<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>Spotlight on CTA's new Cyber Threat Report Analyst, Chelsea Conard - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="po4YdESUei"&gt;&lt;a href="https://www.cyberthreatalliance.org/spotlight-on-ctas-new-cyber-threat-report-analyst-chelsea-conard/"&gt;Spotlight on CTA&#x2019;s new Cyber Threat Report Analyst, Chelsea Conard&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/spotlight-on-ctas-new-cyber-threat-report-analyst-chelsea-conard/embed/#?secret=po4YdESUei" width="600" height="338" title="&#x201C;Spotlight on CTA&#x2019;s new Cyber Threat Report Analyst, Chelsea Conard&#x201D; &#x2014; Cyber Threat Alliance" data-secret="po4YdESUei" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2024/02/Chelsea-blog-01-01.png</thumbnail_url><thumbnail_width>2635</thumbnail_width><thumbnail_height>1754</thumbnail_height><description>CTA is honored to welcome Chelsea Conard to our team as our Cyber Threat Report Analyst leading our analytic reports program. Here we introduce Chelsea in her own words. Can you give us a brief history of your studies and career so far?&nbsp;&nbsp; My undergraduate studies in Economics, Computer Science, and Mandarin naturally steered me &hellip; Continued</description></oembed>
