{"id":569,"date":"2020-01-28T17:24:33","date_gmt":"2020-01-28T16:24:33","guid":{"rendered":"https:\/\/salons.weyou-cms.com\/itsm\/visit"},"modified":"2026-03-23T17:03:17","modified_gmt":"2026-03-23T16:03:17","slug":"visit","status":"publish","type":"page","link":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/visit\/","title":{"rendered":"Visit"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n\t\t\t<!-- START Banni\u00e8re pages REVOLUTION SLIDER 6.6.7 --><p class=\"rs-p-wp-fix\"><\/p>\n\t\t\t<rs-module-wrap id=\"rev_slider_40_1_wrapper\" data-source=\"post\" style=\"visibility:hidden;background:#acacac;padding:0;margin:0px auto;margin-top:0;margin-bottom:0;\">\n\t\t\t\t<rs-module id=\"rev_slider_40_1\" style=\"\" data-version=\"6.6.7\">\n\t\t\t\t\t<rs-slides style=\"overflow: hidden; position: absolute;\">\n\t\t\t\t\t\t<rs-slide style=\"position: absolute;\" data-key=\"rs-569\" data-title=\"Visit\" data-in=\"o:0;\" data-out=\"a:false;\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/wp-content\/plugins\/revslider\/public\/assets\/assets\/dummy.png\" alt=\"\" title=\"ITCM_bandeau-rubriques-1920&#215;300-2022\" width=\"1920\" height=\"300\" class=\"rev-slidebg tp-rs-img rs-lazyload\" data-lazyload=\"\/\/weyoumediastaging.blob.core.windows.net\/itcm-es\/sites\/5\/2024\/07\/ITCM_bandeau-rubriques-1920x300-2022.jpg\" data-bg=\"p:40% 50%;\" data-no-retina>\n<!--\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-569-layer-1\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:974px,520px,370px,17px;y:m;yo:-2px,0,0,0;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:60,50,50,50;l:60,53,53,53;fw:500;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,47px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';text-transform:uppercase;\"\n\t\t\t\t\t\t\t><H1>Visit<\/h1> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n\n\t\t\t\t\t\t\t--><rs-layer\n\t\t\t\t\t\t\t\tid=\"slider-40-slide-569-layer-3\" \n\t\t\t\t\t\t\t\tdata-type=\"text\"\n\t\t\t\t\t\t\t\tdata-xy=\"x:r,r,r,l;xo:1117px,520px,370px,17px;y:m;yo:48px,43px,50px,50px;\"\n\t\t\t\t\t\t\t\tdata-text=\"w:normal;s:19,20,15,20;l:30,30,30,36;a:center,center,center,left;\"\n\t\t\t\t\t\t\t\tdata-dim=\"w:45%,45%,50%,90%;h:auto,auto,auto,39px;\"\n\t\t\t\t\t\t\t\tdata-frame_999=\"o:0;st:w;\"\n\t\t\t\t\t\t\t\tstyle=\"z-index:8;font-family:'Roboto';\"\n\t\t\t\t\t\t\t> \n\t\t\t\t\t\t\t<\/rs-layer><!--\n-->\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t\t<rs-static-layers><!--\n\t\t\t\t\t--><\/rs-static-layers>\n\t\t\t\t<\/rs-module>\n\t\t\t\t<script>\n\t\t\t\t\tsetREVStartSize({c: 'rev_slider_40_1',rl:[1240,1024,778,480],el:[300,200,200,280],gw:[1650,1024,778,480],gh:[300,200,200,280],type:'hero',justify:'',layout:'fullwidth',mh:\"450\"});if (window.RS_MODULES!==undefined && window.RS_MODULES.modules!==undefined && window.RS_MODULES.modules[\"revslider401\"]!==undefined) {window.RS_MODULES.modules[\"revslider401\"].once = false;window.revapi40 = undefined;if (window.RS_MODULES.checkMinimal!==undefined) window.RS_MODULES.checkMinimal()}\n\t\t\t\t<\/script>\n\t\t\t<\/rs-module-wrap>\n\t\t\t<!-- END REVOLUTION SLIDER -->\n[\/vc_column][\/vc_row][vc_row][vc_column]\t<div class=\"wyvc-anchors\">\r\n\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#nomenclature\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">PRESENT SECTORS<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#Conferencias\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">CONFERENCES<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<a class=\"wyvc-button wyvc-shortcode wyvc-btn-large\" href=\"#informaci\u00f3n-pr\u00e1ctica\">\r\n\t\t\t\t\t<span class=\"wyvc-btn-text\">PRACTICAL INFORMATION<\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n[vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;334&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space]<div id=\"wyvc-section-title-8341\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>APPLY FOR YOUR FREE BADGE<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text css=&#8221;&#8221;]<strong>Wednesday 18 November 2026<\/strong>: 8:45am &#8211; 6:45pm.<br \/>\n<strong>Thursday 19 November 2026<\/strong>: 8:45am &#8211; 6:45pm.<\/p>\n<p><strong>Marbella Congress, Trade Fairs and Exhibition Centre<\/strong><\/p>\n<p><strong>Please note that access is reserved for professionals only.\u00a0<\/strong><\/p>\n<p><em>The organisers reserve the right to refuse access to the meetings to persons who cannot prove that they are employed or self-employed.