{"href":"http://player.captivate.fm/services/oembed?url=http%3A%2F%2Fplayer.captivate.fm%2Fepisode%2F9c9a4cb3-3336-4210-9bbf-310eccb82dce","version":"1.0","provider_name":"Captivate.FM","provider_url":"https://www.captivate.fm","width":600,"height":200,"type":"rich","html":"<iframe style=\"width: 100%; height: 200px;\" title=\"Episode 99: Access Control Reimagined \u2014 Why Identity, Devices, and Zero Trust Must Converge\" frameborder=\"0\" scrolling=\"no\" allow=\"clipboard-write\" seamless src=\"http://player.captivate.fm/episode/9c9a4cb3-3336-4210-9bbf-310eccb82dce\"></iframe>","title":"Episode 99: Access Control Reimagined \u2014 Why Identity, Devices, and Zero Trust Must Converge","description":null,"thumbnail_width":300,"thumbnail_height":300,"thumbnail_url":"https://artwork.captivate.fm/624f4d5b-7bec-4266-94c9-1fb0cc735651/pfIVLAZANjsaxNbT54ROYSjK.jpg"}