<svg width="110" height="18" fill="none" xmlns="http://www.w3.org/2000/svg"><g clip-path="url(#a)" fill="#000"><path d="M79.42 9.335c0-.484.523-.672 1.085-.672.908 0 1.769.282 1.769.282V7.628c-.59-.174-1.193-.241-1.89-.241-1.528 0-2.6.725-2.6 1.908 0 2.299 3.162 1.708 3.162 2.823 0 .551-.495.7-1.218.7-.51 0-1.327-.2-1.916-.406v1.304c.49.195 1.18.378 1.862.378 1.487 0 2.907-.444 2.907-2.043 0-2.218-3.162-1.64-3.162-2.715l.001-.001Zm8.337 1.345c0-1.491.817-2.003 1.783-2.003.643 0 1.32.19 1.774.364V7.696c-.536-.174-1.01-.31-1.802-.31-2.104 0-3.404 1.291-3.404 3.375 0 1.975.938 3.333 3.31 3.333.75 0 1.333-.148 1.976-.364v-1.317c-.723.282-1.279.39-1.775.39-1.044 0-1.862-.484-1.862-2.124v.001ZM42.273 8.596h-.054V7.548h-1.474v6.384h1.581v-3.804c.496-.94 1.099-1.25 2.105-1.25h.16V7.494s-.227-.027-.428-.027c-.858 0-1.448.336-1.89 1.13Zm19.837 0h-.053V7.548h-1.474v6.384h1.58v-3.804c.497-.94 1.1-1.25 2.105-1.25h.16V7.494s-.227-.027-.428-.027c-.857 0-1.447.336-1.889 1.13Zm45.76-1.21c-.682 0-1.46.377-2.171.848l-.187.12c-.335-.712-1.005-.967-1.742-.967-.683 0-1.461.35-2.171.82v-.66h-1.501v6.385h1.594V9.35c.59-.39 1.219-.632 1.676-.632.523 0 .844.282.844 1.183v4.032h1.581v-4.57c.59-.39 1.219-.645 1.676-.645.523 0 .845.282.845 1.183v4.032h1.581V9.524c0-1.237-.738-2.137-2.024-2.137h-.001Zm-12.262 5.431c-1.032 0-1.58-.671-1.58-2.07 0-1.398.548-2.07 1.58-2.07s1.568.673 1.568 2.07c0 1.398-.536 2.07-1.568 2.07Zm0-5.43c-2.184 0-3.216 1.411-3.216 3.36 0 1.95 1.032 3.347 3.216 3.347s3.216-1.399 3.216-3.347-1.045-3.36-3.216-3.36ZM73.664 9.336c0-.484.523-.672 1.086-.672.907 0 1.768.282 1.768.282V7.63c-.59-.174-1.193-.241-1.889-.241-1.527 0-2.6.725-2.6 1.908 0 2.299 3.163 1.708 3.163 2.823 0 .551-.496.7-1.22.7-.508 0-1.325-.2-1.915-.406v1.304c.491.195 1.178.378 1.862.378 1.487 0 2.908-.444 2.908-2.043 0-2.218-3.163-1.64-3.163-2.715v-.001Zm-6.86.7c.094-.887.576-1.452 1.366-1.452.845 0 1.099.673 1.099 1.452h-2.466Zm1.38-2.648c-2.037 0-3.096 1.586-3.096 3.32 0 2.38 1.245 3.387 3.267 3.387.817 0 1.523-.109 2.347-.363v-1.32c-.664.244-1.263.391-1.905.391-1.178 0-1.967-.323-2.008-1.72h4.074c.027-.256.054-.497.054-.94 0-1.345-.71-2.756-2.734-2.756ZM56.3 9.483h-1.254V6.257H56.3c1.019 0 1.527.564 1.527 1.573s-.469 1.653-1.527 1.653Zm-.013-4.556h-2.928v9.004h1.688V10.8h1.24c1.916 0 3.31-1.035 3.31-2.97 0-1.935-1.394-2.903-3.31-2.903ZM49.82 12.09c-.51.47-.992.725-1.5.725-.871 0-1.435-.578-1.435-1.935 0-1.465.697-2.231 1.903-2.231.375 0 .764.094 1.032.202v3.239Zm0-4.557c-.47-.094-.805-.149-1.193-.149-2.184 0-3.377 1.466-3.377 3.603 0 2.137 1.193 3.105 2.6 3.105.697 0 1.54-.323 2.05-.753v.591h1.5V4.926h-1.58v2.608Zm-13.565 5.282c-1.031 0-1.58-.671-1.58-2.07 0-1.398.549-2.07 1.58-2.07 1.032 0 1.569.673 1.569 2.07 0 1.397-.537 2.07-1.569 2.07Zm0-5.43c-2.184 0-3.216 1.41-3.216 3.36s1.032 3.347 3.216 3.347c2.185 0 3.216-1.399 3.216-3.347s-1.044-3.36-3.215-3.36Zm47.372 6.545h1.587v-1.64h-1.587v1.64ZM31.608 4.926 29.82 11.82 28.03 4.926h-1.805l.42 1.477-1.575 5.65-1.712-7.128H21.62l2.441 9.005h1.892l1.462-4.815 1.37 4.815h1.892l2.563-9.005h-1.634.001ZM8.973 0C4.025 0 0 4.037 0 9s4.025 9 8.973 9 8.973-4.038 8.973-9-4.026-9-8.973-9ZM.906 9c0-1.173.25-2.287.698-3.293l3.849 10.575A8.095 8.095 0 0 1 .906 9Zm8.067 8.092a8.052 8.052 0 0 1-2.28-.329l2.42-7.055 2.48 6.814c.017.04.037.076.059.112a8.02 8.02 0 0 1-2.68.458Zm1.111-11.885a16 16 0 0 0 .924-.077c.435-.052.383-.693-.051-.667 0 0-1.307.103-2.15.103-.793 0-2.126-.103-2.126-.103-.435-.026-.485.64-.051.667 0 0 .411.052.846.077L8.733 8.66l-1.766 5.311L4.03 5.206c.486-.026.924-.077.924-.077.434-.052.383-.693-.052-.667 0 0-1.306.103-2.15.103-.151 0-.33-.004-.519-.01A8.049 8.049 0 0 1 14.42 3.033c-.035-.003-.069-.007-.105-.007-.792 0-1.355.693-1.355 1.436 0 .667.384 1.231.792 1.897.307.54.666 1.232.666 2.232 0 .692-.266 1.496-.614 2.615l-.806 2.697-2.915-8.698.002.002Zm5.967-.088a8.077 8.077 0 0 1 .989 3.882 8.09 8.09 0 0 