{"version":"1.0","provider_name":"Industrial Security Conference Copenhagen","provider_url":"https:\/\/insightevents.dk\/isc-cph","author_name":"Insight Events Denmark","author_url":"https:\/\/insightevents.dk\/isc-cph\/author\/terje\/","title":"Testing and Validation - Industrial Security Conference Copenhagen","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"GLQqd1AhCg\"><a href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/\">Testing and Validation<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/2-4-testing-and-validation\/embed\/#?secret=GLQqd1AhCg\" width=\"600\" height=\"338\" title=\"&#8220;Testing and Validation&#8221; &#8212; Industrial Security Conference Copenhagen\" data-secret=\"GLQqd1AhCg\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Key takeaways: Methodologies for testing firewall configurations without operational disruption, using packet capture tools to verify firewall behavior, protocol compliance testing, introduction to digital twins for modeling and simulation and cimulating common attack vectors to verify protection."}