1 line
No EOL
262 KiB
Text
1 line
No EOL
262 KiB
Text
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" as="image" href="/_next/static/media/CyberGeek-logo.8e9bbd2b.svg" fetchPriority="high"/><link rel="stylesheet" href="/_next/static/css/ef46db3751d8e999.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/0759e90f4fecfde7.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-182b67d00f496f9d.js"/><script src="/_next/static/chunks/fd9d1056-ad09c71b7719f2fb.js" async=""></script><script src="/_next/static/chunks/23-260042deb5df7a88.js" async=""></script><script src="/_next/static/chunks/main-app-6de3c3100b91a0a9.js" async=""></script><script src="/_next/static/chunks/30-49b1c1429d73281d.js" async=""></script><script src="/_next/static/chunks/317-0f87feacc1712b2f.js" async=""></script><script src="/_next/static/chunks/223-bc9ed43510898bbb.js" async=""></script><script src="/_next/static/chunks/app/layout-9fc24027bc047aa2.js" async=""></script><script src="/_next/static/chunks/972-6e520d137ef194fb.js" async=""></script><script src="/_next/static/chunks/app/page-cc829e051925e906.js" async=""></script><script src="/_next/static/chunks/app/template-d264bab5e3061841.js" async=""></script><script src="/_next/static/chunks/e37a0b60-b74be3d42787b18d.js" async=""></script><script src="/_next/static/chunks/904-dbddf7494c3e6975.js" async=""></script><script src="/_next/static/chunks/549-c87c1c3bbacc319f.js" async=""></script><script src="/_next/static/chunks/app/learn/%5Bslug%5D/page-5b91cdc45a95ebbe.js" async=""></script><link rel="preload" href="/assets/javascript/uswds-init.min.js" as="script"/><link rel="preload" href="/assets/javascript/uswds.min.js" as="script"/><title>CMS CyberWorks | CMS Information Security & Privacy Group</title><meta name="description" content="An annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape"/><link rel="canonical" href="https://security.cms.gov/learn/cms-cyberworks"/><meta name="google-site-verification" content="GMZIwBDJgz_o_JYUB2GpJazkrs7P85BaWDsoCjxF32M"/><meta property="og:title" content="CMS CyberWorks | CMS Information Security & Privacy Group"/><meta property="og:description" content="An annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape"/><meta property="og:url" content="https://security.cms.gov/learn/cms-cyberworks"/><meta property="og:image:type" content="image/jpeg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image" content="https://security.cms.gov/learn/cms-cyberworks/opengraph-image.jpg?d21225707c5ed280"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:title" content="CMS CyberWorks | CMS Information Security & Privacy Group"/><meta name="twitter:description" content="An annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape"/><meta name="twitter:image:type" content="image/jpeg"/><meta name="twitter:image:width" content="1200"/><meta name="twitter:image:height" content="630"/><meta name="twitter:image" content="https://security.cms.gov/learn/cms-cyberworks/opengraph-image.jpg?d21225707c5ed280"/><link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="48x48"/><script>(self.__next_s=self.__next_s||[]).push(["/assets/javascript/uswds-init.min.js",{}])</script><script src="/_next/static/chunks/polyfills-78c92fac7aa8fdd8.js" noModule=""></script></head><body><a class="usa-skipnav" href="#main">Skip to main content</a><section class="usa-banner" aria-label="Official website of the United States government"><div class="usa-accordion"><header class="usa-banner__header"><div class="usa-banner__inner"><div class="grid-col-auto"><img aria-hidden="true" alt="" loading="lazy" width="16" height="11" decoding="async" data-nimg="1" class="usa-banner__header-flag" style="color:transparent" srcSet="/_next/image?url=%2Fassets%2Fimg%2Fus_flag_small.png&w=16&q=75 1x, /_next/image?url=%2Fassets%2Fimg%2Fus_flag_small.png&w=32&q=75 2x" src="/_next/image?url=%2Fassets%2Fimg%2Fus_flag_small.png&w=32&q=75"/></div><div class="grid-col-fill tablet:grid-col-auto" aria-hidden="true"><p class="usa-banner__header-text">An official website of the United States government</p><p class="usa-banner__header-action">Here's how you know</p></div><button type="button" class="usa-accordion__button usa-banner__button" aria-expanded="false" aria-controls="gov-banner-default-default"><span class="usa-banner__button-text">Here's how you know</span></button></div></header><div class="usa-banner__content usa-accordion__content" id="gov-banner-default-default" hidden=""><div class="grid-row grid-gap-lg"><div class="usa-banner__guidance tablet:grid-col-6"><img role="img" alt="" aria-hidden="true" loading="lazy" width="40" height="40" decoding="async" data-nimg="1" class="usa-banner__icon usa-media-block__img" style="color:transparent" src="/_next/static/media/icon-dot-gov.3e9cb1b5.svg"/><div class="usa-media-block__body"><p><strong>Official websites use .gov</strong><br/>A <strong>.gov</strong> website belongs to an official government organization in the United States.</p></div></div><div class="usa-banner__guidance tablet:grid-col-6"><img role="img" alt="" aria-hidden="true" loading="lazy" width="40" height="40" decoding="async" data-nimg="1" class="usa-banner__icon usa-media-block__img" style="color:transparent" src="/_next/static/media/icon-https.e7f1a222.svg"/><div class="usa-media-block__body"><p><strong>Secure .gov websites use HTTPS</strong><br/>A <strong>lock</strong> (<span class="icon-lock"><svg xmlns="http://www.w3.org/2000/svg" width="52" height="64" viewBox="0 0 52 64" class="usa-banner__lock-image" role="img" aria-labelledby="banner-lock-description-default" focusable="false"><title id="banner-lock-title-default">Lock</title><desc id="banner-lock-description-default">Locked padlock icon</desc><path fill="#000000" fill-rule="evenodd" d="M26 0c10.493 0 19 8.507 19 19v9h3a4 4 0 0 1 4 4v28a4 4 0 0 1-4 4H4a4 4 0 0 1-4-4V32a4 4 0 0 1 4-4h3v-9C7 8.507 15.507 0 26 0zm0 8c-5.979 0-10.843 4.77-10.996 10.712L15 19v9h22v-9c0-6.075-4.925-11-11-11z"></path></svg></span>) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.</p></div></div></div></div></div></section><div class="usa-overlay"></div><header class="usa-header usa-header--extended"><div class="bg-primary-dark"><div class="usa-navbar"><div class="usa-logo padding-y-4 padding-right-3" id="CyberGeek-logo"><a title="CMS CyberGeek Home" href="/"><img alt="CyberGeek logo" fetchPriority="high" width="298" height="35" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/CyberGeek-logo.8e9bbd2b.svg"/></a></div><button aria-label="Open menu" type="button" class="usa-menu-btn" data-cy="menu-button">Menu</button></div></div><nav aria-label="Primary navigation" class="usa-nav padding-0 desktop:width-auto bg-white grid-container float-none"><div class="usa-nav__inner"><button type="button" class="usa-nav__close margin-0"><img alt="Close" loading="lazy" width="24" height="24" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/close.1fafc2aa.svg"/></button><ul class="usa-nav__primary usa-accordion"><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="roles"><span>Roles</span></button><ul id="roles" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Roles</span></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/information-system-security-officer-isso">Information System Security Officer (ISSO)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-information-system-security-officer-isso-handbook"><span>ISSO Handbook</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos"><span>Getting started (for new ISSOs)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/isso-mentorship-program"><span>ISSO Mentorship Program</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-information-system-security-officer-isso-handbook#training"><span>ISSO Training</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/data-guardian">Data Guardian</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/data-guardian-handbook"><span>Data Guardian Handbook</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/cyber-risk-advisor-cra">Cyber Risk Advisor (CRA)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-security-and-privacy-handbooks"><span>CMS Security and Privacy Handbooks</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-security-and-privacy-handbooks#risk-management-handbook-rmh-chapters"><span>Risk Management Handbook (RMH)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/business-system-owner">Business / System Owner (BO/SO)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cybersecurity-risk-assessment-program-csrap"><span>Cybersecurity and Risk Assessment Program (CSRAP)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-information-exchange-agreement-iea"><span>Information Exchange Agreement (IEA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-computer-matching-agreement-cma"><span>Computer Matching Agreement (CMA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/isso-service"><span>ISSO As A Service</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="compliance-authorization"><span>Compliance & Authorization</span></button><ul id="compliance-authorization" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Compliance & Authorization</span></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/learn/authorization-operate-ato">Authorization to Operate (ATO)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/authorization-operate-ato"><span>About ATO at CMS</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/authorization-operate-ato#types-of-authorizations"><span>Types of authorizations</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/authorization-operate-ato#ato-stakeholders"><span>ATO stakeholders</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/authorization-operate-ato#related-documents-and-resources"><span>ATO tools and resources</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-technical-reference-architecture-tra"><span>CMS Technical Reference Architecture (TRA)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/learn/ongoing-authorization-oa">Ongoing Authorization (OA)</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/ongoing-authorization-oa"><span>About OA at CMS</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/ongoing-authorization-oa#is-my-system-eligible-for-oa"><span>OA eligibility requirements</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/continuous-diagnostics-and-mitigation-cdm"><span>Continuous Diagnostics and Mitigation (CDM)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Assessments & Audits</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/penetration-testing-pentesting"><span>Penetration Testing</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cybersecurity-risk-assessment-program-csrap"><span>Cybersecurity Risk Assessment Program (CSRAP)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/privacy-impact-assessment-pia"><span>Privacy Impact Assessment (PIA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/security-impact-analysis-sia"><span>Security Impact Analysis (SIA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/system-audits"><span>System Audits</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="policy-guidance"><span>Policy & Guidance</span></button><ul id="policy-guidance" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Policy & Guidance</span></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/cms-policies-and-guidance">CMS Policies and Guidance</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-acceptable-risk-safeguards-ars"><span>CMS Acceptable Risk Safeguards (ARS)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-information-systems-security-privacy-policy-is2p2"><span>CMS Information Security and Privacy Policy (IS2P2)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-security-and-privacy-handbooks"><span>CMS Security and Privacy Handbooks</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="https://security.cms.gov/learn/cms-risk-management-framework-rmf"><span>CMS Risk Management Framework (RMF)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/email-encryption-requirements-cms"><span>CMS Email Encryption</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/federal-policies-and-guidance">Federal Policies and Guidance</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/national-institute-standards-and-technology-nist"><span>National Institute of Standards and Technology (NIST)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/federal-information-security-modernization-act-fisma"><span>Federal Information Security Modernization Act (FISMA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/fedramp"><span>Federal Risk and Authorization Management Program (FedRAMP)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/zero-trust"><span>Zero Trust</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="system-security"><span>System Security</span></button><ul id="system-security" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">System Security</span></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/application-security">Application Security</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/threat-modeling"><span>Threat Modeling</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/zero-trust"><span>Zero Trust</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-cloud-services"><span>CMS Cloud Services</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/software-bill-materials-sbom"><span>Software Bill of Materials (SBOM)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/security-operations">Security Operations</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/risk-management-handbook-chapter-8-incident-response-ir"><span>Incident Response</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-cybersecurity-integration-center-ccic"><span>CMS Cybersecurity Integration Center (CCIC)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/penetration-testing-pentesting"><span>Penetration Testing</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header"><a href="/ispg/risk-management-and-reporting">Risk Management and Reporting</a></h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/continuous-diagnostics-and-mitigation-cdm"><span>Continuous Diagnostics and Mitigation (CDM)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cyber-risk-reports"><span>Cyber Risk Reports</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/plan-action-and-milestones-poam"><span>Plan of Action and Milestones (POA&M)</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="privacy"><span>Privacy</span></button><ul id="privacy" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Privacy</span></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Agreements</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-computer-matching-agreement-cma"><span>Computer Matching Agreement (CMA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-information-exchange-agreement-iea"><span>Information Exchange Agreement (IEA)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Privacy Activities</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/breach-response"><span>Breach Response</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/privacy-impact-assessment-pia"><span>Privacy Impact Assessment (PIA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/system-records-notice-sorn"><span>System of Records Notice (SORN)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Privacy Resources</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/ispg/privacy"><span>Privacy at CMS</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-breach-response-handbook"><span>CMS Breach Response Handbook</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/health-insurance-portability-and-accountability-act-1996-hipaa"><span>Health Insurance Portability and Accessibility Act (HIPAA)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/policy-guidance/cms-privacy-impact-assessment-pia-handbook"><span>CMS Privacy Impact Assessment (PIA) Handbook</span></a></li></ul></section></div></li></ul></li><li class="usa-nav__primary-item"><button type="button" class="usa-accordion__button usa-nav__link font-family-serif text-medium tablet:text-no-wrap desktop:text-primary-vivid" aria-expanded="false" aria-controls="tools-services"><span>Tools & Services</span></button><ul id="tools-services" class="usa-nav__submenu usa-megamenu bg-white" hidden=""><li class="grid-row grid-gap-3 padding-bottom-6"><div class="usa-col text-center desktop:text-right text-normal position-relative nav-label"><span class="display-block font-heading-xl padding-top-2">Tools & Services</span></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Reporting & Compliance</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="https://security.cms.gov/learn/isso-service"><span>ISSO As A Service</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-fisma-continuous-tracking-system-cfacts"><span>CFACTS</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cyber-risk-reports"><span>Cyber Risk Reports and Dashboards</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/continuous-diagnostics-and-mitigation-cdm"><span>Continuous Diagnostics and Mitigation (CDM)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">System Security</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/threat-modeling"><span>Threat Modeling</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-cloud-services"><span>CMS Cloud Services</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cms-cybersecurity-integration-center-ccic"><span>CMS Cybersecurity Integration Center (CCIC)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="https://security.cms.gov/learn/cms-security-data-lake-sdl"><span>CMS Security Data Lake (SDL)</span></a></li></ul></section></div><div class="usa-col"><section><h3 class="usa-col__list-header list-header-margin">Tests & Assessments</h3><ul class="usa-nav__submenu-list"><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/cybersecurity-risk-assessment-program-csrap"><span>Cybersecurity Risk Assessment Program (CSRAP)</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/penetration-testing-pentesting"><span>Penetration Testing</span></a></li><li class="usa-nav__submenu-item font-sans-2xs"><a class="padding-x-0" href="/learn/privacy-impact-assessment-pia"><span>Privacy Impact Assessment (PIA)</span></a></li></ul></section></div></li></ul></li></ul><div class="usa-nav__secondary padding-left-2"><section aria-label="Header search box"><form class="usa-search usa-search--small" role="search" action="/search"><label class="usa-sr-only" for="header-search-box">Search</label><input class="usa-input search__input" id="header-search-box" type="search" name="ispg[query]"/><button aria-label="header search box button" class="usa-button" id="header-search-box-btn" type="submit"><svg aria-describedby="searchIcon" class="usa-icon" aria-hidden="true" focusable="false" role="img"><title id="searchIcon">Search</title><use href="/assets/img/sprite.svg#search"></use></svg></button></form></section></div></div></nav></header><main id="main"><div id="template"><!--$--><!--/$--><section class="hero hero--theme-explainer undefined"><div class="maxw-widescreen margin-x-auto padding-x-2 desktop:padding-x-0 padding-top-4 padding-bottom-6 desktop:padding-y-7"><div class="tablet:grid-container position-relative "><div class="hero__row grid-row grid-gap"><div class="tablet:grid-col-5 widescreen:position-relative"></div><div class="hero__column tablet:grid-col-7 flow padding-bottom-2"><h1 class="hero__heading margin-0 line-height-sans-3 desktop:line-height-sans-2">CMS CyberWorks</h1><p class="hero__description">An annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape</p><div class="hero__meta radius-lg padding-x-2 padding-y-1 bg-white font-sans-2xs line-height-sans-5 display-inline-block text-primary-darker">Contact: <span class="text-bold">Training and Awareness Team</span><span class="hidden-mobile"> | </span><span class="break-mobile"><a href="mailto:CMSISPGTrainers@cms.hhs.gov">CMSISPGTrainers@cms.hhs.gov</a></span></div></div><div class="tablet:position-absolute tablet:top-0"><div class="[ flow ] bg-primary-light radius-lg padding-2 text-base-darkest maxw-mobile"><div class="display-flex flex-align-center font-sans-lg margin-bottom-2 text-italic desktop:text-no-wrap"><img alt="slack logo" loading="lazy" width="21" height="21" decoding="async" data-nimg="1" class="display-inline margin-right-1" style="color:transparent" src="/_next/static/media/slackLogo.f5836093.svg"/>CMS Slack Channel</div><ul class="add-list-reset"><li class="line-height-sans-5 margin-top-0">#CyberWorks2024</li></ul></div></div></div></div></div></section><div class="grid-container"><div class="grid-row grid-gap margin-top-5"><div class="tablet:grid-col-4"><nav class="table-of-contents overflow-y-auto overflow-x-hidden position-sticky top-3 padding-1 radius-lg shadow-2 display-none tablet:display-block" aria-label="Table of contents"><div class="text-uppercase text-bold border-bottom border-base-lighter padding-bottom-1">Table of Contents</div><p class="text-italic text-base font-sans-xs">No table of content entries to display.</p></nav></div><div class="tablet:grid-col-8 content"><section><div class="text-block text-block--theme-explainer"><h2>What is CyberWorks?</h2><p>CMS CyberWorks is an annual cybersecurity event that brings together industry experts, thought leaders, and CMS staff to explore the latest trends and best practices in the ever-evolving field of cybersecurity. With a focus on safeguarding digital privacy, managing cyber risks, and promoting secure online behavior, CyberWorks is designed to engage CMS privacy and cyber professionals across the enterprise.<br><br>Attendees can expect engaging sessions covering important topics such as privacy protection in the age of data breaches, advanced risk management strategies to combat cyber threats, innovative approaches to password management, and the importance of safe browsing habits in today's interconnected digital landscape.<br><br>Whether you're a seasoned cybersecurity professional or just looking to expand your knowledge and awareness in your daily work, CyberWorks will equip you to stay ahead of cyber adversaries and protect your organization's digital assets.<br><br>You can participate in CMS CyberWorks every October during National Cybersecurity Awareness Month.</p><h2>CyberWorks 2024 recordings</h2><p dir="ltr">CyberWorks 2024 was a great success. Thank you to everyone who contributed to and participated in the event!</p><p dir="ltr"><a href="https://cmscyberworks.fbcevent.com/agenda">Recordings of the sessions are available here</a>.</p><p dir="ltr">If you attended, we'd love to hear what you thought about CyberWorks 2024.</p><p dir="ltr"><a href="https://forms.office.com/g/iYxVHTDwpg">Please give your feedback here</a>.</p></div></section></div></div></div><div class="cg-cards grid-container"><h2 class="cg-cards__heading" id="related-documents-and-resources">Related documents and resources</h2><ul aria-label="cards" class="usa-card-group"><li class="usa-card grid-col-12 tablet:grid-col-4"><div class="usa-card__container "><div class="usa-card__header"><h3 class="margin-top-1 line-height-sans-2 text-bold text-base-darkest"><a class="usa-card__link text-no-underline" href="/posts/cyber360">Cyber360: An online event series to help you stay cyber secure</a></h3></div><div class="usa-card__body font-sans-2xs line-height-sans-4 text-base-darkest"><p> From April - October, a series of events is open to everyone at CMS to improve digital safety at work and beyond</p></div></div></li><li class="usa-card grid-col-12 tablet:grid-col-4"><div class="usa-card__container "><div class="usa-card__header"><h3 class="margin-top-1 line-height-sans-2 text-bold text-base-darkest"><a class="usa-card__link text-no-underline" href="/posts/cber360-august-keeping-your-online-hobbies-safe-guide-cybersecurity">Cyber360 August- Keeping your online hobbies cyber secure</a></h3></div><div class="usa-card__body font-sans-2xs line-height-sans-4 text-base-darkest"><p>Hobbies are a great way to relax and unwind. Here’s how to keep your favorite pastimes safe from cyber threats.</p></div></div></li><li class="usa-card grid-col-12 tablet:grid-col-4"><div class="usa-card__container "><div class="usa-card__header"><h3 class="margin-top-1 line-height-sans-2 text-bold text-base-darkest"><a class="usa-card__link text-no-underline" href="/posts/cyber360-september">Cyber360 September: Cybersecurity and you</a></h3></div><div class="usa-card__body font-sans-2xs line-height-sans-4 text-base-darkest"><p>Learn about the personal impact of cybersecurity attacks and what steps you can take to safeguard your digital life</p></div></div></li></ul></div></div></main><footer class="usa-footer usa-footer--slim"><div class="grid-container"><div class="grid-row flex-align-end"><div class="grid-col"><div class="usa-footer__return-to-top"><a class="font-sans-xs" href="#">Return to top</a></div></div><div class="grid-col padding-bottom-2 padding-top-4 display-flex flex-justify-end"><a class="usa-button" href="/feedback">Give feedback</a></div></div></div><div class="usa-footer__primary-section"><div class="usa-footer__primary-container grid-row"><div class="tablet:grid-col-3"><a class="usa-footer__primary-link" href="/"><img alt="CyberGeek logo" loading="lazy" width="142" height="26" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/CyberGeek-logo.8e9bbd2b.svg"/></a><p class="usa-footer__logo-heading display-none tablet-lg:display-block">The official website of the CMS Information Security and Privacy Group (ISPG)</p></div><div class="tablet:grid-col-12 tablet-lg:grid-col-9"><nav class="usa-footer__nav" aria-label="Footer navigation,"><ul class="grid-row grid-gap"><li class=" tablet:grid-col-3 desktop:grid-col-auto usa-footer__primary-content "><a class="usa-footer__primary-link" href="/learn/about-ispg-cybergeek">What is CyberGeek?