1-4.012 6.994l2.464-7.146c.461-1.155.614-2.078.614-2.9 0-.297-.02-.573-.055-.831v.001Z"/></g><defs><clipPath id="a"><path fill="#fff" d="M0 0h109.895v18H0z"/></clipPath></defs></svg>{"id":317926,"date":"2025-04-17T11:38:45","date_gmt":"2025-04-17T10:38:45","guid":{"rendered":"https:\/\/pley2win.com\/?p=317926"},"modified":"2025-04-17T11:38:46","modified_gmt":"2025-04-17T10:38:46","slug":"industrial-cybersecurity-in-2025-insights-from-a-live-game-show-style-panel-industrial-cyber-2","status":"publish","type":"post","link":"https:\/\/pley2win.com\/?p=317926","title":{"rendered":"Industrial Cybersecurity in 2025: Insights from a Reside Recreation Present-Type Panel &#8211; Industrial Cyber"},"content":{"rendered":"<p><img decoding=\"async\" class=\"robot-feature-image\" src=\"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp\" \/><br \/>In a inventive twist on conventional panel discussions, Industrial Cyber hosted a full of life and fascinating webinar on the <a href=\"https:\/\/industrialcyber.co\/technology-and-solutions-buyer-guide\/\">state of industrial cybersecurity in 2025<\/a> on Wednesday (<a href=\"https:\/\/us02web.zoom.us\/rec\/share\/9_f1s-Gfdkn9PXJ-qVCoLNmf062TvudQWHKY18GGRLyFIlX9eMYbFw1UfhU_r2N1.dVNknVe3waLlLfLF\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">recording here<\/a>). Framed as a recreation present, the occasion featured thought leaders Jay Williams, CEO of <a href=\"https:\/\/industrialcyber.co\/vndrs\/industrial-defender\/\">Industrial Defender<\/a>, Invoice Moore, chief govt officer and founder at <a href=\"https:\/\/industrialcyber.co\/vndrs\/xona-systems\/\">Xona Systems<\/a>, and Debbie Lay, principal gross sales engineer at <a href=\"https:\/\/industrialcyber.co\/vndrs\/txone-networks\/\">TXOne Networks<\/a>, who tackled urgent challenges within the area by a dynamic, audience-driven format. The interactive session <a href=\"https:\/\/industrialcyber.co\/features\/industrial-cybersecurity-market-outlook-2025-focus-on-quantifying-risk-embracing-ai-building-operational-resilience\/\">drew insights<\/a> from real-world expertise and viewers polls, providing a candid take a look at how industrial cybersecurity is evolving in an more and more complicated digital setting.<br \/><strong>Cybersecurity as a Strategic Funding<\/strong><br \/>The panel opened with the query of quantifying cybersecurity investments\u2014an ongoing problem for a lot of OT safety professionals. Moderator Jonathon Gordon, directing analyst at <a href=\"https:\/\/takepoint.co\/\">Takepoint Research<\/a>, famous that cybersecurity is now not a technical back-office concern however has develop into a board-level concern, particularly as corporations attempt to scale back downtime, keep away from penalties, and safeguard operational continuity.<br \/>Williams opened the dialogue by stressing the important function of asset visibility and risk-based prioritization. \u201cPerceive what property you might have, what their perform is, and what threat they pose to enterprise continuity,\u201d he suggested. Williams referenced trade knowledge exhibiting that the typical industrial outage prices round $125,000 per hour\u2014an eye-opening determine that highlights the monetary crucial for proactive cybersecurity investments.<br \/>Moore adopted with real-world eventualities underscoring the significance of governance and correct backups. He shared the story of a producing facility that misplaced months of PLC programming after a contractor departed with out correct documentation. \u201cIt\u2019s not nearly ransomware,\u201d Moore mentioned. \u201cIt\u2019s about safeguarding institutional data and sustaining operational continuity.