{"id":4480,"date":"2017-10-08T14:44:49","date_gmt":"2017-10-08T19:44:49","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=4480"},"modified":"2024-06-27T13:04:40","modified_gmt":"2024-06-27T20:04:40","slug":"make-access-control-great-again","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/make-access-control-great-again\/","title":{"rendered":"Make Access Control Great Again!"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h3><em>During ISSA 2017, Ulrich Lang, CEO\/Founder ObjectSecurity will present:\u00a0Make Access Control Great Again! <\/em><\/h3>\n<h3>Infrastructure Access control means many things to many people. The least common denominator is user logins and roles. However, there is a lot (!) more to access control than that. Unfortunately access control is among the most ill understood, least developed aspects of Cybersecurity. At the same time controlling access to IT resources it is the core underpinning of cybersecurity.<\/h3>\n<p>Over the years both scientists and marketeers came up with a myriad of concepts, acronyms and terms to describe different kinds of aspects of access control. Acronyms incl. MAC vs DAC, <strong>IBAC\/AuthNBAC, RBAC, ABAC, PBAC, ZBAC\/AuthZBAC<\/strong>, NAC\/AppAC\/OSAC\/VMAC, HistBAC, NGAC, RAdAC, HBAC, CBAC, GraphBAC, BPMBAC, and many more.\u00a0In addition, terms such as entitlement management, authorization management, micro segmentation, nano segmentation, VLANs, isolation, separation, adaptive\/ dynamic authorization etc. are used by vendors to describe their products.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><p>On top of that, vendors talk about <strong>security automation\/orchestration, security policy automation<\/strong>. Because this terminology soup keeps changing, it leaves security professionals mostly confused. Ulrich Lang&#8217;s presentation will cut through the fog and provide clarity about the reasons\/benefits\/challenges of the various access control concepts.<\/p>\n<p><strong>Ulrich will peel off the marketing layer<\/strong> and categorize concepts according to pertinent characteristics such as granularity, assurance\/verifiability, adoption, enforceability, manageability etc. The audience will learn that once the acronyms and terms are peeled off, there are numerous underlying concepts that are critically important for security professionals to protect their organizations (incl. IIoT\/IoE).<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:40px;--awb-padding-right:0px;--awb-padding-bottom:40px;--awb-padding-left:0px;--awb-bg-color:#005694;--awb-bg-color-hover:#005694;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><div class=\"heading icon-left\">\n<h2 class=\"content-box-heading\" style=\"text-align: center;\" data-inline-fontsize=\"true\" data-inline-lineheight=\"true\" data-fontsize=\"24\" data-lineheight=\"29\"><span style=\"color: #ffffff;\">Make Access Control Great Again &#8211; ISSA 2017<\/span><\/h2>\n<\/div>\n<div class=\"content-container\">\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Presenter:<\/strong>\u00a0Ulrich Lang, CEO and Founder ObjectSecurity<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Date and Time:<\/strong>\u00a0October 10, 2017 and it starts at\u00a04:15 pm.<em>\u00a0<\/em><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><strong>Where:<\/strong>\u00a0ISSA 2017 Sheraton Hotel &amp; Marina in San Diego. Room\u00a0Nautilus 3.<\/span><\/p>\n<\/div>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:var(--awb-color1);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color1);--button_border_width-top:1px;--button_border_width-right:1px;--button_border_width-bottom:1px;--button_border_width-left:1px;--button-border-radius-top-left:2px;--button-border-radius-top-right:2px;--button-border-radius-bottom-right:2px;--button-border-radius-bottom-left:2px;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Questions?<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><h2 style=\"text-align: center;\">Presentation Video &#8220;Make Access Control Great Again&#8221;<\/h2>\n<\/div><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:950px;--awb-max-height:534px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"HW-YB8f_Hh4\" class=\"landscape\" params=\"wmode=transparent&autoplay=1&amp;rel=0&amp;showinfo=0&enablejsapi=1\" title=\"YouTube video player 1\" width=\"950\" height=\"534\" data-thumbnail-size=\"auto\"><\/lite-youtube><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><h2 style=\"text-align: center;\">Questions\/Comments?<\/h2>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-large button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Please contact us.<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":4607,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-4480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-event"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Make Access Control Great Again! - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/\"},\"author\":{\"name\":\"Ulrich Lang\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\"},\"headline\":\"Make Access Control Great Again!\",\"datePublished\":\"2017-10-08T19:44:49+00:00\",\"dateModified\":\"2024-06-27T20:04:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/\"},\"wordCount\":4322,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Event\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/\",\"name\":\"Make Access Control Great Again! - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2017-10-08T19:44:49+00:00\",\"dateModified\":\"2024-06-27T20:04:40+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/make-access-control-great-again\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Make Access Control Great Again!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/3468948fd539bb291b676a906cf17335\",\"name\":\"Ulrich Lang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g\",\"caption\":\"Ulrich Lang\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Make Access Control Great Again! - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/"},"author":{"name":"Ulrich Lang","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335"},"headline":"Make Access Control Great Again!","datePublished":"2017-10-08T19:44:49+00:00","dateModified":"2024-06-27T20:04:40+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/"},"wordCount":4322,"image":{"@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/10\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1","articleSection":["Event"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/","url":"https:\/\/objectsecurity.com\/make-access-control-great-again\/","name":"Make Access Control Great Again! - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/10\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1","datePublished":"2017-10-08T19:44:49+00:00","dateModified":"2024-06-27T20:04:40+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/make-access-control-great-again\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/10\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/10\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/make-access-control-great-again\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Make Access Control Great Again!"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/3468948fd539bb291b676a906cf17335","name":"Ulrich Lang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1becd5ccdeae7ade89a377820868a7789a2e3978f998ef8cb6d5b817c9a63a45?s=96&d=mm&r=g","caption":"Ulrich Lang"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2017\/10\/2017_ISSA_Int_Conference_Ins-600x337-1.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/4480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=4480"}],"version-history":[{"count":7,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/4480\/revisions"}],"predecessor-version":[{"id":4608,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/4480\/revisions\/4608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/4607"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=4480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=4480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=4480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}