<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>CTA Webinar - Connected Yet Divided: Navigating Cybersecurity in a Fractured World - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="zqFo1WRjPY"&gt;&lt;a href="https://www.cyberthreatalliance.org/event/cta-webinar-connected-yet-divided-navigating-cybersecurity-in-a-fractured-world/"&gt;CTA Webinar &#x2013; Connected Yet Divided: Navigating Cybersecurity in a Fractured World&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/event/cta-webinar-connected-yet-divided-navigating-cybersecurity-in-a-fractured-world/embed/#?secret=zqFo1WRjPY" width="600" height="338" title="&#x201C;CTA Webinar &#x2013; Connected Yet Divided: Navigating Cybersecurity in a Fractured World&#x201D; &#x2014; Cyber Threat Alliance" data-secret="zqFo1WRjPY" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2025/12/CTA-Webinar-Connected-Yet-Divided-01-scaled.png</thumbnail_url><thumbnail_width>2560</thumbnail_width><thumbnail_height>1710</thumbnail_height><description>Global instability has fractured the world&#x2019;s political, economic, and technological systems &#x2014; and cyberspace, once a unifying infrastructure, now mirrors and magnifies that fragmentation. In this panel discussion five cybersecurity leaders and geopolitical experts explore how the erosion of global trust is reshaping digital defense. From rising state-sponsored cyber operations and supply chain vulnerabilities to &hellip; Continued</description></oembed>
