{"id":593,"date":"2021-05-11T21:45:41","date_gmt":"2021-05-11T21:45:41","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=593"},"modified":"2024-06-20T22:32:04","modified_gmt":"2024-06-20T22:32:04","slug":"distinguished-contributor-award","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/","title":{"rendered":"The Power of Collaboration: How We&#8217;re Shaping the Future of Cybersecurity Together"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"593\" class=\"elementor elementor-593\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-abb9855 e-flex e-con-boxed e-con e-parent\" data-id=\"abb9855\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f9b0c75 e-con-full e-flex e-con e-child\" data-id=\"f9b0c75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecc1897 elementor-widget elementor-widget-spacer\" data-id=\"ecc1897\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9faa96 elementor-widget elementor-widget-heading\" data-id=\"a9faa96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jane Ginn Receives Outstanding Contributor Award<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78054a5 e-con-full e-flex e-con e-child\" data-id=\"78054a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6abf7d elementor-widget elementor-widget-spacer\" data-id=\"a6abf7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-545c719 elementor-widget elementor-widget-image\" data-id=\"545c719\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"675\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/92396160-ee64-4e68-8969-0f6e6c1a3b85.jpg\" class=\"attachment-large size-large wp-image-4068 lazyload\" alt=\"Cartoonized image of Jane Ginn\" data-srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/92396160-ee64-4e68-8969-0f6e6c1a3b85.jpg 807w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/92396160-ee64-4e68-8969-0f6e6c1a3b85-284x300.jpg 284w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/92396160-ee64-4e68-8969-0f6e6c1a3b85-768x810.jpg 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><noscript><img decoding=\"async\" width=\"640\" height=\"675\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/92396160-ee64-4e68-8969-0f6e6c1a3b85.jpg\" class=\"attachment-large size-large wp-image-4068 lazyload\" alt=\"Cartoonized image of Jane Ginn\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/92396160-ee64-4e68-8969-0f6e6c1a3b85.jpg 807w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/92396160-ee64-4e68-8969-0f6e6c1a3b85-284x300.jpg 284w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/92396160-ee64-4e68-8969-0f6e6c1a3b85-768x810.jpg 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/noscript>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-08fb1cb e-flex e-con-boxed e-con e-parent\" data-id=\"08fb1cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec13d0c elementor-widget elementor-widget-text-editor\" data-id=\"ec13d0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During the 2020 OASIS Awards Ceremony, in the middle of the Covid19 Pandemic, the CTIN President received the prestigious Outstanding Contributor Award.\u00a0 The ceremony was held virtually, as was all business and life during that year.\u00a0 This is a short clip of the award ceremony with Dee Shur of the OASIS Staff presenting.\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2a4a37 e-flex e-con-boxed e-con e-parent\" data-id=\"b2a4a37\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16a2d18 elementor-widget elementor-widget-spacer\" data-id=\"16a2d18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b633ef elementor-widget elementor-widget-heading\" data-id=\"3b633ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jane Ginn Acceptance Speech<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6bcdae e-flex e-con-boxed e-con e-parent\" data-id=\"b6bcdae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d2f844 elementor-widget elementor-widget-video\" data-id=\"7d2f844\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;play_on_mobile&quot;:&quot;yes&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video lazyload\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/05\/oasis-award2020-Original.mp4\" autoplay=\"\" controls=\"\" playsinline=\"\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e78ba56 e-flex e-con-boxed e-con e-parent\" data-id=\"e78ba56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d17fac elementor-widget elementor-widget-heading\" data-id=\"4d17fac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Transcript<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90f22f2 e-flex e-con-boxed e-con e-parent\" data-id=\"90f22f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6e7947 elementor-widget elementor-widget-text-editor\" data-id=\"e6e7947\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>From Dee Schur of the OASIS Open Staff:<\/strong>\u00a0 The Goodwill Ambassador for the Cyber Threat Intelligence Technical Committee, (CTI TC), Jane Ginn, has been a super staff resource and a 2020 recipient of this Distinguished Contributor Award.