<svg width="110" height="18" fill="none" xmlns="http://www.w3.org/2000/svg"><g clip-path="url(#a)" fill="#000"><path d="M79.42 9.335c0-.484.523-.672 1.085-.672.908 0 1.769.282 1.769.282V7.628c-.59-.174-1.193-.241-1.89-.241-1.528 0-2.6.725-2.6 1.908 0 2.299 3.162 1.708 3.162 2.823 0 .551-.495.7-1.218.7-.51 0-1.327-.2-1.916-.406v1.304c.49.195 1.18.378 1.862.378 1.487 0 2.907-.444 2.907-2.043 0-2.218-3.162-1.64-3.162-2.715l.001-.001Zm8.337 1.345c0-1.491.817-2.003 1.783-2.003.643 0 1.32.19 1.774.364V7.696c-.536-.174-1.01-.31-1.802-.31-2.104 0-3.404 1.291-3.404 3.375 0 1.975.938 3.333 3.31 3.333.75 0 1.333-.148 1.976-.364v-1.317c-.723.282-1.279.39-1.775.39-1.044 0-1.862-.484-1.862-2.124v.001ZM42.273 8.596h-.054V7.548h-1.474v6.384h1.581v-3.804c.496-.94 1.099-1.25 2.105-1.25h.16V7.494s-.227-.027-.428-.027c-.858 0-1.448.336-1.89 1.13Zm19.837 0h-.053V7.548h-1.474v6.384h1.58v-3.804c.497-.94 1.1-1.25 2.105-1.25h.16V7.494s-.227-.027-.428-.027c-.857 0-1.447.336-1.889 1.13Zm45.76-1.21c-.682 0-1.46.377-2.171.848l-.187.12c-.335-.712-1.005-.967-1.742-.967-.683 0-1.461.35-2.171.82v-.66h-1.501v6.385h1.594V9.35c.59-.39 1.219-.632 1.676-.632.523 0 .844.282.844 1.183v4.032h1.581v-4.57c.59-.39 1.219-.645 1.676-.645.523 0 .845.282.845 1.183v4.032h1.581V9.524c0-1.237-.738-2.137-2.024-2.137h-.001Zm-12.262 5.431c-1.032 0-1.58-.671-1.58-2.07 0-1.398.548-2.07 1.58-2.07s1.568.673 1.568 2.07c0 1.398-.536 2.07-1.568 2.07Zm0-5.43c-2.184 0-3.216 1.411-3.216 3.36 0 1.95 1.032 3.347 3.216 3.347s3.216-1.399 3.216-3.347-1.045-3.36-3.216-3.36ZM73.664 9.336c0-.484.523-.672 1.086-.672.907 0 1.768.282 1.768.282V7.63c-.59-.174-1.193-.241-1.889-.241-1.527 0-2.6.725-2.6 1.908 0 2.299 3.163 1.708 3.163 2.823 0 .551-.496.7-1.22.7-.508 0-1.325-.2-1.915-.406v1.304c.491.195 1.178.378 1.862.378 1.487 0 2.908-.444 2.908-2.043 0-2.218-3.163-1.64-3.163-2.715v-.001Zm-6.86.7c.094-.887.576-1.452 1.366-1.452.845 0 1.099.673 1.099 1.452h-2.466Zm1.38-2.648c-2.037 0-3.096 1.586-3.096 3.32 0 2.38 1.245 3.387 3.267 3.387.817 0 1.523-.109 2.347-.363v-1.32c-.664.244-1.263.391-1.905.391-1.178 0-1.967-.323-2.008-1.72h4.074c.027-.256.054-.497.054-.94 0-1.345-.71-2.756-2.734-2.756ZM56.3 9.483h-1.254V6.257H56.3c1.019 0 1.527.564 1.527 1.573s-.469 1.653-1.527 1.653Zm-.013-4.556h-2.928v9.004h1.688V10.8h1.24c1.916 0 3.31-1.035 3.31-2.97 0-1.935-1.394-2.903-3.31-2.903ZM49.82 12.09c-.51.47-.992.725-1.5.725-.871 0-1.435-.578-1.435-1.935 0-1.465.697-2.231 1.903-2.231.375 0 .764.094 1.032.202v3.239Zm0-4.557c-.47-.094-.805-.149-1.193-.149-2.184 0-3.377 1.466-3.377 3.603 0 2.137 1.193 3.105 2.6 3.105.697 0 1.54-.323 2.05-.753v.591h1.5V4.926h-1.58v2.608Zm-13.565 5.282c-1.031 0-1.58-.671-1.58-2.07 0-1.398.549-2.07 1.58-2.07 1.032 0 1.569.673 1.569 2.07 0 1.397-.537 2.07-1.569 2.07Zm0-5.43c-2.184 0-3.216 1.41-3.216 3.36s1.032 3.347 3.216 3.347c2.185 0 3.216-1.399 3.216-3.347s-1.044-3.36-3.215-3.36Zm47.372 6.545h1.587v-1.64h-1.587v1.64ZM31.608 4.926 29.82 11.82 28.03 4.926h-1.805l.42 1.477-1.575 5.65-1.712-7.128H21.62l2.441 9.005h1.892l1.462-4.815 1.37 4.815h1.892l2.563-9.005h-1.634.001ZM8.973 0C4.025 0 0 4.037 0 9s4.025 9 8.973 9 8.973-4.038 8.973-9-4.026-9-8.973-9ZM.906 9c0-1.173.25-2.287.698-3.293l3.849 10.575A8.095 8.095 0 0 1 .906 9Zm8.067 8.092a8.052 8.052 0 0 1-2.28-.329l2.42-7.055 2.48 6.814c.017.04.037.076.059.112a8.02 8.02 0 0 1-2.68.458Zm1.111-11.885a16 16 0 0 0 .924-.077c.435-.052.383-.693-.051-.667 0 0-1.307.103-2.15.103-.793 0-2.126-.103-2.126-.103-.435-.026-.485.64-.051.667 0 0 .411.052.846.077L8.733 8.66l-1.766 5.311L4.03 5.206c.486-.026.924-.077.924-.077.434-.052.383-.693-.052-.667 0 0-1.306.103-2.15.103-.151 0-.33-.004-.519-.01A8.049 8.049 0 0 1 14.42 3.033c-.035-.003-.069-.007-.105-.007-.792 0-1.355.693-1.355 1.436 0 .667.384 1.231.792 1.897.307.54.666 1.232.666 2.232 0 .692-.266 1.496-.614 2.615l-.806 2.697-2.915-8.698.002.002Zm5.967-.088a8.077 8.077 0 0 1 .989 3.882 8.09 8.09 0 0 1-4.012 6.994l2.464-7.146c.461-1.155.614-2.078.614-2.9 