{"id":3236,"date":"2023-09-26T16:17:26","date_gmt":"2023-09-26T20:17:26","guid":{"rendered":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/?page_id=3236"},"modified":"2023-11-01T15:52:40","modified_gmt":"2023-11-01T19:52:40","slug":"point-of-contact","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/point-of-contact\/","title":{"rendered":"Point of Contact"},"content":{"rendered":"<p><strong><a href=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2012\/09\/DavidLanter.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-2279\" src=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2012\/09\/DavidLanter-201x300.jpg\" alt=\"\" width=\"201\" height=\"300\" srcset=\"https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2012\/09\/DavidLanter-201x300.jpg 201w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2012\/09\/DavidLanter-768x1147.jpg 768w, https:\/\/community.mis.temple.edu\/cybersecurity-center\/files\/2012\/09\/DavidLanter-685x1024.jpg 685w\" sizes=\"auto, (max-width: 201px) 100vw, 201px\" \/><\/a><\/strong><\/p>\n<p><strong>Prof. David Lanter<\/strong> is the Academic Director of the IT Auditing and Cybersecurity (ITACS) Program<br \/>\nEmail: <a href=\"mailto:david.lanter@temple.edu\">david.lanter@temple.edu<\/a><\/p>\n<p><a href=\"https:\/\/community.mis.temple.edu\/dlanter\/\">Profile<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prof. David Lanter is the Academic Director of the IT Auditing and Cybersecurity (ITACS) Program Email: david.lanter@temple.edu Profile<\/p>\n","protected":false},"author":29750,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","jetpack_post_was_ever_published":false,"footnotes":""},"class_list":{"0":"post-3236","1":"page","2":"type-page","3":"status-publish","5":"entry"},"jetpack_sharing_enabled":false,"jetpack_shortlink":"https:\/\/wp.me\/P2CTMC-Qc","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/users\/29750"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/comments?post=3236"}],"version-history":[{"count":12,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3236\/revisions"}],"predecessor-version":[{"id":3791,"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/pages\/3236\/revisions\/3791"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/cybersecurity-center\/wp-json\/wp\/v2\/media?parent=3236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}