{"version":"1.0","provider_name":"Cyber Security Summit South Africa | Cybersec Conference","provider_url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa","author_name":"root","author_url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/author\/root\/","title":"Cyber 100 - Cyber Security Summit South Africa | Cybersec Conference","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4cdXCpuum8\"><a href=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/\">Cyber 100<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/cyber-100\/embed\/#?secret=4cdXCpuum8\" width=\"600\" height=\"338\" title=\"&#8220;Cyber 100&#8221; &#8212; Cyber Security Summit South Africa | Cybersec Conference\" data-secret=\"4cdXCpuum8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Honouring Tech Pioneers Securing the Digital Future Presenting the Cyber100 Methodology 100 Cyber Leaders to Watch The Cyber Security Summit has put together a list of cyber security leaders to watch based on nominations, direct applications, information from our database, interviews, company websites, and other public sources.They are united in their passion and unwavering commitment [&hellip;]","thumbnail_url":"https:\/\/exito-e.com\/cybersecuritysummit\/south-africa\/wp-content\/uploads\/2026\/02\/cyber100-logo-white-69806792a01d7-scaled.webp","thumbnail_width":2560,"thumbnail_height":697}