{"id":9995,"date":"2026-01-15T19:46:48","date_gmt":"2026-01-15T16:46:48","guid":{"rendered":"https:\/\/int-teamdc.moomkn.us\/?post_type=tribe_events&#038;p=9995"},"modified":"2026-01-15T19:47:27","modified_gmt":"2026-01-15T16:47:27","slug":"analyzing-digital-threats-using-artificial-intelligence","status":"publish","type":"tribe_events","link":"https:\/\/int-teamdc.moomkn.us\/?tribe_events=analyzing-digital-threats-using-artificial-intelligence","title":{"rendered":"Analyzing digital threats using artificial intelligence"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"template":"","meta":{"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[83],"class_list":["post-9995","tribe_events","type-tribe_events","status-publish","hentry","tribe_events_cat-workshops","cat_workshops"],"_links":{"self":[{"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/tribe_events\/9995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"version-history":[{"count":0,"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=\/wp\/v2\/tribe_events\/9995\/revisions"}],"wp:attachment":[{"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9995"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9995"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/int-teamdc.moomkn.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftribe_events_cat&post=9995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}