{"id":660881,"date":"2025-01-21T13:44:23","date_gmt":"2025-01-21T19:44:25","guid":{"rendered":"https:\/\/plusweb.org\/events\/2025-cyber-university\/agenda\/"},"modified":"2025-03-28T11:35:58","modified_gmt":"2025-03-28T16:35:58","slug":"agenda","status":"publish","type":"page","link":"https:\/\/plusweb.org\/events\/2025-cyber-university\/agenda\/","title":{"rendered":"Agenda"},"content":{"rendered":"\n\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/\"  target=\"_self\" itemprop=\"url\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@2x.png\" alt=\"PLUS-Logo@2x\" itemprop=\"image\" height=\"80\" width=\"359\" title=\"PLUS-Logo@2x\" onerror=\"this.style.display='none'\"  \/>\n\t\t\t\t<\/a>\n<h6>\n\t\tPLUS Cyber University\n\t<\/h6>\n\n\t<p>Join us live for PLUS Cyber University to explore ransomware, business email compromise, and cyber risks shaping the insurance market. Sessions cover privacy foundations, evolving cyber coverage, and the interplay with traditional policies.<\/p>\n\t\t\t\t\t\t\t\t<a href=\"#\" id=\"fl-tabs--label-0\" data-index=\"0\" aria-selected=\"true\" aria-controls=\"fl-tabs--panel-0\" aria-expanded=\"true\" role=\"tab\" tabindex=\"0\">\t\t\t\tJune 24, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<a href=\"#\" id=\"fl-tabs--label-1\" data-index=\"1\" aria-selected=\"false\" aria-controls=\"fl-tabs--panel-1\" aria-expanded=\"false\" role=\"tab\" tabindex=\"0\">\t\t\t\tJune 25, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<a href=\"#\" id=\"fl-tabs--label-2\" data-index=\"2\" aria-selected=\"false\" aria-controls=\"fl-tabs--panel-2\" aria-expanded=\"false\" role=\"tab\" tabindex=\"0\">\t\t\t\tJune 26, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\tJune 24, 2025\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/plusweb.org\/session\/privacy-and-cybersecurity-factual-and-legal-foundations-part-1-2\/\" content=\"Privacy and Cybersecurity Factual and Legal Foundations &#8211; Part 1\" \/><meta itemprop=\"datePublished\" content=\"2025-03-27\" \/><meta itemprop=\"dateModified\" content=\"2025-03-27\" \/><meta itemprop=\"name\" content=\"PLUS\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@1x.png\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/news\/author\/shelby_plus\/\" \/><meta itemprop=\"name\" content=\"Shelby Leichman\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n\t\t\t10:00 am\n\t\t\t&#8211;\n\t\t\t11:15 am\n\t\t<h5><a href=\"https:\/\/plusweb.org\/session\/privacy-and-cybersecurity-factual-and-legal-foundations-part-1-2\/\" title=\"Privacy and Cybersecurity Factual and Legal Foundations &#8211; Part 1\">Privacy and Cybersecurity Factual and Legal Foundations &#8211; Part 1<\/a><\/h5>\n\t\t<p>Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. This session will explore privacy and cybersecurity concepts and provide an&hellip;<\/p>\n\t\t\t\t\t<p>Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. This session will explore privacy and cybersecurity concepts and provide an overview of applicable laws and regulations.<\/p>\n\t\t\t<a href=\"#\">Show More<\/a>\n\t\t\t<a href=\"#\">Show Less<\/a>\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/speaker\/bill-hardin\/\" title=\"Bill Hardin\">Bill Hardin<\/a>Charles River Associates\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/plusweb.org\/session\/privacy-and-cybersecurity-factual-and-legal-foundations-part-2-2\/\" content=\"Privacy and Cybersecurity Factual and Legal Foundations &#8211; Part 2\" \/><meta itemprop=\"datePublished\" content=\"2025-03-27\" \/><meta itemprop=\"dateModified\" content=\"2025-03-27\" \/><meta