</a></li><li class=" tablet:grid-col-3 desktop:grid-col-auto usa-footer__primary-content "><a class="usa-footer__primary-link" href="https://www.cms.gov/privacy">Privacy policy</a></li><li class=" tablet:grid-col-3 desktop:grid-col-auto usa-footer__primary-content "><a class="usa-footer__primary-link" href="https://www.cms.gov/about-cms/information-systems/privacy/vulnerability-disclosure-policy">CMS Vulnerability Disclosure Policy</a></li><li class=" tablet:grid-col-3 desktop:grid-col-auto usa-footer__primary-content "><a class="usa-footer__primary-link" href="https://www.cms.gov/About-CMS/Agency-Information/Aboutwebsite/Policiesforaccessibility">Accessibility</a></li></ul></nav></div></div></div><div class="usa-footer__secondary-section"><div class="grid-container"><div class="usa-footer__logo grid-row grid-gap-2"><div class="mobile-lg:grid-col-3"><a href="https://www.cms.gov/"><img alt="CMS homepage" loading="lazy" width="124" height="29" decoding="async" data-nimg="1" style="color:transparent" src="/_next/static/media/cmsLogo.10a64ce4.svg"/></a></div><div class="mobile-lg:grid-col-7"><p class="font-sans-3xs line-height-sans-3">A federal government website managed and paid for by the U.S. Centers for Medicare & Medicaid Services.</p><address class="font-sans-3xs line-height-sans-3">7500 Security Boulevard, Baltimore, MD 21244</address></div></div></div></div></footer><script>(self.__next_s=self.__next_s||[]).push(["/assets/javascript/uswds.min.js",{}])</script><script src="/_next/static/chunks/webpack-182b67d00f496f9d.js" async=""></script><script>(self.__next_f=self.__next_f||[]).push([0]);self.__next_f.push([2,null])</script><script>self.__next_f.push([1,"1:HL[\"/_next/static/css/ef46db3751d8e999.css\",\"style\"]\n2:HL[\"/_next/static/css/0759e90f4fecfde7.css\",\"style\"]\n"])</script><script>self.__next_f.push([1,"3:I[5751,[],\"\"]\n6:I[9275,[],\"\"]\n8:I[1343,[],\"\"]\nb:I[6130,[],\"\"]\n7:[\"slug\",\"cms-cyberworks\",\"d\"]\nc:[]\n0:[\"$\",\"$L3\",null,{\"buildId\":\"m9SaS4P6zugJbBHpXSk5Y\",\"assetPrefix\":\"\",\"urlParts\":[\"\",\"learn\",\"cms-cyberworks\"],\"initialTree\":[\"\",{\"children\":[\"learn\",{\"children\":[[\"slug\",\"cms-cyberworks\",\"d\"],{\"children\":[\"__PAGE__\",{}]}]}]},\"$undefined\",\"$undefined\",true],\"initialSeedData\":[\"\",{\"children\":[\"learn\",{\"children\":[[\"slug\",\"cms-cyberworks\",\"d\"],{\"children\":[\"__PAGE__\",{},[[\"$L4\",\"$L5\",null],null],null]},[null,[\"$\",\"$L6\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"learn\",\"children\",\"$7\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L8\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]],null]},[null,[\"$\",\"$L6\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\",\"learn\",\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L8\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"notFoundStyles\":\"$undefined\"}]],null]},[[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/ef46db3751d8e999.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/0759e90f4fecfde7.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\"}]],\"$L9\"],null],null],\"couldBeIntercepted\":false,\"initialHead\":[null,\"$La\"],\"globalErrorComponent\":\"$b\",\"missingSlots\":\"$Wc\"}]\n"])</script><script>self.__next_f.push([1,"d:I[4080,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"\"]\ne:I[8173,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"972\",\"static/chunks/972-6e520d137ef194fb.js\",\"931\",\"static/chunks/app/page-cc829e051925e906.js\"],\"Image\"]\nf:I[7529,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"default\"]\n11:I[231,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"972\",\"static/chunks/972-6e520d137ef194fb.js\",\"931\",\"static/chunks/app/page-cc829e051925e906.js\"],\"\"]\n12:I[7303,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"default\"]\n13:I[8521,[\"489\",\"static/chunks/app/template-d264bab5e3061841.js\"],\"default\"]\n14:I[5922,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"972\",\"static/chunks/972-6e520d137ef194fb.js\",\"931\",\"static/chunks/app/page-cc829e051925e906.js\"],\"default\"]\n15:I[7182,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"default\"]\n16:I[4180,[\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"223\",\"static/chunks/223-bc9ed43510898bbb.js\",\"185\",\"static/chunks/app/layout-9fc24027bc047aa2.js\"],\"TealiumTagManager\"]\n10:Tdced,"])</script><script>self.__next_f.push([1,"{\"id\":\"mega-menu\",\"linkset\":{\"elements\":[{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Roles\",\"hierarchy\":[\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/information-system-security-officer-isso\",\"attributes\":{\"title\":\"Information System Security Officer (ISSO)\",\"hierarchy\":[\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook\",\"attributes\":{\"title\":\"ISSO Handbook\",\"hierarchy\":[\"0\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\",\"attributes\":{\"title\":\"Getting started (for new ISSOs)\",\"hierarchy\":[\"0\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-mentorship-program\",\"attributes\":{\"title\":\"ISSO Mentorship Program\",\"hierarchy\":[\"0\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\",\"attributes\":{\"title\":\"ISSO Training\",\"hierarchy\":[\"0\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/data-guardian\",\"attributes\":{\"title\":\"Data Guardian\",\"hierarchy\":[\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/data-guardian-handbook\",\"attributes\":{\"title\":\"Data Guardian Handbook\",\"hierarchy\":[\"0\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cyber-risk-advisor-cra\",\"attributes\":{\"title\":\"Cyber Risk Advisor (CRA)\",\"hierarchy\":[\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"0\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks#risk-management-handbook-rmh-chapters\",\"attributes\":{\"title\":\"Risk Management Handbook (RMH)\",\"hierarchy\":[\"0\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/business-system-owner\",\"attributes\":{\"title\":\"Business / System Owner (BO/SO)\",\"hierarchy\":[\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity and Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"0\",\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"0\",\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"0\",\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"0\",\"3\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Compliance \u0026 Authorization\",\"hierarchy\":[\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"Authorization to Operate (ATO)\",\"hierarchy\":[\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"About ATO at CMS\",\"hierarchy\":[\"1\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#types-of-authorizations\",\"attributes\":{\"title\":\"Types of authorizations\",\"hierarchy\":[\"1\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#ato-stakeholders\",\"attributes\":{\"title\":\"ATO stakeholders\",\"hierarchy\":[\"1\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#related-documents-and-resources\",\"attributes\":{\"title\":\"ATO tools and resources\",\"hierarchy\":[\"1\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-technical-reference-architecture-tra\",\"attributes\":{\"title\":\"CMS Technical Reference Architecture (TRA)\",\"hierarchy\":[\"1\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"Ongoing Authorization (OA)\",\"hierarchy\":[\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"About OA at CMS\",\"hierarchy\":[\"1\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa#is-my-system-eligible-for-oa\",\"attributes\":{\"title\":\"OA eligibility requirements\",\"hierarchy\":[\"1\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"1\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Assessments \u0026 Audits\",\"hierarchy\":[\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"1\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"1\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"1\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/security-impact-analysis-sia\",\"attributes\":{\"title\":\"Security Impact Analysis (SIA)\",\"hierarchy\":[\"1\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-audits\",\"attributes\":{\"title\":\"System Audits\",\"hierarchy\":[\"1\",\"2\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Policy \u0026 Guidance\",\"hierarchy\":[\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cms-policies-and-guidance\",\"attributes\":{\"title\":\"CMS Policies and Guidance\",\"hierarchy\":[\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-acceptable-risk-safeguards-ars\",\"attributes\":{\"title\":\"CMS Acceptable Risk Safeguards (ARS)\",\"hierarchy\":[\"2\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-systems-security-privacy-policy-is2p2\",\"attributes\":{\"title\":\"CMS Information Security and Privacy Policy (IS2P2)\",\"hierarchy\":[\"2\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"2\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-risk-management-framework-rmf\",\"attributes\":{\"title\":\"CMS Risk Management Framework (RMF)\",\"hierarchy\":[\"2\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/email-encryption-requirements-cms\",\"attributes\":{\"title\":\"CMS Email Encryption\",\"hierarchy\":[\"2\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/federal-policies-and-guidance\",\"attributes\":{\"title\":\"Federal Policies and Guidance\",\"hierarchy\":[\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/national-institute-standards-and-technology-nist\",\"attributes\":{\"title\":\"National Institute of Standards and Technology (NIST)\",\"hierarchy\":[\"2\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/federal-information-security-modernization-act-fisma\",\"attributes\":{\"title\":\"Federal Information Security Modernization Act (FISMA)\",\"hierarchy\":[\"2\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/fedramp\",\"attributes\":{\"title\":\"Federal Risk and Authorization Management Program (FedRAMP)\",\"hierarchy\":[\"2\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"2\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/application-security\",\"attributes\":{\"title\":\"Application Security\",\"hierarchy\":[\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"3\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"3\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"3\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/software-bill-materials-sbom\",\"attributes\":{\"title\":\"Software Bill of Materials (SBOM)\",\"hierarchy\":[\"3\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/security-operations\",\"attributes\":{\"title\":\"Security Operations\",\"hierarchy\":[\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/risk-management-handbook-chapter-8-incident-response-ir\",\"attributes\":{\"title\":\"Incident Response\",\"hierarchy\":[\"3\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"3\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"3\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/risk-management-and-reporting\",\"attributes\":{\"title\":\"Risk Management and Reporting\",\"hierarchy\":[\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"3\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports\",\"hierarchy\":[\"3\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/plan-action-and-milestones-poam\",\"attributes\":{\"title\":\"Plan of Action and Milestones (POA\u0026M)\",\"hierarchy\":[\"3\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy\",\"hierarchy\":[\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Agreements\",\"hierarchy\":[\"4\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"4\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"4\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Activities\",\"hierarchy\":[\"4\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/breach-response\",\"attributes\":{\"title\":\"Breach Response\",\"hierarchy\":[\"4\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"4\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-records-notice-sorn\",\"attributes\":{\"title\":\"System of Records Notice (SORN)\",\"hierarchy\":[\"4\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Resources\",\"hierarchy\":[\"4\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/privacy\",\"attributes\":{\"title\":\"Privacy at CMS\",\"hierarchy\":[\"4\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-breach-response-handbook\",\"attributes\":{\"title\":\"CMS Breach Response Handbook\",\"hierarchy\":[\"4\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/health-insurance-portability-and-accountability-act-1996-hipaa\",\"attributes\":{\"title\":\"Health Insurance Portability and Accessibility Act (HIPAA)\",\"hierarchy\":[\"4\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-privacy-impact-assessment-pia-handbook\",\"attributes\":{\"title\":\"CMS Privacy Impact Assessment (PIA) Handbook\",\"hierarchy\":[\"4\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tools \u0026 Services\",\"hierarchy\":[\"5\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Reporting \u0026 Compliance\",\"hierarchy\":[\"5\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"5\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-fisma-continuous-tracking-system-cfacts\",\"attributes\":{\"title\":\"CFACTS\",\"hierarchy\":[\"5\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports and Dashboards\",\"hierarchy\":[\"5\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"5\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"5\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"5\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"5\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"5\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-security-data-lake-sdl\",\"attributes\":{\"title\":\"CMS Security Data Lake (SDL)\",\"hierarchy\":[\"5\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tests \u0026 Assessments\",\"hierarchy\":[\"5\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"5\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"5\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"5\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}}],\"size\":87},\"elements\":[{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Roles\",\"hierarchy\":[\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/information-system-security-officer-isso\",\"attributes\":{\"title\":\"Information System Security Officer (ISSO)\",\"hierarchy\":[\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook\",\"attributes\":{\"title\":\"ISSO Handbook\",\"hierarchy\":[\"0\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\",\"attributes\":{\"title\":\"Getting started (for new ISSOs)\",\"hierarchy\":[\"0\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-mentorship-program\",\"attributes\":{\"title\":\"ISSO Mentorship Program\",\"hierarchy\":[\"0\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\",\"attributes\":{\"title\":\"ISSO Training\",\"hierarchy\":[\"0\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/data-guardian\",\"attributes\":{\"title\":\"Data Guardian\",\"hierarchy\":[\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/data-guardian-handbook\",\"attributes\":{\"title\":\"Data Guardian Handbook\",\"hierarchy\":[\"0\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cyber-risk-advisor-cra\",\"attributes\":{\"title\":\"Cyber Risk Advisor (CRA)\",\"hierarchy\":[\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"0\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks#risk-management-handbook-rmh-chapters\",\"attributes\":{\"title\":\"Risk Management Handbook (RMH)\",\"hierarchy\":[\"0\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/business-system-owner\",\"attributes\":{\"title\":\"Business / System Owner (BO/SO)\",\"hierarchy\":[\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity and Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"0\",\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"0\",\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"0\",\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"0\",\"3\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Compliance \u0026 Authorization\",\"hierarchy\":[\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"Authorization to Operate (ATO)\",\"hierarchy\":[\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"About ATO at CMS\",\"hierarchy\":[\"1\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#types-of-authorizations\",\"attributes\":{\"title\":\"Types of authorizations\",\"hierarchy\":[\"1\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#ato-stakeholders\",\"attributes\":{\"title\":\"ATO stakeholders\",\"hierarchy\":[\"1\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#related-documents-and-resources\",\"attributes\":{\"title\":\"ATO tools and resources\",\"hierarchy\":[\"1\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-technical-reference-architecture-tra\",\"attributes\":{\"title\":\"CMS Technical Reference Architecture (TRA)\",\"hierarchy\":[\"1\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"Ongoing Authorization (OA)\",\"hierarchy\":[\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"About OA at CMS\",\"hierarchy\":[\"1\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa#is-my-system-eligible-for-oa\",\"attributes\":{\"title\":\"OA eligibility requirements\",\"hierarchy\":[\"1\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"1\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Assessments \u0026 Audits\",\"hierarchy\":[\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"1\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"1\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"1\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/security-impact-analysis-sia\",\"attributes\":{\"title\":\"Security Impact Analysis (SIA)\",\"hierarchy\":[\"1\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-audits\",\"attributes\":{\"title\":\"System Audits\",\"hierarchy\":[\"1\",\"2\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Policy \u0026 Guidance\",\"hierarchy\":[\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cms-policies-and-guidance\",\"attributes\":{\"title\":\"CMS Policies and Guidance\",\"hierarchy\":[\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-acceptable-risk-safeguards-ars\",\"attributes\":{\"title\":\"CMS Acceptable Risk Safeguards (ARS)\",\"hierarchy\":[\"2\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-systems-security-privacy-policy-is2p2\",\"attributes\":{\"title\":\"CMS Information Security and Privacy Policy (IS2P2)\",\"hierarchy\":[\"2\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"2\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-risk-management-framework-rmf\",\"attributes\":{\"title\":\"CMS Risk Management Framework (RMF)\",\"hierarchy\":[\"2\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/email-encryption-requirements-cms\",\"attributes\":{\"title\":\"CMS Email Encryption\",\"hierarchy\":[\"2\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/federal-policies-and-guidance\",\"attributes\":{\"title\":\"Federal Policies and Guidance\",\"hierarchy\":[\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/national-institute-standards-and-technology-nist\",\"attributes\":{\"title\":\"National Institute of Standards and Technology (NIST)\",\"hierarchy\":[\"2\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/federal-information-security-modernization-act-fisma\",\"attributes\":{\"title\":\"Federal Information Security Modernization Act (FISMA)\",\"hierarchy\":[\"2\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/fedramp\",\"attributes\":{\"title\":\"Federal Risk and Authorization Management Program (FedRAMP)\",\"hierarchy\":[\"2\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"2\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/application-security\",\"attributes\":{\"title\":\"Application Security\",\"hierarchy\":[\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"3\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"3\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"3\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/software-bill-materials-sbom\",\"attributes\":{\"title\":\"Software Bill of Materials (SBOM)\",\"hierarchy\":[\"3\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/security-operations\",\"attributes\":{\"title\":\"Security Operations\",\"hierarchy\":[\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/risk-management-handbook-chapter-8-incident-response-ir\",\"attributes\":{\"title\":\"Incident Response\",\"hierarchy\":[\"3\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"3\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"3\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/risk-management-and-reporting\",\"attributes\":{\"title\":\"Risk Management and Reporting\",\"hierarchy\":[\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"3\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports\",\"hierarchy\":[\"3\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/plan-action-and-milestones-poam\",\"attributes\":{\"title\":\"Plan of Action and Milestones (POA\u0026M)\",\"hierarchy\":[\"3\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy\",\"hierarchy\":[\"4\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Agreements\",\"hierarchy\":[\"4\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"4\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"4\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Activities\",\"hierarchy\":[\"4\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/breach-response\",\"attributes\":{\"title\":\"Breach Response\",\"hierarchy\":[\"4\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"4\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-records-notice-sorn\",\"attributes\":{\"title\":\"System of Records Notice (SORN)\",\"hierarchy\":[\"4\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Resources\",\"hierarchy\":[\"4\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/privacy\",\"attributes\":{\"title\":\"Privacy at CMS\",\"hierarchy\":[\"4\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-breach-response-handbook\",\"attributes\":{\"title\":\"CMS Breach Response Handbook\",\"hierarchy\":[\"4\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/health-insurance-portability-and-accountability-act-1996-hipaa\",\"attributes\":{\"title\":\"Health Insurance Portability and Accessibility Act (HIPAA)\",\"hierarchy\":[\"4\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-privacy-impact-assessment-pia-handbook\",\"attributes\":{\"title\":\"CMS Privacy Impact Assessment (PIA) Handbook\",\"hierarchy\":[\"4\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tools \u0026 Services\",\"hierarchy\":[\"5\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Reporting \u0026 Compliance\",\"hierarchy\":[\"5\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"5\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-fisma-continuous-tracking-system-cfacts\",\"attributes\":{\"title\":\"CFACTS\",\"hierarchy\":[\"5\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports and Dashboards\",\"hierarchy\":[\"5\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"5\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"5\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"5\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"5\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"5\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-security-data-lake-sdl\",\"attributes\":{\"title\":\"CMS Security Data Lake (SDL)\",\"hierarchy\":[\"5\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tests \u0026 Assessments\",\"hierarchy\":[\"5\",\"2\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"5\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"5\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"5\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}}],\"size\":87,\"tree\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Roles\",\"hierarchy\":[\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/information-system-security-officer-isso\",\"attributes\":{\"title\":\"Information System Security Officer (ISSO)\",\"hierarchy\":[\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook\",\"attributes\":{\"title\":\"ISSO Handbook\",\"hierarchy\":[\"0\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#getting-started-for-new-issos\",\"attributes\":{\"title\":\"Getting started (for new ISSOs)\",\"hierarchy\":[\"0\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-mentorship-program\",\"attributes\":{\"title\":\"ISSO Mentorship Program\",\"hierarchy\":[\"0\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-system-security-officer-isso-handbook#training\",\"attributes\":{\"title\":\"ISSO Training\",\"hierarchy\":[\"0\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/data-guardian\",\"attributes\":{\"title\":\"Data