{"id":1719,"date":"2024-03-31T03:46:55","date_gmt":"2024-03-31T03:46:55","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=1719"},"modified":"2024-06-10T23:04:33","modified_gmt":"2024-06-10T23:04:33","slug":"interoperability-village","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/","title":{"rendered":"Interoperability Village"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1719\" class=\"elementor elementor-1719\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a127b20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a127b20\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7d68e0da\" data-id=\"7d68e0da\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43854064 elementor-widget elementor-widget-text-editor\" data-id=\"43854064\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<figure class=\"wp-block-video\"><\/figure>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-4562c1d e-flex e-con-boxed e-con e-parent\" data-id=\"4562c1d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fc6faad e-con-full e-flex e-con e-child\" data-id=\"fc6faad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d8e7f6 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0d8e7f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A Cybersecurity Automation Village, will be hosted by the <a title=\"https:\/\/opencybersecurityalliance.org\/\" href=\"https:\/\/opencybersecurityalliance.org\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Open Cybersecurity Alliance (OCA)<\/a>\u00a0<a href=\"https:\/\/github.com\/opencybersecurityalliance\/casp\" target=\"_blank\" rel=\"noopener\">Cybersecurity Automation SubProject (CASP)<\/a>\u00a0next Thursday and Friday, April 11th and 12th.\u00a0\u00a0This event brings together global cybersecurity vendors, end-users, thought leaders, and individuals passionate about cybersecurity automation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f6e75d e-con-full e-flex e-con e-child\" data-id=\"1f6e75d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0362dc elementor-widget elementor-widget-spacer\" data-id=\"f0362dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a930be8 elementor-widget elementor-widget-image\" data-id=\"a930be8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"55\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-300x55.png\" class=\"attachment-medium size-medium wp-image-1736 lazyload\" alt=\"Logo for OCA\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-300x55.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-1024x186.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-768x140.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-1536x279.png 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1.png 1907w\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"OCA-1 - CTIN\" \/><noscript><img decoding=\"async\" width=\"300\" height=\"55\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-300x55.png\" class=\"attachment-medium size-medium wp-image-1736 lazyload\" alt=\"Logo for OCA\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-300x55.png 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-1024x186.png 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-768x140.png 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1-1536x279.png 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/OCA-1.png 1907w\" sizes=\"(max-width: 300px) 100vw, 300px\" title=\"OCA-1 - CTIN\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd232f2 e-flex e-con-boxed e-con e-parent\" data-id=\"cd232f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7fd8e03 e-con-full e-flex e-con e-child\" data-id=\"7fd8e03\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4806b48 elementor-widget elementor-widget-text-editor\" data-id=\"4806b48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The CASP Community plans to hold a two day HYBRID event featuring plugfest sessions, special guest speakers, contests and demonstrations. The objective is to present and demonstrate working interoperating systems contributing to cybersecurity automation, particularly across different participants and across the different standards.<\/p>\n<p>Subscribe to the <a title=\"https:\/\/lists.oasis-open-projects.org\/g\/oca-casp\" href=\"https:\/\/lists.oasis-open-projects.org\/g\/oca-casp\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CASP mailing list<\/a>, attend biweekly CASP meetings, and\u00a0<a title=\"https:\/\/open-cybersecurity.slack.com\/join\/shared_invite\/zt-17l2stcly-HIpPHd4zx5u9qA2f7TmV3Q#\/shared-invite\/email\" href=\"https:\/\/open-cybersecurity.slack.com\/join\/shared_invite\/zt-17l2stcly-HIpPHd4zx5u9qA2f7TmV3Q#\/shared-invite\/email\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">join the #casp channel on OCA Slack<\/a>.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06d800b e-flex e-con-boxed e-con e-parent\" data-id=\"06d800b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1ced7aa e-con-full e-flex e-con e-child\" data-id=\"1ced7aa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9dc39c elementor-widget elementor-widget-image\" data-id=\"f9dc39c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/caspLogo2-300-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1755 lazyload\" alt=\"\" title=\"caspLogo2-300 - CTIN\" \/><noscript><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/03\/caspLogo2-300-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1755 lazyload\" alt=\"\" title=\"caspLogo2-300 - CTIN\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad74e09 e-con-full e-flex e-con e-child\" data-id=\"ad74e09\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0899fab elementor-widget elementor-widget-text-editor\" data-id=\"0899fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p>\n<p><span style=\"font-weight: var( --e-global-typography-text-font-weight ); color: #6f7287; font-family: -apple-system, BlinkMacSystemFont, Roboto, 'Helvetica Neue', Helvetica, Tahoma, Arial, sans-serif;\">By registering, participants agree to abide by the\u00a0<\/span><a style=\"font-weight: var( --e-global-typography-text-font-weight ); font-family: -apple-system, BlinkMacSystemFont, Roboto, 'Helvetica Neue', Helvetica, Tahoma, Arial, sans-serif; background-color: #ffffff; color: #3659e3; cursor: pointer;\" title=\"https:\/\/github.com\/opencybersecurityalliance\/casp\/blob\/main\/CODE-OF-CONDUCT.md\" href=\"https:\/\/github.com\/opencybersecurityalliance\/casp\/blob\/main\/CODE-OF-CONDUCT.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Code of Conduct\u00a0<\/a><span style=\"font-weight: var( --e-global-typography-text-font-weight ); color: #6f7287; font-family: -apple-system, BlinkMacSystemFont, Roboto, 'Helvetica Neue', Helvetica, Tahoma, Arial, sans-serif;\">.<\/span><\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52311eb e-flex e-con-boxed e-con e-parent\" data-id=\"52311eb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aa1a1cf e-con-full e-flex e-con e-child\" data-id=\"aa1a1cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81f6710 elementor-widget elementor-widget-text-editor\" data-id=\"81f6710\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore a tentative list of projects (technologies, standards, open source) to be interworked in CASP use cases. For detailed demonstrations, refer to the <a href=\"https:\/\/github.com\/opencybersecurityalliance\/casp\/tree\/main\/UseCases\" target=\"_blank\" rel=\"noopener\">Demo Use Case and Demo Use Case<\/a> tech sections on the CASP Github site.