0-.297-.02-.573-.055-.831v.001Z"/></g><defs><clipPath id="a"><path fill="#fff" d="M0 0h109.895v18H0z"/></clipPath></defs></svg>{"id":317928,"date":"2025-04-17T11:44:13","date_gmt":"2025-04-17T10:44:13","guid":{"rendered":"https:\/\/pley2win.com\/?p=317928"},"modified":"2025-04-17T11:44:14","modified_gmt":"2025-04-17T10:44:14","slug":"industrial-cybersecurity-in-2025-insights-from-a-live-game-show-style-panel-industrial-cyber-3","status":"publish","type":"post","link":"https:\/\/pley2win.com\/?p=317928","title":{"rendered":"Industrial Cybersecurity in 2025: Insights from a Stay Recreation Present-Fashion Panel &#8211; Industrial Cyber"},"content":{"rendered":"<p><img decoding=\"async\" class=\"robot-feature-image\" src=\"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp\" \/><br \/>In a inventive twist on conventional panel discussions, Industrial Cyber hosted a energetic and interesting webinar on the <a href=\"https:\/\/industrialcyber.co\/technology-and-solutions-buyer-guide\/\">state of industrial cybersecurity in 2025<\/a> on Wednesday (<a href=\"https:\/\/us02web.zoom.us\/rec\/share\/9_f1s-Gfdkn9PXJ-qVCoLNmf062TvudQWHKY18GGRLyFIlX9eMYbFw1UfhU_r2N1.dVNknVe3waLlLfLF\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">recording here<\/a>). Framed as a sport present, the occasion featured thought leaders Jay Williams, CEO of <a href=\"https:\/\/industrialcyber.co\/vndrs\/industrial-defender\/\">Industrial Defender<\/a>, Invoice Moore, chief government officer and founder at <a href=\"https:\/\/industrialcyber.co\/vndrs\/xona-systems\/\">Xona Systems<\/a>, and Debbie Lay, principal gross sales engineer at <a href=\"https:\/\/industrialcyber.co\/vndrs\/txone-networks\/\">TXOne Networks<\/a>, who tackled urgent challenges within the area by way of a dynamic, audience-driven format. The interactive session <a href=\"https:\/\/industrialcyber.co\/features\/industrial-cybersecurity-market-outlook-2025-focus-on-quantifying-risk-embracing-ai-building-operational-resilience\/\">drew insights<\/a> from real-world expertise and viewers polls, providing a candid have a look at how industrial cybersecurity is evolving in an more and more advanced digital surroundings.<br \/><strong>Cybersecurity as a Strategic Funding<\/strong><br \/>The panel opened with the query of quantifying cybersecurity investments\u2014an ongoing problem for a lot of OT safety professionals. Moderator Jonathon Gordon, directing analyst at <a href=\"https:\/\/takepoint.co\/\">Takepoint Research<\/a>, famous that cybersecurity is now not a technical back-office challenge however has develop into a board-level concern, particularly as firms try to cut back downtime, keep away from penalties, and safeguard operational continuity.<br \/>Williams opened the dialogue by stressing the crucial position of asset visibility and risk-based prioritization. \u201cPerceive what belongings you may have, what their perform is, and what threat they pose to enterprise continuity,\u201d he suggested. Williams referenced business information displaying that the typical industrial outage prices round $125,000 per hour\u2014an eye-opening determine that highlights the monetary crucial for proactive cybersecurity investments.<br \/>Moore adopted with real-world eventualities underscoring the significance of governance and correct backups. He shared the story of a producing facility that misplaced months of PLC programming after a contractor departed with out correct documentation. \u201cIt\u2019s not nearly ransomware,\u201d Moore mentioned. \u201cIt\u2019s about safeguarding institutional data and sustaining operational continuity.\u201d<br \/>Lay emphasised price avoidance as a robust driver, notably in environments with growing older infrastructure. \u201cWe\u2019re seeing prospects defer multi-million-dollar system upgrades through the use of proactive controls to cut back the danger posed by legacy tools,\u201d she defined. Lay additionally highlighted the longer-term enterprise impacts of cyber incidents, citing the 2023 Clorox ransomware assault, which led to misplaced retail shelf house and ongoing board-level challenges months after the occasion.