?<\/p><p>W jaki spos\u00f3b mo\u017cna efektywnie zarz\u0105dza\u0107 dost\u0119pem do danych w chmurze, szczeg\u00f3lnie w kontek\u015bcie wsp\u00f3\u0142pracy z wieloma u\u017cytkownikami i zespo\u0142ami?<\/p><p>O tym pos\u0142uchasz w webinarze przygotowanym dla Fundacji Instytut Cyberbezpiecze\u0144stwa, kt\u00f3ry mia\u0142em przyjemno\u015b\u0107 prowadzi\u0107 wsp\u00f3lnie z Wiktorem S\u0119dkowskim i Mart\u0105 Stelmach.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c628e1 e-grid e-con-boxed e-con e-parent\" data-id=\"3c628e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d18be36 elementor-widget elementor-widget-video\" data-id=\"d18be36\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=qu29aYc6Heg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e75d2e4 elementor-widget elementor-widget-text-editor\" data-id=\"e75d2e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>W drugiej cz\u0119\u015bci webinaru kontynuujemy w\u0105tek kluczowych aspekt\u00f3w zwi\u0105zanych z bezpiecze\u0144stwem danych w chmurze, a tak\u017ce podkre\u015blamy znaczenie wsp\u00f3\u0142odpowiedzialno\u015bci za bezpiecze\u0144stwo pomi\u0119dzy dostawcami us\u0142ug chmurowych a ich Klientami. Zwracamy szczeg\u00f3ln\u0105 uwag\u0119 na to, \u017ce pomimo zaawansowanych zabezpiecze\u0144 oferowanych przez dostawc\u00f3w, to u\u017cytkownicy chmury musz\u0105 nimi aktywnie zarz\u0105dza\u0107.&nbsp;<\/p>\n<p><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e405e1d e-grid e-con-boxed e-con e-parent\" data-id=\"e405e1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de75f4e elementor-widget elementor-widget-spacer\" data-id=\"de75f4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Dzielenie si\u0119 wiedz\u0105 to nasza misja Dzielenie si\u0119 wiedz\u0105 jest g\u0142\u0119boko zakorzenione w naszym DNA. Na tej stronie znajdziesz bogaty [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-37","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Strefa wiedzy -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.red2red.pl\/?page_id=37\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strefa wiedzy -\" \/>\n<meta property=\"og:description\" content=\"Dzielenie si\u0119 wiedz\u0105 to nasza misja Dzielenie si\u0119 wiedz\u0105 jest g\u0142\u0119boko zakorzenione w naszym DNA. Na tej stronie znajdziesz bogaty [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.red2red.pl\/?page_id=37\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-05T17:04:21+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.red2red.pl\\\/?page_id=37\",\"url\":\"https:\\\/\\\/www.red2red.pl\\\/?page_id=37\",\"name\":\"Strefa wiedzy -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.red2red.pl\\\/#website\"},\"datePublished\":\"2024-09-17T16:29:14+00:00\",\"dateModified\":\"2024-10-05T17:04:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.red2red.pl\\\/?page_id=37#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.red2red.pl\\\/?page_id=37\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.red2red.pl\\\/?page_id=37#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/www.red2red.pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strefa wiedzy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.red2red.pl\\\/#website\",\"url\":\"https:\\\/\\\/www.red2red.pl\\\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.red2red.pl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Strefa wiedzy -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.red2red.pl\/?page_id=37","og_locale":"pl_PL","og_type":"article","og_title":"Strefa wiedzy -","og_description":"Dzielenie si\u0119 wiedz\u0105 to nasza misja Dzielenie si\u0119 wiedz\u0105 jest g\u0142\u0119boko zakorzenione w naszym DNA. Na tej stronie znajdziesz bogaty [&hellip;]","og_url":"https:\/\/www.red2red.pl\/?page_id=37","article_modified_time":"2024-10-05T17:04:21+00:00","twitter_card":"summary_large_image","twitter_misc":{"Szacowany czas czytania":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.red2red.pl\/?page_id=37","url":"https:\/\/www.red2red.pl\/?page_id=37","name":"Strefa wiedzy -","isPartOf":{"@id":"https:\/\/www.red2red.pl\/#website"},"datePublished":"2024-09-17T16:29:14+00:00","dateModified":"2024-10-05T17:04:21+00:00","breadcrumb":{"@id":"https:\/\/www.red2red.pl\/?page_id=37#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.red2red.pl\/?page_id=37"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.red2red.pl\/?page_id=37#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.red2red.pl\/"},{"@type":"ListItem","position":2,"name":"Strefa wiedzy"}]},{"@type":"WebSite","@id":"https:\/\/www.red2red.pl\/#website","url":"https:\/\/www.red2red.pl\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.red2red.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"}]}},"_links":{"self":[{"href":"https:\/\/www.red2red.pl\/index.php?rest_route=\/wp\/v2\/pages\/37","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.red2red.pl\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.red2red.pl\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.red2red.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.red2red.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=37"}],"version-history":[{"count":25,"href":"https:\/\/www.red2red.pl\/index.php?rest_route=\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/www.red2red.pl\/index.php?rest_route=\/wp\/v2\/pages\/37\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/www.red2red.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}