{"id":14977,"date":"2024-02-22T02:57:57","date_gmt":"2024-02-22T02:57:57","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/"},"modified":"2024-02-29T03:25:36","modified_gmt":"2024-02-29T03:25:36","slug":"agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/","title":{"rendered":"Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling"},"content":{"rendered":"<h4><strong><span style=\"color: #993300\">ATTEND IN-PERSON<\/span>: <\/strong><strong>Onsite at Abu Dhabi<\/strong><\/h4>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h4><strong>DATE: 25-26 Nov 2024<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 GST\/GMT+4<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>25 Nov<\/td>\n<td>Monday<\/td>\n<td>09:00 to 17:00 GST\/GMT+4<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>26 Nov<\/td>\n<td>Tuesday<\/td>\n<td>09:00 to 17:00 GST\/GMT+4<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h5 style=\"text-align: center\"><em><span style=\"color: #993300\">Participants get access to the on-demand Threat Modeling Introduction training prior to the training, and one hour of threat modeling coaching after the training<\/span><\/em><\/h5>\n<hr \/>\n<h5>You will be challenged with hands-on threat modeling exercises based on real-world projects. You will get insight into our practical industry experience, helping you to become a Threat Modeling Practitioner. We included an exercise on MITRE ATT&amp;CK, and we focus on embedding threat modeling in Agile and DevOps practices.<\/h5>\n<p>We levelled up the threat modeling war game. Engaged in CTF-style challenges, your team will battle for control over an offshore wind turbine park.<\/p>\n<p>The level of this training is Beginner\/Intermediate. Participants who are new to threat modeling are advised to follow our self-paced Threat Modeling Introduction training (which is about 2 hours and is included in this training).<\/p>\n<p>As highly skilled professionals with years of experience under our belts, we&#8217;re intimately familiar with the gap between academic knowledge of threat modeling and real-world practice. To minimize that gap, we have developed practical use cases, based on real-world projects. Each use case includes a description of the environment, together with questions and templates to build a threat model.<\/p>\n<p>Students will be challenged in groups of 3 to 4 people to perform the different stages of threat modeling:<\/p>\n<p>\u2022 Diagram techniques applied on a travel booking service<br \/>\n\u2022 Threat model a cloud-based update service for an IoT kiosk<br \/>\n\u2022 Create an attack tree against a nuclear research facility<br \/>\n\u2022 Create a SOC Risk Based Alerting system with MITRE ATT&amp;CK<br \/>\n\u2022 Mitigate threats in a payment service build with microservices and S3 buckets<br \/>\n\u2022 Apply data protection by design and default on a loyalty app<br \/>\n\u2022 Apply the OWASP Threat Modeling Playbook on agile development<br \/>\n\u2022 Threat modeling the CI\/CD pipeline<br \/>\n\u2022 Battle for control over &#8220;Zwarte Wind&#8221;, an offshore wind turbine park<\/p>\n<p>After each hands-on exercise, the results are discussed, and students receive a documented solution. All participants get our Threat Modeling Playbook to improve you threat modeling practice, and a one-year access to our online threat modeling learning platform.<\/p>\n<p>As part of this training, you will be asked to create and submit your own threat model, on which you will get feedback. One month after the training we organize an individual coaching session with all the participants.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5><strong>Your bonus training package includes:<\/strong><\/h5>\n<p>\u2022 Following a successful evaluation of your own threat model: Threat Modeling Expert certificate<br \/>\n\u2022 One year of access to our threat modeling e-learning platform<br \/>\n\u2022 Presentation handouts<br \/>\n\u2022 Tailored use case worksheets<br \/>\n\u2022 Detailed use case solution descriptions<br \/>\n\u2022 Threat model documentation template<br \/>\n\u2022 Template for calculating identified threat risk severity<br \/>\n\u2022 Threat modeling playbook<br \/>\n\u2022 STRIDE mapped on compliance standards<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>We plan 9 hands-on exercises:<\/strong><\/h5>\n<p>\u2022 Diagram techniques applied on a travel booking service<br \/>\n\u2022 Threat model a cloud-based update service for an IoT kiosk<br \/>\n\u2022 Create an attack tree against a nuclear research facility<br \/>\n\u2022 Create a SOC Risk Based Alerting system with MITRE ATT&amp;CK<br \/>\n\u2022 Mitigate threats in a payment service build with microservices and S3 buckets<br \/>\n\u2022 Apply data protection by design and default on a loyalty app<br \/>\n\u2022 Apply the OWASP Threat Modeling Playbook on agile development<br \/>\n\u2022 Threat modeling the CI\/CD pipeline<br \/>\n\u2022 Battle for control over &#8220;Zwarte Wind&#8221;, an offshore wind turbine park<br \/>\n<em>At least 60% of the training will be exercises.