itemprop=\"name\" content=\"PLUS\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@1x.png\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/news\/author\/shelby_plus\/\" \/><meta itemprop=\"name\" content=\"Shelby Leichman\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n\t\t\t11:45 am\n\t\t\t&#8211;\n\t\t\t1:00 pm\n\t\t<h5><a href=\"https:\/\/plusweb.org\/session\/privacy-and-cybersecurity-factual-and-legal-foundations-part-2-2\/\" title=\"Privacy and Cybersecurity Factual and Legal Foundations &#8211; Part 2\">Privacy and Cybersecurity Factual and Legal Foundations &#8211; Part 2<\/a><\/h5>\n\t\t<p>Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. This session will explore privacy and cybersecurity concepts and provide an&hellip;<\/p>\n\t\t\t\t\t<p>Ransomware, business email compromise, nation state attacks, and more. Privacy and cybersecurity issues dominate headlines, consume significant resources, prompt considerable legal attention, and affect the global insurance marketplace. This session will explore privacy and cybersecurity concepts and provide an overview of applicable laws and regulations.<\/p>\n\t\t\t<a href=\"#\">Show More<\/a>\n\t\t\t<a href=\"#\">Show Less<\/a>\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/speaker\/molly-mcginnis-stine\/\" title=\"Molly McGinnis Stine\">Molly McGinnis Stine<\/a>Troutman Pepper\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/plusweb.org\/session\/non-cyber-line-of-coverage-evolution-of-cyber-coverage-and-interplay-among-lines-2\/\" content=\"Non-Cyber Line of Coverage, Evolution of Cyber Coverage, and Interplay Among Lines\" \/><meta itemprop=\"datePublished\" content=\"2025-03-27\" \/><meta itemprop=\"dateModified\" content=\"2025-03-27\" \/><meta itemprop=\"name\" content=\"PLUS\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@1x.png\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/news\/author\/shelby_plus\/\" \/><meta itemprop=\"name\" content=\"Shelby Leichman\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n\t\t\t1:30 pm\n\t\t\t&#8211;\n\t\t\t2:45 pm\n\t\t<h5><a href=\"https:\/\/plusweb.org\/session\/non-cyber-line-of-coverage-evolution-of-cyber-coverage-and-interplay-among-lines-2\/\" title=\"Non-Cyber Line of Coverage, Evolution of Cyber Coverage, and Interplay Among Lines\">Non-Cyber Line of Coverage, Evolution of Cyber Coverage, and Interplay Among Lines<\/a><\/h5>\n\t\t<p>Learn about coverage for privacy and cyber risks under various traditional policies and the evolution of so-called &#8220;cyber&#8221; coverages, highlighting the types of provisions offered for first- and third-party coverage. We will then consider how a single loss may&hellip;<\/p>\n\t\t\t\t\t<p>Learn about coverage for privacy and cyber risks under various traditional policies and the evolution of so-called &#8220;cyber&#8221; coverages, highlighting the types of provisions offered for first- and third-party coverage. We will then consider how a single loss may implicate different lines of coverage.<\/p>\n\t\t\t<a href=\"#\">Show More<\/a>\n\t\t\t<a href=\"#\">Show Less<\/a>\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/speaker\/kelly-dworniczek\/\" title=\"Kelly Dworniczek\">Kelly Dworniczek<\/a>Platinum Specialty Underwriters, Platinum Management Liability<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/08\/John_Black_headshot-300x300.png\" alt=\"John Black Headshot\" loading=\"lazy\" \/><a href=\"https:\/\/plusweb.org\/speaker\/john-e-black\/\" title=\"John E Black\">John E Black<\/a>Skarzynski Marick &amp; Black LLP\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/plusweb.org\/session\/debunking-myths-about-cyber-insurance-2\/\" content=\"Debunking