<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>KIM</provider_name><provider_url>https://ptkim.co.id/id</provider_url><author_name>admin</author_name><author_url>https://ptkim.co.id/id/author/admin/</author_url><title>Agile Threat Modeling - KIM</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="Q4Y9xlJ3jy"&gt;&lt;a href="https://ptkim.co.id/id/product/agile-threat-modeling/"&gt;Agile Threat Modeling&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://ptkim.co.id/id/product/agile-threat-modeling/embed/#?secret=Q4Y9xlJ3jy" width="600" height="338" title="&#x201C;Agile Threat Modeling&#x201D; &#x2014; KIM" data-secret="Q4Y9xlJ3jy" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://ptkim.co.id/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;</html><thumbnail_url>https://ptkim.co.id/wp-content/uploads/2026/01/attack-tree-200.png</thumbnail_url><thumbnail_width>200</thumbnail_width><thumbnail_height>218</thumbnail_height><description>Mitigating Risks the Agile Way Prior to conducting the training with your team, we&#x2019;ll have an initial scoping meeting. This session is designed to customize the workshop to your specific requirements, helping us decide on the most suitable approach and focus areas to address your needs effectively. Top-Down &#x2014; Attack Scenario Approach This approach is [&hellip;]</description></oembed>
