<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>CTA Webinar &#x2013; Picking Up the Pieces: Cybersecurity in the Next Administration - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="m0UCrYnGjj"&gt;&lt;a href="https://www.cyberthreatalliance.org/cta-webinar-picking-up-the-pieces-cybersecurity-in-the-next-administration/"&gt;CTA Webinar &#x2013; Picking Up the Pieces: Cybersecurity in the Next Administration&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/cta-webinar-picking-up-the-pieces-cybersecurity-in-the-next-administration/embed/#?secret=m0UCrYnGjj" width="600" height="338" title="&#x201C;CTA Webinar &#x2013; Picking Up the Pieces: Cybersecurity in the Next Administration&#x201D; &#x2014; Cyber Threat Alliance" data-secret="m0UCrYnGjj" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2020/12/Third_Way_background.png</thumbnail_url><thumbnail_width>3363</thumbnail_width><thumbnail_height>2246</thumbnail_height><description>Join us for a CTA Webinar, Picking Up the Pieces: Cybersecurity in the Next Administration, featuring Michael Daniel, President and CEO of the Cyber Threat Alliance, and Mieke Eoyang, Senior Vice President for the National Security Program and Chairperson of the Cyber Enforcement Initiative at Third Way. Presidential transitions are a good time to take &hellip; Continued</description></oembed>