Myths about Cyber Insurance\" \/><meta itemprop=\"datePublished\" content=\"2025-03-27\" \/><meta itemprop=\"dateModified\" content=\"2025-03-27\" \/><meta itemprop=\"name\" content=\"PLUS\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@1x.png\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/news\/author\/shelby_plus\/\" \/><meta itemprop=\"name\" content=\"Shelby Leichman\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n\t\t\t10:00 am\n\t\t\t&#8211;\n\t\t\t11:15 am\n\t\t<h5><a href=\"https:\/\/plusweb.org\/session\/debunking-myths-about-cyber-insurance-2\/\" title=\"Debunking Myths about Cyber Insurance\">Debunking Myths about Cyber Insurance<\/a><\/h5>\n\t\t<p>This session will discuss many of the misperceptions about cyber insurance that contribute to what are still relatively low adoption rates in certain industries. We will explore some of these myths as well as counter-arguments to utilize when making&hellip;<\/p>\n\t\t\t\t\t<p>This session will discuss many of the misperceptions about cyber insurance that contribute to what are still relatively low adoption rates in certain industries. We will explore some of these myths as well as counter-arguments to utilize when making the business case for entities adding cyber insurance to their risk management portfolios.<\/p>\n\t\t\t<a href=\"#\">Show More<\/a>\n\t\t\t<a href=\"#\">Show Less<\/a>\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/speaker\/peter-laurentius-hedberg\/\" title=\"Peter Laurentius Hedberg\">Peter Laurentius Hedberg<\/a>Corvus by Travelers\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/plusweb.org\/session\/underwriting-breach-response-1st-party-incidents-3rd-party-claims-and-emerging-coverages-2\/\" content=\"Underwriting, Breach Response, 1st Party Incidents, 3rd Party Claims, and Emerging Coverages\" \/><meta itemprop=\"datePublished\" content=\"2025-03-27\" \/><meta itemprop=\"dateModified\" content=\"2025-03-27\" \/><meta itemprop=\"name\" content=\"PLUS\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@1x.png\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/news\/author\/shelby_plus\/\" \/><meta itemprop=\"name\" content=\"Shelby Leichman\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n\t\t\t11:45 am\n\t\t\t&#8211;\n\t\t\t1:00 pm\n\t\t<h5><a href=\"https:\/\/plusweb.org\/session\/underwriting-breach-response-1st-party-incidents-3rd-party-claims-and-emerging-coverages-2\/\" title=\"Underwriting, Breach Response, 1st Party Incidents, 3rd Party Claims, and Emerging Coverages\">Underwriting, Breach Response, 1st Party Incidents, 3rd Party Claims, and Emerging Coverages<\/a><\/h5>\n\t\t<p>This session will provide a broad overview of the state of the market, basic and evolving coverages, and claims. Learn the background basics of these points as well as emerging issues and products in this evolving marketplace.<\/p>\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/speaker\/shehla-qureshi\/\" title=\"Shehla Qureshi\">Shehla Qureshi<\/a>AXA XL<a href=\"https:\/\/plusweb.org\/speaker\/amy-landefeld\/\" title=\"Amy Landefeld\">Amy Landefeld<\/a>Ambridge\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/plusweb.org\/session\/risk-management-and-how-business-leaders-prepare-and-respond-2\/\" content=\"Risk Management and How Business Leaders Prepare and Respond\" \/><meta itemprop=\"datePublished\" content=\"2025-03-27\" \/><meta itemprop=\"dateModified\" content=\"2025-03-27\" \/><meta itemprop=\"name\" content=\"PLUS\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@1x.png\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/news\/author\/shelby_plus\/\" \/><meta