
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Information Security: Your Complete Guides to Data Regulatory Compliance","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ADAihbUeIR\"><a href=\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/\">Information Security: Your Complete Guides to Data Regulatory Compliance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/embed\/#?secret=ADAihbUeIR\" width=\"600\" height=\"338\" title=\"&#8220;Information Security: Your Complete Guides to Data Regulatory Compliance&#8221; &#8212; OTAVA\" data-secret=\"ADAihbUeIR\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Our online guides to information security (infosec) and compliance are scattered across our website and blog, but here\u2019s a roundup of our best and most relevant resources that relate to this year\u2019s Detroit SecureWorld security and compliance sessions, tomorrow and Thursday. Online Tech\u2019s Senior Product Architect Steve Aiello will be speaking on a panel discussion tomorrow, October 16, about network security: Industry Expert Panel: Network Security Room: Suite 3 Time: 1:15pm \u2013 2:15pm Description: Network Security is defined as, \u201cthe protection of a computer network and its services from unauthorized modification, destruction or disclosure.\u201d Cyber security professionals are tasked with keeping up with new threats to the network while maintaining efficient workflow and access to information. This panel discussion aims to explore current issues being raised in the area of Network Security and solutions available to make the network more secure. Watch Aiello\u2019s special video series on data encryption here, and watch his previously recorded webinar series on disaster recovery, data backup and business continuity. Other key sessions on the agenda include: Vendor Oversight: How to Perform a Vendor Security Due Diligence Review Speaker: Dr. Faith Heikkila Room: Theater Time: 8:30am &#8211; 9:15am Description: Vendors are an important part of..."}