{"href":"http://player.captivate.fm/services/oembed?url=http%3A%2F%2Fplayer.captivate.fm%2Fepisode%2Fd6e55d76-b81e-4a57-8477-497cda82fe5c","version":"1.0","provider_name":"Captivate.FM","provider_url":"https://www.captivate.fm","width":600,"height":200,"type":"rich","html":"<iframe style=\"width: 100%; height: 200px;\" title=\"Mitigating a Data Breach: Insider Threats - why insider threats must not fall under the radar\" frameborder=\"0\" scrolling=\"no\" allow=\"clipboard-write\" seamless src=\"http://player.captivate.fm/episode/d6e55d76-b81e-4a57-8477-497cda82fe5c\"></iframe>","title":"Mitigating a Data Breach: Insider Threats - why insider threats must not fall under the radar","description":"","thumbnail_width":300,"thumbnail_height":300,"thumbnail_url":"https://artwork.captivate.fm/65b4a2bd-f20a-4487-8e3d-84ebd815462c/W4iAcLRTLMyia6eLw44xSzbp.png"}