Guardian\",\"hierarchy\":[\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/data-guardian-handbook\",\"attributes\":{\"title\":\"Data Guardian Handbook\",\"hierarchy\":[\"0\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cyber-risk-advisor-cra\",\"attributes\":{\"title\":\"Cyber Risk Advisor (CRA)\",\"hierarchy\":[\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"0\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks#risk-management-handbook-rmh-chapters\",\"attributes\":{\"title\":\"Risk Management Handbook (RMH)\",\"hierarchy\":[\"0\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/business-system-owner\",\"attributes\":{\"title\":\"Business / System Owner (BO/SO)\",\"hierarchy\":[\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity and Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"0\",\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"0\",\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"0\",\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"0\",\"3\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Compliance \u0026 Authorization\",\"hierarchy\":[\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"Authorization to Operate (ATO)\",\"hierarchy\":[\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato\",\"attributes\":{\"title\":\"About ATO at CMS\",\"hierarchy\":[\"1\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#types-of-authorizations\",\"attributes\":{\"title\":\"Types of authorizations\",\"hierarchy\":[\"1\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#ato-stakeholders\",\"attributes\":{\"title\":\"ATO stakeholders\",\"hierarchy\":[\"1\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/authorization-operate-ato#related-documents-and-resources\",\"attributes\":{\"title\":\"ATO tools and resources\",\"hierarchy\":[\"1\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-technical-reference-architecture-tra\",\"attributes\":{\"title\":\"CMS Technical Reference Architecture (TRA)\",\"hierarchy\":[\"1\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"Ongoing Authorization (OA)\",\"hierarchy\":[\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa\",\"attributes\":{\"title\":\"About OA at CMS\",\"hierarchy\":[\"1\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/ongoing-authorization-oa#is-my-system-eligible-for-oa\",\"attributes\":{\"title\":\"OA eligibility requirements\",\"hierarchy\":[\"1\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"1\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Assessments \u0026 Audits\",\"hierarchy\":[\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"1\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"1\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"1\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/security-impact-analysis-sia\",\"attributes\":{\"title\":\"Security Impact Analysis (SIA)\",\"hierarchy\":[\"1\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-audits\",\"attributes\":{\"title\":\"System Audits\",\"hierarchy\":[\"1\",\"2\",\"4\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Policy \u0026 Guidance\",\"hierarchy\":[\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/cms-policies-and-guidance\",\"attributes\":{\"title\":\"CMS Policies and Guidance\",\"hierarchy\":[\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-acceptable-risk-safeguards-ars\",\"attributes\":{\"title\":\"CMS Acceptable Risk Safeguards (ARS)\",\"hierarchy\":[\"2\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-information-systems-security-privacy-policy-is2p2\",\"attributes\":{\"title\":\"CMS Information Security and Privacy Policy (IS2P2)\",\"hierarchy\":[\"2\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-security-and-privacy-handbooks\",\"attributes\":{\"title\":\"CMS Security and Privacy Handbooks\",\"hierarchy\":[\"2\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-risk-management-framework-rmf\",\"attributes\":{\"title\":\"CMS Risk Management Framework (RMF)\",\"hierarchy\":[\"2\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/email-encryption-requirements-cms\",\"attributes\":{\"title\":\"CMS Email Encryption\",\"hierarchy\":[\"2\",\"0\",\"4\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/federal-policies-and-guidance\",\"attributes\":{\"title\":\"Federal Policies and Guidance\",\"hierarchy\":[\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/national-institute-standards-and-technology-nist\",\"attributes\":{\"title\":\"National Institute of Standards and Technology (NIST)\",\"hierarchy\":[\"2\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/federal-information-security-modernization-act-fisma\",\"attributes\":{\"title\":\"Federal Information Security Modernization Act (FISMA)\",\"hierarchy\":[\"2\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/fedramp\",\"attributes\":{\"title\":\"Federal Risk and Authorization Management Program (FedRAMP)\",\"hierarchy\":[\"2\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"2\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/application-security\",\"attributes\":{\"title\":\"Application Security\",\"hierarchy\":[\"3\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"3\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/zero-trust\",\"attributes\":{\"title\":\"Zero Trust\",\"hierarchy\":[\"3\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"3\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/software-bill-materials-sbom\",\"attributes\":{\"title\":\"Software Bill of Materials (SBOM)\",\"hierarchy\":[\"3\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/security-operations\",\"attributes\":{\"title\":\"Security Operations\",\"hierarchy\":[\"3\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/risk-management-handbook-chapter-8-incident-response-ir\",\"attributes\":{\"title\":\"Incident Response\",\"hierarchy\":[\"3\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"3\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"3\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/risk-management-and-reporting\",\"attributes\":{\"title\":\"Risk Management and Reporting\",\"hierarchy\":[\"3\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"3\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports\",\"hierarchy\":[\"3\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/plan-action-and-milestones-poam\",\"attributes\":{\"title\":\"Plan of Action and Milestones (POA\u0026M)\",\"hierarchy\":[\"3\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy\",\"hierarchy\":[\"4\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Agreements\",\"hierarchy\":[\"4\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-computer-matching-agreement-cma\",\"attributes\":{\"title\":\"Computer Matching Agreement (CMA)\",\"hierarchy\":[\"4\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-information-exchange-agreement-iea\",\"attributes\":{\"title\":\"Information Exchange Agreement (IEA)\",\"hierarchy\":[\"4\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Activities\",\"hierarchy\":[\"4\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/breach-response\",\"attributes\":{\"title\":\"Breach Response\",\"hierarchy\":[\"4\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"4\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/system-records-notice-sorn\",\"attributes\":{\"title\":\"System of Records Notice (SORN)\",\"hierarchy\":[\"4\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Privacy Resources\",\"hierarchy\":[\"4\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/ispg/privacy\",\"attributes\":{\"title\":\"Privacy at CMS\",\"hierarchy\":[\"4\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-breach-response-handbook\",\"attributes\":{\"title\":\"CMS Breach Response Handbook\",\"hierarchy\":[\"4\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/health-insurance-portability-and-accountability-act-1996-hipaa\",\"attributes\":{\"title\":\"Health Insurance Portability and Accessibility Act (HIPAA)\",\"hierarchy\":[\"4\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/policy-guidance/cms-privacy-impact-assessment-pia-handbook\",\"attributes\":{\"title\":\"CMS Privacy Impact Assessment (PIA) Handbook\",\"hierarchy\":[\"4\",\"2\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tools \u0026 Services\",\"hierarchy\":[\"5\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Reporting \u0026 Compliance\",\"hierarchy\":[\"5\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/isso-service\",\"attributes\":{\"title\":\"ISSO As A Service\",\"hierarchy\":[\"5\",\"0\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-fisma-continuous-tracking-system-cfacts\",\"attributes\":{\"title\":\"CFACTS\",\"hierarchy\":[\"5\",\"0\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cyber-risk-reports\",\"attributes\":{\"title\":\"Cyber Risk Reports and Dashboards\",\"hierarchy\":[\"5\",\"0\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/continuous-diagnostics-and-mitigation-cdm\",\"attributes\":{\"title\":\"Continuous Diagnostics and Mitigation (CDM)\",\"hierarchy\":[\"5\",\"0\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"System Security\",\"hierarchy\":[\"5\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/threat-modeling\",\"attributes\":{\"title\":\"Threat Modeling\",\"hierarchy\":[\"5\",\"1\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cloud-services\",\"attributes\":{\"title\":\"CMS Cloud Services\",\"hierarchy\":[\"5\",\"1\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cms-cybersecurity-integration-center-ccic\",\"attributes\":{\"title\":\"CMS Cybersecurity Integration Center (CCIC)\",\"hierarchy\":[\"5\",\"1\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"https://security.cms.gov/learn/cms-security-data-lake-sdl\",\"attributes\":{\"title\":\"CMS Security Data Lake (SDL)\",\"hierarchy\":[\"5\",\"1\",\"3\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"\",\"attributes\":{\"title\":\"Tests \u0026 Assessments\",\"hierarchy\":[\"5\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/cybersecurity-risk-assessment-program-csrap\",\"attributes\":{\"title\":\"Cybersecurity Risk Assessment Program (CSRAP)\",\"hierarchy\":[\"5\",\"2\",\"0\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/penetration-testing-pentesting\",\"attributes\":{\"title\":\"Penetration Testing\",\"hierarchy\":[\"5\",\"2\",\"1\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]},{\"link\":{\"anchor\":\"/system/menu/mega-menu/linkset\",\"rel\":\"item\",\"href\":\"/learn/privacy-impact-assessment-pia\",\"attributes\":{\"title\":\"Privacy Impact Assessment (PIA)\",\"hierarchy\":[\"5\",\"2\",\"2\"],\"machine-name\":[\"mega-menu\"]}},\"children\":[]}]}]}]}"])</script><script>self.__next_f.push([1,"9:[\"$\",\"html\",null,{\"lang\":\"en\",\"children\":[[\"$\",\"head\",null,{\"children\":[\"$\",\"$Ld\",null,{\"src\":\"/assets/javascript/uswds-init.min.js\",\"strategy\":\"beforeInteractive\"}]}],[\"$\",\"body\",null,{\"children\":[[[\"$\",\"a\",null,{\"className\":\"usa-skipnav\",\"href\":\"#main\",\"children\":\"Skip to main content\"}],[\"$\",\"section\",null,{\"className\":\"usa-banner\",\"aria-label\":\"Official website of the United States government\",\"children\":[\"$\",\"div\",null,{\"className\":\"usa-accordion\",\"children\":[[\"$\",\"header\",null,{\"className\":\"usa-banner__header\",\"children\":[\"$\",\"div\",null,{\"className\":\"usa-banner__inner\",\"children\":[[\"$\",\"div\",null,{\"className\":\"grid-col-auto\",\"children\":[\"$\",\"$Le\",null,{\"aria-hidden\":\"true\",\"className\":\"usa-banner__header-flag\",\"src\":\"/assets/img/us_flag_small.png\",\"alt\":\"\",\"width\":\"16\",\"height\":\"11\"}]}],[\"$\",\"div\",null,{\"className\":\"grid-col-fill tablet:grid-col-auto\",\"aria-hidden\":\"true\",\"children\":[[\"$\",\"p\",null,{\"className\":\"usa-banner__header-text\",\"children\":\"An official website of the United States government\"}],[\"$\",\"p\",null,{\"className\":\"usa-banner__header-action\",\"children\":\"Here's how you know\"}]]}],[\"$\",\"button\",null,{\"type\":\"button\",\"className\":\"usa-accordion__button usa-banner__button\",\"aria-expanded\":\"false\",\"aria-controls\":\"gov-banner-default-default\",\"children\":[\"$\",\"span\",null,{\"className\":\"usa-banner__button-text\",\"children\":\"Here's how you know\"}]}]]}]}],[\"$\",\"div\",null,{\"className\":\"usa-banner__content usa-accordion__content\",\"id\":\"gov-banner-default-default\",\"hidden\":true,\"children\":[\"$\",\"div\",null,{\"className\":\"grid-row grid-gap-lg\",\"children\":[[\"$\",\"div\",null,{\"className\":\"usa-banner__guidance tablet:grid-col-6\",\"children\":[[\"$\",\"$Le\",null,{\"className\":\"usa-banner__icon usa-media-block__img\",\"src\":{\"src\":\"/_next/static/media/icon-dot-gov.3e9cb1b5.svg\",\"height\":64,\"width\":64,\"blurWidth\":0,\"blurHeight\":0},\"role\":\"img\",\"alt\":\"\",\"aria-hidden\":\"true\",\"width\":\"40\",\"height\":\"40\"}],[\"$\",\"div\",null,{\"className\":\"usa-media-block__body\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"strong\",null,{\"children\":\"Official websites use .gov\"}],[\"$\",\"br\",null,{}],\"A \",[\"$\",\"strong\",null,{\"children\":\".gov\"}],\" website belongs to an official government organization in the United States.\"]}]}]]}],[\"$\",\"div\",null,{\"className\":\"usa-banner__guidance tablet:grid-col-6\",\"children\":[[\"$\",\"$Le\",null,{\"className\":\"usa-banner__icon usa-media-block__img\",\"src\":{\"src\":\"/_next/static/media/icon-https.e7f1a222.svg\",\"height\":64,\"width\":64,\"blurWidth\":0,\"blurHeight\":0},\"role\":\"img\",\"alt\":\"\",\"aria-hidden\":\"true\",\"width\":\"40\",\"height\":\"40\"}],[\"$\",\"div\",null,{\"className\":\"usa-media-block__body\",\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"strong\",null,{\"children\":\"Secure .gov websites use HTTPS\"}],[\"$\",\"br\",null,{}],\"A \",[\"$\",\"strong\",null,{\"children\":\"lock\"}],\" (\",[\"$\",\"span\",null,{\"className\":\"icon-lock\",\"children\":[\"$\",\"svg\",null,{\"xmlns\":\"http://www.w3.org/2000/svg\",\"width\":\"52\",\"height\":\"64\",\"viewBox\":\"0 0 52 64\",\"className\":\"usa-banner__lock-image\",\"role\":\"img\",\"aria-labelledby\":\"banner-lock-description-default\",\"focusable\":\"false\",\"children\":[[\"$\",\"title\",null,{\"id\":\"banner-lock-title-default\",\"children\":\"Lock\"}],[\"$\",\"desc\",null,{\"id\":\"banner-lock-description-default\",\"children\":\"Locked padlock icon\"}],[\"$\",\"path\",null,{\"fill\":\"#000000\",\"fillRule\":\"evenodd\",\"d\":\"M26 0c10.493 0 19 8.507 19 19v9h3a4 4 0 0 1 4 4v28a4 4 0 0 1-4 4H4a4 4 0 0 1-4-4V32a4 4 0 0 1 4-4h3v-9C7 8.507 15.507 0 26 0zm0 8c-5.979 0-10.843 4.77-10.996 10.712L15 19v9h22v-9c0-6.075-4.925-11-11-11z\"}]]}]}],\") or \",[\"$\",\"strong\",null,{\"children\":\"https://\"}],\" means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.\"]}]}]]}]]}]}]]}]}]],[\"$\",\"$Lf\",null,{\"value\":\"$10\",\"children\":[[\"$\",\"div\",null,{\"className\":\"usa-overlay\"}],[\"$\",\"header\",null,{\"className\":\"usa-header usa-header--extended\",\"children\":[[\"$\",\"div\",null,{\"className\":\"bg-primary-dark\",\"children\":[\"$\",\"div\",null,{\"className\":\"usa-navbar\",\"children\":[[\"$\",\"div\",null,{\"className\":\"usa-logo padding-y-4 padding-right-3\",\"id\":\"CyberGeek-logo\",\"children\":[\"$\",\"$L11\",null,{\"href\":\"/\",\"title\":\"CMS CyberGeek Home\",\"children\":[\"$\",\"$Le\",null,{\"src\":{\"src\":\"/_next/static/media/CyberGeek-logo.8e9bbd2b.svg\",\"height\":50,\"width\":425,\"blurWidth\":0,\"blurHeight\":0},\"alt\":\"CyberGeek logo\",\"width\":\"298\",\"height\":\"35\",\"priority\":true}]}]}],[\"$\",\"button\",null,{\"aria-label\":\"Open menu\",\"type\":\"button\",\"className\":\"usa-menu-btn\",\"data-cy\":\"menu-button\",\"children\":\"Menu\"}]]}]}],[\"$\",\"$L12\",null,{}]]}]]}],[\"$\",\"main\",null,{\"id\":\"main\",\"children\":[\"$\",\"$L6\",null,{\"parallelRouterKey\":\"children\",\"segmentPath\":[\"children\"],\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L13\",null,{\"children\":[\"$\",\"$L8\",null,{}]}],\"templateStyles\":[],\"templateScripts\":[],\"notFound\":[\"$\",\"section\",null,{\"className\":\"hero hero--theme-content-not-found undefined\",\"children\":[[\"$\",\"$Le\",null,{\"alt\":\"404 page not found\",\"className\":\"hero__graphic\",\"priority\":true,\"src\":{\"src\":\"/_next/static/media/content-not-found-graphic.8f104f47.svg\",\"height\":551,\"width\":948,\"blurWidth\":0,\"blurHeight\":0}}],[\"$\",\"div\",null,{\"className\":\"maxw-widescreen margin-x-auto padding-x-2 desktop:padding-x-0 padding-top-4 padding-bottom-6 desktop:padding-y-7\",\"children\":[\"$\",\"div\",null,{\"className\":\"tablet:grid-container position-relative \",\"children\":[\"$\",\"div\",null,{\"className\":\"hero__row grid-row grid-gap\",\"children\":[[\"$\",\"div\",null,{\"className\":\"tablet:grid-col-5 widescreen:position-relative\",\"children\":[false,false]}],[\"$\",\"div\",null,{\"className\":\"hero__column tablet:grid-col-7 flow padding-bottom-2\",\"children\":[\"$undefined\",\"$undefined\",false,[\"$\",\"h1\",null,{\"className\":\"hero__heading margin-0 line-height-sans-3 desktop:line-height-sans-2\",\"children\":\"We can't find that page.\"}],\"$undefined\",\"$undefined\",false,[\"$\",\"div\",null,{\"children\":[[\"$\",\"div\",null,{\"className\":\"hero__description\",\"children\":[[\"The page you're looking for may have been moved or retired. You can\",\" \",[\"$\",\"$L11\",null,{\"href\":\"/\",\"children\":\"visit our home page\"}],\" or use the search box to find helpful resources.\"]]}],[\"$\",\"div\",null,{\"className\":\"margin-top-6 search-container\",\"children\":[\"$\",\"$L14\",null,{\"theme\":\"content-not-found\"}]}]]}],false]}],false,false]}]}]}]]}],\"notFoundStyles\":[]}]}],[\"$\",\"$L15\",null,{}],[\"$\",\"$L16\",null,{}],[\"$\",\"$Ld\",null,{\"src\":\"/assets/javascript/uswds.min.js\",\"strategy\":\"beforeInteractive\"}]]}]]}]\n"])</script><script>self.__next_f.push([1,"17:I[9461,[\"866\",\"static/chunks/e37a0b60-b74be3d42787b18d.js\",\"30\",\"static/chunks/30-49b1c1429d73281d.js\",\"317\",\"static/chunks/317-0f87feacc1712b2f.js\",\"904\",\"static/chunks/904-dbddf7494c3e6975.js\",\"972\",\"static/chunks/972-6e520d137ef194fb.js\",\"549\",\"static/chunks/549-c87c1c3bbacc319f.js\",\"192\",\"static/chunks/app/learn/%5Bslug%5D/page-5b91cdc45a95ebbe.js\"],\"default\"]\n18:T632,\u003ch2\u003eWhat is CyberWorks?\u003c/h2\u003e\u003cp\u003eCMS CyberWorks is an annual cybersecurity event that brings together industry experts, thought leaders, and CMS staff to explore the latest trends and best practices in the ever-evolving field of cybersecurity. With a focus on safeguarding digital privacy, managing cyber risks, and promoting secure online behavior, CyberWorks is designed to engage CMS privacy and cyber professionals across the enterprise.\u003cbr\u003e\u003cbr\u003eAttendees can expect engaging sessions covering important topics such as privacy protection in the age of data breaches, advanced risk management strategies to combat cyber threats, innovative approaches to password management, and the importance of safe browsing habits in today's interconnected digital landscape.\u003cbr\u003e\u003cbr\u003eWhether you're a seasoned cybersecurity professional or just looking to expand your knowledge and awareness in your daily work, CyberWorks will equip you to stay ahead of cyber adversaries and protect your organization's digital assets.\u003cbr\u003e\u003cbr\u003eYou can participate in CMS CyberWorks every October during National Cybersecurity Awareness Month.\u003c/p\u003e\u003ch2\u003eCyberWorks 2024 recordings\u003c/h2\u003e\u003cp dir=\"ltr\"\u003eCyberWorks 2024 was a great success. Thank you to everyone who contributed to and participated in the event!\u003c/p\u003e\u003cp dir=\"ltr\"\u003e\u003ca href=\"https://cmscyberworks.fbcevent.com/agenda\"\u003eRecordings of the sessions are available here\u003c/a\u003e.\u003c/p\u003e\u003cp dir=\"ltr\"\u003eIf you attended, we'd love to hear what you thought about CyberWorks 2024.\u003c/p\u003e\u003cp dir=\"ltr\"\u003e\u003ca href=\"https://forms.office.com/g/iYxVHTDwpg\"\u003ePlease give your feedback here\u003c/a\u003e.\u003c/p\u003e19:T632,\u003ch2\u003eWhat is CyberWorks?\u003c/h2\u003e\u003cp\u003eCMS CyberWorks is an annual cybersecurity eve"])</script><script>self.__next_f.push([1,"nt that brings together industry experts, thought leaders, and CMS staff to explore the latest trends and best practices in the ever-evolving field of cybersecurity. With a focus on safeguarding digital privacy, managing cyber risks, and promoting secure online behavior, CyberWorks is designed to engage CMS privacy and cyber professionals across the enterprise.\u003cbr\u003e\u003cbr\u003eAttendees can expect engaging sessions covering important topics such as privacy protection in the age of data breaches, advanced risk management strategies to combat cyber threats, innovative approaches to password management, and the importance of safe browsing habits in today's interconnected digital landscape.\u003cbr\u003e\u003cbr\u003eWhether you're a seasoned cybersecurity professional or just looking to expand your knowledge and awareness in your daily work, CyberWorks will equip you to stay ahead of cyber adversaries and protect your organization's digital assets.\u003cbr\u003e\u003cbr\u003eYou can participate in CMS CyberWorks every October during National Cybersecurity Awareness Month.\u003c/p\u003e\u003ch2\u003eCyberWorks 2024 recordings\u003c/h2\u003e\u003cp dir=\"ltr\"\u003eCyberWorks 2024 was a great success. Thank you to everyone who contributed to and participated in the event!\u003c/p\u003e\u003cp dir=\"ltr\"\u003e\u003ca href=\"https://cmscyberworks.fbcevent.com/agenda\"\u003eRecordings of the sessions are available here\u003c/a\u003e.\u003c/p\u003e\u003cp dir=\"ltr\"\u003eIf you attended, we'd love to hear what you thought about CyberWorks 2024.\u003c/p\u003e\u003cp dir=\"ltr\"\u003e\u003ca href=\"https://forms.office.com/g/iYxVHTDwpg\"\u003ePlease give your feedback here\u003c/a\u003e.\u003c/p\u003e1a:Tbb6,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eWhat is Cyber360?\u003c/h2\u003e\u003cp\u003eIn an era dominated by digital advancements, the importance of cybersecurity has skyrocketed. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety.\u003c/p\u003e\u003ch2\u003eWhat to expect from Cyber360\u003c/h2\u003e\u003cp\u003e\u003cstrong\u003eApril: Staying safe online\u0026nbsp;\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series kicks off with a focus on staying safe online.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMay: Navigating cybersecurity as a family\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAttention shifts to family cybersecurity, offering strategies to safeguard families against online threats and ensuring a safe digital home environment.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eJune: Secure online communities\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series explores community cybersecurity, teaching how to secure online community spaces and maintain trust and safety for all members.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eJuly: Keeping financial information safe\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eFinancial cybersecurity takes the stage, with insights on protecting financial information in the age of online banking and digital transactions.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eAugust: Safety for online hobbies\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eFor hobbyists, this month covers how to safely engage in online hobbies, from gaming to blogging, protecting digital assets and personal information.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSeptember: Individual cybersecurity and responsibility\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eA personal focus on individual cybersecurity, emphasizing the importance of securing one's digital footprint and personal data online.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eOctober: CyberWorks!\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series culminates with the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003eCyberWorks event\u003c/a\u003e, a hybrid finale on \u003cstrong\u003eOctober 15,\u003c/strong\u003e hosted both in-person and virtually. This event promises a deep dive into the latest cybersecurity trends, strategies, and insights.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eWhy attend CyberWorks?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCyberWorks is the grand finale of the Cyber360 series, where education meets excitement. This event is your chance to dive into the latest in cybersecurity, interact with various vendors, and hear from inspirational keynote speakers. It's a perfect mix of learning and fun; designed for everyone from professionals to enthusiasts eager to enhance their digital safety.\u003c/p\u003e\u003cp\u003eMark your calendars for October 15th for an unforgettable day that brings together knowledge, skills, and enthusiasm in a dynamic hybrid format. We're excited to see you there for a memorable experience of networking and discovery. Don't miss out on this unique opportunity to connect and grow in the world of cybersecurity!\u0026nbsp;\u003c/p\u003e\u003cp\u003eFor more information, visit the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003eCyberWorks page here\u003c/a\u003e and join our CMS Slack channel \u003cstrong\u003e#Cyberworks2024.