{"id":2,"date":"2013-10-10T15:31:19","date_gmt":"2013-10-10T15:31:19","guid":{"rendered":"https:\/\/sites.erau.edu\/trbcybersecurity\/?page_id=2"},"modified":"2013-10-10T16:38:30","modified_gmt":"2013-10-10T16:38:30","slug":"contact","status":"publish","type":"page","link":"https:\/\/sites.erau.edu\/trbcybersecurity\/contact\/","title":{"rendered":"Contact"},"content":{"rendered":"<p>We value your feedback.<br \/>\nIf you have any questions, comments, concerns, or input regarding this website, please contact:<\/p>\n<dl>\n<dt>Jon C. Haass, PhD<\/dt>\n<dd>Program Director, Cyber Security and Intelligence<br \/>\n3700 Willow Creek Rd.<br \/>\nPrescott, AZ 86301-3720<br \/>\nPhone: (928)777-6975<br \/>\nemail:\u00a0<a href=\"https:\/\/mail.google.com\/mail?view=cm&amp;tf=0&amp;to=jon.haass@erau.edu\" target=\"_blank\">jon.haass@erau.edu<\/a><\/dd>\n<dt>Professor Richard Bloom<\/dt>\n<dd>Cybersecurity Resource Center<br \/>\nEmbry-Riddle Aeronautical University &#8211; AC1 257<br \/>\n3700 Willow Creek<br \/>\nPrescott, AZ 86301-3720<br \/>\nPhone: (928)777-3837<br \/>\nemail:\u00a0<a href=\"https:\/\/mail.google.com\/mail?view=cm&amp;tf=0&amp;to=Richard.Bloom@erau.edu\" target=\"_blank\">Richard.Bloom@erau.edu<\/a><\/dd>\n<dt>Heather Marriott<\/dt>\n<dd>Cybersecurity Resource Center<br \/>\nEmbry-Riddle Aeronautical University &#8211; Bldg 70C Rm 106<br \/>\n3700 Willow Creek<br \/>\nPrescott, AZ 86301-3720<br \/>\nPhone: (928)777-3960<br \/>\nemail:\u00a0<a href=\"https:\/\/mail.google.com\/mail?view=cm&amp;tf=0&amp;to=marric72@erau.edu\" target=\"_blank\">marric72@erau.edu<\/a><\/dd>\n<\/dl>\n","protected":false},"excerpt":{"rendered":"<p>We value your feedback. If you have any questions, comments, concerns, or input regarding this website, please contact: Jon C. Haass, PhD Program Director, Cyber Security and Intelligence 3700 Willow Creek Rd. Prescott, AZ 86301-3720 Phone: (928)777-6975 email:\u00a0jon.haass@erau.edu Professor Richard &hellip; <a href=\"https:\/\/sites.erau.edu\/trbcybersecurity\/contact\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":65,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":0,"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.erau.edu\/trbcybersecurity\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}