<\/em>[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/visitor.weyou-group.com\/it-and-cybersecurity-meetings-es\/2025\/inscription\/si\" target=\"_blank\">\r\n\t\t<span class=\"wyvc-btn-text\">VISIT<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_section el_id=&#8221;nomenclature&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-8705\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>THE EXHIBITORS<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-8705.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n<div id=\"wyvc-section-title-2252\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>EXHIBITING SECTORS<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Networks and Telecommunications&#8221; tab_id=&#8221;1577354495611-a83fa4c2-4cf9&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Unified Communications<\/li>\n<li>Creation of free solutions.<\/li>\n<li>VoIP\/ToIP<\/li>\n<li>Network operator<\/li>\n<li>Telecoms operator \/ Mobile<\/li>\n<li>Network Management<\/li>\n<li>Performance management<\/li>\n<li>Terminals (ip, digital, sip)<\/li>\n<li>Communication solution \/ Videoconferencing<\/li>\n<li>NFC services<\/li>\n<li>M2M solutions<\/li>\n<li>Contact centre<\/li>\n<li>IT equipment<\/li>\n<li>Telecoms\/equipment distributor<\/li>\n<li>Infrastructure management<\/li>\n<li>Fixed and mobile convergence<\/li>\n<li>SDN (Software Defined Networking)<\/li>\n<li>Infrastructure management software<\/li>\n<li>Collaborative meeting \/ interactive meetings \/ room booking management<\/li>\n<li>WAN optimisation<\/li>\n<li>Hyperconvergence<\/li>\n<li>Router\/Switch<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Mobility&#8221; tab_id=&#8221;1577354495666-6d2614ed-6a35&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Mobility Solutions \/ Mobility Products<\/li>\n<li>Peripheral devices<\/li>\n<li>Mobile terminals\/robots<\/li>\n<li>Mobile applications<\/li>\n<li>Mobile CRM<\/li>\n<li>Mobile payment<\/li>\n<li>Fleet management<\/li>\n<li>Embedded system \/ Geolocation<\/li>\n<li>Traceability<\/li>\n<li>Development of customised business applications<\/li>\n<li>BYOD management<\/li>\n<li>Mobile Device Management (MDM)<\/li>\n<li>Connected objects<\/li>\n<li>EMM (Enterprise Mobility Management)<\/li>\n<li>Telecom Expense Management<\/li>\n<li>Mobile application testing<\/li>\n<li>Intervention management<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Cybersecurity&#8221; tab_id=&#8221;1577354495715-f9cd4c04-62d1&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<ul>\n<li>Security software<\/li>\n<li>Security hardware<\/li>\n<li>Control\/monitoring tools<\/li>\n<li>Secure infrastructure services<\/li>\n<li>Authentication services<\/li>\n<li>Data security<\/li>\n<li>Anomaly management<\/li>\n<li>Security testing<\/li>\n<li>Cloud security<\/li>\n<li>DNS<\/li>\n<li>Identity\/email\/data\/contract protection<\/li>\n<li>Data backup and storage<\/li>\n<li>Secure networks<\/li>\n<li>Mobile networks<\/li>\n<li>Geolocation<\/li>\n<li>Connected devices<\/li>\n<li>GDPR services\/solutions<\/li>\n<li>Email security<\/li>\n<li>DDOS<\/li>\n<li>Devsecopps<\/li>\n<li>Endpoint<\/li>\n<li>Firewall<\/li>\n<li>Workload protection<\/li>\n<li>Email<\/li>\n<li>CSPM<\/li>\n<li>Mobile<\/li>\n<li>Wi-fi<\/li>\n<li>Encryption<\/li>\n<li>ZTNA<\/li>\n<li>Switch<\/li>\n<li>NETWORK<\/li>\n<li>Access Point<\/li>\n<li>Managed Threat Response<\/li>\n<li>Rapid Response<\/li>\n<li>Professional Services<\/li>\n<li>Identity and Access Management (IAM)<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Cloud computing&#8221; tab_id=&#8221;1577354495770-32b5f639-08fd&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Automation<\/li>\n<li>Cloud computing system<\/li>\n<li>Software publishing\/SAAS solutions<\/li>\n<li>Edge computing<\/li>\n<li>Cloud infrastructure\/platform solutions (PAAS, IAAS)<\/li>\n<li>Hosting<\/li>\n<li>Virtualisation<\/li>\n<li>Workstation virtualisation<\/li>\n<li>DAAS solutions<\/li>\n<li>BI solutions<\/li>\n<li>Big Data<\/li>\n<li>Analytics<\/li>\n<li>Dematerialisation<\/li>\n<li>Collaborative<\/li>\n<li>Private Cloud<\/li>\n<li>Public cloud<\/li>\n<li>Hybrid cloud<\/li>\n<li>ITIL<\/li>\n<li>ES M<\/li>\n<li>Cloud provider<\/li>\n<li>Unified Endpoint Management<\/li>\n<li>Risk Management \/ Cyber Risk Management<\/li>\n<li>Cyber Insurance \/ Scoring<\/li>\n<li>Compliance<\/li>\n<li>Governance<\/li>\n<li>Customised AI<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_tta_accordion shape=&#8221;square&#8221; color=&#8221;theme-bg&#8221; active_section=&#8221;&#8221; no_fill=&#8221;true&#8221; collapsible_all=&#8221;true&#8221;][vc_tta_section title=&#8221;Data Center&#8221; tab_id=&#8221;1577354266026-3d24d7dc-6ed4&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Optimisation\/Redesign, construction and expansion of data centres<\/li>\n<li>Outsourcing \/ Subcontracting<\/li>\n<li>Storage<\/li>\n<li>Infrastructure development<\/li>\n<li>Management services<\/li>\n<li>Backup<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Consulting and Formation&#8221; tab_id=&#8221;1577354314274-eacd3422-49e5&#8243;][vc_column_text]<\/p>\n<ul>\n<li>IT services company \/ Integrator<\/li>\n<li>Consultancy in new technologies.