{"version":"1.0","provider_name":"Cyber Resilience Conference","provider_url":"https:\/\/heliview.com\/cyber-resilience-belgium","title":"Achieve Digital Sovereignty with Thales - Cyber Resilience Conference","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TxyRLWzfhi\"><a href=\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/\">Achieve Digital Sovereignty with Thales<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/heliview.com\/cyber-resilience-belgium\/achieve-digital-sovereignty-with-thales\/embed\/#?secret=TxyRLWzfhi\" width=\"600\" height=\"338\" title=\"&#8220;Achieve Digital Sovereignty with Thales&#8221; &#8212; Cyber Resilience Conference\" data-secret=\"TxyRLWzfhi\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/heliview.com\/cyber-resilience-belgium\/wp-content\/uploads\/sites\/56\/2023\/03\/Thales-whitepaper-pic-e1680081510215.png","thumbnail_width":1140,"thumbnail_height":350,"description":"[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Digital sovereignty refers to the ability to have control over your own digital destiny \u2013 the data, hardware, and software that you rely on and create. How big is the digital sovereignty problem? Today the World Economic Forum estimates that over 92% of all data in the western world is stored on servers owned [&hellip;]"}