{"id":4352,"date":"2024-11-19T06:41:29","date_gmt":"2024-11-19T06:41:29","guid":{"rendered":"https:\/\/greenmethod.net\/dev\/?post_type=event_listing&#038;p=4352"},"modified":"2024-12-07T12:28:17","modified_gmt":"2024-12-07T12:28:17","slug":"8th-annual-e-crime-information-security","status":"publish","type":"event_listing","link":"https:\/\/greenmethod.net\/dev\/event\/8th-annual-e-crime-information-security\/","title":{"rendered":"8th Annual E-Crime &amp; Information Security"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-1.webp\" alt=\"\" class=\"wp-image-4354\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-1.webp 1024w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-1-300x300.webp 300w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-1-150x150.webp 150w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-1-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-3.webp\" alt=\"\" class=\"wp-image-4355\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-3.webp 1024w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-3-300x300.webp 300w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-3-150x150.webp 150w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-3-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-4.webp\" alt=\"\" class=\"wp-image-4356\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-4.webp 1024w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-4-300x300.webp 300w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-4-150x150.webp 150w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-4-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-5.webp\" alt=\"\" class=\"wp-image-4357\" srcset=\"https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-5.webp 1024w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-5-300x300.webp 300w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-5-150x150.webp 150w, https:\/\/greenmethod.net\/dev\/wp-content\/uploads\/2024\/11\/8th-annual-e-crime-information-security-5-768x768.webp 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"featured_media":8437,"template":"","meta":[],"event_listing_category":[],"event_listing_type":[],"class_list":["post-4352","event_listing","type-event_listing","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/event_listing\/4352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/event_listing"}],"about":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/types\/event_listing"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/media\/8437"}],"wp:attachment":[{"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/media?parent=4352"}],"wp:term":[{"taxonomy":"event_listing_category","embeddable":true,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/event_listing_category?post=4352"},{"taxonomy":"event_listing_type","embeddable":true,"href":"https:\/\/greenmethod.net\/dev\/wp-json\/wp\/v2\/event_listing_type?post=4352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}