{"id":2403,"date":"2021-07-12T09:39:08","date_gmt":"2021-07-12T06:39:08","guid":{"rendered":"https:\/\/www.talentlms.com\/library\/?p=2403"},"modified":"2023-01-19T11:45:54","modified_gmt":"2023-01-19T09:45:54","slug":"information-security-and-governance","status":"publish","type":"post","link":"https:\/\/www.talentlms.com\/library\/information-security-and-governance\/","title":{"rendered":"Information Security Governance"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":2458,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[112],"tags":[27,35],"acf":[],"yoast_head":"\n