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1852bb e-con-full e-flex e-con e-child\" data-id=\"f1852bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-916789c elementor-widget elementor-widget-video\" data-id=\"916789c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;start&quot;:1,&quot;end&quot;:282,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video lazyload\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Base2.mp4#t=1,282\" controls=\"\" preload=\"metadata\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-caa8855 e-flex e-con-boxed e-con e-parent\" data-id=\"caa8855\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-de571d0 e-con-full e-flex e-con e-child\" data-id=\"de571d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad661f7 e-con-full e-flex e-con e-child\" data-id=\"ad661f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f3ffbf elementor-widget elementor-widget-text-editor\" data-id=\"8f3ffbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Plugfest will be demonstrating multiple cybersecurity-related technical standards published by OASIS-Open, as well as the progress made by multiple OCA Subprojects.<\/p>\n<p>In order to demonstrate interoperability between the standards and subprojects the participants are using a single use case from the 2018 Winter Olympics: a campaign dubbed \u2018Olympic Destroyer.\u2019 The following video gives a high-level overview of some of the features of this campaign that made it a good candidate for demonstrating interoperability.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7729a6a e-con-full e-flex e-con e-child\" data-id=\"7729a6a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>OASIS-Open&#8217;s Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability &#8216;Plugfest&#8217; in the Washington, D.C. area on April 11th and 12th.  <\/p>\n","protected":false},"author":2,"featured_media":1705,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[5,2,54],"tags":[67,253,18,254],"class_list":["post-1719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-automation","category-coth","category-cybersecurity","tag-cybersecurity","tag-osint","tag-stix2-1","tag-threat-intelligence"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"OASIS-Open&#039;s Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability &#039;Plugfest&#039; in the Washington, D.C. area on April 11th and 12th.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Interoperability Village - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"OASIS-Open&#039;s Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability &#039;Plugfest&#039; in the Washington, D.C. area on April 11th and 12th.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2024-03-31T03:46:55+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-10T23:04:33+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Interoperability Village - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"OASIS-Open&#039;s Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability &#039;Plugfest&#039; in the Washington, D.C. area on April 11th and 12th.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#blogposting\",\"name\":\"Interoperability Village - CTIN\",\"headline\":\"Interoperability Village\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/LookingDownOnPeople.jpg\",\"width\":1600,\"height\":727},\"datePublished\":\"2024-03-31T03:46:55+00:00\",\"dateModified\":\"2024-06-10T23:04:33+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#webpage\"},\"articleSection\":\"Automation, COTH, CyberSecurity, cybersecurity, OSINT, STIX2.1, threat intelligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"name\":\"COTH\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"position\":3,\"name\":\"COTH\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/automation\\\/#listItem\",\"name\":\"Automation\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/automation\\\/#listItem\",\"position\":4,\"name\":\"Automation\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/automation\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#listItem\",\"name\":\"Interoperability Village\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"name\":\"COTH\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#listItem\",\"position\":5,\"name\":\"Interoperability Village\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/automation\\\/#listItem\",\"name\":\"Automation\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/\",\"name\":\"Interoperability Village - CTIN\",\"description\":\"OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/LookingDownOnPeople.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#mainImage\",\"width\":1600,\"height\":727},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2024\\\/03\\\/31\\\/interoperability-village\\\/#mainImage\"},\"datePublished\":\"2024-03-31T03:46:55+00:00\",\"dateModified\":\"2024-06-10T23:04:33+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Interoperability Village - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Interoperability Village - CTIN","description":"OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#blogposting","name":"Interoperability Village - CTIN","headline":"Interoperability Village","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/LookingDownOnPeople.jpg","width":1600,"height":727},"datePublished":"2024-03-31T03:46:55+00:00","dateModified":"2024-06-10T23:04:33+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#webpage"},"articleSection":"Automation, COTH, CyberSecurity, cybersecurity, OSINT, STIX2.1, threat intelligence"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","name":"COTH"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","position":3,"name":"COTH","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/#listItem","name":"Automation"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/#listItem","position":4,"name":"Automation","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#listItem","name":"Interoperability Village"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","name":"COTH"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#listItem","position":5,"name":"Interoperability Village","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/#listItem","name":"Automation"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/","name":"Interoperability Village - CTIN","description":"OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/LookingDownOnPeople.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#mainImage","width":1600,"height":727},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/#mainImage"},"datePublished":"2024-03-31T03:46:55+00:00","dateModified":"2024-06-10T23:04:33+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Interoperability Village - CTIN","og:description":"OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2024-03-31T03:46:55+00:00","article:modified_time":"2024-06-10T23:04:33+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Interoperability Village - CTIN","twitter:description":"OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"1719","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:01:10","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2024-04-18 16:57:44","updated":"2025-08-25 22:01:10"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/\" title=\"COTH\">COTH<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/\" title=\"Automation\">Automation<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tInteroperability Village\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"COTH","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/"},{"label":"Automation","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/"},{"label":"Interoperability Village","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2024\/03\/31\/interoperability-village\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=1719"}],"version-history":[{"count":166,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1719\/revisions"}],"predecessor-version":[{"id":3000,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1719\/revisions\/3000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/1705"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=1719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=1719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=1719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}