{"id":596282,"date":"2025-11-06T10:50:58","date_gmt":"2025-11-06T16:50:58","guid":{"rendered":"https:\/\/plusweb.org\/session\/breach-scenario-surviving-a-cybersecurity-incident-2\/"},"modified":"2025-11-06T10:50:58","modified_gmt":"2025-11-06T16:50:58","slug":"breach-scenario-surviving-a-cybersecurity-incident-2","status":"publish","type":"session","link":"https:\/\/plusweb.org\/session\/breach-scenario-surviving-a-cybersecurity-incident-2\/","title":{"rendered":"Breach Scenario: Surviving a Cybersecurity Incident"},"content":{"rendered":"<p>This session will walk through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of follow up is necessary. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>This session will walk through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of&hellip;<\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-596282","session","type-session","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/session\/596282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/types\/session"}],"version-history":[{"count":1,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/session\/596282\/revisions"}],"predecessor-version":[{"id":596408,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/session\/596282\/revisions\/596408"}],"wp:attachment":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/media?parent=596282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}