<br \/>An viewers ballot confirmed the panel\u2019s insights: nearly all of respondents cited downtime and operational continuity as the first metrics for evaluating cybersecurity investments, adopted by regulatory compliance.<br \/><strong>Securing the Provide Chain: A Lengthy Highway Forward<\/strong><br \/>Subsequent up was the problem of provide chain threat and secure-by-design ideas. With legacy techniques and lengthy {hardware} lifecycles widespread in OT, the panel agreed that offer chain threat stays a persistent menace.<br \/>Lay recounted how \u2018new\u2019 tools coming into OT environments can carry outdated software program like Home windows 7, having sat untouched in warehouses for years. \u201cYou&#8217;ll be able to\u2019t simply assume that new means safe,\u201d she cautioned.<br \/>Moore emphasised the necessity for asset house owners to take management of third-party dangers. \u201cYou need to transfer away from 10 totally different distant entry options and standardize on one safe method,\u201d he argued, advocating for zero belief fashions and inside possession of safety postures.<br \/>Williams acknowledged the promise of secure-by-design however was blunt about its limitations: \u201cIt\u2019s unrealistic within the quick time period. Operators should take duty with structured third-party threat administration packages and inside governance.\u201d<br \/>The viewers agreed, rating third-party threat assessments and integrating safety into procurement contracts as the highest provide chain safety priorities.<br \/><strong>IT-OT Integration: From Buzzword to Actuality<\/strong><br \/>Moore chosen \u2018Built-in Cyber Protection\u2019 for the third spherical, sparking a dialogue about breaking down IT-OT silos. \u201cSeven years in the past, IT\/OT convergence gave the impression of advertising communicate. Right this moment, it\u2019s actual,\u201d Moore mentioned, pointing to new roles like OT safety architects that bridge the hole.<br \/>Williams underscored the necessity for open APIs and vendor collaboration. \u201cThere\u2019s no silver bullet in OT safety. It takes a village,\u201d he remarked. He famous Industrial Defender\u2019s integrations with platforms like Splunk and Sentinel as examples of open interoperability in motion.<br \/>Lay agreed however cautioned in opposition to blindly importing IT instruments into OT environments. \u201cIt appears straightforward to only reuse your IT playbooks, however these can create unexpected issues in OT,\u201d she mentioned. As an alternative, she urged groups to guage OT-specific alternate options earlier than deploying.<br \/>A ultimate viewers ballot confirmed that 38% of contributors cited the dearth of a transparent integration roadmap as their largest problem, adopted by interoperability points between IT and OT instruments.<br \/><strong>Remaining Takeaways: Sensible, Proactive, and Progressing<\/strong><br \/>Within the bonus spherical, every panelist summarized the state of the business and shared their outlook.<br \/><strong>Remaining Phrase: From Visibility to Motion<\/strong><br \/>As Gordon wrapped up, he mirrored on how the market has shifted from visibility as an finish purpose to actionable perception and threat mitigation. Whereas industrial cybersecurity has made important strides, a lot of the market stays underserved. \u201cWe\u2019re nonetheless solely reaching about 5% of the addressable market,\u201d he famous. \u201cThat has to vary.\u201d<br \/>This yr\u2019s webinar didn\u2019t simply illuminate the present state of the business, it made the case for fast motion. Whether or not your group is simply starting its journey or seeking to fine-tune a longtime program, the message is obvious: begin with the fundamentals, combine well, and quantify organizational safety investments in phrases that the enterprise understands.