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003e\u0026nbsp;\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1b:Tbb6,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eWhat is Cyber360?\u003c/h2\u003e\u003cp\u003eIn an era dominated by digital advancements, the importance of cybersecurity has skyrocketed. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety.\u003c/p\u003e\u003ch2\u003eWhat to expect from Cyber360\u003c/h2\u003e\u003cp\u003e\u003cstrong\u003eApril: Staying safe online\u0026nbsp;\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series kicks off with a focus on staying safe online.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMay: Navigating cybersecurity as a family\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAttention shifts to family cybersecurity, offering strategies to safeguard families against online threats and ensuring a safe digital home environment.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eJune: Secure online communities\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series explores community cybersecurity, teaching how to secure online community spaces and maintain trust and safety for all members.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eJuly: Keeping financial information safe\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eFinancial cybersecurity takes the stage, with insights on protecting financial information in the age of online banking and digital transactions.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eAugust: Safety for online hobbies\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eFor hobbyists, this month covers how to safely engage in online hobbies, from gaming to blogging, protecting digital assets and personal information.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSeptember: Individual cybersecurity and responsibility\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eA personal focus on individual cybersecurity, emphasizing the importance of securing one's digital footprint and personal data online.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eOctober: CyberWorks!\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series culminates with the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003eCyberWorks event\u003c/a\u003e, a hybrid finale on \u003cstrong\u003eOctober 15,\u003c/strong\u003e hosted both in-person and virtually. This event promises a deep dive into the latest cybersecurity trends, strategies, and insights.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eWhy attend CyberWorks?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCyberWorks is the grand finale of the Cyber360 series, where education meets excitement. This event is your chance to dive into the latest in cybersecurity, interact with various vendors, and hear from inspirational keynote speakers. It's a perfect mix of learning and fun; designed for everyone from professionals to enthusiasts eager to enhance their digital safety.\u003c/p\u003e\u003cp\u003eMark your calendars for October 15th for an unforgettable day that brings together knowledge, skills, and enthusiasm in a dynamic hybrid format. We're excited to see you there for a memorable experience of networking and discovery. Don't miss out on this unique opportunity to connect and grow in the world of cybersecurity!\u0026nbsp;\u003c/p\u003e\u003cp\u003eFor more information, visit the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003eCyberWorks page here\u003c/a\u003e and join our CMS Slack channel \u003cstrong\u003e#Cyberworks2024.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003e\u0026nbsp;\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1c:Ted5,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eTips for staying secure with online hobbies\u003c/h2\u003e\u003cp\u003eFor this month on \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eCyber360\u003c/a\u003e, we're looking at ways to stay safe with your hobbies in the digital world.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSocial Media: Share with care\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eSocial media is a fun place to post about hobbies like baking, gardening, or playing music. However, sharing too much can attract scammers. For example, talking about an upcoming trip might tip off thieves that your house will be empty. To stay safe, adjust your privacy settings so only friends can see your posts, and be careful about accepting friend requests or messages from people you don't know. When joining hobby groups or making video calls, make sure the settings are private to keep unwanted guests out.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eGaming: Play it safe\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eGaming is all about fun and competition, but it’s also a hotspot for cyber threats like phishing and malware. Protect your gaming accounts with strong, unique passwords and turn on two-factor authentication for an extra layer of security. Be cautious about where you download game files and mods—stick to trusted sources to avoid downloading harmful software.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFantasy sports and betting\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eSites where you manage fantasy sports teams or bet on games ask for a lot of personal info, which can make you a target for scams. Only use reputable websites that have good security practices, and keep your login details private. Regularly check your account for any strange activity.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWatching out for sports scams\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eScammers love to exploit sports fans, especially during big game seasons, by selling fake tickets or counterfeit gear. Always buy tickets from the official venue or a reputable reseller, and avoid deals that seem too good to be true. Similarly, buy team merchandise directly from official stores or approved retailers to ensure you're getting the real thing. When it comes to betting, use well-known and legally recognized platforms that have positive reviews.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWrap-up\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEnjoying hobbies online adds fun to our lives, but it’s important to keep them secure. By being smart about what you share, protecting your accounts, and staying aware of common scams, you can safely enjoy your hobbies without worry.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eAbout Cyber360\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCybersecurity is more important than ever in today's world of digital and technological advancements. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October 2024, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety. \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eLearn more about Cyber360 here\u003c/a\u003e.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eGet ready for CyberWorks!\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eRemember to join us at the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003e\u003cstrong\u003eCyberWorks event\u003c/strong\u003e\u003c/a\u003e on October 15th, 2024! This event will be a fantastic opportunity for families to learn more about cybersecurity, engage with experts, and discover the latest trends and strategies to keep their digital homes safe. Join our CMS Slack channel \u003ca href=\"https://cmsgov.slack.com/archives/C06S6HH6M37\" rel=\"noopener noreferrer\"\u003e\u003cstrong\u003e#CyberWorks2024\u003c/strong\u003e\u003c/a\u003e for updates.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eMore resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor a complete overview of training opportunities and best practices for keeping data and systems safe at CMS, check out the \u003ca href=\"https://security.cms.gov/policy-guidance/cms-cybersecurity-and-privacy-handbook\"\u003eCMS Information Security and Privacy Training Handbook\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1d:Ted5,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eTips for staying secure with online hobbies\u003c/h2\u003e\u003cp\u003eFor this month on \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eCyber360\u003c/a\u003e, we're looking at ways to stay safe with your hobbies in the digital world.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSocial Media: Share with care\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eSocial media is a fun place to post about hobbies like baking, gardening, or playing music. However, sharing too much can attract scammers. For example, talking about an upcoming trip might tip off thieves that your house will be empty. To stay safe, adjust your privacy settings so only friends can see your posts, and be careful about accepting friend requests or messages from people you don't know. When joining hobby groups or making video calls, make sure the settings are private to keep unwanted guests out.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eGaming: Play it safe\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eGaming is all about fun and competition, but it’s also a hotspot for cyber threats like phishing and malware. Protect your gaming accounts with strong, unique passwords and turn on two-factor authentication for an extra layer of security. Be cautious about where you download game files and mods—stick to trusted sources to avoid downloading harmful software.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFantasy sports and betting\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eSites where you manage fantasy sports teams or bet on games ask for a lot of personal info, which can make you a target for scams. Only use reputable websites that have good security practices, and keep your login details private. Regularly check your account for any strange activity.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWatching out for sports scams\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eScammers love to exploit sports fans, especially during big game seasons, by selling fake tickets or counterfeit gear. Always buy tickets from the official venue or a reputable reseller, and avoid deals that seem too good to be true. Similarly, buy team merchandise directly from official stores or approved retailers to ensure you're getting the real thing. When it comes to betting, use well-known and legally recognized platforms that have positive reviews.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWrap-up\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEnjoying hobbies online adds fun to our lives, but it’s important to keep them secure. By being smart about what you share, protecting your accounts, and staying aware of common scams, you can safely enjoy your hobbies without worry.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eAbout Cyber360\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCybersecurity is more important than ever in today's world of digital and technological advancements. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October 2024, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety. \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eLearn more about Cyber360 here\u003c/a\u003e.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eGet ready for CyberWorks!\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eRemember to join us at the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003e\u003cstrong\u003eCyberWorks event\u003c/strong\u003e\u003c/a\u003e on October 15th, 2024! This event will be a fantastic opportunity for families to learn more about cybersecurity, engage with experts, and discover the latest trends and strategies to keep their digital homes safe. Join our CMS Slack channel \u003ca href=\"https://cmsgov.slack.com/archives/C06S6HH6M37\" rel=\"noopener noreferrer\"\u003e\u003cstrong\u003e#CyberWorks2024\u003c/strong\u003e\u003c/a\u003e for updates.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eMore resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor a complete overview of training opportunities and best practices for keeping data and systems safe at CMS, check out the \u003ca href=\"https://security.cms.gov/policy-guidance/cms-cybersecurity-and-privacy-handbook\"\u003eCMS Information Security and Privacy Training Handbook\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1e:T1321,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eTips for keeping yourself safe in the digital world\u003c/h2\u003e\u003cp\u003eIn today's increasingly digital world, cybersecurity attacks have become a pervasive threat that can have serious personal consequences for individuals. From identity theft to financial fraud, the impact of these attacks can be far-reaching and long-lasting. Understanding the nature of these threats and taking proactive steps to safeguard our digital lives is crucial in protecting ourselves from the dangers of cybercrime.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eThe rise of cybersecurity attacks\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eCybersecurity attacks have been on the rise in recent years, with hackers targeting individuals, businesses, and even governments. According to a report by Cybersecurity Ventures, it is estimated that cybercrime will cost the global economy $6 trillion annually by 2021. This staggering figure underscores the scale of the threat posed by cybercriminals and the urgent need for individuals to take cybersecurity seriously.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003ePersonal data breaches and identity theft\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eOne of the most common forms of cybersecurity attacks is personal data breaches, where hackers gain unauthorized access to sensitive information such as credit card numbers, social security numbers, and login credentials. This stolen information can then be used to commit identity theft, a crime that can have devastating consequences for victims. Identity theft can result in financial losses, damage to credit scores, and even legal troubles if the stolen identity is used to commit further crimes.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFinancial fraud and scams\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAnother significant impact of cybersecurity attacks is financial fraud and scams. Phishing emails, fraudulent websites, and malware-infected software are commonly used by cybercriminals to trick individuals into revealing their financial information or transferring money to fraudulent accounts. Once the money is stolen, it can be extremely difficult to recover, leading to financial hardship for the victims.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eEmotional and psychological toll\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eIn addition to the financial repercussions, cybersecurity attacks can also take a toll on the emotional and psychological well-being of individuals. The sense of violation that comes with having your personal information stolen can be deeply unsettling, leading to feelings of anxiety, stress, and vulnerability. Victims of cybercrime may also experience a loss of trust in online platforms and a heightened sense of paranoia about their digital security.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eProtecting yourself from cybersecurity attacks\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWhile the threat of cybersecurity attacks is real and pervasive, there are steps that individuals can take to protect themselves from falling victim to cybercrime. Using strong, unique passwords for each online account, enabling two-factor authentication, keeping software and antivirus programs up to date, and being cautious of suspicious emails and websites are all important measures in safeguarding your digital life.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eConclusion\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eCybersecurity attacks pose a significant threat to individuals in today's digital age, with the potential for financial, emotional, and psychological harm. By understanding the nature of these threats and taking proactive steps to protect ourselves, we can reduce our risk of falling victim to cybercrime and safeguard our digital lives for the future.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eAbout Cyber360\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCybersecurity is more important than ever in today's world of digital and technological advancements. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October 2024, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety. \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eLearn more about Cyber360 here\u003c/a\u003e.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eGet ready for CyberWorks!\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eRemember to join us at the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003e\u003cstrong\u003eCyberWorks event\u003c/strong\u003e\u003c/a\u003e on October 15th, 2024! This event will be a fantastic opportunity for families to learn more about cybersecurity, engage with experts, and discover the latest trends and strategies to keep their digital homes safe.\u0026nbsp;\u003c/p\u003e\u003cp\u003eJoin our CMS Slack channel \u003ca href=\"https://cmsgov.slack.com/archives/C06S6HH6M37\" rel=\"noopener noreferrer\"\u003e\u003cstrong\u003e#CyberWorks2024\u003c/strong\u003e\u003c/a\u003e for updates.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eMore resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor a complete overview of training opportunities and best practices for keeping data and systems safe at CMS, check out the \u003ca href=\"https://security.cms.gov/policy-guidance/cms-cybersecurity-and-privacy-handbook\"\u003eCMS Information Security and Privacy Training Handbook\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1f:T1321,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eTips for keeping yourself safe in the digital world\u003c/h2\u003e\u003cp\u003eIn today's increasingly digital world, cybersecurity attacks have become a pervasive threat that can have serious personal consequences for individuals. From identity theft to financial fraud, the impact of these attacks can be far-reaching and long-lasting. Understanding the nature of these threats and taking proactive steps to safeguard our digital lives is crucial in protecting ourselves from the dangers of cybercrime.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eThe rise of cybersecurity attacks\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eCybersecurity attacks have been on the rise in recent years, with hackers targeting individuals, businesses, and even governments. According to a report by Cybersecurity Ventures, it is estimated that cybercrime will cost the global economy $6 trillion annually by 2021. This staggering figure underscores the scale of the threat posed by cybercriminals and the urgent need for individuals to take cybersecurity seriously.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003ePersonal data breaches and identity theft\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eOne of the most common forms of cybersecurity attacks is personal data breaches, where hackers gain unauthorized access to sensitive information such as credit card numbers, social security numbers, and login credentials. This stolen information can then be used to commit identity theft, a crime that can have devastating consequences for victims. Identity theft can result in financial losses, damage to credit scores, and even legal troubles if the stolen identity is used to commit further crimes.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFinancial fraud and scams\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAnother significant impact of cybersecurity attacks is financial fraud and scams. Phishing emails, fraudulent websites, and malware-infected software are commonly used by cybercriminals to trick individuals into revealing their financial information or transferring money to fraudulent accounts. Once the money is stolen, it can be extremely difficult to recover, leading to financial hardship for the victims.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eEmotional and psychological toll\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eIn addition to the financial repercussions, cybersecurity attacks can also take a toll on the emotional and psychological well-being of individuals. The sense of violation that comes with having your personal information stolen can be deeply unsettling, leading to feelings of anxiety, stress, and vulnerability. Victims of cybercrime may also experience a loss of trust in online platforms and a heightened sense of paranoia about their digital security.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eProtecting yourself from cybersecurity attacks\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWhile the threat of cybersecurity attacks is real and pervasive, there are steps that individuals can take to protect themselves from falling victim to cybercrime. Using strong, unique passwords for each online account, enabling two-factor authentication, keeping software and antivirus programs up to date, and being cautious of suspicious emails and websites are all important measures in safeguarding your digital life.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eConclusion\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eCybersecurity attacks pose a significant threat to individuals in today's digital age, with the potential for financial, emotional, and psychological harm. By understanding the nature of these threats and taking proactive steps to protect ourselves, we can reduce our risk of falling victim to cybercrime and safeguard our digital lives for the future.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eAbout Cyber360\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCybersecurity is more important than ever in today's world of digital and technological advancements. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October 2024, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety. \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eLearn more about Cyber360 here\u003c/a\u003e.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eGet ready for CyberWorks!\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eRemember to join us at the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003e\u003cstrong\u003eCyberWorks event\u003c/strong\u003e\u003c/a\u003e on October 15th, 2024! This event will be a fantastic opportunity for families to learn more about cybersecurity, engage with experts, and discover the latest trends and strategies to keep their digital homes safe.\u0026nbsp;\u003c/p\u003e\u003cp\u003eJoin our CMS Slack channel \u003ca href=\"https://cmsgov.slack.com/archives/C06S6HH6M37\" rel=\"noopener noreferrer\"\u003e\u003cstrong\u003e#CyberWorks2024\u003c/strong\u003e\u003c/a\u003e for updates.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eMore resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor a complete overview of training opportunities and best practices for keeping data and systems safe at CMS, check out the \u003ca href=\"https://security.cms.gov/policy-guidance/cms-cybersecurity-and-privacy-handbook\"\u003eCMS Information Security and Privacy Training Handbook\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"22:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node_type/node_type/d185e460-4998-4d2b-85cb-b04f304dfb1b\"}\n21:{\"self\":\"$22\"}\n25:[\"menu_ui\",\"scheduler\"]\n24:{\"module\":\"$25\"}\n28:[]\n27:{\"available_menus\":\"$28\",\"parent\":\"\"}\n29:{\"expand_fieldset\":\"when_required\",\"fields_display_mode\":\"vertical_tab\",\"publish_enable\":false,\"publish_past_date\":\"error\",\"publish_past_date_created\":false,\"publish_required\":false,\"publish_revision\":false,\"publish_touch\":false,\"show_message_after_update\":true,\"unpublish_enable\":false,\"unpublish_required\":false,\"unpublish_revision\":false}\n26:{\"menu_ui\":\"$27\",\"scheduler\":\"$29\"}\n23:{\"langcode\":\"en\",\"status\":true,\"dependencies\":\"$24\",\"third_party_settings\":\"$26\",\"name\":\"Explainer page\",\"drupal_internal__type\":\"explainer\",\"description\":\"Use \u003ci\u003eExplainer pages\u003c/i\u003e to provide general information in plain language about a policy, program, tool, service, or task related to security and privacy at CMS.\",\"help\":null,\"new_revision\":true,\"preview_mode\":1,\"display_submitted\":true}\n20:{\"type\":\"node_type--node_type\",\"id\":\"d185e460-4998-4d2b-85cb-b04f304dfb1b\",\"links\":\"$21\",\"attributes\":\"$23\"}\n2c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/user/user/e352e203-fe9c-47ba-af75-2c7f8302fca8\"}\n2b:{\"self\":\"$2c\"}\n2d:{\"display_name\":\"mburgess\"}\n2a:{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"links\":\"$2b\",\"attributes\":\"$2d\"}\n30:{\"href\":\"https://cybergeek.cms.gov/jsonapi/user/user/dca2c49b-4a12-4d5f-859d-a759444160a4\"}\n2f:{\"self\":\"$30\"}\n31:{\"display_name\":\"meg - retired\"}\n2e:{\"type\":\"user--user\",\"id\":\"dca2c49b-4a12-4d5f-859d-a759444160a4\",\"links\":\"$2f\",\"attributes\":\"$31\"}\n34:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22?resourceVersion=id%3A131\"}\n33:{\"self\":\"$34\"}\n36:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\n35:{\"drupal_internal__tid\":131,\"drupal_internal__revision_id\":131,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:13:33+00:00\",\"status\":true,\"name\":\"General Information\",\"description\":null,\"weight\":2,\"changed\":\"2023-03-10T19:04:03+00:00"])</script><script>self.