<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Infosec &amp; Cybersecurity Congress 2024</provider_name><provider_url>https://www.tahawultech.com/infosec-cybersecurity-congress/2024</provider_url><author_name>tla20tt21</author_name><author_url>https://www.tahawultech.com/infosec-cybersecurity-congress/2024/author/tla20tt21/</author_url><title>Why Attend - Infosec &amp; Cybersecurity Congress 2024</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="yd7G4EwCYN"&gt;&lt;a href="https://www.tahawultech.com/infosec-cybersecurity-congress/2024/why-attend/"&gt;Why Attend&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.tahawultech.com/infosec-cybersecurity-congress/2024/why-attend/embed/#?secret=yd7G4EwCYN" width="600" height="338" title="&#x201C;Why Attend&#x201D; &#x2014; Infosec &amp; Cybersecurity Congress 2024" data-secret="yd7G4EwCYN" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.tahawultech.com/infosec-cybersecurity-congress/2024/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>[vc_row type=&#x201D;vc_default&#x201D; gap=&#x201D;20&#x2033; equal_height=&#x201D;yes&#x201D; content_placement=&#x201D;top&#x201D; bg_type=&#x201D;image&#x201D; parallax_style=&#x201D;vcpb-default&#x201D; bg_image_new=&#x201D;id^2061|url^https://www.tahawultech.com/infosec-cybersecurity-congress/2024/wp-content/uploads/2024/03/3474969.jpg|caption^null|alt^null|title^3474969|description^null&#x201D; bg_override=&#x201D;ex-full&#x201D; enable_overlay=&#x201D;enable_overlay_value&#x201D; overlay_color=&#x201D;rgba(0,0,0,0.18)&#x201D; overlay_pattern=&#x201D;02.png&#x201D; overlay_pattern_attachment=&#x201D;fixed&#x201D; css=&#x201D;.vc_custom_1709885930429{padding-top: 50px !important;padding-bottom: 60px !important;}&#x201D; el_id=&#x201D;about&#x201D;][vc_column css=&#x201D;.vc_custom_1621510941945{padding-top: 0px !important;}&#x201D;][vc_tta_tabs style=&#x201D;outline&#x201D; color=&#x201D;vista-blue&#x201D; active_section=&#x201D;1&#x2033; el_class=&#x201D;tab-area-isaca&#x201D;][vc_tta_section title=&#x201D;Join Peers&#x201D; tab_id=&#x201D;1709379414408-1ecaae4a-9e10&#x2033;][vc_row_inner content_placement=&#x201D;middle&#x201D; css=&#x201D;.vc_custom_1709388238316{padding-top: 10px !important;padding-bottom: 10px !important;}&#x201D;][vc_column_inner width=&#x201D;1/2&#x2033;][vc_toggle title=&#x201D;CISOs&#x201D; style=&#x201D;simple&#x201D; color=&#x201D;green&#x201D; size=&#x201D;lg&#x201D; custom_font_container=&#x201D;tag:h4|font_size:18|text_align:left|color:%23ffffff&#x201D; custom_use_theme_fonts=&#x201D;yes&#x201D; use_custom_heading=&#x201D;true&#x201D; el_class=&#x201D;isaca-faq&#x201D; css=&#x201D;.vc_custom_1709389904257{margin-bottom: 5px !important;}&#x201D;]Define strategies for cyber resilience and agility as digital&hellip;</description></oembed>
