{"version":"1.0","provider_name":"State of Cyber Security","provider_url":"https:\/\/heliview.com\/state-cyber-security-sweden","title":"About the conference - State of Cyber Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2C10ttuQ1g\"><a href=\"https:\/\/heliview.com\/state-cyber-security-sweden\/about-the-conference\/\">About the conference<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/heliview.com\/state-cyber-security-sweden\/about-the-conference\/embed\/#?secret=2C10ttuQ1g\" width=\"600\" height=\"338\" title=\"&#8220;About the conference&#8221; &#8212; State of Cyber Security\" data-secret=\"2C10ttuQ1g\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"[vc_row full_width=&#8221;stretch_row_content&#8221; enable_full_screen=&#8221;yes&#8221; css=&#8221;.vc_custom_1580113592155{background: #ffffff url(https:\/\/heliview.be\/data-driven-business\/wp-content\/uploads\/sites\/65\/2018\/09\/patt2.png?id=1177) !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner][vc_column_text css=&#8221;&#8221;]From national infrastructure to healthcare and banking, digital systems power every aspect of modern life. But with progress comes exposure. Today\u2019s attackers, be it state actors, cybercriminals, or lone hackers, exploit vulnerabilities with increasing sophistication. AI is reshaping the threat landscape. But beyond the hype, what does it [&hellip;]"}