<br \/>All rights reserved | <a href=\"https:\/\/www.expertmi.com\/terms-of-use\/\" target=\"_blank\" rel=\"noopener\">Terms and Conditions<\/a><br \/><a href=\"https:\/\/www.expertmi.com\/privacy-policy\/\" target=\"_blank\" rel=\"noopener\">Privacy Policy<\/a> | <a href=\"https:\/\/www.expertmi.com\/cookie-policy\/\" target=\"_blank\" rel=\"noopener\">Cookie Policy<\/a><\/p>\n<p><a href=\"https:\/\/news.google.com\/rss\/articles\/CBMirwFBVV95cUxQdnhXZ2hhR3VtZkt4NE9wS0RwQTVBTWxSTURwMjBtQlVDMXhFTUFKQlluMm1FY1NUbUN5M0I1NUxSSEJNWVU0OWp1aU1ySDdZcXVkMTVsYVc3ZG5DWnp0a3M1cjY3c1Y5TnVBNFZ2MWtEcHFxQ2dicDNiTDJFcWV0UUhKdmg1VHZBYzR3cTFUc2tCN1V1TmVSTWU4VUYyVkZ2WEhjQ09qNlBGUFM1NUlJ?oc=5\">source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a inventive twist on conventional panel discussions, Industrial Cyber hosted a energetic and interesting webinar on the state of industrial cybersecurity in 2025 on Wednesday (recording here). Framed as a sport present, the occasion featured thought leaders Jay Williams, CEO of Industrial Defender, Invoice Moore, chief government officer and founder at Xona Systems, and [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-317928","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Industrial Cybersecurity in 2025: Insights from a Stay Recreation Present-Fashion Panel - Industrial Cyber - Gaming News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pley2win.com\/?p=317928\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial Cybersecurity in 2025: Insights from a Stay Recreation Present-Fashion Panel - Industrial Cyber - Gaming News\" \/>\n<meta property=\"og:description\" content=\"In a inventive twist on conventional panel discussions, Industrial Cyber hosted a energetic and interesting webinar on the state of industrial cybersecurity in 2025 on Wednesday (recording here). Framed as a sport present, the occasion featured thought leaders Jay Williams, CEO of Industrial Defender, Invoice Moore, chief government officer and founder at Xona Systems, and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pley2win.com\/?p=317928\" \/>\n<meta property=\"og:site_name\" content=\"Gaming News\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-17T10:44:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-17T10:44:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp\" \/>\n<meta name=\"author\" content=\"alexiswalsh4378\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"alexiswalsh4378\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Industrial Cybersecurity in 2025: Insights from a Stay Recreation Present-Fashion Panel - Industrial Cyber - Gaming News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pley2win.com\/?p=317928","og_locale":"en_US","og_type":"article","og_title":"Industrial Cybersecurity in 2025: Insights from a Stay Recreation Present-Fashion Panel - Industrial Cyber - Gaming News","og_description":"In a inventive twist on conventional panel discussions, Industrial Cyber hosted a energetic and interesting webinar on the state of industrial cybersecurity in 2025 on Wednesday (recording here). Framed as a sport present, the occasion featured thought leaders Jay Williams, CEO of Industrial Defender, Invoice Moore, chief government officer and founder at Xona Systems, and [&hellip;]","og_url":"https:\/\/pley2win.com\/?p=317928","og_site_name":"Gaming News","article_published_time":"2025-04-17T10:44:13+00:00","article_modified_time":"2025-04-17T10:44:14+00:00","og_image":[{"url":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp","type":"","width":"","height":""}],"author":"alexiswalsh4378","twitter_card":"summary_large_image","twitter_misc":{"Written by":"alexiswalsh4378","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pley2win.com\/?p=317928#article","isPartOf":{"@id":"https:\/\/pley2win.com\/?p=317928"},"author":{"name":"alexiswalsh4378","@id":"https:\/\/pley2win.com\/#\/schema\/person\/66bd3a503af6f4a359422150c24d1775"},"headline":"Industrial