{"id":812,"date":"2025-05-22T09:47:25","date_gmt":"2025-05-22T09:47:25","guid":{"rendered":"https:\/\/inforb-wp.demo.certsign.ro\/?page_id=812"},"modified":"2025-10-28T15:26:49","modified_gmt":"2025-10-28T15:26:49","slug":"deliverables","status":"publish","type":"page","link":"https:\/\/inforb.ro\/en\/deliverables\/","title":{"rendered":"Deliverables"},"content":{"rendered":"<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><div class=\"wp-block-file\" style=\"align-items: center;gap: 20px\">\n  <a id=\"wp-block-file--media-2efa71f3-2e01-40a2-a118-6103bfa681ee\" href=\"https:\/\/inforb.ro\/en\/download\/D1.1-Project-Development-Plan_EN.pdf\/\">\n    D1.1 Project Development Plan_EN\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D1.1-Project-Development-Plan_EN.pdf\/\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2efa71f3-2e01-40a2-a118-6103bfa681ee\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\">\n    Download\n  <\/a>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><a id=\"wp-block-file--media-efa6aad2-32e6-495d-b814-e7e1bbe4b79e\" href=\"https:\/\/inforb.ro\/en\/download\/D2.1 Methodology_MICEIA_EN.pdf\/\" target=\"_self\">\n    D2.1 Methodology_MICEIA_EN V1.0\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D2.1-Methodology_MICEIA_EN.pdf\/\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-efa6aad2-32e6-495d-b814-e7e1bbe4b79e\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\" target=\"_self\">\n    Download\n  <\/a><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><a id=\"wp-block-file--media-efa6aad2-32e6-495d-b814-e7e1bbe4b79e\" href=\"https:\/\/inforb.ro\/en\/download\/D2.1 Metodologia_MICEIA_EN_v2.0_2025.07.15.pdf\/\" target=\"_self\">\n    D2.1 Methodology_MICEIA_EN V2.0\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D2.1-Metodologia_MICEIA_EN_v2.0_2025.07.15.pdf\/\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-efa6aad2-32e6-495d-b814-e7e1bbe4b79e\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\" target=\"_self\">\n    Download\n  <\/a><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><a id=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" href=\"https:\/\/inforb.ro\/en\/download\/D2.2-Good-practice-guide_EN_v10.pdf\/\" target=\"_self\">\n    D2.2 \u2013 Good practice guide EN V1.0 <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D2.2-Good-practice-guide_EN_v10.pdf\/\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\" target=\"_self\">\n    Download\n  <\/a><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><a id=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" href=\"https:\/\/inforb.ro\/en\/download\/D2.2-Good-practice-guide_EN_v2.0_2025.07.15.pdf\/\" target=\"_self\">\n    D2.2 \u2013 Good practice guide EN V2.0 <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D2.2-Good-practice-guide_EN_v2.0_2025.07.15.pdf\/\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\" target=\"_self\">\n    Download\n  <\/a><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><div class=\"wp-block-file\" style=\"align-items: center;gap: 20px\">  <a id=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" href=\"https:\/\/inforb.ro\/en\/download\/D2.3-Practical-guide-to-increasing-cyber-security_EN_v1.0_2025.06.23-1.pdf\/\">    D2.3 - Practical guide to increasing cyber security_EN_v1.0_2025.06.23_EN  <\/a>  <a href=\"https:\/\/inforb.ro\/wp-content\/uploads\/2025\/10\/D2.3-Practical-guide-to-increasing-cyber-security_EN_v1.0_2025.06.23-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\">    Download  <\/a><\/div><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><div class=\"wp-block-file\" style=\"align-items: center;gap: 20px\">\n  <a id=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" href=\"https:\/\/inforb.ro\/en\/download\/D3.1-CORB-Platform_-EN_v1.0_2025.07.31-1.pdf\/\">\n    D3.1 - CORB Platform_ EN_v1.0_2025.07.31\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D3.1-CORB-Platform_-EN_v1.0_2025.07.31-1.pdf\/\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\">\n    Download\n  <\/a>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><div class=\"wp-block-file\" style=\"align-items: center;gap: 20px\">\n  <a id=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" href=\"https:\/\/inforb.ro\/en\/download\/D4.1-Study-and-Handbook-regarding-cyber-security-and-supply-chain-for-the-food-sector_EN_V1.0_2025.06.23-1.pdf\/\">\n    D4.1&amp;4.2 - Study and Handbook regarding cyber security and supply chain for the food sector_EN\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D4.1-Study-and-Handbook-regarding-cyber-security-and-supply-chain-for-the-food-sector_EN_V1.0_2025.06.23-1.pdf\/\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e1644a93-b227-4675-9b3b-9685ec27b330\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\">\n    Download\n  <\/a>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><div class=\"wp-block-file\" style=\"align-items: center;gap: 20px\">\n  <a id=\"wp-block-file--media-3b7637e6-ae18-497b-9f1a-dd62d6bc815e\" href=\"https:\/\/inforb.ro\/en\/download\/D5.1-Awareness-plan_EN.pdf\/\">\n    D5.1 Awareness plan_EN\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D5.1-Awareness-plan_EN.pdf\/\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3b7637e6-ae18-497b-9f1a-dd62d6bc815e\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\">\n    Download\n  <\/a>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><div class=\"wp-block-file\" style=\"align-items: center;gap: 20px\">\n  <a id=\"wp-block-file--media-dbcabef2-2824-4f9b-afe8-bfa97880b2ac\" href=\"https:\/\/inforb.ro\/en\/download\/D5.2-Training-schemes-for-the-management-of-entities-and-cyber-security_EN_v1.0_2025.07.30.pdf\/\">\n    D5.2 Training schemes for the management of entities and cyber security officers in the food sector_EN\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D5.2-Training-schemes-for-the-management-of-entities-and-cyber-security_EN_v1.0_2025.07.30.pdf\/\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-dbcabef2-2824-4f9b-afe8-bfa97880b2ac\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\">\n    Download\n  <\/a>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-file translation-block\" style=\"display: flex; align-items: center; gap: 20px;\"><div class=\"wp-block-file\" style=\"align-items: center;gap: 20px\">\n  <a id=\"wp-block-file--media-dbcabef2-2824-4f9b-afe8-bfa97880b2ac\" href=\"https:\/\/inforb.ro\/en\/download\/D5.3-Dissemination_and_Exploitation_Report_V10_EN.pdf\/\">\n    D5.3 Dissemination_and_Exploitation_Report_V10_EN\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/en\/download\/D5.3-Dissemination_and_Exploitation_Report_V10_EN.pdf\/\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-dbcabef2-2824-4f9b-afe8-bfa97880b2ac\" style=\"background-color: #0073e6;color: white;padding: 10px 15px;text-decoration: none;border-radius: 4px\">\n    Download\n  <\/a>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-file\" style=\"display: flex; align-items: center; gap: 20px;\">\n  <a id=\"wp-block-file--media-dbcabef2-2824-4f9b-afe8-bfa97880b2ac\" href=\"https:\/\/inforb.ro\/wp-content\/uploads\/2025\/10\/T3.1-Software-Requirements-Specification-SRS_en.pdf\">\n    T3.1-Software-Requirements-Specification-SRS\n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/wp-content\/uploads\/2025\/10\/T3.1-Software-Requirements-Specification-SRS_en.pdf\"\n     