<\/p><p>Jane is the co-founder of the Cyber Threat Intelligence Network and the Secretary of the CTI TC and the Threat Actor Context (TAC TC). Jane has been an active member of the CTI TC since the beginning, over five years ago, which is really hard for me to believe.<\/p><p>She serves on the Board of Directors of the Cyber Resilience Institute. It&#8217;s equally difficult to overstate Jane&#8217;s commitment to the CTI TC. Jane has set the bar very high for her tireless devotion to the community.<\/p><p>From <strong>Trey Darley<\/strong>, the CTI TC Co-Chair: &#8220;<em>It&#8217;s been my honor to have worked hand in hand with Jane Ginn since the inception of the CTI TC. Over the past years, I&#8217;ve been deeply impressed with Jane&#8217;s unflagging professionalism. It was with tremendous delight that I learned of Jane&#8217;s selection as a 2020 Distinguished Contributor.<\/em><\/p><p><em>Jane has earned this award at least several times over. As I pen these words, there&#8217;s a huge smile on my face at the thought that at long last, Jane is getting the recognition that she so deserves.&#8221;<\/em><\/p><p><strong>Dee Schur<\/strong>:\u00a0 And from <strong>Rich Struse<\/strong>, an OASIS Board of Directors member and the CTI TC co-chair:<em>\u00a0 <\/em><\/p><p><em>&#8220;Jane has been a stalwart supporter of the TC&#8217;s mission and has toiled in the shadows to ensure that the TC runs smoothly.\u00a0<\/em><em style=\"text-align: var(--text-align);\">We couldn&#8217;t have gotten to where we are without her. Jane is a bridge builder, an ambassador, and advocate for open collaboration in multiple venues within OASIS. Jane is often the unsung hero toiling behind the scenes to make sure that records are up to date, that queries are answered, and that agendas are populated.<\/em><\/p><p><em>Without Jane&#8217;s attention, so many things would simply grind to a halt, yet you&#8217;d never know it from speaking with her. Her humility and grace are her hallmarks, and for this we say thank you.\u00a0<\/em><\/p><p><em>Congratulations, Jane.&#8221;<\/em><\/p><p><strong>Dee Schur:<\/strong>\u00a0 Can you please say a few words?<\/p><p><strong>Jane Ginn:<\/strong>\u00a0 Hi, that was very kind of Trey and Rich and others that have supported my nomination.\u00a0<\/p><p>I want to thank all of you at OASIS for providing the infrastructure within which we are all operating. And I want to thank the co-chairs of the CTI TC that have really been leading the technical effort throughout the past five years.<\/p><p>When I came on as Secretary, I made it my mission to try to document the progress that we were making, moving from STIX 1.X to where we are today with STIX 2.1; moving rapidly toward a full committee specification. I have done the same thing as I&#8217;ve accepted the Secretary position with the Threat Actor Context TC, where I&#8217;m working with Ryan Hohimer and Vasileios Mavroeidis.\u00a0<\/p><p>I am so thankful to be working with so many wonderful people within OASIS, and I so appreciate that what you have done for us is you&#8217;ve provided us rules of engagement and a code of conduct that allows us to reach consensus as we move toward these international standards, and as we move towards interoperability.<\/p><p>And I will continue to document what I&#8217;m seeing along the way.\u00a0<\/p><p>Thank you again, and back over to you, Dee.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85ec41 e-flex e-con-boxed e-con e-parent\" data-id=\"f85ec41\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.<\/p>\n","protected":false},"author":2,"featured_media":4057,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"video","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[281,20],"tags":[328,327],"class_list":["post-593","post","type-post","status-publish","format-video","has-post-thumbnail","hentry","category-cyberleaders","category-standards","tag-award","tag-distinguished","post_format-post-format-video"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"The Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-05-11T21:45:41+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-20T22:32:04+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"The Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#blogposting\",\"name\":\"The Power of Collaboration: How We\\u2019re Shaping the Future of Cybersecurity Together - CTIN\",\"headline\":\"The Power of Collaboration: How We&#8217;re Shaping the Future of Cybersecurity Together\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/StandingAboveCity-RS.jpg\",\"width\":1260,\"height\":703,\"caption\":\"AI generated image of man standing on top of building - sunset in background\"},\"datePublished\":\"2021-05-11T21:45:41+00:00\",\"dateModified\":\"2024-06-20T22:32:04+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#webpage\"},\"articleSection\":\"CyberLeaders, Standards, award, distinguished, Video\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/standards\\\/#listItem\",\"name\":\"Standards\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/standards\\\/#listItem\",\"position\":4,\"name\":\"Standards\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/standards\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#listItem\",\"name\":\"The