{"title":"\u59d4\u54e1\u4f1a / \u4f1a\u8b70 (\u307e\u3068\u3081)","image_url":null,"height":"190","blog_url":"https://security-log.hatenablog.com/","provider_name":"Hatena Blog","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2FCommittee\" title=\"\u59d4\u54e1\u4f1a / \u4f1a\u8b70 (\u307e\u3068\u3081) - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","published":"1900-01-01 00:00:00","author_name":"tt_ctf","author_url":"https://blog.hatena.ne.jp/tt_ctf/","blog_title":"TT Security Log","width":"100%","url":"https://security-log.hatenablog.com/entry/Committee","provider_url":"https://hatena.blog","description":"\u653f\u5e9c \u3010\u5185\u95a3\u5b98\u623f\u3011 \u25a0\u30b5\u30a4\u30d0\u30fc\u5b89\u5168\u4fdd\u969c \u25c6\u30b5\u30a4\u30d0\u30fc\u5b89\u5168\u4fdd\u969c\u5206\u91ce\u3067\u306e\u5bfe\u5fdc\u80fd\u529b\u306e\u5411\u4e0a\u306b\u5411\u3051\u305f\u6709\u8b58\u8005\u4f1a\u8b70 (\u307e\u3068\u3081) https://security-log.hatenablog.com/entry/Expert_Committee_on_Cyber_Security \u3010NISC\u3011 \u25c6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u672c\u90e8 (\u307e\u3068\u3081) https://security-log.hatenablog.com/entry/Cyber_Security_Strategy_Division \u3010\u7d4c\u7523\u7701\u3011 \u25a0\u7523\u696d\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u7a76\u4f1a \u25c6\u7523\u696d\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u7a76\u4f1a (\u7d4c\u6e08\u7523\u696d\u7701) https://www.met\u2026","categories":["*\u59d4\u54e1\u4f1a / \u4f1a\u8b70"],"version":"1.0"}