{"id":27,"date":"2017-11-16T04:00:14","date_gmt":"2017-11-16T11:00:14","guid":{"rendered":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/?page_id=27"},"modified":"2017-11-16T04:06:23","modified_gmt":"2017-11-16T11:06:23","slug":"submit","status":"publish","type":"page","link":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/submit\/","title":{"rendered":"Submission Form"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLSdaZ3GwcyZJqVOa_HYPw_Jxv-FyIsHcd973LMlehZqTxnvHdA\/viewform?embedded=true\" width=\"960\" height=\"1900\" frameborder=\"0\" marginheight=\"0\" marginwidth=\"0\">Loading&#8230;<\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Loading&#8230;<\/p>\n","protected":false},"author":5422,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width.php","meta":{"footnotes":""},"class_list":["post-27","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/27","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/users\/5422"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/comments?post=27"}],"version-history":[{"count":4,"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/27\/revisions"}],"predecessor-version":[{"id":31,"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/pages\/27\/revisions\/31"}],"wp:attachment":[{"href":"https:\/\/blogs.ubc.ca\/cybersecuritysummit\/wp-json\/wp\/v2\/media?parent=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}