{"version":"1.0","provider_name":"CFP WESCO Cameroon","provider_url":"https:\/\/wescocenter.org\/fr\/","title":"IT Security and Cybersecurity","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"URMWSiwMoQ\"><a href=\"https:\/\/wescocenter.org\/fr\/it-security-and-cybersecurity\/\">IT Security and Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/wescocenter.org\/fr\/it-security-and-cybersecurity\/embed\/#?secret=URMWSiwMoQ\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0IT Security and Cybersecurity\u00a0\u00bb &#8212; CFP WESCO Cameroon\" data-secret=\"URMWSiwMoQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/wescocenter.org\/wp-includes\/js\/wp-embed.min.js\n<\/script>","description":"IT Security and Cybersecurity SECURITE INFORMATIQUE ET CYBER SECURITE Protecting Sensitive Data and Privacy \ud83d\udd12 Addressing the Growing Threat Landscape \ud83d\udcc8 High Demand and Lucrative Career Opportunities \ud83d\udcb0 Ensuring Business Continuity and Trust \ud83e\udd1d L&#8217;\u00e9tude de la cybers\u00e9curit\u00e9 est cruciale pour prot\u00e9ger nos donn\u00e9es sensibles, faire face aux menaces num\u00e9riques croissantes et assurer la continuit\u00e9 [&hellip;]","thumbnail_url":"https:\/\/wescocenter.org\/wp-content\/uploads\/2025\/07\/advanced-carousel-elementor-widget.png"}