__next_f.push([1,"\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$36\"}\n3a:{\"drupal_internal__target_id\":\"resource_type\"}\n39:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"3a0127c4-ee06-41ed-8239-f796f6d78eb3\",\"meta\":\"$3a\"}\n3c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/vid?resourceVersion=id%3A131\"}\n3d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/relationships/vid?resourceVersion=id%3A131\"}\n3b:{\"related\":\"$3c\",\"self\":\"$3d\"}\n38:{\"data\":\"$39\",\"links\":\"$3b\"}\n40:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/revision_user?resourceVersion=id%3A131\"}\n41:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/relationships/revision_user?resourceVersion=id%3A131\"}\n3f:{\"related\":\"$40\",\"self\":\"$41\"}\n3e:{\"data\":null,\"links\":\"$3f\"}\n48:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\n47:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$48\"}\n46:{\"help\":\"$47\"}\n45:{\"links\":\"$46\"}\n44:{\"type\":\"taxonomy_term--resource_type\",\"id\":\"virtual\",\"meta\":\"$45\"}\n43:[\"$44\"]\n4a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/parent?resourceVersion=id%3A131\"}\n4b:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/relationships/parent?resourceVersion=id%3A131\"}\n49:{\"related\":\"$4a\",\"self\":\"$4b\"}\n42:{\"data\":\"$43\",\"links\":\"$49\"}\n37:{\"vid\":\"$38\",\"revision_user\":\"$3e\",\"parent\":\"$42\"}\n32:{\"type\":\"taxonomy_term--resource_type\",\"id\":\"a17f4908-9141-4b1e-82aa-e6bfe0f91a22\",\"links\":\"$33\",\"attributes\":\"$35\",\"relationships\":\"$37\"}\n4e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5?resourceVersion=id%3A66\"}\n4d:{\"self\":\"$4e\"}\n50:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\n4f:{\"drupal_intern"])</script><script>self.__next_f.push([1,"al__tid\":66,\"drupal_internal__revision_id\":66,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:26+00:00\",\"status\":true,\"name\":\"Cyber Risk Advisor (CRA)\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:08:26+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$50\"}\n54:{\"drupal_internal__target_id\":\"roles\"}\n53:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":\"$54\"}\n56:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/vid?resourceVersion=id%3A66\"}\n57:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/relationships/vid?resourceVersion=id%3A66\"}\n55:{\"related\":\"$56\",\"self\":\"$57\"}\n52:{\"data\":\"$53\",\"links\":\"$55\"}\n5a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/revision_user?resourceVersion=id%3A66\"}\n5b:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/relationships/revision_user?resourceVersion=id%3A66\"}\n59:{\"related\":\"$5a\",\"self\":\"$5b\"}\n58:{\"data\":null,\"links\":\"$59\"}\n62:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\n61:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$62\"}\n60:{\"help\":\"$61\"}\n5f:{\"links\":\"$60\"}\n5e:{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":\"$5f\"}\n5d:[\"$5e\"]\n64:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/parent?resourceVersion=id%3A66\"}\n65:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/relationships/parent?resourceVersion=id%3A66\"}\n63:{\"related\":\"$64\",\"self\":\"$65\"}\n5c:{\"data\":\"$5d\",\"links\":\"$63\"}\n51:{\"vid\":\"$52\",\"revision_user\":\"$58\",\"parent\":\"$5c\"}\n4c:{\"type\":\"taxonomy_term--roles\",\"id\":\"9d999ae3-b43c-45fb-973e-dffe50c27da5\",\"links\":\"$4d\",\"attributes\":\"$4f\",\"relationships\":\"$51\"}\n68:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles"])</script><script>self.__next_f.push([1,"/a2b33f6a-8172-4862-9c0e-6e5076b6cf26?resourceVersion=id%3A81\"}\n67:{\"self\":\"$68\"}\n6a:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\n69:{\"drupal_internal__tid\":81,\"drupal_internal__revision_id\":81,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:09:11+00:00\",\"status\":true,\"name\":\"Data Guardian\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:09:11+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$6a\"}\n6e:{\"drupal_internal__target_id\":\"roles\"}\n6d:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":\"$6e\"}\n70:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/vid?resourceVersion=id%3A81\"}\n71:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/relationships/vid?resourceVersion=id%3A81\"}\n6f:{\"related\":\"$70\",\"self\":\"$71\"}\n6c:{\"data\":\"$6d\",\"links\":\"$6f\"}\n74:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/revision_user?resourceVersion=id%3A81\"}\n75:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/relationships/revision_user?resourceVersion=id%3A81\"}\n73:{\"related\":\"$74\",\"self\":\"$75\"}\n72:{\"data\":null,\"links\":\"$73\"}\n7c:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\n7b:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$7c\"}\n7a:{\"help\":\"$7b\"}\n79:{\"links\":\"$7a\"}\n78:{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":\"$79\"}\n77:[\"$78\"]\n7e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/parent?resourceVersion=id%3A81\"}\n7f:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/relationships/parent?resourceVersion=id%3A81\"}\n7d:{\"related\":\"$7e\",\"self\":\"$7f\"}\n76:{\"data\":\"$77\",\"links\":\"$7d\"}\n6b:{\"vid\":\"$6c\",\"revision_user\":\"$72\",\"parent\":\"$76\"}\n66:{\"type\":\"taxonomy_term--roles\",\"id\":\"a2b33f6a-8172-4862-9c0e-6"])</script><script>self.__next_f.push([1,"e5076b6cf26\",\"links\":\"$67\",\"attributes\":\"$69\",\"relationships\":\"$6b\"}\n82:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab?resourceVersion=id%3A61\"}\n81:{\"self\":\"$82\"}\n84:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\n83:{\"drupal_internal__tid\":61,\"drupal_internal__revision_id\":61,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:12+00:00\",\"status\":true,\"name\":\"Information System Security Officer (ISSO)\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:08:12+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$84\"}\n88:{\"drupal_internal__target_id\":\"roles\"}\n87:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":\"$88\"}\n8a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/vid?resourceVersion=id%3A61\"}\n8b:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/vid?resourceVersion=id%3A61\"}\n89:{\"related\":\"$8a\",\"self\":\"$8b\"}\n86:{\"data\":\"$87\",\"links\":\"$89\"}\n8e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/revision_user?resourceVersion=id%3A61\"}\n8f:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/revision_user?resourceVersion=id%3A61\"}\n8d:{\"related\":\"$8e\",\"self\":\"$8f\"}\n8c:{\"data\":null,\"links\":\"$8d\"}\n96:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\n95:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$96\"}\n94:{\"help\":\"$95\"}\n93:{\"links\":\"$94\"}\n92:{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":\"$93\"}\n91:[\"$92\"]\n98:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/parent?resourceVersion=id%3A61\"}\n99:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/parent?resourceVersion=id%3A61\"}\n97:{\"related\":\"$98\",\"s"])</script><script>self.__next_f.push([1,"elf\":\"$99\"}\n90:{\"data\":\"$91\",\"links\":\"$97\"}\n85:{\"vid\":\"$86\",\"revision_user\":\"$8c\",\"parent\":\"$90\"}\n80:{\"type\":\"taxonomy_term--roles\",\"id\":\"7a18463d-b0fc-474f-8536-ad7db1b2e5ab\",\"links\":\"$81\",\"attributes\":\"$83\",\"relationships\":\"$85\"}\n9c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34?resourceVersion=id%3A76\"}\n9b:{\"self\":\"$9c\"}\n9e:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\n9d:{\"drupal_internal__tid\":76,\"drupal_internal__revision_id\":76,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:55+00:00\",\"status\":true,\"name\":\"System / Business Owner\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:08:55+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$9e\"}\na2:{\"drupal_internal__target_id\":\"roles\"}\na1:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":\"$a2\"}\na4:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/vid?resourceVersion=id%3A76\"}\na5:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/relationships/vid?resourceVersion=id%3A76\"}\na3:{\"related\":\"$a4\",\"self\":\"$a5\"}\na0:{\"data\":\"$a1\",\"links\":\"$a3\"}\na8:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/revision_user?resourceVersion=id%3A76\"}\na9:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/relationships/revision_user?resourceVersion=id%3A76\"}\na7:{\"related\":\"$a8\",\"self\":\"$a9\"}\na6:{\"data\":null,\"links\":\"$a7\"}\nb0:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\naf:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$b0\"}\nae:{\"help\":\"$af\"}\nad:{\"links\":\"$ae\"}\nac:{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":\"$ad\"}\nab:[\"$ac\"]\nb2:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/parent?resourceVersion=id%3A76\"}\nb3:{\"href\":\"https://cybergee"])</script><script>self.__next_f.push([1,"k.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/relationships/parent?resourceVersion=id%3A76\"}\nb1:{\"related\":\"$b2\",\"self\":\"$b3\"}\naa:{\"data\":\"$ab\",\"links\":\"$b1\"}\n9f:{\"vid\":\"$a0\",\"revision_user\":\"$a6\",\"parent\":\"$aa\"}\n9a:{\"type\":\"taxonomy_term--roles\",\"id\":\"f591f442-c0b0-4b8e-af66-7998a3329f34\",\"links\":\"$9b\",\"attributes\":\"$9d\",\"relationships\":\"$9f\"}\nb6:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e?resourceVersion=id%3A71\"}\nb5:{\"self\":\"$b6\"}\nb8:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\nb7:{\"drupal_internal__tid\":71,\"drupal_internal__revision_id\":71,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:42+00:00\",\"status\":true,\"name\":\"System Teams\",\"description\":null,\"weight\":0,\"changed\":\"2024-08-02T21:29:47+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$b8\"}\nbc:{\"drupal_internal__target_id\":\"roles\"}\nbb:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":\"$bc\"}\nbe:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/vid?resourceVersion=id%3A71\"}\nbf:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/relationships/vid?resourceVersion=id%3A71\"}\nbd:{\"related\":\"$be\",\"self\":\"$bf\"}\nba:{\"data\":\"$bb\",\"links\":\"$bd\"}\nc2:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/revision_user?resourceVersion=id%3A71\"}\nc3:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/relationships/revision_user?resourceVersion=id%3A71\"}\nc1:{\"related\":\"$c2\",\"self\":\"$c3\"}\nc0:{\"data\":null,\"links\":\"$c1\"}\nca:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\nc9:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$ca\"}\nc8:{\"help\":\"$c9\"}\nc7:{\"links\":\"$c8\"}\nc6:{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":\"$c7\"}\nc5:[\"$c6\"]\ncc:{\"href\":\"https://cybergeek.c"])</script><script>self.__next_f.push([1,"ms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/parent?resourceVersion=id%3A71\"}\ncd:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/relationships/parent?resourceVersion=id%3A71\"}\ncb:{\"related\":\"$cc\",\"self\":\"$cd\"}\nc4:{\"data\":\"$c5\",\"links\":\"$cb\"}\nb9:{\"vid\":\"$ba\",\"revision_user\":\"$c0\",\"parent\":\"$c4\"}\nb4:{\"type\":\"taxonomy_term--roles\",\"id\":\"feb4e85d-429e-48b0-92f0-3d2da2c5056e\",\"links\":\"$b5\",\"attributes\":\"$b7\",\"relationships\":\"$b9\"}\nd0:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d?resourceVersion=id%3A56\"}\ncf:{\"self\":\"$d0\"}\nd2:{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}\nd1:{\"drupal_internal__tid\":56,\"drupal_internal__revision_id\":56,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:06:35+00:00\",\"status\":true,\"name\":\"Training \u0026 Awareness\",\"description\":null,\"weight\":8,\"changed\":\"2024-06-14T17:38:33+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":\"$d2\"}\nd6:{\"drupal_internal__target_id\":\"topics\"}\nd5:{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"73f89dec-123f-4c8c-9a97-d025a2b0e5cf\",\"meta\":\"$d6\"}\nd8:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/vid?resourceVersion=id%3A56\"}\nd9:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/vid?resourceVersion=id%3A56\"}\nd7:{\"related\":\"$d8\",\"self\":\"$d9\"}\nd4:{\"data\":\"$d5\",\"links\":\"$d7\"}\ndc:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/revision_user?resourceVersion=id%3A56\"}\ndd:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/revision_user?resourceVersion=id%3A56\"}\ndb:{\"related\":\"$dc\",\"self\":\"$dd\"}\nda:{\"data\":null,\"links\":\"$db\"}\ne4:{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}\ne3:{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":\"$"])</script><script>self.__next_f.push([1,"e4\"}\ne2:{\"help\":\"$e3\"}\ne1:{\"links\":\"$e2\"}\ne0:{\"type\":\"taxonomy_term--topics\",\"id\":\"virtual\",\"meta\":\"$e1\"}\ndf:[\"$e0\"]\ne6:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/parent?resourceVersion=id%3A56\"}\ne7:{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/parent?resourceVersion=id%3A56\"}\ne5:{\"related\":\"$e6\",\"self\":\"$e7\"}\nde:{\"data\":\"$df\",\"links\":\"$e5\"}\nd3:{\"vid\":\"$d4\",\"revision_user\":\"$da\",\"parent\":\"$de\"}\nce:{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"links\":\"$cf\",\"attributes\":\"$d1\",\"relationships\":\"$d3\"}\nea:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0?resourceVersion=id%3A19481\"}\ne9:{\"self\":\"$ea\"}\nec:[]\nee:T632,\u003ch2\u003eWhat is CyberWorks?\u003c/h2\u003e\u003cp\u003eCMS CyberWorks is an annual cybersecurity event that brings together industry experts, thought leaders, and CMS staff to explore the latest trends and best practices in the ever-evolving field of cybersecurity. With a focus on safeguarding digital privacy, managing cyber risks, and promoting secure online behavior, CyberWorks is designed to engage CMS privacy and cyber professionals across the enterprise.\u003cbr\u003e\u003cbr\u003eAttendees can expect engaging sessions covering important topics such as privacy protection in the age of data breaches, advanced risk management strategies to combat cyber threats, innovative approaches to password management, and the importance of safe browsing habits in today's interconnected digital landscape.\u003cbr\u003e\u003cbr\u003eWhether you're a seasoned cybersecurity professional or just looking to expand your knowledge and awareness in your daily work, CyberWorks will equip you to stay ahead of cyber adversaries and protect your organization's digital assets.\u003cbr\u003e\u003cbr\u003eYou can participate in CMS CyberWorks every October during National Cybersecurity Awareness Month.\u003c/p\u003e\u003ch2\u003eCyberWorks 2024 recordings\u003c/h2\u003e\u003cp dir=\"ltr\"\u003eCyberWorks 2024 was a great success. Thank you to everyon"])</script><script>self.__next_f.push([1,"e who contributed to and participated in the event!\u003c/p\u003e\u003cp dir=\"ltr\"\u003e\u003ca href=\"https://cmscyberworks.fbcevent.com/agenda\"\u003eRecordings of the sessions are available here\u003c/a\u003e.\u003c/p\u003e\u003cp dir=\"ltr\"\u003eIf you attended, we'd love to hear what you thought about CyberWorks 2024.\u003c/p\u003e\u003cp dir=\"ltr\"\u003e\u003ca href=\"https://forms.office.com/g/iYxVHTDwpg\"\u003ePlease give your feedback here\u003c/a\u003e.\u003c/p\u003eef:T632,\u003ch2\u003eWhat is CyberWorks?\u003c/h2\u003e\u003cp\u003eCMS CyberWorks is an annual cybersecurity event that brings together industry experts, thought leaders, and CMS staff to explore the latest trends and best practices in the ever-evolving field of cybersecurity. With a focus on safeguarding digital privacy, managing cyber risks, and promoting secure online behavior, CyberWorks is designed to engage CMS privacy and cyber professionals across the enterprise.\u003cbr\u003e\u003cbr\u003eAttendees can expect engaging sessions covering important topics such as privacy protection in the age of data breaches, advanced risk management strategies to combat cyber threats, innovative approaches to password management, and the importance of safe browsing habits in today's interconnected digital landscape.\u003cbr\u003e\u003cbr\u003eWhether you're a seasoned cybersecurity professional or just looking to expand your knowledge and awareness in your daily work, CyberWorks will equip you to stay ahead of cyber adversaries and protect your organization's digital assets.\u003cbr\u003e\u003cbr\u003eYou can participate in CMS CyberWorks every October during National Cybersecurity Awareness Month.\u003c/p\u003e\u003ch2\u003eCyberWorks 2024 recordings\u003c/h2\u003e\u003cp dir=\"ltr\"\u003eCyberWorks 2024 was a great success. Thank you to everyone who contributed to and participated in the event!\u003c/p\u003e\u003cp dir=\"ltr\"\u003e\u003ca href=\"https://cmscyberworks.fbcevent.com/agenda\"\u003eRecordings of the sessions are available here\u003c/a\u003e.\u003c/p\u003e\u003cp dir=\"ltr\"\u003eIf you attended, we'd love to hear what you thought about CyberWorks 2024.\u003c/p\u003e\u003cp dir=\"ltr\"\u003e\u003ca href=\"https://forms.office.com/g/iYxVHTDwpg\"\u003ePlease give your feedback here\u003c/a\u003e.\u003c/p\u003eed:{\"value\":\"$ee\",\"format\":\"body_text\",\"processed\":\"$ef\"}\neb:{\"drupal_internal__id\":3437,"])</script><script>self.__next_f.push([1,"\"drupal_internal__revision_id\":19481,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-09-18T18:19:54+00:00\",\"parent_id\":\"1149\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":\"$ec\",\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":\"$ed\"}\nf3:{\"drupal_internal__target_id\":\"page_section\"}\nf2:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":\"$f3\"}\nf5:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0/paragraph_type?resourceVersion=id%3A19481\"}\nf6:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0/relationships/paragraph_type?resourceVersion=id%3A19481\"}\nf4:{\"related\":\"$f5\",\"self\":\"$f6\"}\nf1:{\"data\":\"$f2\",\"links\":\"$f4\"}\nf9:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0/field_specialty_item?resourceVersion=id%3A19481\"}\nfa:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0/relationships/field_specialty_item?resourceVersion=id%3A19481\"}\nf8:{\"related\":\"$f9\",\"self\":\"$fa\"}\nf7:{\"data\":null,\"links\":\"$f8\"}\nf0:{\"paragraph_type\":\"$f1\",\"field_specialty_item\":\"$f7\"}\ne8:{\"type\":\"paragraph--page_section\",\"id\":\"8ceaf677-74a8-4e7a-88ca-00b15c8068f0\",\"links\":\"$e9\",\"attributes\":\"$eb\",\"relationships\":\"$f0\"}\nfd:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb?resourceVersion=id%3A19482\"}\nfc:{\"self\":\"$fd\"}\nff:[]\nfe:{\"drupal_internal__id\":3441,\"drupal_internal__revision_id\":19482,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-09-18T19:12:16+00:00\",\"parent_id\":\"1149\",\"parent_type\":\"node\",\"parent_field_name\":\"field_related_collection\",\"behavior_settings\":\"$ff\",\"default_langcode\":true,\"revision_translation_affected\":true}\n103:{\"drupal_internal__target_id\":\"internal_link\"}\n102:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"81d4313f-807c-40e2-8ffa-700ec8c17167\",\"meta\":\"$103\"}\n105"])</script><script>self.__next_f.push([1,":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb/paragraph_type?resourceVersion=id%3A19482\"}\n106:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb/relationships/paragraph_type?resourceVersion=id%3A19482\"}\n104:{\"related\":\"$105\",\"self\":\"$106\"}\n101:{\"data\":\"$102\",\"links\":\"$104\"}\n109:{\"drupal_internal__target_id\":1180}\n108:{\"type\":\"node--blog\",\"id\":\"ac546b72-4d1a-4068-b86c-28452c192c10\",\"meta\":\"$109\"}\n10b:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb/field_link?resourceVersion=id%3A19482\"}\n10c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb/relationships/field_link?resourceVersion=id%3A19482\"}\n10a:{\"related\":\"$10b\",\"self\":\"$10c\"}\n107:{\"data\":\"$108\",\"links\":\"$10a\"}\n100:{\"paragraph_type\":\"$101\",\"field_link\":\"$107\"}\nfb:{\"type\":\"paragraph--internal_link\",\"id\":\"a644fafb-289e-447a-ab12-f8b24b698bdb\",\"links\":\"$fc\",\"attributes\":\"$fe\",\"relationships\":\"$100\"}\n10f:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7?resourceVersion=id%3A19483\"}\n10e:{\"self\":\"$10f\"}\n111:[]\n110:{\"drupal_internal__id\":3513,\"drupal_internal__revision_id\":19483,\"langcode\":\"en\",\"status\":true,\"created\":\"2024-07-02T15:45:33+00:00\",\"parent_id\":\"1149\",\"parent_type\":\"node\",\"parent_field_name\":\"field_related_collection\",\"behavior_settings\":\"$111\",\"default_langcode\":true,\"revision_translation_affected\":true}\n115:{\"drupal_internal__target_id\":\"internal_link\"}\n114:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"81d4313f-807c-40e2-8ffa-700ec8c17167\",\"meta\":\"$115\"}\n117:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7/paragraph_type?resourceVersion=id%3A19483\"}\n118:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7/relationships/paragraph_type?resourceVersion=id%3A19483\"}\n116:{\"related\""])</script><script>self.__next_f.push([1,":\"$117\",\"self\":\"$118\"}\n113:{\"data\":\"$114\",\"links\":\"$116\"}\n11b:{\"drupal_internal__target_id\":1208}\n11a:{\"type\":\"node--blog\",\"id\":\"2b214ce1-6a86-4f13-a358-c5c527d56e8f\",\"meta\":\"$11b\"}\n11d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7/field_link?resourceVersion=id%3A19483\"}\n11e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7/relationships/field_link?resourceVersion=id%3A19483\"}\n11c:{\"related\":\"$11d\",\"self\":\"$11e\"}\n119:{\"data\":\"$11a\",\"links\":\"$11c\"}\n112:{\"paragraph_type\":\"$113\",\"field_link\":\"$119\"}\n10d:{\"type\":\"paragraph--internal_link\",\"id\":\"8f74d15c-08f2-4272-822e-ea3031b60ef7\",\"links\":\"$10e\",\"attributes\":\"$110\",\"relationships\":\"$112\"}\n121:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c?resourceVersion=id%3A19484\"}\n120:{\"self\":\"$121\"}\n123:[]\n122:{\"drupal_internal__id\":3514,\"drupal_internal__revision_id\":19484,\"langcode\":\"en\",\"status\":true,\"created\":\"2024-07-02T15:45:44+00:00\",\"parent_id\":\"1149\",\"parent_type\":\"node\",\"parent_field_name\":\"field_related_collection\",\"behavior_settings\":\"$123\",\"default_langcode\":true,\"revision_translation_affected\":true}\n127:{\"drupal_internal__target_id\":\"internal_link\"}\n126:{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"81d4313f-807c-40e2-8ffa-700ec8c17167\",\"meta\":\"$127\"}\n129:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c/paragraph_type?resourceVersion=id%3A19484\"}\n12a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c/relationships/paragraph_type?resourceVersion=id%3A19484\"}\n128:{\"related\":\"$129\",\"self\":\"$12a\"}\n125:{\"data\":\"$126\",\"links\":\"$128\"}\n12d:{\"drupal_internal__target_id\":1213}\n12c:{\"type\":\"node--blog\",\"id\":\"ea83cc8d-9007-49b5-9e97-262e0770d711\",\"meta\":\"$12d\"}\n12f:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c/field_link?resourceVersion=id%3A1948"])</script><script>self.__next_f.push([1,"4\"}\n130:{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c/relationships/field_link?resourceVersion=id%3A19484\"}\n12e:{\"related\":\"$12f\",\"self\":\"$130\"}\n12b:{\"data\":\"$12c\",\"links\":\"$12e\"}\n124:{\"paragraph_type\":\"$125\",\"field_link\":\"$12b\"}\n11f:{\"type\":\"paragraph--internal_link\",\"id\":\"aba91053-95f0-4702-8c13-abee0393d51c\",\"links\":\"$120\",\"attributes\":\"$122\",\"relationships\":\"$124\"}\n133:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10?resourceVersion=id%3A5840\"}\n132:{\"self\":\"$133\"}\n135:{\"alias\":\"/posts/cyber360\",\"pid\":1186,\"langcode\":\"en\"}\n137:Tbb6,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eWhat is Cyber360?\u003c/h2\u003e\u003cp\u003eIn an era dominated by digital advancements, the importance of cybersecurity has skyrocketed. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety.\u003c/p\u003e\u003ch2\u003eWhat to expect from Cyber360\u003c/h2\u003e\u003cp\u003e\u003cstrong\u003eApril: Staying safe online\u0026nbsp;\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series kicks off with a focus on staying safe online.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMay: Navigating cybersecurity as a family\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAttention shifts to family cybersecurity, offering strategies to safeguard families against online threats and ensuring a safe digital home environment.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eJune: Secure online communities\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series explores community cybersecurity, teaching how to secure online community spaces and maintain trust and safety for all members.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eJuly: Keeping financial information safe\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eFinancial cybersecurity takes the stage, with insights on protecting financial information in the age of online banking and digital transactions.