{"id":33729,"date":"2022-01-07T13:57:33","date_gmt":"2022-01-07T02:57:33","guid":{"rendered":"https:\/\/www.institutedata.com\/?p=33729"},"modified":"2022-01-18T14:57:39","modified_gmt":"2022-01-18T03:57:39","slug":"whats-your-response-plan-for-data-breaches","status":"publish","type":"post","link":"https:\/\/www.institutedata.com\/us\/blog\/whats-your-response-plan-for-data-breaches\/","title":{"rendered":"What&#8217;s your response plan for data breaches?"},"content":{"rendered":"<h2><span style=\"font-weight: 400;\">How can AI and machine learning models contribute to data breaches?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In this <\/span><a href=\"https:\/\/www.youtube.com\/watch?v=MVV7dRIkaEY\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">short clip<\/span><\/a><span style=\"font-weight: 400;\">, cyber security experts discuss how ai and machine learning models are adapting and how companies can stay safe.<\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/MVV7dRIkaEY\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re looking for the fastest and most effective way to break into the cyber security industry, <\/span><a href=\"https:\/\/www.institutedata.com\/us\/about\/#contact\"><span style=\"font-weight: 400;\">schedule a call today<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><span style=\"font-weight: 400;\">learn more<\/span><span style=\"font-weight: 400;\">\u00a0about our practical <a href=\"https:\/\/www.institutedata.com\/us\/courses\/cyber-security-program\/\">cyber security training program<\/a>, taught by cyber security industry experts focused on helping you land a job in the cyber market.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How can AI and machine learning models contribute to data breaches? In this short clip, cyber security experts discuss how ai and machine learning models are adapting and how companies can stay safe. If you\u2019re looking for the fastest and most effective way to break into the cyber security industry, schedule a call today or&hellip;<\/p>\n","protected":false},"author":1,"featured_media":31142,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[528,529,532,530,533],"tags":[],"class_list":["post-33729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-cybersecuritytechnology","category-datascience","category-datasecurity","category-industry-us"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/33729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=33729"}],"version-history":[{"count":0,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/33729\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media\/31142"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=33729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/categories?post=33729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=33729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}