{"id":1185,"date":"2020-08-11T09:50:28","date_gmt":"2020-08-11T07:50:28","guid":{"rendered":"https:\/\/www.cyberinflight.com\/?p=1185"},"modified":"2020-08-11T10:33:48","modified_gmt":"2020-08-11T08:33:48","slug":"summer-series-episode-3-hackers-isacs","status":"publish","type":"post","link":"https:\/\/www.cyberinflight.com\/?p=1185","title":{"rendered":"Summer series: Episode 3, Hackers &#038; ISACs"},"content":{"rendered":"\n<p>Discover more about the topic of vulnerability disclosure and non-disclosure agreement.<\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-3 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-1_DEFCON_HackersISACs-2.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1919\" height=\"1079\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-1_DEFCON_HackersISACs-2.png\" alt=\"\" data-id=\"1198\" data-full-url=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-1_DEFCON_HackersISACs-2.png\" data-link=\"https:\/\/www.cyberinflight.com\/?attachment_id=1198\" class=\"wp-image-1198\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-1_DEFCON_HackersISACs-2.png 1919w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-1_DEFCON_HackersISACs-2-300x169.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-1_DEFCON_HackersISACs-2-1024x576.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-1_DEFCON_HackersISACs-2-768x432.png 768w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-1_DEFCON_HackersISACs-2-1536x864.png 1536w\" sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-2_DEFCON_HackersISACs-3.png\"><img decoding=\"async\" width=\"1919\" height=\"1079\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-2_DEFCON_HackersISACs-3.png\" alt=\"\" data-id=\"1199\" data-full-url=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-2_DEFCON_HackersISACs-3.png\" data-link=\"https:\/\/www.cyberinflight.com\/?attachment_id=1199\" class=\"wp-image-1199\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-2_DEFCON_HackersISACs-3.png 1919w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-2_DEFCON_HackersISACs-3-300x169.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-2_DEFCON_HackersISACs-3-1024x576.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-2_DEFCON_HackersISACs-3-768x432.png 768w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-2_DEFCON_HackersISACs-3-1536x864.png 1536w\" sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-3_DEFCON_HackersISACs-2.png\"><img decoding=\"async\" width=\"1919\" height=\"1079\" src=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-3_DEFCON_HackersISACs-2.png\" alt=\"\" data-id=\"1200\" data-full-url=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-3_DEFCON_HackersISACs-2.png\" data-link=\"https:\/\/www.cyberinflight.com\/?attachment_id=1200\" class=\"wp-image-1200\" srcset=\"https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-3_DEFCON_HackersISACs-2.png 1919w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-3_DEFCON_HackersISACs-2-300x169.png 300w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-3_DEFCON_HackersISACs-2-1024x576.png 1024w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-3_DEFCON_HackersISACs-2-768x432.png 768w, https:\/\/www.cyberinflight.com\/wp-content\/uploads\/2020\/08\/CyberInflight_Flash-3-3_DEFCON_HackersISACs-2-1536x864.png 1536w\" sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/a><\/figure><\/li><\/ul><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Discover more about the topic of vulnerability disclosure and non-disclosure agreement.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1185","post","type-post","status-publish","format-standard","hentry","category-non-classe"],"_links":{"self":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1185"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1185\/revisions"}],"predecessor-version":[{"id":1201,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=\/wp\/v2\/posts\/1185\/revisions\/1201"}],"wp:attachment":[{"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberinflight.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}