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eAugust: Safety for online hobbies\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eFor hobbyists, this month covers how to safely engage in online hobbies, from gaming to blogging, protecting digital assets and personal information.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSeptember: Individual cybersecurity and responsibility\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eA personal focus on individual cybersecurity, emphasizing the importance of securing one's digital footprint and personal data online.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eOctober: CyberWorks!\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series culminates with the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003eCyberWorks event\u003c/a\u003e, a hybrid finale on \u003cstrong\u003eOctober 15,\u003c/strong\u003e hosted both in-person and virtually. This event promises a deep dive into the latest cybersecurity trends, strategies, and insights.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eWhy attend CyberWorks?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCyberWorks is the grand finale of the Cyber360 series, where education meets excitement. This event is your chance to dive into the latest in cybersecurity, interact with various vendors, and hear from inspirational keynote speakers. It's a perfect mix of learning and fun; designed for everyone from professionals to enthusiasts eager to enhance their digital safety.\u003c/p\u003e\u003cp\u003eMark your calendars for October 15th for an unforgettable day that brings together knowledge, skills, and enthusiasm in a dynamic hybrid format. We're excited to see you there for a memorable experience of networking and discovery. Don't miss out on this unique opportunity to connect and grow in the world of cybersecurity!\u0026nbsp;\u003c/p\u003e\u003cp\u003eFor more information, visit the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003eCyberWorks page here\u003c/a\u003e and join our CMS Slack channel \u003cstrong\u003e#Cyberworks2024.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003e\u0026nbsp;\u003c/p\u003e"])</script><script>self.__next_f.push([1,"138:Tbb6,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eWhat is Cyber360?\u003c/h2\u003e\u003cp\u003eIn an era dominated by digital advancements, the importance of cybersecurity has skyrocketed. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety.\u003c/p\u003e\u003ch2\u003eWhat to expect from Cyber360\u003c/h2\u003e\u003cp\u003e\u003cstrong\u003eApril: Staying safe online\u0026nbsp;\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series kicks off with a focus on staying safe online.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eMay: Navigating cybersecurity as a family\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAttention shifts to family cybersecurity, offering strategies to safeguard families against online threats and ensuring a safe digital home environment.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eJune: Secure online communities\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series explores community cybersecurity, teaching how to secure online community spaces and maintain trust and safety for all members.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eJuly: Keeping financial information safe\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eFinancial cybersecurity takes the stage, with insights on protecting financial information in the age of online banking and digital transactions.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eAugust: Safety for online hobbies\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eFor hobbyists, this month covers how to safely engage in online hobbies, from gaming to blogging, protecting digital assets and personal information.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSeptember: Individual cybersecurity and responsibility\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eA personal focus on individual cybersecurity, emphasizing the importance of securing one's digital footprint and personal data online.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eOctober: CyberWorks!\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eThe series culminates with the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003eCyberWorks event\u003c/a\u003e, a hybrid finale on \u003cstrong\u003eOctober 15,\u003c/strong\u003e hosted both in-person and virtually. This event promises a deep dive into the latest cybersecurity trends, strategies, and insights.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eWhy attend CyberWorks?\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCyberWorks is the grand finale of the Cyber360 series, where education meets excitement. This event is your chance to dive into the latest in cybersecurity, interact with various vendors, and hear from inspirational keynote speakers. It's a perfect mix of learning and fun; designed for everyone from professionals to enthusiasts eager to enhance their digital safety.\u003c/p\u003e\u003cp\u003eMark your calendars for October 15th for an unforgettable day that brings together knowledge, skills, and enthusiasm in a dynamic hybrid format. We're excited to see you there for a memorable experience of networking and discovery. Don't miss out on this unique opportunity to connect and grow in the world of cybersecurity!\u0026nbsp;\u003c/p\u003e\u003cp\u003eFor more information, visit the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003eCyberWorks page here\u003c/a\u003e and join our CMS Slack channel \u003cstrong\u003e#Cyberworks2024.\u003c/strong\u003e\u003c/p\u003e\u003cp\u003e\u0026nbsp;\u003c/p\u003e"])</script><script>self.__next_f.push([1,"136:{\"value\":\"$137\",\"format\":\"body_text\",\"processed\":\"$138\",\"summary\":\"\"}\n139:{\"value\":\" From April - October, a series of events is open to everyone at CMS to improve digital safety at work and beyond\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eFrom April - October, a series of events is open to everyone at CMS to improve digital safety at work and beyond\u003c/p\u003e\\n\"}\n134:{\"drupal_internal__nid\":1180,\"drupal_internal__vid\":5840,\"langcode\":\"en\",\"revision_timestamp\":\"2024-08-06T16:39:13+00:00\",\"status\":true,\"title\":\"Cyber360: An online event series to help you stay cyber secure\",\"created\":\"2024-04-02T13:58:34+00:00\",\"changed\":\"2024-08-06T16:39:13+00:00\",\"promote\":false,\"sticky\":false,\"default_langcode\":true,\"revision_translation_affected\":true,\"moderation_state\":\"published\",\"path\":\"$135\",\"rh_action\":null,\"rh_redirect\":null,\"rh_redirect_response\":null,\"rh_redirect_fallback_action\":null,\"publish_on\":null,\"unpublish_on\":null,\"body\":\"$136\",\"field_short_description\":\"$139\",\"field_video_link\":\"https://youtu.be/uj0f-NJVCt4?si=he8c4Bz-RAy8kkwR\"}\n13d:{\"drupal_internal__target_id\":\"blog\"}\n13c:{\"type\":\"node_type--node_type\",\"id\":\"f382c03e-0cc5-4892-aa46-653a2d90fc05\",\"meta\":\"$13d\"}\n13f:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/node_type?resourceVersion=id%3A5840\"}\n140:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/node_type?resourceVersion=id%3A5840\"}\n13e:{\"related\":\"$13f\",\"self\":\"$140\"}\n13b:{\"data\":\"$13c\",\"links\":\"$13e\"}\n143:{\"drupal_internal__target_id\":94}\n142:{\"type\":\"user--user\",\"id\":\"c34b79d4-f936-45dd-968f-7efc22d4370b\",\"meta\":\"$143\"}\n145:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/revision_uid?resourceVersion=id%3A5840\"}\n146:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/revision_uid?resourceVersion=id%3A5840\"}\n144:{\"related\":\"$145\",\"self\":\"$146\"}\n141:{\"data\":\"$142\",\"links\":\"$144\"}\n149:{\"drupal_internal__target_id\":137}\n14"])</script><script>self.__next_f.push([1,"8:{\"type\":\"user--user\",\"id\":\"7d07692d-56ec-4a02-a8aa-5913ee3871e3\",\"meta\":\"$149\"}\n14b:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/uid?resourceVersion=id%3A5840\"}\n14c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/uid?resourceVersion=id%3A5840\"}\n14a:{\"related\":\"$14b\",\"self\":\"$14c\"}\n147:{\"data\":\"$148\",\"links\":\"$14a\"}\n14f:{\"drupal_internal__target_id\":46}\n14e:{\"type\":\"media--blog_cover_image\",\"id\":\"6873150c-7be2-46ef-ac42-754e174ef228\",\"meta\":\"$14f\"}\n151:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_cover_image?resourceVersion=id%3A5840\"}\n152:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_cover_image?resourceVersion=id%3A5840\"}\n150:{\"related\":\"$151\",\"self\":\"$152\"}\n14d:{\"data\":\"$14e\",\"links\":\"$150\"}\n155:{\"drupal_internal__target_id\":37}\n154:{\"type\":\"group--team\",\"id\":\"aefc74af-7595-46cc-9835-0f35ae5d6dcf\",\"meta\":\"$155\"}\n157:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_publisher_group?resourceVersion=id%3A5840\"}\n158:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_publisher_group?resourceVersion=id%3A5840\"}\n156:{\"related\":\"$157\",\"self\":\"$158\"}\n153:{\"data\":\"$154\",\"links\":\"$156\"}\n15b:{\"drupal_internal__target_id\":116}\n15a:{\"type\":\"taxonomy_term--resource_type\",\"id\":\"541ccc21-c894-45e2-88db-cb8f935100bd\",\"meta\":\"$15b\"}\n15d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_resource_type?resourceVersion=id%3A5840\"}\n15e:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_resource_type?resourceVersion=id%3A5840\"}\n15c:{\"related\":\"$15d\",\"self\":\"$15e\"}\n159:{\"data\":\"$15a\",\"links\":\"$15c\"}\n160:[]\n162:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_roles?resour"])</script><script>self.__next_f.push([1,"ceVersion=id%3A5840\"}\n163:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_roles?resourceVersion=id%3A5840\"}\n161:{\"related\":\"$162\",\"self\":\"$163\"}\n15f:{\"data\":\"$160\",\"links\":\"$161\"}\n167:{\"drupal_internal__target_id\":56}\n166:{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"meta\":\"$167\"}\n165:[\"$166\"]\n169:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_topics?resourceVersion=id%3A5840\"}\n16a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_topics?resourceVersion=id%3A5840\"}\n168:{\"related\":\"$169\",\"self\":\"$16a\"}\n164:{\"data\":\"$165\",\"links\":\"$168\"}\n13a:{\"node_type\":\"$13b\",\"revision_uid\":\"$141\",\"uid\":\"$147\",\"field_cover_image\":\"$14d\",\"field_publisher_group\":\"$153\",\"field_resource_type\":\"$159\",\"field_roles\":\"$15f\",\"field_topics\":\"$164\"}\n131:{\"type\":\"node--blog\",\"id\":\"ac546b72-4d1a-4068-b86c-28452c192c10\",\"links\":\"$132\",\"attributes\":\"$134\",\"relationships\":\"$13a\"}\n16d:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f?resourceVersion=id%3A5907\"}\n16c:{\"self\":\"$16d\"}\n16f:{\"alias\":\"/posts/cber360-august-keeping-your-online-hobbies-safe-guide-cybersecurity\",\"pid\":1230,\"langcode\":\"en\"}\n171:Ted5,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eTips for staying secure with online hobbies\u003c/h2\u003e\u003cp\u003eFor this month on \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eCyber360\u003c/a\u003e, we're looking at ways to stay safe with your hobbies in the digital world.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSocial Media: Share with care\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eSocial media is a fun place to post about hobbies like baking, gardening, or playing music. However, sharing too much can attract scammers. For example, talking about an upcoming trip might tip off thieves that your house will be empty. To stay safe, adjust your privacy settings so only friends can see your posts, and be careful about accepting friend requests or messages from people you don't know. When joining hobby groups or making video calls, make sure the settings are private to keep unwanted guests out.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eGaming: Play it safe\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eGaming is all about fun and competition, but it’s also a hotspot for cyber threats like phishing and malware. Protect your gaming accounts with strong, unique passwords and turn on two-factor authentication for an extra layer of security. Be cautious about where you download game files and mods—stick to trusted sources to avoid downloading harmful software.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFantasy sports and betting\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eSites where you manage fantasy sports teams or bet on games ask for a lot of personal info, which can make you a target for scams. Only use reputable websites that have good security practices, and keep your login details private. Regularly check your account for any strange activity.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWatching out for sports scams\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eScammers love to exploit sports fans, especially during big game seasons, by selling fake tickets or counterfeit gear. Always buy tickets from the official venue or a reputable reseller, and avoid deals that seem too good to be true. Similarly, buy team merchandise directly from official stores or approved retailers to ensure you're getting the real thing. When it comes to betting, use well-known and legally recognized platforms that have positive reviews.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWrap-up\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEnjoying hobbies online adds fun to our lives, but it’s important to keep them secure. By being smart about what you share, protecting your accounts, and staying aware of common scams, you can safely enjoy your hobbies without worry.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eAbout Cyber360\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCybersecurity is more important than ever in today's world of digital and technological advancements. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October 2024, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety. \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eLearn more about Cyber360 here\u003c/a\u003e.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eGet ready for CyberWorks!\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eRemember to join us at the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003e\u003cstrong\u003eCyberWorks event\u003c/strong\u003e\u003c/a\u003e on October 15th, 2024! This event will be a fantastic opportunity for families to learn more about cybersecurity, engage with experts, and discover the latest trends and strategies to keep their digital homes safe. Join our CMS Slack channel \u003ca href=\"https://cmsgov.slack.com/archives/C06S6HH6M37\" rel=\"noopener noreferrer\"\u003e\u003cstrong\u003e#CyberWorks2024\u003c/strong\u003e\u003c/a\u003e for updates.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eMore resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor a complete overview of training opportunities and best practices for keeping data and systems safe at CMS, check out the \u003ca href=\"https://security.cms.gov/policy-guidance/cms-cybersecurity-and-privacy-handbook\"\u003eCMS Information Security and Privacy Training Handbook\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"172:Ted5,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eTips for staying secure with online hobbies\u003c/h2\u003e\u003cp\u003eFor this month on \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eCyber360\u003c/a\u003e, we're looking at ways to stay safe with your hobbies in the digital world.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eSocial Media: Share with care\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eSocial media is a fun place to post about hobbies like baking, gardening, or playing music. However, sharing too much can attract scammers. For example, talking about an upcoming trip might tip off thieves that your house will be empty. To stay safe, adjust your privacy settings so only friends can see your posts, and be careful about accepting friend requests or messages from people you don't know. When joining hobby groups or making video calls, make sure the settings are private to keep unwanted guests out.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eGaming: Play it safe\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eGaming is all about fun and competition, but it’s also a hotspot for cyber threats like phishing and malware. Protect your gaming accounts with strong, unique passwords and turn on two-factor authentication for an extra layer of security. Be cautious about where you download game files and mods—stick to trusted sources to avoid downloading harmful software.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFantasy sports and betting\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eSites where you manage fantasy sports teams or bet on games ask for a lot of personal info, which can make you a target for scams. Only use reputable websites that have good security practices, and keep your login details private. Regularly check your account for any strange activity.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWatching out for sports scams\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eScammers love to exploit sports fans, especially during big game seasons, by selling fake tickets or counterfeit gear. Always buy tickets from the official venue or a reputable reseller, and avoid deals that seem too good to be true. Similarly, buy team merchandise directly from official stores or approved retailers to ensure you're getting the real thing. When it comes to betting, use well-known and legally recognized platforms that have positive reviews.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eWrap-up\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eEnjoying hobbies online adds fun to our lives, but it’s important to keep them secure. By being smart about what you share, protecting your accounts, and staying aware of common scams, you can safely enjoy your hobbies without worry.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eAbout Cyber360\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCybersecurity is more important than ever in today's world of digital and technological advancements. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October 2024, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety. \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eLearn more about Cyber360 here\u003c/a\u003e.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eGet ready for CyberWorks!\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eRemember to join us at the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003e\u003cstrong\u003eCyberWorks event\u003c/strong\u003e\u003c/a\u003e on October 15th, 2024! This event will be a fantastic opportunity for families to learn more about cybersecurity, engage with experts, and discover the latest trends and strategies to keep their digital homes safe. Join our CMS Slack channel \u003ca href=\"https://cmsgov.slack.com/archives/C06S6HH6M37\" rel=\"noopener noreferrer\"\u003e\u003cstrong\u003e#CyberWorks2024\u003c/strong\u003e\u003c/a\u003e for updates.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eMore resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor a complete overview of training opportunities and best practices for keeping data and systems safe at CMS, check out the \u003ca href=\"https://security.cms.gov/policy-guidance/cms-cybersecurity-and-privacy-handbook\"\u003eCMS Information Security and Privacy Training Handbook\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"170:{\"value\":\"$171\",\"format\":\"body_text\",\"processed\":\"$172\",\"summary\":\"\"}\n173:{\"value\":\"Hobbies are a great way to relax and unwind. Here’s how to keep your favorite pastimes safe from cyber threats.\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eHobbies are a great way to relax and unwind. Here’s how to keep your favorite pastimes safe from cyber threats.\u003c/p\u003e\\n\"}\n16e:{\"drupal_internal__nid\":1208,\"drupal_internal__vid\":5907,\"langcode\":\"en\",\"revision_timestamp\":\"2024-09-11T22:12:18+00:00\",\"status\":true,\"title\":\"Cyber360 August- Keeping your online hobbies cyber secure\",\"created\":\"2024-08-05T14:33:14+00:00\",\"changed\":\"2024-09-11T22:12:18+00:00\",\"promote\":false,\"sticky\":false,\"default_langcode\":true,\"revision_translation_affected\":true,\"moderation_state\":\"published\",\"path\":\"$16f\",\"rh_action\":null,\"rh_redirect\":null,\"rh_redirect_response\":null,\"rh_redirect_fallback_action\":null,\"publish_on\":null,\"unpublish_on\":null,\"body\":\"$170\",\"field_short_description\":\"$173\",\"field_video_link\":null}\n177:{\"drupal_internal__target_id\":\"blog\"}\n176:{\"type\":\"node_type--node_type\",\"id\":\"f382c03e-0cc5-4892-aa46-653a2d90fc05\",\"meta\":\"$177\"}\n179:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/node_type?resourceVersion=id%3A5907\"}\n17a:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/node_type?resourceVersion=id%3A5907\"}\n178:{\"related\":\"$179\",\"self\":\"$17a\"}\n175:{\"data\":\"$176\",\"links\":\"$178\"}\n17d:{\"drupal_internal__target_id\":6}\n17c:{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"meta\":\"$17d\"}\n17f:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/revision_uid?resourceVersion=id%3A5907\"}\n180:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/revision_uid?resourceVersion=id%3A5907\"}\n17e:{\"related\":\"$17f\",\"self\":\"$180\"}\n17b:{\"data\":\"$17c\",\"links\":\"$17e\"}\n183:{\"drupal_internal__target_id\":155}\n182:{\"type\":\"user--user\",\"id\":\"7e6e5827-619d-4ef2-8eb"])</script><script>self.__next_f.push([1,"3-785e6c3bbfd2\",\"meta\":\"$183\"}\n185:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/uid?resourceVersion=id%3A5907\"}\n186:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/uid?resourceVersion=id%3A5907\"}\n184:{\"related\":\"$185\",\"self\":\"$186\"}\n181:{\"data\":\"$182\",\"links\":\"$184\"}\n189:{\"drupal_internal__target_id\":6}\n188:{\"type\":\"media--blog_cover_image\",\"id\":\"72738a9d-42bb-4ba9-90c2-635a49ceeb81\",\"meta\":\"$189\"}\n18b:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_cover_image?resourceVersion=id%3A5907\"}\n18c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_cover_image?resourceVersion=id%3A5907\"}\n18a:{\"related\":\"$18b\",\"self\":\"$18c\"}\n187:{\"data\":\"$188\",\"links\":\"$18a\"}\n18f:{\"drupal_internal__target_id\":37}\n18e:{\"type\":\"group--team\",\"id\":\"aefc74af-7595-46cc-9835-0f35ae5d6dcf\",\"meta\":\"$18f\"}\n191:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_publisher_group?resourceVersion=id%3A5907\"}\n192:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_publisher_group?resourceVersion=id%3A5907\"}\n190:{\"related\":\"$191\",\"self\":\"$192\"}\n18d:{\"data\":\"$18e\",\"links\":\"$190\"}\n195:{\"drupal_internal__target_id\":106}\n194:{\"type\":\"taxonomy_term--resource_type\",\"id\":\"cccd136f-b478-40f0-8ff8-fd73f75f4ab0\",\"meta\":\"$195\"}\n197:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_resource_type?resourceVersion=id%3A5907\"}\n198:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_resource_type?resourceVersion=id%3A5907\"}\n196:{\"related\":\"$197\",\"self\":\"$198\"}\n193:{\"data\":\"$194\",\"links\":\"$196\"}\n19a:[]\n19c:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_roles?resourceVersion=id%3A5907\"}\n19d:{\"href\":\"https://cybergeek"])</script><script>self.__next_f.push([1,".cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_roles?resourceVersion=id%3A5907\"}\n19b:{\"related\":\"$19c\",\"self\":\"$19d\"}\n199:{\"data\":\"$19a\",\"links\":\"$19b\"}\n1a1:{\"drupal_internal__target_id\":56}\n1a0:{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"meta\":\"$1a1\"}\n19f:[\"$1a0\"]\n1a3:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_topics?resourceVersion=id%3A5907\"}\n1a4:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_topics?resourceVersion=id%3A5907\"}\n1a2:{\"related\":\"$1a3\",\"self\":\"$1a4\"}\n19e:{\"data\":\"$19f\",\"links\":\"$1a2\"}\n174:{\"node_type\":\"$175\",\"revision_uid\":\"$17b\",\"uid\":\"$181\",\"field_cover_image\":\"$187\",\"field_publisher_group\":\"$18d\",\"field_resource_type\":\"$193\",\"field_roles\":\"$199\",\"field_topics\":\"$19e\"}\n16b:{\"type\":\"node--blog\",\"id\":\"2b214ce1-6a86-4f13-a358-c5c527d56e8f\",\"links\":\"$16c\",\"attributes\":\"$16e\",\"relationships\":\"$174\"}\n1a7:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711?resourceVersion=id%3A5905\"}\n1a6:{\"self\":\"$1a7\"}\n1a9:{\"alias\":\"/posts/cyber360-september\",\"pid\":1270,\"langcode\":\"en\"}\n1ab:T1321,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eTips for keeping yourself safe in the digital world\u003c/h2\u003e\u003cp\u003eIn today's increasingly digital world, cybersecurity attacks have become a pervasive threat that can have serious personal consequences for individuals. From identity theft to financial fraud, the impact of these attacks can be far-reaching and long-lasting. Understanding the nature of these threats and taking proactive steps to safeguard our digital lives is crucial in protecting ourselves from the dangers of cybercrime.