class=\"wp-block-file__button wp-element-button\"\n     download\n aria-describedby=\"wp-block-file--media-dbcabef2-2824-4f9b-afe8-bfa97880b2ac\"\n     style=\"background-color: #0073e6; color: white; padding: 10px 15px; text-decoration: none; border-radius: 4px;\">\n    Descarc\u0103\n  <\/a>\n<\/div>\n\n\n\n<div class=\"wp-block-file\" style=\"display: flex; align-items: center; gap: 20px;\">\n  <a id=\"wp-block-file--media-dbcabef2-2824-4f9b-afe8-bfa97880b2ac\" href=\"https:\/\/inforb.ro\/wp-content\/uploads\/2025\/10\/T4.4-Cyber-Security-Compliance-Lists-at-Production-Processing-and-Distribution-Stages.pdf\">\n    T4.4-Cyber-Security-Compliance-Lists-at-Production-Processing-and-Distribution-Stages \n  <\/a>\n  <a href=\"https:\/\/inforb.ro\/wp-content\/uploads\/2025\/10\/T4.4-Cyber-Security-Compliance-Lists-at-Production-Processing-and-Distribution-Stages.pdf\"\n     class=\"wp-block-file__button wp-element-button\"\n     download\n aria-describedby=\"wp-block-file--media-dbcabef2-2824-4f9b-afe8-bfa97880b2ac\"\n     style=\"background-color: #0073e6; color: white; padding: 10px 15px; text-decoration: none; border-radius: 4px;\">\n    Descarc\u0103\n  <\/a>\n<\/div>\n\n\n\n<style>\n  .download-wrapper {\n    display: flex;\n    justify-content: center;\n    align-items: center;\n    margin: 100px 0;\n  }\n\n  .download-flow-button {\n    padding: 20px 80px;\n    font-size: 20px;\n    font-weight: bold;\n    color: white;\n    border: none;\n    border-radius: 10px;\n    cursor: pointer;\n    background-size: 600% 100%;\n    background-image: linear-gradient(\n      90deg,\n      #002B7F,  \/* Rom\u00e2nia - albastru *\/\n      #FCD116,  \/* Rom\u00e2nia - galben *\/\n      #CE1126,  \/* Rom\u00e2nia - ro\u0219u *\/\n      #ffffff,  \/* Bulgaria - alb *\/\n      #00966E,  \/* Bulgaria - verde *\/\n      #d62612   \/* Bulgaria - ro\u0219u *\/\n    );\n    animation: flowGradient 8s linear infinite;\n    box-shadow: 0 6px 16px rgba(0, 0, 0, 0.25);\n    text-shadow: 1px 1px 2px #00000088;\n    text-align: center;\n    text-decoration: none;\n    transition: transform 0.3s ease;\n  }\n\n  .download-flow-button:hover {\n    transform: scale(1.05);\n  }\n\n  @keyframes flowGradient {\n    0% { background-position: 0% 50%; }\n    100% { background-position: 100% 50%; }\n  }\n<\/style>\n\n<!-- Buton centrat \u0219i lat -->\n<div class=\"download-wrapper\">\n  <a class=\"download-flow-button\"\n     href=\"https:\/\/inforb.ro\/en\/download\/inforb_all-deliverables_2025.zip\/\"\n     download>\n    Download all INFORB deliverables\n  <\/a>\n<\/div>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>D1.1 Project Development Plan RO Descarc\u0103 D2.1 Methodology_MICEIA_RO V1.0 Descarc\u0103 D2.1 Methodology_MICEIA_RO V2.0 Descarc\u0103 D2.2 &#8211; Good practice guide RO V1.0 Descarc\u0103 D2.2 &#8211; Good practice guide RO V2.0 Descarc\u0103 D2.3 &#8211; Practical guide to increasing cyber security RO Descarc\u0103 D3.1 &#8211; CORB Platform RO Descarc\u0103 D4.1&#038;4.2 &#8211; Study and Handbook regarding cyber security and [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-812","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/pages\/812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/comments?post=812"}],"version-history":[{"count":33,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/pages\/812\/revisions"}],"predecessor-version":[{"id":1192,"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/pages\/812\/revisions\/1192"}],"wp:attachment":[{"href":"https:\/\/inforb.ro\/en\/wp-json\/wp\/v2\/media?parent=812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}