{"id":62387,"date":"2025-11-06T10:49:45","date_gmt":"2025-11-06T16:49:45","guid":{"rendered":"https:\/\/plusweb.org\/?post_type=session&#038;p=62387"},"modified":"2025-11-06T10:49:45","modified_gmt":"2025-11-06T16:49:45","slug":"breach-scenario-surviving-a-cybersecurity-incident","status":"publish","type":"session","link":"https:\/\/plusweb.org\/session\/breach-scenario-surviving-a-cybersecurity-incident\/","title":{"rendered":"Breach Scenario: Surviving a Cybersecurity Incident"},"content":{"rendered":"<p>This session will walk through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of follow up is necessary. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>This session will walk through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of&hellip;<\/p>\n","protected":false},"featured_media":0,"template":"","class_list":["post-62387","session","type-session","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/session\/62387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/types\/session"}],"version-history":[{"count":1,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/session\/62387\/revisions"}],"predecessor-version":[{"id":62445,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/session\/62387\/revisions\/62445"}],"wp:attachment":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/media?parent=62387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}