Cybersecurity in 2025: Insights from a Stay Recreation Present-Fashion Panel &#8211; Industrial Cyber","datePublished":"2025-04-17T10:44:13+00:00","dateModified":"2025-04-17T10:44:14+00:00","mainEntityOfPage":{"@id":"https:\/\/pley2win.com\/?p=317928"},"wordCount":902,"commentCount":0,"publisher":{"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"image":{"@id":"https:\/\/pley2win.com\/?p=317928#primaryimage"},"thumbnailUrl":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pley2win.com\/?p=317928#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pley2win.com\/?p=317928","url":"https:\/\/pley2win.com\/?p=317928","name":"Industrial Cybersecurity in 2025: Insights from a Stay Recreation Present-Fashion Panel - Industrial Cyber - Gaming News","isPartOf":{"@id":"https:\/\/pley2win.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pley2win.com\/?p=317928#primaryimage"},"image":{"@id":"https:\/\/pley2win.com\/?p=317928#primaryimage"},"thumbnailUrl":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp","datePublished":"2025-04-17T10:44:13+00:00","dateModified":"2025-04-17T10:44:14+00:00","breadcrumb":{"@id":"https:\/\/pley2win.com\/?p=317928#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pley2win.com\/?p=317928"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pley2win.com\/?p=317928#primaryimage","url":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp","contentUrl":"https:\/\/industrialcyber.co\/wp-content\/uploads\/2025\/04\/2025.04.17-Industrial-Cybersecurity-in-2025-Insights-from-a-Live-Game-Show-Style-Panel.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/pley2win.com\/?p=317928#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pley2win.com\/"},{"@type":"ListItem","position":2,"name":"Industrial Cybersecurity in 2025: Insights from a Stay Recreation Present-Fashion Panel &#8211; Industrial Cyber"}]},{"@type":"WebSite","@id":"https:\/\/pley2win.com\/#website","url":"https:\/\/pley2win.com\/","name":"Gaming News","description":"Video Gaming News","publisher":{"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pley2win.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/pley2win.com\/#\/schema\/person\/abf11620d7b4805f5f298fb9c0a56d0d","name":"pley2win","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","url":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","contentUrl":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png","width":700,"height":250,"caption":"pley2win"},"logo":{"@id":"https:\/\/pley2win.com\/wp-content\/uploads\/2022\/03\/Main-logo-.png"},"sameAs":["http:\/\/www.pley2win.com"]},{"@type":"Person","@id":"https:\/\/pley2win.com\/#\/schema\/person\/66bd3a503af6f4a359422150c24d1775","name":"alexiswalsh4378","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/06ef96c8507abfb87ce69ac0e5886906075ede4b7853c3e0dbe1bfac35fc66fb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06ef96c8507abfb87ce69ac0e5886906075ede4b7853c3e0dbe1bfac35fc66fb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/06ef96c8507abfb87ce69ac0e5886906075ede4b7853c3e0dbe1bfac35fc66fb?s=96&d=mm&r=g","caption":"alexiswalsh4378"},"url":"https:\/\/pley2win.com\/?author=31"}]}},"_links":{"self":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/317928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=317928"}],"version-history":[{"count":1,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/317928\/revisions"}],"predecessor-version":[{"id":317929,"href":"https:\/\/pley2win.com\/index.php?rest_route=\/wp\/v2\/posts\/317928\/revisions\/317929"}],"wp:attachment":[{"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=317928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=317928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pley2win.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=317928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}