<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>ICIT (Institute for Critical Infrastructure Technology)</provider_name><provider_url>https://icitech.org</provider_url><author_name>ICIT</author_name><author_url>https://icitech.org/author/admin/</author_url><title>ICIT Certified Content: Making Better Cyber Risk Decisions - Architecting the Choices - ICIT (Institute for Critical Infrastructure Technology)</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="nfNIcdAy7t"&gt;&lt;a href="https://icitech.org/artitecting-cyber-risk-decisions/"&gt;ICIT Certified Content: Making Better Cyber Risk Decisions &#x2013; Architecting the Choices&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://icitech.org/artitecting-cyber-risk-decisions/embed/#?secret=nfNIcdAy7t" width="600" height="338" title="&#x201C;ICIT Certified Content: Making Better Cyber Risk Decisions &#x2013; Architecting the Choices&#x201D; &#x2014; ICIT (Institute for Critical Infrastructure Technology)" data-secret="nfNIcdAy7t" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/*! This file is auto-generated */
!function(c,l){"use strict";var e=!1,o=!1;if(l.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=0;o&lt;n.length;o++)n[o].style.display="none";for(o=0;o&lt;i.length;o++)if(r=i[o],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=l.createElement("a"),a=l.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,a.host===s.host)if(l.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=l.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://icitech.org/wp-content/uploads/2022/05/EPIPHANY-certified-content.png</thumbnail_url><thumbnail_width>578</thumbnail_width><thumbnail_height>751</thumbnail_height><description>Malcolm Harkins' essay explores how CISOs can become more effective choice architects and data storytellers to evoke the engaged and emotional responses, properly frame risks and rewards, and lead their organizations along the path of security-conscious decision-making.</description></oembed>