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eThe rise of cybersecurity attacks\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eCybersecurity attacks have been on the rise in recent years, with hackers targeting individuals, businesses, and even governments. According to a report by Cybersecurity Ventures, it is estimated that cybercrime will cost the global economy $6 trillion annually by 2021. This staggering figure underscores the scale of the threat posed by cybercriminals and the urgent need for individuals to take cybersecurity seriously.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003ePersonal data breaches and identity theft\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eOne of the most common forms of cybersecurity attacks is personal data breaches, where hackers gain unauthorized access to sensitive information such as credit card numbers, social security numbers, and login credentials. This stolen information can then be used to commit identity theft, a crime that can have devastating consequences for victims. Identity theft can result in financial losses, damage to credit scores, and even legal troubles if the stolen identity is used to commit further crimes.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFinancial fraud and scams\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAnother significant impact of cybersecurity attacks is financial fraud and scams. Phishing emails, fraudulent websites, and malware-infected software are commonly used by cybercriminals to trick individuals into revealing their financial information or transferring money to fraudulent accounts. Once the money is stolen, it can be extremely difficult to recover, leading to financial hardship for the victims.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eEmotional and psychological toll\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eIn addition to the financial repercussions, cybersecurity attacks can also take a toll on the emotional and psychological well-being of individuals. The sense of violation that comes with having your personal information stolen can be deeply unsettling, leading to feelings of anxiety, stress, and vulnerability. Victims of cybercrime may also experience a loss of trust in online platforms and a heightened sense of paranoia about their digital security.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eProtecting yourself from cybersecurity attacks\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWhile the threat of cybersecurity attacks is real and pervasive, there are steps that individuals can take to protect themselves from falling victim to cybercrime. Using strong, unique passwords for each online account, enabling two-factor authentication, keeping software and antivirus programs up to date, and being cautious of suspicious emails and websites are all important measures in safeguarding your digital life.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eConclusion\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eCybersecurity attacks pose a significant threat to individuals in today's digital age, with the potential for financial, emotional, and psychological harm. By understanding the nature of these threats and taking proactive steps to protect ourselves, we can reduce our risk of falling victim to cybercrime and safeguard our digital lives for the future.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eAbout Cyber360\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCybersecurity is more important than ever in today's world of digital and technological advancements. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October 2024, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety. \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eLearn more about Cyber360 here\u003c/a\u003e.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eGet ready for CyberWorks!\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eRemember to join us at the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003e\u003cstrong\u003eCyberWorks event\u003c/strong\u003e\u003c/a\u003e on October 15th, 2024! This event will be a fantastic opportunity for families to learn more about cybersecurity, engage with experts, and discover the latest trends and strategies to keep their digital homes safe.\u0026nbsp;\u003c/p\u003e\u003cp\u003eJoin our CMS Slack channel \u003ca href=\"https://cmsgov.slack.com/archives/C06S6HH6M37\" rel=\"noopener noreferrer\"\u003e\u003cstrong\u003e#CyberWorks2024\u003c/strong\u003e\u003c/a\u003e for updates.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eMore resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor a complete overview of training opportunities and best practices for keeping data and systems safe at CMS, check out the \u003ca href=\"https://security.cms.gov/policy-guidance/cms-cybersecurity-and-privacy-handbook\"\u003eCMS Information Security and Privacy Training Handbook\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1ac:T1321,"])</script><script>self.__next_f.push([1,"\u003ch2\u003eTips for keeping yourself safe in the digital world\u003c/h2\u003e\u003cp\u003eIn today's increasingly digital world, cybersecurity attacks have become a pervasive threat that can have serious personal consequences for individuals. From identity theft to financial fraud, the impact of these attacks can be far-reaching and long-lasting. Understanding the nature of these threats and taking proactive steps to safeguard our digital lives is crucial in protecting ourselves from the dangers of cybercrime.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eThe rise of cybersecurity attacks\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eCybersecurity attacks have been on the rise in recent years, with hackers targeting individuals, businesses, and even governments. According to a report by Cybersecurity Ventures, it is estimated that cybercrime will cost the global economy $6 trillion annually by 2021. This staggering figure underscores the scale of the threat posed by cybercriminals and the urgent need for individuals to take cybersecurity seriously.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003ePersonal data breaches and identity theft\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eOne of the most common forms of cybersecurity attacks is personal data breaches, where hackers gain unauthorized access to sensitive information such as credit card numbers, social security numbers, and login credentials. This stolen information can then be used to commit identity theft, a crime that can have devastating consequences for victims. Identity theft can result in financial losses, damage to credit scores, and even legal troubles if the stolen identity is used to commit further crimes.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eFinancial fraud and scams\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eAnother significant impact of cybersecurity attacks is financial fraud and scams. Phishing emails, fraudulent websites, and malware-infected software are commonly used by cybercriminals to trick individuals into revealing their financial information or transferring money to fraudulent accounts. Once the money is stolen, it can be extremely difficult to recover, leading to financial hardship for the victims.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eEmotional and psychological toll\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eIn addition to the financial repercussions, cybersecurity attacks can also take a toll on the emotional and psychological well-being of individuals. The sense of violation that comes with having your personal information stolen can be deeply unsettling, leading to feelings of anxiety, stress, and vulnerability. Victims of cybercrime may also experience a loss of trust in online platforms and a heightened sense of paranoia about their digital security.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eProtecting yourself from cybersecurity attacks\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eWhile the threat of cybersecurity attacks is real and pervasive, there are steps that individuals can take to protect themselves from falling victim to cybercrime. Using strong, unique passwords for each online account, enabling two-factor authentication, keeping software and antivirus programs up to date, and being cautious of suspicious emails and websites are all important measures in safeguarding your digital life.\u003c/p\u003e\u003cp\u003e\u003cstrong\u003eConclusion\u003c/strong\u003e\u003c/p\u003e\u003cp\u003eCybersecurity attacks pose a significant threat to individuals in today's digital age, with the potential for financial, emotional, and psychological harm. By understanding the nature of these threats and taking proactive steps to protect ourselves, we can reduce our risk of falling victim to cybercrime and safeguard our digital lives for the future.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eAbout Cyber360\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eCybersecurity is more important than ever in today's world of digital and technological advancements. To meet this critical need, the Information Security and Privacy Group is excited to present the Cyber360 event series. This series, running from April through October 2024, is designed to cover a wide range of cybersecurity topics; each month focusing on a different theme to ensure participants gain a comprehensive understanding of digital safety. \u003ca href=\"https://security.cms.gov/posts/cyber360\"\u003eLearn more about Cyber360 here\u003c/a\u003e.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eGet ready for CyberWorks!\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eRemember to join us at the \u003ca href=\"https://security.cms.gov/learn/cms-cyberworks\"\u003e\u003cstrong\u003eCyberWorks event\u003c/strong\u003e\u003c/a\u003e on October 15th, 2024! This event will be a fantastic opportunity for families to learn more about cybersecurity, engage with experts, and discover the latest trends and strategies to keep their digital homes safe.\u0026nbsp;\u003c/p\u003e\u003cp\u003eJoin our CMS Slack channel \u003ca href=\"https://cmsgov.slack.com/archives/C06S6HH6M37\" rel=\"noopener noreferrer\"\u003e\u003cstrong\u003e#CyberWorks2024\u003c/strong\u003e\u003c/a\u003e for updates.\u003c/p\u003e\u003ch2\u003e\u003cstrong\u003eMore resources\u003c/strong\u003e\u003c/h2\u003e\u003cp\u003eFor a complete overview of training opportunities and best practices for keeping data and systems safe at CMS, check out the \u003ca href=\"https://security.cms.gov/policy-guidance/cms-cybersecurity-and-privacy-handbook\"\u003eCMS Information Security and Privacy Training Handbook\u003c/a\u003e.\u003c/p\u003e"])</script><script>self.__next_f.push([1,"1aa:{\"value\":\"$1ab\",\"format\":\"body_text\",\"processed\":\"$1ac\",\"summary\":\"\"}\n1ad:{\"value\":\"Learn about the personal impact of cybersecurity attacks and what steps you can take to safeguard your digital life\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eLearn about the personal impact of cybersecurity attacks and what steps you can take to safeguard your digital life\u003c/p\u003e\\n\"}\n1a8:{\"drupal_internal__nid\":1213,\"drupal_internal__vid\":5905,\"langcode\":\"en\",\"revision_timestamp\":\"2024-09-11T21:57:41+00:00\",\"status\":true,\"title\":\"Cyber360 September: Cybersecurity and you\",\"created\":\"2024-09-10T18:13:11+00:00\",\"changed\":\"2024-09-11T21:57:41+00:00\",\"promote\":false,\"sticky\":false,\"default_langcode\":true,\"revision_translation_affected\":true,\"moderation_state\":\"published\",\"path\":\"$1a9\",\"rh_action\":null,\"rh_redirect\":null,\"rh_redirect_response\":null,\"rh_redirect_fallback_action\":null,\"publish_on\":null,\"unpublish_on\":null,\"body\":\"$1aa\",\"field_short_description\":\"$1ad\",\"field_video_link\":null}\n1b1:{\"drupal_internal__target_id\":\"blog\"}\n1b0:{\"type\":\"node_type--node_type\",\"id\":\"f382c03e-0cc5-4892-aa46-653a2d90fc05\",\"meta\":\"$1b1\"}\n1b3:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/node_type?resourceVersion=id%3A5905\"}\n1b4:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/node_type?resourceVersion=id%3A5905\"}\n1b2:{\"related\":\"$1b3\",\"self\":\"$1b4\"}\n1af:{\"data\":\"$1b0\",\"links\":\"$1b2\"}\n1b7:{\"drupal_internal__target_id\":6}\n1b6:{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"meta\":\"$1b7\"}\n1b9:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/revision_uid?resourceVersion=id%3A5905\"}\n1ba:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/revision_uid?resourceVersion=id%3A5905\"}\n1b8:{\"related\":\"$1b9\",\"self\":\"$1ba\"}\n1b5:{\"data\":\"$1b6\",\"links\":\"$1b8\"}\n1bd:{\"drupal_internal__target_id\":155}\n1bc:{\"type\":\"user--user\",\"id\":\"7e6e5827-619d-4ef2-8eb3-785e6c3bbf"])</script><script>self.__next_f.push([1,"d2\",\"meta\":\"$1bd\"}\n1bf:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/uid?resourceVersion=id%3A5905\"}\n1c0:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/uid?resourceVersion=id%3A5905\"}\n1be:{\"related\":\"$1bf\",\"self\":\"$1c0\"}\n1bb:{\"data\":\"$1bc\",\"links\":\"$1be\"}\n1c3:{\"drupal_internal__target_id\":21}\n1c2:{\"type\":\"media--blog_cover_image\",\"id\":\"7ace57c9-4a50-470b-a365-f38739fc7540\",\"meta\":\"$1c3\"}\n1c5:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_cover_image?resourceVersion=id%3A5905\"}\n1c6:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_cover_image?resourceVersion=id%3A5905\"}\n1c4:{\"related\":\"$1c5\",\"self\":\"$1c6\"}\n1c1:{\"data\":\"$1c2\",\"links\":\"$1c4\"}\n1c9:{\"drupal_internal__target_id\":37}\n1c8:{\"type\":\"group--team\",\"id\":\"aefc74af-7595-46cc-9835-0f35ae5d6dcf\",\"meta\":\"$1c9\"}\n1cb:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_publisher_group?resourceVersion=id%3A5905\"}\n1cc:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_publisher_group?resourceVersion=id%3A5905\"}\n1ca:{\"related\":\"$1cb\",\"self\":\"$1cc\"}\n1c7:{\"data\":\"$1c8\",\"links\":\"$1ca\"}\n1cf:{\"drupal_internal__target_id\":106}\n1ce:{\"type\":\"taxonomy_term--resource_type\",\"id\":\"cccd136f-b478-40f0-8ff8-fd73f75f4ab0\",\"meta\":\"$1cf\"}\n1d1:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_resource_type?resourceVersion=id%3A5905\"}\n1d2:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_resource_type?resourceVersion=id%3A5905\"}\n1d0:{\"related\":\"$1d1\",\"self\":\"$1d2\"}\n1cd:{\"data\":\"$1ce\",\"links\":\"$1d0\"}\n1d4:[]\n1d6:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_roles?resourceVersion=id%3A5905\"}\n1d7:{\"href\":\"https://cybergeek.cms.gov/js"])</script><script>self.__next_f.push([1,"onapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_roles?resourceVersion=id%3A5905\"}\n1d5:{\"related\":\"$1d6\",\"self\":\"$1d7\"}\n1d3:{\"data\":\"$1d4\",\"links\":\"$1d5\"}\n1db:{\"drupal_internal__target_id\":56}\n1da:{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"meta\":\"$1db\"}\n1d9:[\"$1da\"]\n1dd:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_topics?resourceVersion=id%3A5905\"}\n1de:{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_topics?resourceVersion=id%3A5905\"}\n1dc:{\"related\":\"$1dd\",\"self\":\"$1de\"}\n1d8:{\"data\":\"$1d9\",\"links\":\"$1dc\"}\n1ae:{\"node_type\":\"$1af\",\"revision_uid\":\"$1b5\",\"uid\":\"$1bb\",\"field_cover_image\":\"$1c1\",\"field_publisher_group\":\"$1c7\",\"field_resource_type\":\"$1cd\",\"field_roles\":\"$1d3\",\"field_topics\":\"$1d8\"}\n1a5:{\"type\":\"node--blog\",\"id\":\"ea83cc8d-9007-49b5-9e97-262e0770d711\",\"links\":\"$1a6\",\"attributes\":\"$1a8\",\"relationships\":\"$1ae\"}\n"])</script><script>self.__next_f.push([1,"5:[\"$\",\"$L17\",null,{\"content\":{\"data\":{\"type\":\"node--explainer\",\"id\":\"c69b5be6-c965-448a-8d9a-742e04887cd7\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7?resourceVersion=id%3A5946\"}},\"attributes\":{\"drupal_internal__nid\":1149,\"drupal_internal__vid\":5946,\"langcode\":\"en\",\"revision_timestamp\":\"2024-10-25T18:06:50+00:00\",\"status\":true,\"title\":\"CMS CyberWorks\",\"created\":\"2023-09-18T18:13:54+00:00\",\"changed\":\"2024-10-25T18:06:50+00:00\",\"promote\":false,\"sticky\":false,\"default_langcode\":true,\"revision_translation_affected\":true,\"moderation_state\":\"published\",\"path\":{\"alias\":\"/learn/cms-cyberworks\",\"pid\":1001,\"langcode\":\"en\"},\"rh_action\":null,\"rh_redirect\":null,\"rh_redirect_response\":null,\"rh_redirect_fallback_action\":null,\"publish_on\":null,\"unpublish_on\":null,\"body\":null,\"field_contact_email\":\"CMSISPGTrainers@cms.hhs.gov\",\"field_contact_name\":\"Training and Awareness Team\",\"field_short_description\":{\"value\":\"An annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eAn annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape\u003c/p\u003e\\n\"},\"field_slack_channel\":[\"#CyberWorks2024\"]},\"relationships\":{\"node_type\":{\"data\":{\"type\":\"node_type--node_type\",\"id\":\"d185e460-4998-4d2b-85cb-b04f304dfb1b\",\"meta\":{\"drupal_internal__target_id\":\"explainer\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/node_type?resourceVersion=id%3A5946\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/relationships/node_type?resourceVersion=id%3A5946\"}}},\"revision_uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"meta\":{\"drupal_internal__target_id\":6}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/revision_uid?resourceVersion=id%3A5946\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/relationships/revision_uid?resourceVersion=id%3A5946\"}}},\"uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"dca2c49b-4a12-4d5f-859d-a759444160a4\",\"meta\":{\"drupal_internal__target_id\":26}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/uid?resourceVersion=id%3A5946\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/relationships/uid?resourceVersion=id%3A5946\"}}},\"field_page_section\":{\"data\":[{\"type\":\"paragraph--page_section\",\"id\":\"8ceaf677-74a8-4e7a-88ca-00b15c8068f0\",\"meta\":{\"target_revision_id\":19481,\"drupal_internal__target_id\":3437}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/field_page_section?resourceVersion=id%3A5946\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/relationships/field_page_section?resourceVersion=id%3A5946\"}}},\"field_related_collection\":{\"data\":[{\"type\":\"paragraph--internal_link\",\"id\":\"a644fafb-289e-447a-ab12-f8b24b698bdb\",\"meta\":{\"target_revision_id\":19482,\"drupal_internal__target_id\":3441}},{\"type\":\"paragraph--internal_link\",\"id\":\"8f74d15c-08f2-4272-822e-ea3031b60ef7\",\"meta\":{\"target_revision_id\":19483,\"drupal_internal__target_id\":3513}},{\"type\":\"paragraph--internal_link\",\"id\":\"aba91053-95f0-4702-8c13-abee0393d51c\",\"meta\":{\"target_revision_id\":19484,\"drupal_internal__target_id\":3514}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/field_related_collection?resourceVersion=id%3A5946\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/relationships/field_related_collection?resourceVersion=id%3A5946\"}}},\"field_resource_type\":{\"data\":{\"type\":\"taxonomy_term--resource_type\",\"id\":\"a17f4908-9141-4b1e-82aa-e6bfe0f91a22\",\"meta\":{\"drupal_internal__target_id\":131}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/field_resource_type?resourceVersion=id%3A5946\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/relationships/field_resource_type?resourceVersion=id%3A5946\"}}},\"field_roles\":{\"data\":[{\"type\":\"taxonomy_term--roles\",\"id\":\"9d999ae3-b43c-45fb-973e-dffe50c27da5\",\"meta\":{\"drupal_internal__target_id\":66}},{\"type\":\"taxonomy_term--roles\",\"id\":\"a2b33f6a-8172-4862-9c0e-6e5076b6cf26\",\"meta\":{\"drupal_internal__target_id\":81}},{\"type\":\"taxonomy_term--roles\",\"id\":\"7a18463d-b0fc-474f-8536-ad7db1b2e5ab\",\"meta\":{\"drupal_internal__target_id\":61}},{\"type\":\"taxonomy_term--roles\",\"id\":\"f591f442-c0b0-4b8e-af66-7998a3329f34\",\"meta\":{\"drupal_internal__target_id\":76}},{\"type\":\"taxonomy_term--roles\",\"id\":\"feb4e85d-429e-48b0-92f0-3d2da2c5056e\",\"meta\":{\"drupal_internal__target_id\":71}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/field_roles?resourceVersion=id%3A5946\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/relationships/field_roles?resourceVersion=id%3A5946\"}}},\"field_topics\":{\"data\":[{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"meta\":{\"drupal_internal__target_id\":56}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/field_topics?resourceVersion=id%3A5946\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/explainer/c69b5be6-c965-448a-8d9a-742e04887cd7/relationships/field_topics?resourceVersion=id%3A5946\"}}}}},\"included\":[{\"type\":\"node_type--node_type\",\"id\":\"d185e460-4998-4d2b-85cb-b04f304dfb1b\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node_type/node_type/d185e460-4998-4d2b-85cb-b04f304dfb1b\"}},\"attributes\":{\"langcode\":\"en\",\"status\":true,\"dependencies\":{\"module\":[\"menu_ui\",\"scheduler\"]},\"third_party_settings\":{\"menu_ui\":{\"available_menus\":[],\"parent\":\"\"},\"scheduler\":{\"expand_fieldset\":\"when_required\",\"fields_display_mode\":\"vertical_tab\",\"publish_enable\":false,\"publish_past_date\":\"error\",\"publish_past_date_created\":false,\"publish_required\":false,\"publish_revision\":false,\"publish_touch\":false,\"show_message_after_update\":true,\"unpublish_enable\":false,\"unpublish_required\":false,\"unpublish_revision\":false}},\"name\":\"Explainer page\",\"drupal_internal__type\":\"explainer\",\"description\":\"Use \u003ci\u003eExplainer pages\u003c/i\u003e to provide general information in plain language about a policy, program, tool, service, or task related to security and privacy at CMS.