{"id":2378,"date":"2026-02-26T11:12:02","date_gmt":"2026-02-26T17:12:02","guid":{"rendered":"https:\/\/cybersecurity.bellevue.edu\/?p=2378"},"modified":"2026-02-26T11:12:02","modified_gmt":"2026-02-26T17:12:02","slug":"securing-your-privates","status":"publish","type":"post","link":"https:\/\/cybersecurity.bellevue.edu\/index.php\/2026\/02\/26\/securing-your-privates\/","title":{"rendered":"Securing Your Privates"},"content":{"rendered":"\n<p>Bellevue University Assistant Professor Dr. Lisa McKee is a co-host of a new ISACA security and privacy podcast that talks about Real Conversations. Real Consequences. Real Solutions. relating to a variety of topics in security and privacy. The second session is about the Power of Networking, which will be released soon.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"jetpack-video-wrapper\"><iframe loading=\"lazy\" title=\"Secure Your Privates: Where Security &amp; Privacy Get Real\" width=\"1000\" height=\"563\" src=\"https:\/\/www.youtube.com\/embed\/bkg9qF-frm8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Bellevue University Assistant Professor Dr. Lisa McKee is a co-host of a new ISACA security and privacy podcast that talks about Real Conversations. Real Consequences. Real Solutions. relating to a variety of topics in security and privacy. The second session is about the Power of Networking, which will be released soon.<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2378","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/comments?post=2378"}],"version-history":[{"count":4,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2378\/revisions"}],"predecessor-version":[{"id":2382,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/posts\/2378\/revisions\/2382"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/media?parent=2378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/categories?post=2378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bellevue.edu\/index.php\/wp-json\/wp\/v2\/tags?post=2378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}