itemprop=\"name\" content=\"Shelby Leichman\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n\t\t\t1:30 pm\n\t\t\t&#8211;\n\t\t\t2:45 pm\n\t\t<h5><a href=\"https:\/\/plusweb.org\/session\/risk-management-and-how-business-leaders-prepare-and-respond-2\/\" title=\"Risk Management and How Business Leaders Prepare and Respond\">Risk Management and How Business Leaders Prepare and Respond<\/a><\/h5>\n\t\t<p>Cyber, Privacy and security risks are not just a task for the IT department to tackle. These are enterprise risks and require a task force within an organization. In this session we will hear from a risk manager and&hellip;<\/p>\n\t\t\t\t\t<p>Cyber, Privacy and security risks are not just a task for the IT department to tackle. These are enterprise risks and require a task force within an organization. In this session we will hear from a risk manager and a Chief Information Security Officer on how they manage these risks, communicate and plan.<\/p>\n\t\t\t<a href=\"#\">Show More<\/a>\n\t\t\t<a href=\"#\">Show Less<\/a>\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/speaker\/colin-battersby\/\" title=\"Colin Battersby\">Colin Battersby<\/a>McDonald Hopkins<a href=\"https:\/\/plusweb.org\/speaker\/david-j-molitano\/\" title=\"David J Molitano\">David J Molitano<\/a>Berkley Cyber Risk Solutions<a href=\"https:\/\/plusweb.org\/speaker\/david-c-wasson\/\" title=\"David C Wasson\">David C Wasson<\/a>Brown &amp; Brown\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/plusweb.org\/session\/breach-scenario-surviving-a-cybersecurity-incident-2\/\" content=\"Breach Scenario: Surviving a Cybersecurity Incident\" \/><meta itemprop=\"datePublished\" content=\"2025-03-27\" \/><meta itemprop=\"dateModified\" content=\"2025-03-27\" \/><meta itemprop=\"name\" content=\"PLUS\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@1x.png\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/news\/author\/shelby_plus\/\" \/><meta itemprop=\"name\" content=\"Shelby Leichman\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n\t\t\t10:00 am\n\t\t\t&#8211;\n\t\t\t11:15 am\n\t\t<h5><a href=\"https:\/\/plusweb.org\/session\/breach-scenario-surviving-a-cybersecurity-incident-2\/\" title=\"Breach Scenario: Surviving a Cybersecurity Incident\">Breach Scenario: Surviving a Cybersecurity Incident<\/a><\/h5>\n\t\t<p>This session will walk through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of&hellip;<\/p>\n\t\t\t\t\t<p>This session will walk through a hypothetical breach scenario and focus on the challenges of identifying a breach, the discovery process, the role of the crisis response team, critical steps, the resolution of the breach, and what type of follow up is necessary.<\/p>\n\t\t\t<a href=\"#\">Show More<\/a>\n\t\t\t<a href=\"#\">Show Less<\/a>\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/speaker\/evgueni-erchov\/\" title=\"Evgueni Erchov\">Evgueni Erchov<\/a>CYPFER<a href=\"https:\/\/plusweb.org\/speaker\/mark-sadler\/\" title=\"Mark Sadler\">Mark Sadler<\/a>Great American<a href=\"https:\/\/plusweb.org\/speaker\/chris-dilenno\/\" title=\"Chris Dilenno\">Chris Dilenno<\/a>Mullen Coughlin LLC\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/plusweb.org\/session\/cyber-roundtable-trends-risks-and-emerging-issues-2\/\" content=\"Cyber Roundtable: Trends, Risks, and Emerging Issues\" \/><meta itemprop=\"datePublished\" content=\"2025-03-27\" \/><meta itemprop=\"dateModified\" content=\"2025-03-27\" \/><meta itemprop=\"name\" content=\"PLUS\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/02\/PLUS-Logo@1x.png\"\/><meta itemprop=\"url\" content=\"https:\/\/plusweb.org\/news\/author\/shelby_plus\/\" \/><meta