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Key Learning Objectives<\/strong><\/h5>\n<ul>\n<li>Cover the 4 main steps of creating and updating an effective threat model<\/li>\n<li>Use threat modeling as part of the secure design of systems and to scope pen-testing more efficiently<\/li>\n<li>Use threat modeling to learn, model and communicate with security and development teams and build bridges between them.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Topics Covered<\/strong><\/h5>\n<p><strong>Threat modeling introduction<\/strong><br \/>\n\u2022 Threat modeling in a secure development lifecycle<br \/>\n\u2022 What is threat modeling?<br \/>\n\u2022 Why perform threat modeling?<br \/>\n\u2022 Threat modeling stages<br \/>\n\u2022 Different threat modeling methodologies<br \/>\n\u2022 Document a threat model<\/p>\n<p><strong>Diagrams \u2013 what are you building?<\/strong><br \/>\n\u2022 Understanding context<br \/>\n\u2022 Doomsday scenarios<br \/>\n\u2022 Data flow diagrams<br \/>\n\u2022 Trust boundaries<br \/>\n\u2022 Sequence and state diagrams<br \/>\n\u2022 Advanced diagrams<br \/>\n\u2022 Hands-on: Diagram techniques applied on a travel booking service<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Identifying threats \u2013 what can go wrong?<\/strong><br \/>\n\u2022 STRIDE introduction<br \/>\n\u2022 STRIDE threats<br \/>\n\u2022 Hands-on: Threat model a cloud-based update service for an IoT kiosk<br \/>\n\u2022 Attack trees<br \/>\n\u2022 Hands-on: Create an attack tree against a nuclear research facility<br \/>\n\u2022 Attack libraries<br \/>\n\u2022 MITRE ATT&amp;CK<br \/>\n\u2022 Hands-on: Create a SOC Risk Based Alerting system with MITRE ATT&amp;CK<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Addressing each threat<\/strong><br \/>\n\u2022 How to address threats<br \/>\n\u2022 Mitigation patterns<br \/>\n\u2022 Value of standard mitigations<br \/>\n\u2022 Setting priorities through risk calculation<br \/>\n\u2022 Risk management<br \/>\n\u2022 Threat agents<br \/>\n\u2022 The mitigation process<br \/>\n\u2022 Hands-on: Mitigate threats in a payment service build with microservices and S3 buckets<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Threat modeling and compliance<\/strong><br \/>\n\u2022 How to marry threat modeling with compliance<br \/>\n\u2022 GDPR and Privacy by design<br \/>\n\u2022 Privacy threats<br \/>\n\u2022 LINDUNN and Mitigating privacy threats<br \/>\n\u2022 Threat modeling medical devices<br \/>\n\u2022 Threat modeling Industrial Control Systems (IEC 62443)<br \/>\n\u2022 Threat Assessment and Remediation Analysis for automotive (TARA, SAE 21434)<br \/>\n\u2022 Mapping threat modeling on compliance frameworks<br \/>\n\u2022 Hands-on: Apply data protection by design and default on a loyalty app<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Advanced threat modeling<\/strong><br \/>\n\u2022 Typical steps and variations<br \/>\n\u2022 Validation threat models<br \/>\n\u2022 Effective threat model workshops<br \/>\n\u2022 Communicating threat models<br \/>\n\u2022 Agile and DevOps threat modeling<br \/>\n\u2022 Improving your practice with the Threat Modeling Playbook<br \/>\n\u2022 Scaling up threat modeling<br \/>\n\u2022 Hands-on: Apply the OWASP Threat Modeling Playbook on agile development<br \/>\n\u2022 Hands-on: Threat modeling the CI\/CD pipeline<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Threat modeling resources<\/strong><br \/>\n\u2022 Open-Source tools<br \/>\n\u2022 Commercial tools<br \/>\n\u2022 General tools<br \/>\n\u2022 Threat modeling tools compared<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Examination<\/strong><br \/>\n\u2022 Hands-on examination<br \/>\n\u2022 Grading and certification<br \/>\n<em>Battle for control over &#8220;Zwarte Wind&#8221;, an offshore wind turbine park<\/em><br \/>\n<em>Red team versus Blue team battle for control over an offshore wind turbine park<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Review session (online coaching session after 1 month)<\/strong><br \/>\n\u2022 Hand-in of your own threat model<br \/>\n\u2022 Individual feedback on your threat model<br \/>\n\u2022 Review session<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 25-26 Nov 2024 TIME: 09:00 to 17:00 GST\/GMT+4 Date Day Time Duration 25 Nov Monday 09:00 to 17:00 GST\/GMT+4 8 Hours 26 Nov Tuesday 09:00 to 17:00 GST\/GMT+4 8 Hours Participants get access to the on-demand Threat Modeling Introduction training prior to the training, and one hour of [&hellip;]<\/p>\n","protected":false},"featured_media":14976,"template":"","meta":{"_acf_changed":false},"product_cat":[58,90,92,57],"product_tag":[],"class_list":{"0":"post-14977","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-2-day-training","7":"product_cat-auh2024","8":"product_cat-auh2024-training","9":"product_cat-in-person","11":"first","12":"outofstock","13":"featured","14":"shipping-taxable","15":"purchasable","16":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling - HITBSecConf2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling - HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 25-26 Nov 2024 TIME: 09:00 to 17:00 GST\/GMT+4 Date Day Time Duration 25 Nov Monday 09:00 to 17:00 GST\/GMT+4 8 Hours 26 Nov Tuesday 09:00 to 17:00 GST\/GMT+4 8 Hours Participants get access to the on-demand Threat Modeling Introduction training prior to the training, and one hour of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-29T03:25:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/sebastien-deleersnyder-product-photo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"335\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/\",\"name\":\"Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling - HITBSecConf2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/sebastien-deleersnyder-product-photo.png\",\"datePublished\":\"2024-02-22T02:57:57+00:00\",\"dateModified\":\"2024-02-29T03:25:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/sebastien-deleersnyder-product-photo.png\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/sebastien-deleersnyder-product-photo.png\",\"width\":512,\"height\":335},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/\",\"name\":\"HITBSecConf2024 - Abu Dhabi\",\"description\":\"Nov 25 - 28, Abu Dhabi, UAE\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling - HITBSecConf2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/","og_locale":"en_US","og_type":"article","og_title":"Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling - HITBSecConf2024 - Abu Dhabi","og_description":"ATTEND IN-PERSON: Onsite at Abu Dhabi DATE: 25-26 Nov 2024 TIME: 09:00 to 17:00 GST\/GMT+4 Date Day Time Duration 25 Nov Monday 09:00 to 17:00 GST\/GMT+4 8 Hours 26 Nov Tuesday 09:00 to 17:00 GST\/GMT+4 8 Hours Participants get access to the on-demand Threat Modeling Introduction training prior to the training, and one hour of [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/","og_site_name":"HITBSecConf2024 - Abu Dhabi","article_modified_time":"2024-02-29T03:25:36+00:00","og_image":[{"width":512,"height":335,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/sebastien-deleersnyder-product-photo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/","name":"Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling - HITBSecConf2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/sebastien-deleersnyder-product-photo.png","datePublished":"2024-02-22T02:57:57+00:00","dateModified":"2024-02-29T03:25:36+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/sebastien-deleersnyder-product-photo.png","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-content\/uploads\/sites\/23\/2024\/02\/sebastien-deleersnyder-product-photo.png","width":512,"height":335},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/product\/agile-whiteboard-hacking-aka-hands-on-threat-modeling-auh2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/shop\/"},{"@type":"ListItem","position":3,"name":"Agile Whiteboard Hacking \u2013 aka Hands-on Threat Modeling"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/","name":"HITBSecConf2024 - Abu Dhabi","description":"Nov 25 - 28, Abu Dhabi, UAE","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product\/14977"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media\/14976"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/media?parent=14977"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product_cat?post=14977"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2024auh\/wp-json\/wp\/v2\/product_tag?post=14977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}