{"type":"rich","url":"https://www.optiv.com/connecting-modern-cyber-operations-tailored-approach?aliId=eyJpIjoibFpEWGdlWmtlWVhNTHFkMyIsInQiOiJKc3NJbUwrUHcwYWdRVm1EWFduemx3PT0ifQ%253D%253D","title":"From Cybersecurity to Cyber-Maturity Desktop","html":"<div style=\"position:relative;width:auto;padding:0 0 429.69%;height:0;top:0;left:0;bottom:0;right:0;margin:0;border:0 none\" id=\"experience-5d13a57c3cc56\" data-aspectRatio=\"0.23272727\" data-mobile-aspectRatio=\"0.07272727\"><iframe allowfullscreen src=\"https://view.ceros.com/optiv/cyberops-ebook-cyber-maturity?heightOverride=5500&mobileHeightOverride=11000\" style=\"position:absolute;top:0;left:0;bottom:0;right:0;margin:0;padding:0;border:0 none;height:1px;width:1px;min-height:100%;min-width:100%\" frameborder=\"0\" class=\"ceros-experience\" title=\"From Cybersecurity to Cyber-Maturity Desktop\" scrolling=\"no\"></iframe></div><script type=\"text/javascript\" src=\"https://view.ceros.com/scroll-proxy.min.js\" data-ceros-origin-domains=\"view.ceros.com\"></script>","width":1280,"height":5500,"provider_name":"Ceros","provider_url":"https://ceros.com","version":"1.0","embedType":"full-height"}