{"id":1754,"date":"2020-09-01T16:26:30","date_gmt":"2020-09-01T21:26:30","guid":{"rendered":"http:\/\/blogs.iit.edu\/itm_loopback\/?p=1754"},"modified":"2020-09-01T16:27:58","modified_gmt":"2020-09-01T21:27:58","slug":"wicys-conference-applications-now-open","status":"publish","type":"post","link":"https:\/\/blogs.iit.edu\/itm_loopback\/2020\/09\/01\/wicys-conference-applications-now-open\/","title":{"rendered":"WiCyS Conference Support Applications Now Open"},"content":{"rendered":"<p><a href=\"https:\/\/www.wicys.org\/scholarships-grants-and-fellowship-awards\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1755\" src=\"https:\/\/blogs.iit.edu\/itm_loopback\/files\/2020\/09\/WiCyS2021.jpg\" alt=\"WiCyS 2021\" width=\"800\" height=\"200\" \/><\/a><strong>Happy September 1st<\/strong> or in COVID-19 times&#8230; March 185th! We&#8217;re pleased to announce that <strong>Women in CyberSecurity (WiCyS)<\/strong> has their #WiCyS2021 applications for scholarships, grants, and fellowship awards OPEN! This opportunity is what WiCyS lives for&#8230; to pay it forward \u2764\ufe0f<br \/>\nApply here: <a href=\"https:\/\/www.wicys.org\/scholarships-grants-and-fellowship-awards\">www.wicys.org\/scholarships-grants-and-fellowship-awards<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Happy September 1st or in COVID-19 times&#8230; March 185th! We&#8217;re pleased to announce that Women in CyberSecurity (WiCyS) has their #WiCyS2021 applications for scholarships, grants, and fellowship awards OPEN! This opportunity is what WiCyS lives for&#8230; to pay it forward \u2764\ufe0f Apply here: www.wicys.org\/scholarships-grants-and-fellowship-awards<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3869,3904],"tags":[3948,3916,10224,3913,7486],"class_list":["post-1754","post","type-post","status-publish","format-standard","hentry","category-security","category-stuff-for-students","tag-conferences","tag-cyber-security","tag-cybersecurity","tag-fun","tag-jobs"],"_links":{"self":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/comments?post=1754"}],"version-history":[{"count":4,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1754\/revisions"}],"predecessor-version":[{"id":1759,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1754\/revisions\/1759"}],"wp:attachment":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/media?parent=1754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/categories?post=1754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/tags?post=1754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}