<\/li>\n<li>Training<\/li>\n<li>Project management<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Managed Services&#8221; tab_id=&#8221;1577354354524-64c8c886-aaec&#8221;][vc_column_text]<\/p>\n<ul>\n<li>Monitoring tools<\/li>\n<li>Network monitoring<\/li>\n<li>Measurement and reporting<\/li>\n<li>Managed Print Service (MPS)<\/li>\n<li>Performance<\/li>\n<li>Security and business continuity (PCA)<\/li>\n<li>Outsourcing<\/li>\n<li>Digital product creation.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Printing Solutions&#8221; tab_id=&#8221;1577354389487-dfa7a5d1-36a6&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Printing systems<\/li>\n<li>Hardware solutions<\/li>\n<li>Software solutions<\/li>\n<li>Document Management<\/li>\n<li>Document security<\/li>\n<li>Dematerialisation of the print shop.<\/li>\n<li>Managed Document Services (MDS)<\/li>\n<li>Remote printing and scanning<\/li>\n<li>Document sharing<\/li>\n<li>Document auditing<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_accordion][\/vc_column][\/vc_row][vc_row el_id=&#8221;Conferencias&#8221;][vc_column][vc_empty_space height=&#8221;40px&#8221;]<div id=\"wyvc-section-title-6748\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>THE CONFERENCES<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-6748.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;]<div id=\"wyvc-section-title-3270\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-2 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>CONFERENCE PROGRAMME<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n[vc_column_text]<strong>IT &amp; CYBERSECURITY MEETINGS <\/strong>will feature plenary lectures and expert workshops addressing various current industry topics.[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode \" href=\"https:\/\/itcm-es.weyou-preview.com\/en\/conferences\/\" title=\"Programmes\">\r\n\t\t<span class=\"wyvc-btn-text\">PROGRAMME<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;4395&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section][vc_section el_id=&#8221;informaci\u00f3n-pr\u00e1ctica&#8221;][vc_row][vc_column]<div id=\"wyvc-section-title-4840\" class=\"wyvc-section-title wyvc-shortcode wyvc-section-title-1 \">\r\n\t<div class=\"wyvc-st-inner\">\r\n\t\t\t\t\t<div class=\"wyvc-st-title\">\r\n\t\t\t\t<p>Practical information<\/p>\n\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n<\/div>\r\n<style type=\"text\/css\">#wyvc-section-title-4840.wyvc-section-title-1 .wyvc-st-title::before{content:'IT & CYBERSECURITY'}<\/style>\r\n[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221;][vc_column width=&#8221;5\/12&#8243;][vc_column_text css=&#8221;&#8221;]<\/p>\n<p style=\"text-align: center\"><strong>DATES<\/strong><\/p>\n<p style=\"text-align: center\"><strong>Wednesday, 18 November 2026:<\/strong> 8:45am to 6:45pm.<br \/>\n<strong>Thursday, 19 November 2026:<\/strong> 8:45am to 6:45pm.<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center\"><strong>VENUE <\/strong><\/p>\n<p style=\"text-align: center\"><strong>Marbella Congress, Trade Fairs and Exhibition Centre\u00a0<\/strong><br \/>\nC. Jos\u00e9 Meli\u00e1, 2, 29602 Marbella, M\u00e1laga, Espagne<\/p>\n<p>[\/vc_column_text]<div class=\"wyvc-button-wrapper wyvc-btn-center\">\r\n\t<a class=\"wyvc-button wyvc-shortcode  wpb_animate_when_almost_visible wpb_bounceIn bounceIn\" href=\"https:\/\/itcm-es.weyou-preview.com\/en\/practical-information\/\" title=\"Infos pratiques\">\r\n\t\t<span class=\"wyvc-btn-text\">Further information<\/span>\r\n\t<\/a>\r\n<\/div>[\/vc_column][vc_column width=&#8221;7\/12&#8243;][vc_gmaps link=&#8221;#E-8_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&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;334&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_column_text css=&#8221;&#8221;]Wednesday 18 November 2026: 8:45am &#8211; 6:45pm. Thursday 19 November 2026: 8:45am &#8211; 6:45pm. Marbella Congress, Trade Fairs and Exhibition Centre Please note that access is reserved for professionals only.