<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>CTA Webinar &#x2013; Collaborative Cybersecurity: Balancing Systemic Responses and Market Competition - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="w9vk2NKgnY"&gt;&lt;a href="https://www.cyberthreatalliance.org/cta-webinar-collaborative-cybersecurity-balancing-systemic-responses-and-market-competition/"&gt;CTA Webinar &#x2013; Collaborative Cybersecurity: Balancing Systemic Responses and Market Competition&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/cta-webinar-collaborative-cybersecurity-balancing-systemic-responses-and-market-competition/embed/#?secret=w9vk2NKgnY" width="600" height="338" title="&#x201C;CTA Webinar &#x2013; Collaborative Cybersecurity: Balancing Systemic Responses and Market Competition&#x201D; &#x2014; Cyber Threat Alliance" data-secret="w9vk2NKgnY" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2024/11/CTA-Webinar_Collaborative-Cybersecurity-01-1024x684.png</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>684</thumbnail_height><description>Increased connectivity brings many benefits, from increasing a company&#x2019;s customer base to providing citizen services more efficiently. However, this connectivity comes with a cost in the form of increased risk, whether due to malicious activity or accidents. This risk has both private and public components, and it is not distributed evenly across the digital ecosystem. &hellip; Continued</description></oembed>
