<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Threat Alliance</provider_name><provider_url>https://www.cyberthreatalliance.org</provider_url><title>Preparing for New Incident Reporting Requirements - Cyber Threat Alliance</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="yYehliTzPC"&gt;&lt;a href="https://www.cyberthreatalliance.org/preparing-for-new-incident-reporting-requirements/"&gt;Preparing for New Incident Reporting Requirements&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.cyberthreatalliance.org/preparing-for-new-incident-reporting-requirements/embed/#?secret=yYehliTzPC" width="600" height="338" title="&#x201C;Preparing for New Incident Reporting Requirements&#x201D; &#x2014; Cyber Threat Alliance" data-secret="yYehliTzPC" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script nonce="2ce19bea8f"&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.cyberthreatalliance.org/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.cyberthreatalliance.org/wp-content/uploads/2022/11/Preparing-for-New-Incident-Reporting-Requirements.png</thumbnail_url><thumbnail_width>582</thumbnail_width><thumbnail_height>813</thumbnail_height><description>Mandatory cyber incident reporting is being extended to many more organizations. Those already subject to these regulations face new, more stringent, requirements. Engaging proactively with government agencies and your own incident response and legal partners will make mandatory incident reporting as frictionless as possible and allow you to derive maximum benefit from the process. Defining &hellip; Continued</description></oembed>
