<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>CTA Webinar &#x2013; CISA 2015 Reauthorization: What&#x2019;s all the fuss about? - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="yBM6joRgnj"&gt;&lt;a href="https://www.cyberthreatalliance.org/cta-webinar-cisa-2015-reauthorization-whats-all-the-fuss-about/"&gt;CTA Webinar &#x2013; CISA 2015 Reauthorization: What&#x2019;s all the fuss about?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/cta-webinar-cisa-2015-reauthorization-whats-all-the-fuss-about/embed/#?secret=yBM6joRgnj" width="600" height="338" title="&#x201C;CTA Webinar &#x2013; CISA 2015 Reauthorization: What&#x2019;s all the fuss about?&#x201D; &#x2014; Cyber Threat Alliance" data-secret="yBM6joRgnj" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2025/04/CTA-Webinar_CISA-Reauthorization-01-01-scaled.png</thumbnail_url><thumbnail_width>2560</thumbnail_width><thumbnail_height>1710</thumbnail_height><description>The Cybersecurity Information Sharing Act of 2015 was the culmination of more than five years of work. Someone reading the statute now might think the activities it authorizes are rather pedestrian. Yet, concerns at the time were significant enough that the statute included a sunset clause for September 30, 2025. Over the past decade, this &hellip; Continued</description></oembed>