itemprop=\"name\" content=\"Shelby Leichman\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\n\t\t\t11:45 am\n\t\t\t&#8211;\n\t\t\t1:00 pm\n\t\t<h5><a href=\"https:\/\/plusweb.org\/session\/cyber-roundtable-trends-risks-and-emerging-issues-2\/\" title=\"Cyber Roundtable: Trends, Risks, and Emerging Issues\">Cyber Roundtable: Trends, Risks, and Emerging Issues<\/a><\/h5>\n\t\t<p>Our roundtable experts will discuss common cyber risks and emerging exposures that should be on any cyber insurance professional&#8217;s radar. This session will also explore the role of the policy holder and insurers as it relates to mitigating cyber&hellip;<\/p>\n\t\t\t\t\t<p>Our roundtable experts will discuss common cyber risks and emerging exposures that should be on any cyber insurance professional&#8217;s radar. This session will also explore the role of the policy holder and insurers as it relates to mitigating cyber risks and the current state of the cyber insurance market.<\/p>\n\t\t\t<a href=\"#\">Show More<\/a>\n\t\t\t<a href=\"#\">Show Less<\/a>\n\t\t\t\t<a href=\"https:\/\/plusweb.org\/speaker\/annmarie-giblin\/\" title=\"Annmarie Giblin\">Annmarie Giblin<\/a>Norton Rose Fulbright LLP<a href=\"https:\/\/plusweb.org\/speaker\/john-butler\/\" title=\"John Butler\">John Butler<\/a>Erisk Services LLC<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/12\/Nadia-N-Hoyte_Headshot-300x300.png\" alt=\"Headshot of Nadia N Hoyte\" loading=\"lazy\" \/><a href=\"https:\/\/plusweb.org\/speaker\/nadia-hoyte\/\" title=\"Nadia Hoyte\">Nadia Hoyte<\/a>USI Insurance Services<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/plusweb.org\/wp-content\/uploads\/2024\/08\/Julian_Sylvestro_headshot-300x300.png\" alt=\"Julian Sylvestro headshot\" loading=\"lazy\" \/><a href=\"https:\/\/plusweb.org\/speaker\/julian-r-sylvestro\/\" title=\"Julian R Sylvestro\">Julian R Sylvestro<\/a>Marsh\n\t\t\t\t\t\tJune 25, 2025\n\t\t\t\t\t\tJune 26, 2025\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/plusweb.org\/wp-content\/uploads\/2021\/04\/PLUS-Logo-white.png\" alt=\"PLUS-Logo-white\" itemprop=\"image\" height=\"96\" width=\"430\" title=\"PLUS-Logo-white\" onerror=\"this.style.display='none'\"  \/>\n\t5353 Wayzata Blvd.<br \/>\nSuite 306<br \/>\nMinneapolis, MN 55416\n\t<a href=\"tel:952-746-2580\">952-746-2580<\/a><br \/>\n<a href=\"tel:800.845.0778\">800-845-0778<\/a><br \/>\n<a href=\"mailto:info@plusweb.org\" target=\"_blank\" rel=\"noopener\">info@plusweb.org<\/a>\n\t&copy; 2025 &#8211; Professional Liability Underwriting Society\n\t<a href=\"https:\/\/www.yokoco.com\/referral\/?site=the%20PLUS%20site\">Website by Yoko Co<\/a>\n\n","protected":false},"excerpt":{"rendered":"<p>PLUS Cyber University Join us live for PLUS Cyber University to explore&hellip;<\/p>\n","protected":false},"author":11,"featured_media":0,"parent":599847,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"tpl-no-header-footer.php","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-660881","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/pages\/660881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/comments?post=660881"}],"version-history":[{"count":3,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/pages\/660881\/revisions"}],"predecessor-version":[{"id":1112122,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/pages\/660881\/revisions\/1112122"}],"up":[{"embeddable":true,"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/pages\/599847"}],"wp:attachment":[{"href":"https:\/\/plusweb.org\/wp-json\/wp\/v2\/media?parent=660881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}