Power of Collaboration: How We&#8217;re Shaping the Future of Cybersecurity Together\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#listItem\",\"position\":5,\"name\":\"The Power of Collaboration: How We&#8217;re Shaping the Future of Cybersecurity Together\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/standards\\\/#listItem\",\"name\":\"Standards\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/\",\"name\":\"The Power of Collaboration: How We\\u2019re Shaping the Future of Cybersecurity Together - CTIN\",\"description\":\"Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/StandingAboveCity-RS.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#mainImage\",\"width\":1260,\"height\":703,\"caption\":\"AI generated image of man standing on top of building - sunset in background\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2021\\\/05\\\/11\\\/distinguished-contributor-award\\\/#mainImage\"},\"datePublished\":\"2021-05-11T21:45:41+00:00\",\"dateModified\":\"2024-06-20T22:32:04+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>The Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together - CTIN<\/title>\n\n","aioseo_head_json":{"title":"The Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together - CTIN","description":"Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#blogposting","name":"The Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together - CTIN","headline":"The Power of Collaboration: How We&#8217;re Shaping the Future of Cybersecurity Together","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/StandingAboveCity-RS.jpg","width":1260,"height":703,"caption":"AI generated image of man standing on top of building - sunset in background"},"datePublished":"2021-05-11T21:45:41+00:00","dateModified":"2024-06-20T22:32:04+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#webpage"},"articleSection":"CyberLeaders, Standards, award, distinguished, Video"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/#listItem","name":"Standards"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/#listItem","position":4,"name":"Standards","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#listItem","name":"The Power of Collaboration: How We&#8217;re Shaping the Future of Cybersecurity Together"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#listItem","position":5,"name":"The Power of Collaboration: How We&#8217;re Shaping the Future of Cybersecurity Together","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/#listItem","name":"Standards"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/","name":"The Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together - CTIN","description":"Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/StandingAboveCity-RS.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#mainImage","width":1260,"height":703,"caption":"AI generated image of man standing on top of building - sunset in background"},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/#mainImage"},"datePublished":"2021-05-11T21:45:41+00:00","dateModified":"2024-06-20T22:32:04+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"The Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together - CTIN","og:description":"Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2021-05-11T21:45:41+00:00","article:modified_time":"2024-06-20T22:32:04+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"The Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together - CTIN","twitter:description":"Jane Ginn accepts the prestigious OASIS Open Distinguished Contributor 2020 Award. Video of acceptance speech.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"593","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":{"category":20},"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 21:57:56","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2021-08-07 21:56:26","updated":"2025-08-25 21:57:56"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/\" title=\"Standards\">Standards<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tThe Power of Collaboration: How We\u2019re Shaping the Future of Cybersecurity Together\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"Standards","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/standards\/"},{"label":"The Power of Collaboration: How We&#8217;re Shaping the Future of Cybersecurity Together","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2021\/05\/11\/distinguished-contributor-award\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=593"}],"version-history":[{"count":55,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/593\/revisions"}],"predecessor-version":[{"id":4071,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/593\/revisions\/4071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/4057"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}