{"id":330,"date":"2019-09-06T10:10:56","date_gmt":"2019-09-06T10:10:56","guid":{"rendered":"http:\/\/127.0.0.1\/csam\/?p=330"},"modified":"2019-10-14T03:48:55","modified_gmt":"2019-10-14T03:48:55","slug":"round-table-discussion-strengthening-academic-collaboration-in-cyber-security-15-nov-2018","status":"publish","type":"post","link":"https:\/\/www.ukm.my\/csam\/round-table-discussion-strengthening-academic-collaboration-in-cyber-security-15-nov-2018\/","title":{"rendered":"Round Table Discussion Strengthening Academic Collaboration in Cyber Security 15 Nov 2018"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"330\" class=\"elementor elementor-330\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71b17b9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71b17b9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e28850b\" data-id=\"e28850b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-48dca9b elementor-widget elementor-widget-image\" data-id=\"48dca9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"445\" src=\"https:\/\/www.ukm.my\/csam\/wp-content\/uploads\/2019\/09\/Untitled-1.jpg\" class=\"attachment-large size-large wp-image-331\" alt=\"\" srcset=\"https:\/\/www.ukm.my\/csam\/wp-content\/uploads\/2019\/09\/Untitled-1.jpg 800w, https:\/\/www.ukm.my\/csam\/wp-content\/uploads\/2019\/09\/Untitled-1-300x167.jpg 300w, https:\/\/www.ukm.my\/csam\/wp-content\/uploads\/2019\/09\/Untitled-1-768x427.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-acf6e03 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"acf6e03\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-95316fa\" data-id=\"95316fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f906ae elementor-widget elementor-widget-text-editor\" data-id=\"4f906ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Round Table Discussion Strengthening Academic Collaboration in Cyber Security 15 Nov 2018<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Round Table Discussion Strengthening Academic Collaboration in Cyber Security 15 Nov 2018<\/p>\n","protected":false},"author":1,"featured_media":331,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[16,7],"tags":[],"class_list":["post-330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-conferences","category-events"],"_links":{"self":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":4,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":381,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/posts\/330\/revisions\/381"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/media\/331"}],"wp:attachment":[{"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ukm.my\/csam\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}