{"id":41,"date":"2021-04-14T17:33:11","date_gmt":"2021-04-14T17:33:11","guid":{"rendered":"https:\/\/blogs.rollins.edu\/ITsec\/?p=41"},"modified":"2021-04-14T17:33:11","modified_gmt":"2021-04-14T17:33:11","slug":"join-us-for-a-lunch-and-learn","status":"publish","type":"post","link":"https:\/\/blogs.rollins.edu\/ITsec\/2021\/04\/14\/join-us-for-a-lunch-and-learn\/","title":{"rendered":"Join us for a lunch and learn"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.wejoinin.com\/sheets\/iikri\"><img loading=\"lazy\" decoding=\"async\" width=\"724\" height=\"1024\" src=\"https:\/\/blogs.rollins.edu\/ITsec\/wp-content\/uploads\/2021\/04\/Cyber-724x1024.png\" alt=\"\" class=\"wp-image-42\" srcset=\"https:\/\/blogs.rollins.edu\/ITsec\/wp-content\/uploads\/2021\/04\/Cyber-724x1024.png 724w, https:\/\/blogs.rollins.edu\/ITsec\/wp-content\/uploads\/2021\/04\/Cyber-212x300.png 212w, https:\/\/blogs.rollins.edu\/ITsec\/wp-content\/uploads\/2021\/04\/Cyber-768x1086.png 768w, https:\/\/blogs.rollins.edu\/ITsec\/wp-content\/uploads\/2021\/04\/Cyber-1086x1536.png 1086w, https:\/\/blogs.rollins.edu\/ITsec\/wp-content\/uploads\/2021\/04\/Cyber-1448x2048.png 1448w, https:\/\/blogs.rollins.edu\/ITsec\/wp-content\/uploads\/2021\/04\/Cyber.png 1587w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-41","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/posts\/41","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/comments?post=41"}],"version-history":[{"count":2,"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/posts\/41\/revisions"}],"predecessor-version":[{"id":44,"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/posts\/41\/revisions\/44"}],"wp:attachment":[{"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/media?parent=41"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/categories?post=41"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.rollins.edu\/ITsec\/wp-json\/wp\/v2\/tags?post=41"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}