\",\"help\":null,\"new_revision\":true,\"preview_mode\":1,\"display_submitted\":true}},{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/user/user/e352e203-fe9c-47ba-af75-2c7f8302fca8\"}},\"attributes\":{\"display_name\":\"mburgess\"}},{\"type\":\"user--user\",\"id\":\"dca2c49b-4a12-4d5f-859d-a759444160a4\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/user/user/dca2c49b-4a12-4d5f-859d-a759444160a4\"}},\"attributes\":{\"display_name\":\"meg - retired\"}},{\"type\":\"taxonomy_term--resource_type\",\"id\":\"a17f4908-9141-4b1e-82aa-e6bfe0f91a22\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22?resourceVersion=id%3A131\"}},\"attributes\":{\"drupal_internal__tid\":131,\"drupal_internal__revision_id\":131,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:13:33+00:00\",\"status\":true,\"name\":\"General Information\",\"description\":null,\"weight\":2,\"changed\":\"2023-03-10T19:04:03+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"3a0127c4-ee06-41ed-8239-f796f6d78eb3\",\"meta\":{\"drupal_internal__target_id\":\"resource_type\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/vid?resourceVersion=id%3A131\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/relationships/vid?resourceVersion=id%3A131\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/revision_user?resourceVersion=id%3A131\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/relationships/revision_user?resourceVersion=id%3A131\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--resource_type\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/parent?resourceVersion=id%3A131\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/resource_type/a17f4908-9141-4b1e-82aa-e6bfe0f91a22/relationships/parent?resourceVersion=id%3A131\"}}}}},{\"type\":\"taxonomy_term--roles\",\"id\":\"9d999ae3-b43c-45fb-973e-dffe50c27da5\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5?resourceVersion=id%3A66\"}},\"attributes\":{\"drupal_internal__tid\":66,\"drupal_internal__revision_id\":66,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:26+00:00\",\"status\":true,\"name\":\"Cyber Risk Advisor (CRA)\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:08:26+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":{\"drupal_internal__target_id\":\"roles\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/vid?resourceVersion=id%3A66\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/relationships/vid?resourceVersion=id%3A66\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/revision_user?resourceVersion=id%3A66\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/relationships/revision_user?resourceVersion=id%3A66\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/parent?resourceVersion=id%3A66\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/9d999ae3-b43c-45fb-973e-dffe50c27da5/relationships/parent?resourceVersion=id%3A66\"}}}}},{\"type\":\"taxonomy_term--roles\",\"id\":\"a2b33f6a-8172-4862-9c0e-6e5076b6cf26\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26?resourceVersion=id%3A81\"}},\"attributes\":{\"drupal_internal__tid\":81,\"drupal_internal__revision_id\":81,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:09:11+00:00\",\"status\":true,\"name\":\"Data Guardian\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:09:11+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":{\"drupal_internal__target_id\":\"roles\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/vid?resourceVersion=id%3A81\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/relationships/vid?resourceVersion=id%3A81\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/revision_user?resourceVersion=id%3A81\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/relationships/revision_user?resourceVersion=id%3A81\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/parent?resourceVersion=id%3A81\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/a2b33f6a-8172-4862-9c0e-6e5076b6cf26/relationships/parent?resourceVersion=id%3A81\"}}}}},{\"type\":\"taxonomy_term--roles\",\"id\":\"7a18463d-b0fc-474f-8536-ad7db1b2e5ab\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab?resourceVersion=id%3A61\"}},\"attributes\":{\"drupal_internal__tid\":61,\"drupal_internal__revision_id\":61,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:12+00:00\",\"status\":true,\"name\":\"Information System Security Officer (ISSO)\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:08:12+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":{\"drupal_internal__target_id\":\"roles\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/vid?resourceVersion=id%3A61\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/vid?resourceVersion=id%3A61\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/revision_user?resourceVersion=id%3A61\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/revision_user?resourceVersion=id%3A61\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/parent?resourceVersion=id%3A61\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/7a18463d-b0fc-474f-8536-ad7db1b2e5ab/relationships/parent?resourceVersion=id%3A61\"}}}}},{\"type\":\"taxonomy_term--roles\",\"id\":\"f591f442-c0b0-4b8e-af66-7998a3329f34\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34?resourceVersion=id%3A76\"}},\"attributes\":{\"drupal_internal__tid\":76,\"drupal_internal__revision_id\":76,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:55+00:00\",\"status\":true,\"name\":\"System / Business Owner\",\"description\":null,\"weight\":0,\"changed\":\"2022-08-02T23:08:55+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":{\"drupal_internal__target_id\":\"roles\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/vid?resourceVersion=id%3A76\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/relationships/vid?resourceVersion=id%3A76\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/revision_user?resourceVersion=id%3A76\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/relationships/revision_user?resourceVersion=id%3A76\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/parent?resourceVersion=id%3A76\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/f591f442-c0b0-4b8e-af66-7998a3329f34/relationships/parent?resourceVersion=id%3A76\"}}}}},{\"type\":\"taxonomy_term--roles\",\"id\":\"feb4e85d-429e-48b0-92f0-3d2da2c5056e\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e?resourceVersion=id%3A71\"}},\"attributes\":{\"drupal_internal__tid\":71,\"drupal_internal__revision_id\":71,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:08:42+00:00\",\"status\":true,\"name\":\"System Teams\",\"description\":null,\"weight\":0,\"changed\":\"2024-08-02T21:29:47+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"a89af840-d1f0-4a08-9f15-7b1cb71c3e35\",\"meta\":{\"drupal_internal__target_id\":\"roles\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/vid?resourceVersion=id%3A71\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/relationships/vid?resourceVersion=id%3A71\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/revision_user?resourceVersion=id%3A71\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/relationships/revision_user?resourceVersion=id%3A71\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--roles\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/parent?resourceVersion=id%3A71\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/roles/feb4e85d-429e-48b0-92f0-3d2da2c5056e/relationships/parent?resourceVersion=id%3A71\"}}}}},{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d?resourceVersion=id%3A56\"}},\"attributes\":{\"drupal_internal__tid\":56,\"drupal_internal__revision_id\":56,\"langcode\":\"en\",\"revision_created\":\"2022-08-02T23:06:35+00:00\",\"status\":true,\"name\":\"Training \u0026 Awareness\",\"description\":null,\"weight\":8,\"changed\":\"2024-06-14T17:38:33+00:00\",\"default_langcode\":true,\"revision_translation_affected\":true,\"path\":{\"alias\":null,\"pid\":null,\"langcode\":\"en\"}},\"relationships\":{\"vid\":{\"data\":{\"type\":\"taxonomy_vocabulary--taxonomy_vocabulary\",\"id\":\"73f89dec-123f-4c8c-9a97-d025a2b0e5cf\",\"meta\":{\"drupal_internal__target_id\":\"topics\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/vid?resourceVersion=id%3A56\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/vid?resourceVersion=id%3A56\"}}},\"revision_user\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/revision_user?resourceVersion=id%3A56\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/revision_user?resourceVersion=id%3A56\"}}},\"parent\":{\"data\":[{\"type\":\"taxonomy_term--topics\",\"id\":\"virtual\",\"meta\":{\"links\":{\"help\":{\"href\":\"https://www.drupal.org/docs/8/modules/json-api/core-concepts#virtual\",\"meta\":{\"about\":\"Usage and meaning of the 'virtual' resource identifier.\"}}}}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/parent?resourceVersion=id%3A56\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/taxonomy_term/topics/8b8ffea0-3b0b-404d-8442-7f3a4602482d/relationships/parent?resourceVersion=id%3A56\"}}}}},{\"type\":\"paragraph--page_section\",\"id\":\"8ceaf677-74a8-4e7a-88ca-00b15c8068f0\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0?resourceVersion=id%3A19481\"}},\"attributes\":{\"drupal_internal__id\":3437,\"drupal_internal__revision_id\":19481,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-09-18T18:19:54+00:00\",\"parent_id\":\"1149\",\"parent_type\":\"node\",\"parent_field_name\":\"field_page_section\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true,\"field_text_block\":{\"value\":\"$18\",\"format\":\"body_text\",\"processed\":\"$19\"}},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"57f3f40a-8120-4393-b881-a5758f9fb30d\",\"meta\":{\"drupal_internal__target_id\":\"page_section\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0/paragraph_type?resourceVersion=id%3A19481\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0/relationships/paragraph_type?resourceVersion=id%3A19481\"}}},\"field_specialty_item\":{\"data\":null,\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0/field_specialty_item?resourceVersion=id%3A19481\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/page_section/8ceaf677-74a8-4e7a-88ca-00b15c8068f0/relationships/field_specialty_item?resourceVersion=id%3A19481\"}}}}},{\"type\":\"paragraph--internal_link\",\"id\":\"a644fafb-289e-447a-ab12-f8b24b698bdb\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb?resourceVersion=id%3A19482\"}},\"attributes\":{\"drupal_internal__id\":3441,\"drupal_internal__revision_id\":19482,\"langcode\":\"en\",\"status\":true,\"created\":\"2023-09-18T19:12:16+00:00\",\"parent_id\":\"1149\",\"parent_type\":\"node\",\"parent_field_name\":\"field_related_collection\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"81d4313f-807c-40e2-8ffa-700ec8c17167\",\"meta\":{\"drupal_internal__target_id\":\"internal_link\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb/paragraph_type?resourceVersion=id%3A19482\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb/relationships/paragraph_type?resourceVersion=id%3A19482\"}}},\"field_link\":{\"data\":{\"type\":\"node--blog\",\"id\":\"ac546b72-4d1a-4068-b86c-28452c192c10\",\"meta\":{\"drupal_internal__target_id\":1180}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb/field_link?resourceVersion=id%3A19482\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/a644fafb-289e-447a-ab12-f8b24b698bdb/relationships/field_link?resourceVersion=id%3A19482\"}}}}},{\"type\":\"paragraph--internal_link\",\"id\":\"8f74d15c-08f2-4272-822e-ea3031b60ef7\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7?resourceVersion=id%3A19483\"}},\"attributes\":{\"drupal_internal__id\":3513,\"drupal_internal__revision_id\":19483,\"langcode\":\"en\",\"status\":true,\"created\":\"2024-07-02T15:45:33+00:00\",\"parent_id\":\"1149\",\"parent_type\":\"node\",\"parent_field_name\":\"field_related_collection\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"81d4313f-807c-40e2-8ffa-700ec8c17167\",\"meta\":{\"drupal_internal__target_id\":\"internal_link\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7/paragraph_type?resourceVersion=id%3A19483\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7/relationships/paragraph_type?resourceVersion=id%3A19483\"}}},\"field_link\":{\"data\":{\"type\":\"node--blog\",\"id\":\"2b214ce1-6a86-4f13-a358-c5c527d56e8f\",\"meta\":{\"drupal_internal__target_id\":1208}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7/field_link?resourceVersion=id%3A19483\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/8f74d15c-08f2-4272-822e-ea3031b60ef7/relationships/field_link?resourceVersion=id%3A19483\"}}}}},{\"type\":\"paragraph--internal_link\",\"id\":\"aba91053-95f0-4702-8c13-abee0393d51c\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c?resourceVersion=id%3A19484\"}},\"attributes\":{\"drupal_internal__id\":3514,\"drupal_internal__revision_id\":19484,\"langcode\":\"en\",\"status\":true,\"created\":\"2024-07-02T15:45:44+00:00\",\"parent_id\":\"1149\",\"parent_type\":\"node\",\"parent_field_name\":\"field_related_collection\",\"behavior_settings\":[],\"default_langcode\":true,\"revision_translation_affected\":true},\"relationships\":{\"paragraph_type\":{\"data\":{\"type\":\"paragraphs_type--paragraphs_type\",\"id\":\"81d4313f-807c-40e2-8ffa-700ec8c17167\",\"meta\":{\"drupal_internal__target_id\":\"internal_link\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c/paragraph_type?resourceVersion=id%3A19484\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c/relationships/paragraph_type?resourceVersion=id%3A19484\"}}},\"field_link\":{\"data\":{\"type\":\"node--blog\",\"id\":\"ea83cc8d-9007-49b5-9e97-262e0770d711\",\"meta\":{\"drupal_internal__target_id\":1213}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c/field_link?resourceVersion=id%3A19484\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/paragraph/internal_link/aba91053-95f0-4702-8c13-abee0393d51c/relationships/field_link?resourceVersion=id%3A19484\"}}}}},{\"type\":\"node--blog\",\"id\":\"ac546b72-4d1a-4068-b86c-28452c192c10\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10?resourceVersion=id%3A5840\"}},\"attributes\":{\"drupal_internal__nid\":1180,\"drupal_internal__vid\":5840,\"langcode\":\"en\",\"revision_timestamp\":\"2024-08-06T16:39:13+00:00\",\"status\":true,\"title\":\"Cyber360: An online event series to help you stay cyber secure\",\"created\":\"2024-04-02T13:58:34+00:00\",\"changed\":\"2024-08-06T16:39:13+00:00\",\"promote\":false,\"sticky\":false,\"default_langcode\":true,\"revision_translation_affected\":true,\"moderation_state\":\"published\",\"path\":{\"alias\":\"/posts/cyber360\",\"pid\":1186,\"langcode\":\"en\"},\"rh_action\":null,\"rh_redirect\":null,\"rh_redirect_response\":null,\"rh_redirect_fallback_action\":null,\"publish_on\":null,\"unpublish_on\":null,\"body\":{\"value\":\"$1a\",\"format\":\"body_text\",\"processed\":\"$1b\",\"summary\":\"\"},\"field_short_description\":{\"value\":\" From April - October, a series of events is open to everyone at CMS to improve digital safety at work and beyond\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eFrom April - October, a series of events is open to everyone at CMS to improve digital safety at work and beyond\u003c/p\u003e\\n\"},\"field_video_link\":\"https://youtu.be/uj0f-NJVCt4?si=he8c4Bz-RAy8kkwR\"},\"relationships\":{\"node_type\":{\"data\":{\"type\":\"node_type--node_type\",\"id\":\"f382c03e-0cc5-4892-aa46-653a2d90fc05\",\"meta\":{\"drupal_internal__target_id\":\"blog\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/node_type?resourceVersion=id%3A5840\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/node_type?resourceVersion=id%3A5840\"}}},\"revision_uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"c34b79d4-f936-45dd-968f-7efc22d4370b\",\"meta\":{\"drupal_internal__target_id\":94}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/revision_uid?resourceVersion=id%3A5840\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/revision_uid?resourceVersion=id%3A5840\"}}},\"uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"7d07692d-56ec-4a02-a8aa-5913ee3871e3\",\"meta\":{\"drupal_internal__target_id\":137}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/uid?resourceVersion=id%3A5840\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/uid?resourceVersion=id%3A5840\"}}},\"field_cover_image\":{\"data\":{\"type\":\"media--blog_cover_image\",\"id\":\"6873150c-7be2-46ef-ac42-754e174ef228\",\"meta\":{\"drupal_internal__target_id\":46}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_cover_image?resourceVersion=id%3A5840\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_cover_image?resourceVersion=id%3A5840\"}}},\"field_publisher_group\":{\"data\":{\"type\":\"group--team\",\"id\":\"aefc74af-7595-46cc-9835-0f35ae5d6dcf\",\"meta\":{\"drupal_internal__target_id\":37}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_publisher_group?resourceVersion=id%3A5840\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_publisher_group?resourceVersion=id%3A5840\"}}},\"field_resource_type\":{\"data\":{\"type\":\"taxonomy_term--resource_type\",\"id\":\"541ccc21-c894-45e2-88db-cb8f935100bd\",\"meta\":{\"drupal_internal__target_id\":116}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_resource_type?resourceVersion=id%3A5840\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_resource_type?resourceVersion=id%3A5840\"}}},\"field_roles\":{\"data\":[],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_roles?resourceVersion=id%3A5840\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_roles?resourceVersion=id%3A5840\"}}},\"field_topics\":{\"data\":[{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"meta\":{\"drupal_internal__target_id\":56}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/field_topics?resourceVersion=id%3A5840\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ac546b72-4d1a-4068-b86c-28452c192c10/relationships/field_topics?resourceVersion=id%3A5840\"}}}}},{\"type\":\"node--blog\",\"id\":\"2b214ce1-6a86-4f13-a358-c5c527d56e8f\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f?resourceVersion=id%3A5907\"}},\"attributes\":{\"drupal_internal__nid\":1208,\"drupal_internal__vid\":5907,\"langcode\":\"en\",\"revision_timestamp\":\"2024-09-11T22:12:18+00:00\",\"status\":true,\"title\":\"Cyber360 August- Keeping your online hobbies cyber secure\",\"created\":\"2024-08-05T14:33:14+00:00\",\"changed\":\"2024-09-11T22:12:18+00:00\",\"promote\":false,\"sticky\":false,\"default_langcode\":true,\"revision_translation_affected\":true,\"moderation_state\":\"published\",\"path\":{\"alias\":\"/posts/cber360-august-keeping-your-online-hobbies-safe-guide-cybersecurity\",\"pid\":1230,\"langcode\":\"en\"},\"rh_action\":null,\"rh_redirect\":null,\"rh_redirect_response\":null,\"rh_redirect_fallback_action\":null,\"publish_on\":null,\"unpublish_on\":null,\"body\":{\"value\":\"$1c\",\"format\":\"body_text\",\"processed\":\"$1d\",\"summary\":\"\"},\"field_short_description\":{\"value\":\"Hobbies are a great way to relax and unwind. Here’s how to keep your favorite pastimes safe from cyber threats.\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eHobbies are a great way to relax and unwind. Here’s how to keep your favorite pastimes safe from cyber threats.\u003c/p\u003e\\n\"},\"field_video_link\":null},\"relationships\":{\"node_type\":{\"data\":{\"type\":\"node_type--node_type\",\"id\":\"f382c03e-0cc5-4892-aa46-653a2d90fc05\",\"meta\":{\"drupal_internal__target_id\":\"blog\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/node_type?resourceVersion=id%3A5907\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/node_type?resourceVersion=id%3A5907\"}}},\"revision_uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"meta\":{\"drupal_internal__target_id\":6}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/revision_uid?resourceVersion=id%3A5907\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/revision_uid?resourceVersion=id%3A5907\"}}},\"uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"7e6e5827-619d-4ef2-8eb3-785e6c3bbfd2\",\"meta\":{\"drupal_internal__target_id\":155}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/uid?resourceVersion=id%3A5907\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/uid?resourceVersion=id%3A5907\"}}},\"field_cover_image\":{\"data\":{\"type\":\"media--blog_cover_image\",\"id\":\"72738a9d-42bb-4ba9-90c2-635a49ceeb81\",\"meta\":{\"drupal_internal__target_id\":6}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_cover_image?resourceVersion=id%3A5907\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_cover_image?resourceVersion=id%3A5907\"}}},\"field_publisher_group\":{\"data\":{\"type\":\"group--team\",\"id\":\"aefc74af-7595-46cc-9835-0f35ae5d6dcf\",\"meta\":{\"drupal_internal__target_id\":37}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_publisher_group?resourceVersion=id%3A5907\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_publisher_group?resourceVersion=id%3A5907\"}}},\"field_resource_type\":{\"data\":{\"type\":\"taxonomy_term--resource_type\",\"id\":\"cccd136f-b478-40f0-8ff8-fd73f75f4ab0\",\"meta\":{\"drupal_internal__target_id\":106}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_resource_type?resourceVersion=id%3A5907\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_resource_type?resourceVersion=id%3A5907\"}}},\"field_roles\":{\"data\":[],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_roles?resourceVersion=id%3A5907\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_roles?resourceVersion=id%3A5907\"}}},\"field_topics\":{\"data\":[{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"meta\":{\"drupal_internal__target_id\":56}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/field_topics?resourceVersion=id%3A5907\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/2b214ce1-6a86-4f13-a358-c5c527d56e8f/relationships/field_topics?resourceVersion=id%3A5907\"}}}}},{\"type\":\"node--blog\",\"id\":\"ea83cc8d-9007-49b5-9e97-262e0770d711\",\"links\":{\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711?resourceVersion=id%3A5905\"}},\"attributes\":{\"drupal_internal__nid\":1213,\"drupal_internal__vid\":5905,\"langcode\":\"en\",\"revision_timestamp\":\"2024-09-11T21:57:41+00:00\",\"status\":true,\"title\":\"Cyber360 September: Cybersecurity and you\",\"created\":\"2024-09-10T18:13:11+00:00\",\"changed\":\"2024-09-11T21:57:41+00:00\",\"promote\":false,\"sticky\":false,\"default_langcode\":true,\"revision_translation_affected\":true,\"moderation_state\":\"published\",\"path\":{\"alias\":\"/posts/cyber360-september\",\"pid\":1270,\"langcode\":\"en\"},\"rh_action\":null,\"rh_redirect\":null,\"rh_redirect_response\":null,\"rh_redirect_fallback_action\":null,\"publish_on\":null,\"unpublish_on\":null,\"body\":{\"value\":\"$1e\",\"format\":\"body_text\",\"processed\":\"$1f\",\"summary\":\"\"},\"field_short_description\":{\"value\":\"Learn about the personal impact of cybersecurity attacks and what steps you can take to safeguard your digital life\",\"format\":\"plain_text\",\"processed\":\"\u003cp\u003eLearn about the personal impact of cybersecurity attacks and what steps you can take to safeguard your digital life\u003c/p\u003e\\n\"},\"field_video_link\":null},\"relationships\":{\"node_type\":{\"data\":{\"type\":\"node_type--node_type\",\"id\":\"f382c03e-0cc5-4892-aa46-653a2d90fc05\",\"meta\":{\"drupal_internal__target_id\":\"blog\"}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/node_type?resourceVersion=id%3A5905\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/node_type?resourceVersion=id%3A5905\"}}},\"revision_uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"e352e203-fe9c-47ba-af75-2c7f8302fca8\",\"meta\":{\"drupal_internal__target_id\":6}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/revision_uid?resourceVersion=id%3A5905\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/revision_uid?resourceVersion=id%3A5905\"}}},\"uid\":{\"data\":{\"type\":\"user--user\",\"id\":\"7e6e5827-619d-4ef2-8eb3-785e6c3bbfd2\",\"meta\":{\"drupal_internal__target_id\":155}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/uid?resourceVersion=id%3A5905\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/uid?resourceVersion=id%3A5905\"}}},\"field_cover_image\":{\"data\":{\"type\":\"media--blog_cover_image\",\"id\":\"7ace57c9-4a50-470b-a365-f38739fc7540\",\"meta\":{\"drupal_internal__target_id\":21}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_cover_image?resourceVersion=id%3A5905\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_cover_image?resourceVersion=id%3A5905\"}}},\"field_publisher_group\":{\"data\":{\"type\":\"group--team\",\"id\":\"aefc74af-7595-46cc-9835-0f35ae5d6dcf\",\"meta\":{\"drupal_internal__target_id\":37}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_publisher_group?resourceVersion=id%3A5905\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_publisher_group?resourceVersion=id%3A5905\"}}},\"field_resource_type\":{\"data\":{\"type\":\"taxonomy_term--resource_type\",\"id\":\"cccd136f-b478-40f0-8ff8-fd73f75f4ab0\",\"meta\":{\"drupal_internal__target_id\":106}},\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_resource_type?resourceVersion=id%3A5905\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_resource_type?resourceVersion=id%3A5905\"}}},\"field_roles\":{\"data\":[],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_roles?resourceVersion=id%3A5905\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_roles?resourceVersion=id%3A5905\"}}},\"field_topics\":{\"data\":[{\"type\":\"taxonomy_term--topics\",\"id\":\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\",\"meta\":{\"drupal_internal__target_id\":56}}],\"links\":{\"related\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/field_topics?resourceVersion=id%3A5905\"},\"self\":{\"href\":\"https://cybergeek.cms.gov/jsonapi/node/blog/ea83cc8d-9007-49b5-9e97-262e0770d711/relationships/field_topics?resourceVersion=id%3A5905\"}}}}}],\"includedMap\":{\"d185e460-4998-4d2b-85cb-b04f304dfb1b\":\"$20\",\"e352e203-fe9c-47ba-af75-2c7f8302fca8\":\"$2a\",\"dca2c49b-4a12-4d5f-859d-a759444160a4\":\"$2e\",\"a17f4908-9141-4b1e-82aa-e6bfe0f91a22\":\"$32\",\"9d999ae3-b43c-45fb-973e-dffe50c27da5\":\"$4c\",\"a2b33f6a-8172-4862-9c0e-6e5076b6cf26\":\"$66\",\"7a18463d-b0fc-474f-8536-ad7db1b2e5ab\":\"$80\",\"f591f442-c0b0-4b8e-af66-7998a3329f34\":\"$9a\",\"feb4e85d-429e-48b0-92f0-3d2da2c5056e\":\"$b4\",\"8b8ffea0-3b0b-404d-8442-7f3a4602482d\":\"$ce\",\"8ceaf677-74a8-4e7a-88ca-00b15c8068f0\":\"$e8\",\"a644fafb-289e-447a-ab12-f8b24b698bdb\":\"$fb\",\"8f74d15c-08f2-4272-822e-ea3031b60ef7\":\"$10d\",\"aba91053-95f0-4702-8c13-abee0393d51c\":\"$11f\",\"ac546b72-4d1a-4068-b86c-28452c192c10\":\"$131\",\"2b214ce1-6a86-4f13-a358-c5c527d56e8f\":\"$16b\",\"ea83cc8d-9007-49b5-9e97-262e0770d711\":\"$1a5\"}}}]\n"])</script><script>self.__next_f.push([1,"a:[[\"$\",\"meta\",\"0\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1\"}],[\"$\",\"meta\",\"1\",{\"charSet\":\"utf-8\"}],[\"$\",\"title\",\"2\",{\"children\":\"CMS CyberWorks | CMS Information Security \u0026 Privacy Group\"}],[\"$\",\"meta\",\"3\",{\"name\":\"description\",\"content\":\"An annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape\"}],[\"$\",\"link\",\"4\",{\"rel\":\"canonical\",\"href\":\"https://security.cms.gov/learn/cms-cyberworks\"}],[\"$\",\"meta\",\"5\",{\"name\":\"google-site-verification\",\"content\":\"GMZIwBDJgz_o_JYUB2GpJazkrs7P85BaWDsoCjxF32M\"}],[\"$\",\"meta\",\"6\",{\"property\":\"og:title\",\"content\":\"CMS CyberWorks | CMS Information Security \u0026 Privacy Group\"}],[\"$\",\"meta\",\"7\",{\"property\":\"og:description\",\"content\":\"An annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape\"}],[\"$\",\"meta\",\"8\",{\"property\":\"og:url\",\"content\":\"https://security.cms.gov/learn/cms-cyberworks\"}],[\"$\",\"meta\",\"9\",{\"property\":\"og:image:type\",\"content\":\"image/jpeg\"}],[\"$\",\"meta\",\"10\",{\"property\":\"og:image:width\",\"content\":\"1200\"}],[\"$\",\"meta\",\"11\",{\"property\":\"og:image:height\",\"content\":\"630\"}],[\"$\",\"meta\",\"12\",{\"property\":\"og:image\",\"content\":\"https://security.cms.gov/learn/cms-cyberworks/opengraph-image.jpg?d21225707c5ed280\"}],[\"$\",\"meta\",\"13\",{\"property\":\"og:type\",\"content\":\"website\"}],[\"$\",\"meta\",\"14\",{\"name\":\"twitter:card\",\"content\":\"summary_large_image\"}],[\"$\",\"meta\",\"15\",{\"name\":\"twitter:title\",\"content\":\"CMS CyberWorks | CMS Information Security \u0026 Privacy Group\"}],[\"$\",\"meta\",\"16\",{\"name\":\"twitter:description\",\"content\":\"An annual CMS-wide event to promote knowledge sharing and awareness in the ever-changing digital security landscape\"}],[\"$\",\"meta\",\"17\",{\"name\":\"twitter:image:type\",\"content\":\"image/jpeg\"}],[\"$\",\"meta\",\"18\",{\"name\":\"twitter:image:width\",\"content\":\"1200\"}],[\"$\",\"meta\",\"19\",{\"name\":\"twitter:image:height\",\"content\":\"630\"}],[\"$\",\"meta\",\"20\",{\"name\":\"twitter:image\",\"content\":\"https://security.cms.gov/learn/cms-cyberworks/opengraph-image.jpg?d21225707c5ed280\"}],[\"$\",\"link\",\"21\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"48x48\"}]]\n"])</script><script>self.__next_f.push([1,"4:null\n"])</script></body></html> |