<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Resilience Conference</provider_name><provider_url>https://heliview.com/cyber-resilience-belgium</provider_url><title>Michael Adjei - Cyber Resilience Conference</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="1PB1FwlV4K"&gt;&lt;a href="https://heliview.com/cyber-resilience-belgium/speaker/michael-adjei/"&gt;Michael Adjei&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://heliview.com/cyber-resilience-belgium/speaker/michael-adjei/embed/#?secret=1PB1FwlV4K" width="600" height="338" title="&#x201C;Michael Adjei&#x201D; &#x2014; Cyber Resilience Conference" data-secret="1PB1FwlV4K" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://heliview.com/cyber-resilience-belgium/wp-content/uploads/sites/56/2025/02/Foto-Michael-Adjei-1.jpg</thumbnail_url><thumbnail_width>400</thumbnail_width><thumbnail_height>400</thumbnail_height><description>[vc_row full_width=&#x201D;stretch_row&#x201D; css=&#x201D;.vc_custom_1712571053664{background-color: #ffffff !important;}&#x201D;][vc_column width=&#x201D;5/6&#x2033;][vc_column_text css=&#x201D;&#x201D;]Illumio, the Zero Trust Segmentation Company, stops breaches and ransomware from spreading across the hybrid attack surface. The Illumio ZTS Platform visualizes all traffic flows between workloads, devices, and the internet, automatically sets granular segmentation policies to control communications, and isolates high-value assets and compromised systems proactively or in [&hellip;]</description></oembed>