\u201d<br \/>Lay emphasised price avoidance as a strong driver, significantly in environments with getting old infrastructure. \u201cWe\u2019re seeing prospects defer multi-million-dollar system upgrades by utilizing proactive controls to scale back the chance posed by legacy gear,\u201d she defined. Lay additionally highlighted the longer-term enterprise impacts of cyber incidents, citing the 2023 Clorox ransomware assault, which led to misplaced retail shelf house and ongoing board-level challenges months after the occasion.<br \/>An viewers ballot confirmed the panel\u2019s insights: nearly all of respondents cited downtime and operational continuity as the first metrics for evaluating cybersecurity investments, adopted by regulatory compliance.<br \/><strong>Securing the Provide Chain: A Lengthy Highway Forward<\/strong><br \/>Subsequent up was the difficulty of provide chain threat and secure-by-design rules. With legacy methods and lengthy {hardware} lifecycles widespread in OT, the panel agreed that offer chain threat stays a persistent menace.<br \/>Lay recounted how \u2018new\u2019 gear coming into OT environments can carry outdated software program like Home windows 7, having sat untouched in warehouses for years. \u201cYou possibly can\u2019t simply assume that new means safe,\u201d she cautioned.<br \/>Moore emphasised the necessity for asset house owners to take management of third-party dangers. \u201cYou must transfer away from 10 completely different distant entry options and standardize on one safe strategy,\u201d he argued, advocating for zero belief fashions and inside possession of safety postures.<br \/>Williams acknowledged the promise of secure-by-design however was blunt about its limitations: \u201cIt\u2019s unrealistic within the quick time period. Operators should take accountability with structured third-party threat administration packages and inside governance.\u201d<br \/>The viewers agreed, rating third-party threat assessments and integrating safety into procurement contracts as the highest provide chain safety priorities.<br \/><strong>IT-OT Integration: From Buzzword to Actuality<\/strong><br \/>Moore chosen \u2018Built-in Cyber Protection\u2019 for the third spherical, sparking a dialogue about breaking down IT-OT silos. \u201cSeven years in the past, IT\/OT convergence seemed like advertising converse. Right now, it\u2019s actual,\u201d Moore mentioned, pointing to new roles like OT safety architects that bridge the hole.<br \/>Williams underscored the necessity for open APIs and vendor collaboration. \u201cThere\u2019s no silver bullet in OT safety. It takes a village,\u201d he remarked. He famous Industrial Defender\u2019s integrations with platforms like Splunk and Sentinel as examples of open interoperability in motion.<br \/>Lay agreed however cautioned in opposition to blindly importing IT instruments into OT environments. \u201cIt appears to be like straightforward to simply reuse your IT playbooks, however these can create unexpected issues in OT,\u201d she mentioned. As a substitute, she urged groups to guage OT-specific options earlier than deploying.<br \/>A remaining viewers ballot confirmed that 38% of members cited the dearth of a transparent integration roadmap as their greatest problem, adopted by interoperability points between IT and OT instruments.<br \/><strong>Ultimate Takeaways: Sensible, Proactive, and Progressing<\/strong><br \/>Within the bonus spherical, every panelist summarized the state of the trade and shared their outlook.<br \/><strong>Ultimate Phrase: From Visibility to Motion<\/strong><br \/>As Gordon wrapped up, he mirrored on how the market has shifted from visibility as an finish purpose to actionable perception and threat mitigation. Whereas industrial cybersecurity has made important strides, a lot of the market stays underserved. \u201cWe\u2019re nonetheless solely reaching about 5% of the addressable market,\u201d he famous. \u201cThat has to vary.