
{"id":8257,"date":"2021-04-02T19:32:20","date_gmt":"2021-04-02T08:32:20","guid":{"rendered":"https:\/\/www.identitysecurity.com.au\/?p=8257"},"modified":"2021-04-02T19:47:47","modified_gmt":"2021-04-02T08:47:47","slug":"simx","status":"publish","type":"post","link":"https:\/\/www.identitysecurity.com.au\/index.php\/2021\/04\/02\/simx\/","title":{"rendered":"SimX"},"content":{"rendered":"<p>SimX is an advanced web platform that organisations use to experience a realistic simulation of a crisis.<\/p>\n<p>Developed for crisis management experts SOCOM, this platform has be used to train executives from many large organisations and government.<\/p>\n<p>State of the art web technologies create a fast paced, real-time environment that simulates the pressures of a crisis that is unfolding.<\/p>\n<p>Participants interact with stakeholders and fellow team members to plan for, and manage the events of the crisis.<\/p>\n<p>It has proven extremely valuable in preparing organisations for their worst day possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SimX is an advanced web platform that organisations use to experience a realistic simulation of a crisis. Developed for crisis management&#8230;<\/p>\n","protected":false},"author":7992,"featured_media":8268,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,96,14],"tags":[251],"_links":{"self":[{"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/posts\/8257"}],"collection":[{"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/users\/7992"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=8257"}],"version-history":[{"count":3,"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/posts\/8257\/revisions"}],"predecessor-version":[{"id":8270,"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/posts\/8257\/revisions\/8270"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/media\/8268"}],"wp:attachment":[{"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=8257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=8257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identitysecurity.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=8257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}