{"id":23992,"date":"2024-08-12T18:30:43","date_gmt":"2024-08-12T18:30:43","guid":{"rendered":"https:\/\/sterling.com\/?post_type=tribe_events&#038;p=23992"},"modified":"2024-08-12T18:31:03","modified_gmt":"2024-08-12T18:31:03","slug":"dafitc","status":"publish","type":"tribe_events","link":"https:\/\/sterling.com\/stargazer\/?tribe_events=dafitc","title":{"rendered":"DAFITC"},"content":{"rendered":"<p>DAFITC covers a wide range of topics related to IT and cybersecurity. DAFITC events have covered topics of software, vulnerability management, incident management, standards and compliance, monitoring, the latest hardware, systems integration, AI, a variety of digital security concerns, and encryption as well as past and current challenges faced in this increasingly digital world. These topics are tackled in Keynote, Panel, and Breakout Sessions, while the DAFITC also offers a jam packed Exhibit Hall and a variety of other activities and networking opportunities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DAFITC covers a wide range of topics related to IT and cybersecurity. DAFITC events have covered topics of software, vulnerability management, incident management, standards and compliance, monitoring, the latest hardware, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"template":"","meta":{"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[69],"class_list":["post-23992","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-conference","cat_conference"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DAFITC - Sterling<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DAFITC - Sterling\" \/>\n<meta property=\"og:description\" content=\"DAFITC covers a wide range of topics related to IT and cybersecurity. DAFITC events have covered topics of software, vulnerability management, incident management, standards and compliance, monitoring, the latest hardware, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sterling.com\/stargazer\/?tribe_events=dafitc\" \/>\n<meta property=\"og:site_name\" content=\"Sterling\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/SterlingComp\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T18:31:03+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?tribe_events=dafitc\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?tribe_events=dafitc\",\"name\":\"DAFITC - Sterling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\"},\"datePublished\":\"2024-08-12T18:30:43+00:00\",\"dateModified\":\"2024-08-12T18:31:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?tribe_events=dafitc#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?tribe_events=dafitc\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?tribe_events=dafitc#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\\\/\\\/sterling.com\\\/stargazer?post_type=tribe_events\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DAFITC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"name\":\"Sterling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\",\"name\":\"Sterling\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"width\":399,\"height\":145,\"caption\":\"Sterling\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/facebook.com\\\/SterlingComp\\\/\",\"https:\\\/\\\/x.com\\\/sterlingcomp\",\"https:\\\/\\\/www.instagram.com\\\/sterlingcomputers\\\/\",\"http:\\\/\\\/youtube.com\\\/@sterlingcomp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sterling-computers\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DAFITC - Sterling","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"DAFITC - Sterling","og_description":"DAFITC covers a wide range of topics related to IT and cybersecurity. DAFITC events have covered topics of software, vulnerability management, incident management, standards and compliance, monitoring, the latest hardware, [&hellip;]","og_url":"https:\/\/sterling.com\/stargazer\/?tribe_events=dafitc","og_site_name":"Sterling","article_publisher":"http:\/\/facebook.com\/SterlingComp\/","article_modified_time":"2024-08-12T18:31:03+00:00","twitter_card":"summary_large_image","twitter_site":"@sterlingcomp","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sterling.com\/stargazer\/?tribe_events=dafitc","url":"https:\/\/sterling.com\/stargazer\/?tribe_events=dafitc","name":"DAFITC - Sterling","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/#website"},"datePublished":"2024-08-12T18:30:43+00:00","dateModified":"2024-08-12T18:31:03+00:00","breadcrumb":{"@id":"https:\/\/sterling.com\/stargazer\/?tribe_events=dafitc#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sterling.com\/stargazer\/?tribe_events=dafitc"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sterling.com\/stargazer\/?tribe_events=dafitc#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sterling.com\/stargazer\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/sterling.com\/stargazer?post_type=tribe_events"},{"@type":"ListItem","position":3,"name":"DAFITC"}]},{"@type":"WebSite","@id":"https:\/\/sterling.com\/stargazer\/#website","url":"https:\/\/sterling.com\/stargazer\/","name":"Sterling","description":"","publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sterling.com\/stargazer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sterling.com\/stargazer\/#organization","name":"Sterling","url":"https:\/\/sterling.com\/stargazer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","width":399,"height":145,"caption":"Sterling"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/SterlingComp\/","https:\/\/x.com\/sterlingcomp","https:\/\/www.instagram.com\/sterlingcomputers\/","http:\/\/youtube.com\/@sterlingcomp","https:\/\/www.linkedin.com\/company\/sterling-computers"]}]}},"_links":{"self":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/tribe_events\/23992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/users\/2"}],"version-history":[{"count":1,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/tribe_events\/23992\/revisions"}],"predecessor-version":[{"id":23994,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/tribe_events\/23992\/revisions\/23994"}],"wp:attachment":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=23992"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=23992"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftribe_events_cat&post=23992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}