\u201d<br \/>This 12 months\u2019s webinar didn\u2019t simply illuminate the present state of the trade, it made the case for fast motion. Whether or not your group is simply starting its journey or trying to fine-tune a longtime program, the message is obvious: begin with the fundamentals, combine well, and quantify organizational safety investments in phrases that the enterprise understands.<br \/>All rights reserved | <a href=\"https:\/\/www.expertmi.com\/terms-of-use\/\" target=\"_blank\" rel=\"noopener\">Terms and Conditions<\/a><br \/><a href=\"https:\/\/www.expertmi.com\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">Privacy Policy<\/a> | <a href=\"https:\/\/www.expertmi.com\/cookie-policy\/\" target=\"_blank\" rel=\"noopener\">Cookie Policy<\/a><\/p>\n<p><a href=\"https:\/\/news.google.com\/rss\/articles\/CBMirwFBVV95cUxQdnhXZ2hhR3VtZkt4NE9wS0RwQTVBTWxSTURwMjBtQlVDMXhFTUFKQlluMm1FY1NUbUN5M0I1NUxSSEJNWVU0OWp1aU1ySDdZcXVkMTVsYVc3ZG5DWnp0a3M1cjY3c1Y5TnVBNFZ2MWtEcHFxQ2dicDNiTDJFcWV0UUhKdmg1VHZBYzR3cTFUc2tCN1V1TmVSTWU4VUYyVkZ2WEhjQ09qNlBGUFM1NUlJ?oc=5\">source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a inventive twist on conventional panel discussions, Industrial Cyber hosted a full of life and fascinating webinar on the state of industrial cybersecurity in 2025 on Wednesday (recording here). Framed as a recreation present, the occasion featured thought leaders Jay Williams, CEO of Industrial Defender, Invoice Moore, chief govt officer and founder at Xona [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-317926","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industrial Cybersecurity in 2025: Insights from a Reside Recreation Present-Type Panel - Industrial Cyber - Gaming News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pley2win.com\/?p=317926\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Cybersecurity in 2025: Insights from a Reside Recreation Present-Type Panel - Industrial Cyber - Gaming News\" \/>\n<meta property=\"og:description\" content=\"In a inventive twist on conventional panel discussions, Industrial Cyber hosted a full of life and fascinating webinar on the state of industrial cybersecurity in 2025 on Wednesday (recording here). Framed as a recreation present, the occasion featured thought leaders Jay Williams, CEO of Industrial Defender, Invoice Moore, chief govt officer and founder at Xona [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pley2win.com\/?p=317926\" \/>\n<meta property=\"og:site_name\" content=\"Gaming News\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-17T10:38:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-17T10:38:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp\" \/>\n<meta name=\"author\" content=\"alexiswalsh4378\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"alexiswalsh4378\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial Cybersecurity in 2025: Insights from a Reside Recreation Present-Type Panel - Industrial Cyber - Gaming News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pley2win.com\/?p=317926","og_locale":"en_US","og_type":"article","og_title":"Industrial Cybersecurity in 2025: Insights from a Reside Recreation Present-Type Panel - Industrial Cyber - Gaming News","og_description":"In a inventive twist on conventional panel discussions, Industrial Cyber hosted a full of life and fascinating webinar on the state of industrial cybersecurity in 2025 on Wednesday (recording here). Framed as a recreation present, the occasion featured thought leaders Jay Williams, CEO of Industrial Defender, Invoice Moore, chief govt officer and founder at Xona [&hellip;]","og_url":"https:\/\/pley2win.com\/?p=317926","og_site_name":"Gaming News","article_published_time":"2025-04-17T10:38:45+00:00","article_modified_time":"2025-04-17T10:38:46+00:00","og_image":[{"url":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp","type":"","width":"","height":""}],"author":"alexiswalsh4378","twitter_card":"summary_large_image","twitter_misc":{"Written