{"id":1227,"date":"2023-07-18T01:50:05","date_gmt":"2023-07-17T23:50:05","guid":{"rendered":"https:\/\/immunity-systems.com\/?page_id=1227"},"modified":"2023-07-18T01:52:15","modified_gmt":"2023-07-17T23:52:15","slug":"post-breach-analysis-of-an-it-system","status":"publish","type":"page","link":"https:\/\/immunity-systems.com\/en\/post-breach-analysis-of-an-it-system\/","title":{"rendered":"Post-breach analysis of an IT system"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t