<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>ISIC Japan - International Security Industry Council</provider_name><provider_url>https://isic-japan.org/jp</provider_url><author_name>admin</author_name><author_url>https://isic-japan.org/jp/author/admin/</author_url><title>The Industrial Security Dilemma - ISIC Japan - International Security Industry Council</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="BXUjTmdXt1"&gt;&lt;a href="https://isic-japan.org/jp/event/the-industrial-security-dilemma/"&gt;&#x7523;&#x696D;&#x754C;&#x304C;&#x62B1;&#x3048;&#x308B;&#x30BB;&#x30AD;&#x30E5;&#x30EA;&#x30C6;&#x30A3;&#x306E;&#x30B8;&#x30EC;&#x30F3;&#x30DE;&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://isic-japan.org/jp/event/the-industrial-security-dilemma/embed/#?secret=BXUjTmdXt1" width="600" height="338" title="&#x201C;The Industrial Security Dilemma&#x201D; &#x2014; ISIC Japan - International Security Industry Council" data-secret="BXUjTmdXt1" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;</html><thumbnail_url>https://isic-japan.org/wp-content/uploads/2021/07/access-banking-biometric-business-business-woman-code-concept-connection-credit-card-criminal-cyber_t20_nLErmK.jpg</thumbnail_url><thumbnail_width>1920</thumbnail_width><thumbnail_height>1178</thumbnail_height><description>Protection of classified/sensitive information is the greatest challenge facing increased cooperation with international partners on defense equipment and technology interests. Concerns range from protection of sensitive technologies on specific programs to broader sharing of classified/sensitive information affecting all areas of national security. Many countries have successfully worked together for years with information security procedures that have been standardized, primarily on NATO coordination. As Japan begins to work more closely with these countries the differences in its procedures and those of potential partner countries have come into sharper focus. Building a foundation of regulations and procedures needed to implement the Secrets Protection Act adopted by Japan in 2013 remains a work [&hellip;]</description></oembed>