by":"alexiswalsh4378","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pley2win.com\/?p=317926#article","isPartOf":{"@id":"https:\/\/pley2win.com\/?p=317926"},"author":{"name":"alexiswalsh4378","@id":"https:\/\/pley2win.com\/#\/schema\/person\/66bd3a503af6f4a359422150c24d1775"},"headline":"Industrial Cybersecurity in 2025: Insights from a Reside Recreation Present-Type Panel &#8211; Industrial Cyber","datePublished":"2025-04-17T10:38:45+00:00","dateModified":"2025-04-17T10:38:46+00:00","mainEntityOfPage":{"@id":"https:\/\/pley2win.com\/?p=317926"},"wordCount":897,"commentCount":0,"publisher":{"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"image":{"@id":"https:\/\/pley2win.com\/?p=317926#primaryimage"},"thumbnailUrl":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pley2win.com\/?p=317926#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pley2win.com\/?p=317926","url":"https:\/\/pley2win.com\/?p=317926","name":"Industrial Cybersecurity in 2025: Insights from a Reside Recreation Present-Type Panel - Industrial Cyber - Gaming News","isPartOf":{"@id":"https:\/\/pley2win.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pley2win.com\/?p=317926#primaryimage"},"image":{"@id":"https:\/\/pley2win.com\/?p=317926#primaryimage"},"thumbnailUrl":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp","datePublished":"2025-04-17T10:38:45+00:00","dateModified":"2025-04-17T10:38:46+00:00","breadcrumb":{"@id":"https:\/\/pley2win.com\/?p=317926#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pley2win.com\/?p=317926"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pley2win.com\/?p=317926#primaryimage","url":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp","contentUrl":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/pley2win.com\/?p=317926#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pley2win.com\/"},{"@type":"ListItem","position":2,"name":"Industrial Cybersecurity in 2025: Insights from a Reside Recreation Present-Type Panel &#8211; Industrial Cyber"}]},{"@type":"WebSite","@id":"https:\/\/pley2win.com\/#website","url":"https:\/\/pley2win.com\/","name":"Gaming News","description":"Video Gaming News","publisher":{"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pley2win.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d","name":"pley2win","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","url":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","contentUrl":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","width":700,"height":250,"caption":"pley2win"},"logo":{"@id":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png"},"sameAs":["http:\/\/www.pley2win.com"]},{"@type":"Person","@id":"https:\/\/pley2win.com\/#\/schema\/person\/66bd3a503af6f4a359422150c24d1775","name":"alexiswalsh4378","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/06ef96c8507abfb87ce69ac0e5886906075ede4b7853c3e0dbe1bfac35fc66fb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06ef96c8507abfb87ce69ac0e5886906075ede4b7853c3e0dbe1bfac35fc66fb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/06ef96c8507abfb87ce69ac0e5886906075ede4b7853c3e0dbe1bfac35fc66fb?s=96&d=mm&r=g","caption":"alexiswalsh4378"},"url":"https:\/\/pley2win.com\/?author=31"}]}},"_links":{"self":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/317926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=317926"}],"version-history":[{"count":1,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/317926\/revisions"}],"predecessor-version":[{"id":317927,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/317926\/revisions\/317927"}],"wp:attachment":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=317926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=317926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=317926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}