\u00a0 The organisers reserve the right to refuse access to the meetings to persons who cannot prove that they are employed or [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-569","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Visit - IT and Cybersecurity One to one Meetings Espa\u00f1a<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Visit - IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;334&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_column_text css=&#8221;&#8221;]Wednesday 18 November 2026: 8:45am &#8211; 6:45pm. Thursday 19 November 2026: 8:45am &#8211; 6:45pm. Marbella Congress, Trade Fairs and Exhibition Centre Please note that access is reserved for professionals only.\u00a0 The organisers reserve the right to refuse access to the meetings to persons who cannot prove that they are employed or [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/\" \/>\n<meta property=\"og:site_name\" content=\"IT and Cybersecurity One to one Meetings Espa\u00f1a\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T16:03:17+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/\",\"url\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/\",\"name\":\"Visit - IT and Cybersecurity One to one Meetings Espa\u00f1a\",\"isPartOf\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\"},\"datePublished\":\"2020-01-28T16:24:33+00:00\",\"dateModified\":\"2026-03-23T16:03:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Visit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"name\":\"IT & Cybersecurity Meetings\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization\",\"name\":\"IT & Cybersecurity Meetings\",\"url\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"contentUrl\":\"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png\",\"width\":198,\"height\":175,\"caption\":\"IT & Cybersecurity Meetings\"},\"image\":{\"@id\":\"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/\",\"https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Visit - IT and Cybersecurity One to one Meetings Espa\u00f1a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/","og_locale":"en_US","og_type":"article","og_title":"Visit - IT and Cybersecurity One to one Meetings Espa\u00f1a","og_description":"[vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_single_image image=&#8221;334&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_empty_space][vc_column_text css=&#8221;&#8221;]Wednesday 18 November 2026: 8:45am &#8211; 6:45pm. Thursday 19 November 2026: 8:45am &#8211; 6:45pm. Marbella Congress, Trade Fairs and Exhibition Centre Please note that access is reserved for professionals only.\u00a0 The organisers reserve the right to refuse access to the meetings to persons who cannot prove that they are employed or [&hellip;]","og_url":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/","og_site_name":"IT and Cybersecurity One to one Meetings Espa\u00f1a","article_modified_time":"2026-03-23T16:03:17+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/","url":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/","name":"Visit - IT and Cybersecurity One to one Meetings Espa\u00f1a","isPartOf":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website"},"datePublished":"2020-01-28T16:24:33+00:00","dateModified":"2026-03-23T16:03:17+00:00","breadcrumb":{"@id":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/visit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/salons-es.weyou-cms.com\/itcm\/en\/"},{"@type":"ListItem","position":2,"name":"Visit"}]},{"@type":"WebSite","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#website","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","name":"IT & Cybersecurity Meetings","description":"","publisher":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#organization","name":"IT & Cybersecurity Meetings","url":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/","url":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","contentUrl":"https:\/\/weyoumedia.blob.core.windows.net\/itcm-es\/sites\/5\/2025\/10\/ITCM-LOGO-ESPANA-2025.png","width":198,"height":175,"caption":"IT & Cybersecurity Meetings"},"image":{"@id":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/it-and-cybersecurity-meetings\/","https:\/\/www.youtube.com\/channel\/UC26vS5fiqy2nHBAwlkp2aOw"]}]}},"_links":{"self":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/comments?post=569"}],"version-history":[{"count":3,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/569\/revisions"}],"predecessor-version":[{"id":7116,"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/pages\/569\/revisions\/7116"}],"wp:attachment":[{"href":"https:\/\/www.it-and-cybersecurity-one-to-one-meetings.es\/en\/wp-json\/wp\/v2\/media?parent=569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}