{"id":1419,"date":"2016-05-08T10:30:15","date_gmt":"2016-05-08T15:30:15","guid":{"rendered":"https:\/\/2016.chicago.wordcamp.org\/?p=1419"},"modified":"2016-05-06T15:53:30","modified_gmt":"2016-05-06T20:53:30","slug":"recap-michele-butcher-on-passwords-attacks-and-security","status":"publish","type":"post","link":"https:\/\/chicago.wordcamp.org\/2016\/recap-michele-butcher-on-passwords-attacks-and-security\/","title":{"rendered":"Recap: Michele Butcher on Passwords, Attacks, and Security"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left;margin-right: 10px\" src=\"http:\/\/www.gravatar.com\/avatar\/6abfc3798b39a0fa17fb066f8e9de8ff?s=200\" alt=\"Michele Butcher\" \/><br \/>\n<a href=\"https:\/\/2016.chicago.wordcamp.org\/speaker\/michele-butcher\/\">Michele Butcher<\/a> (<a href=\"https:\/\/twitter.com\/Michele_Butcher\" target=\"_blank\">@Michele_Butcher<\/a>) gave a talk titled <a href=\"https:\/\/2016.chicago.wordcamp.org\/session\/passwords-attacks-and-security-oh-my\/\">Passwords, Attacks, and Security Oh My!<\/a> on Sunday, May 1 at 10:00 AM.<\/p>\n<h3>View presentation online<\/h3>\n<ul>\n<li><a href=\"http:\/\/www.slideshare.net\/MicheleButcher1\/passwords-attakcks-and-security-oh-my\">download slides<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" title=\"Passwords, Attakcks, and Security, oh my!\" src=\"https:\/\/www.slideshare.net\/slideshow\/embed_code\/key\/xgFY6xDxL4do6U\" width=\"427\" height=\"356\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;\" allowfullscreen> <\/iframe> <\/p>\n<div style=\"margin-bottom:5px\"> <strong> <a href=\"https:\/\/www.slideshare.net\/MicheleButcher1\/passwords-attakcks-and-security-oh-my\" title=\"Passwords, Attakcks, and Security, oh my!\" target=\"_blank\">Passwords, Attakcks, and Security, oh my!<\/a> <\/strong> from <strong><a href=\"https:\/\/www.slideshare.net\/MicheleButcher1\" target=\"_blank\">Michele Butcher<\/a><\/strong> <\/div>\n<h3>Social Recap<\/h3>\n<p>Here are some of the highlights and tips our audience shared on Twitter:<br \/>\n<!--more--><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">About to learn a bit about security from <a href=\"https:\/\/twitter.com\/Michele_Butcher?ref_src=twsrc%5Etfw\">@Michele_Butcher<\/a> at <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/t.co\/xg2krHp6Ov\">pic.twitter.com\/xg2krHp6Ov<\/a><\/p>\n<p>&mdash; Sarah E. Collins (@Sarah_E_Collins) <a href=\"https:\/\/twitter.com\/Sarah_E_Collins\/status\/726788766279544833?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Hackers! Can they affect you?<\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Security is critical. Even if you get few visitors,  you may be hacked. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> Today&#39;s code is tomorrow&#39;s vulnerability.<\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726789758999998473?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Hacker&#39;s hack for so many reasons. It isn&#39;t necessarily personal. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/t.co\/WLpCqBnZZa\">pic.twitter.com\/WLpCqBnZZa<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726790056116125696?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>https:\/\/twitter.com\/ReTheMsg\/status\/726790281408974853<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How they get in. They keep trying. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/t.co\/CuhlpLg3mU\">pic.twitter.com\/CuhlpLg3mU<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726790336526299137?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">You are NEVER 100% secure. <a href=\"https:\/\/twitter.com\/Michele_Butcher?ref_src=twsrc%5Etfw\">@michele_butcher<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a><\/p>\n<p>&mdash; Jan Marie Wilson (@janBigW) <a href=\"https:\/\/twitter.com\/janBigW\/status\/726790757345021952?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>What should you remove?<\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The more themes on a <a href=\"https:\/\/twitter.com\/hashtag\/WordPress?src=hash&amp;ref_src=twsrc%5Etfw\">#WordPress<\/a> site, the more open chances you have for a vulnerability. <a href=\"https:\/\/twitter.com\/Michele_Butcher?ref_src=twsrc%5Etfw\">@michele_butcher<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a><\/p>\n<p>&mdash; Maddy Osman (French) (@MaddyOsman) <a href=\"https:\/\/twitter.com\/MaddyOsman\/status\/726791554891816960?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">You can add &amp; delete user accounts all day long. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/t.co\/j8Zk4J8o8c\">pic.twitter.com\/j8Zk4J8o8c<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726791366735441923?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Only keep the active plugins on your <a href=\"https:\/\/twitter.com\/hashtag\/WordPress?src=hash&amp;ref_src=twsrc%5Etfw\">#WordPress<\/a> website &#8211; delete the rest! <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/twitter.com\/Michele_Butcher?ref_src=twsrc%5Etfw\">@michele_butcher<\/a><\/p>\n<p>&mdash; Maddy Osman (French) (@MaddyOsman) <a href=\"https:\/\/twitter.com\/MaddyOsman\/status\/726791935529119746?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Password Tips:<\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/t.co\/8Zl5EswtZr\">https:\/\/t.co\/8Zl5EswtZr<\/a>. keep sensitive information out of email. <a href=\"https:\/\/twitter.com\/Michele_Butcher?ref_src=twsrc%5Etfw\">@michele_butcher<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a><\/p>\n<p>&mdash; Jan Marie Wilson (@janBigW) <a href=\"https:\/\/twitter.com\/janBigW\/status\/726795953978494976?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Use complex passwords and don&#39;t use the same password for anything or twice. Don&#39;t email passwords either. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726794967537045504?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">If you can read your password, the bots can guess it. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726790916955082753?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Use a password keeper to share your password. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> Once done, delete it. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/t.co\/pZIFhPECz1\">pic.twitter.com\/pZIFhPECz1<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726795214573195264?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>More Security:<\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Use two-step authentication if it&#39;s available. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> Be careful when using public WiFi. <a href=\"https:\/\/twitter.com\/Michele_Butcher?ref_src=twsrc%5Etfw\">@Michele_Butcher<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726795571281944576?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">You can combine security plugins,  as long as they don&#39;t conflict. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/t.co\/C0buR4GFXt\">pic.twitter.com\/C0buR4GFXt<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726792275376885760?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">I feel incredibly vulnerable right now. Eeeeeeeeeekkkkkkk!  <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/t.co\/Xn3Ku6qD0T\">pic.twitter.com\/Xn3Ku6qD0T<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726792479983427584?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Make backups. And test them. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> And use malware scan.<\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726792945412771840?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>NO Zombies!<\/h3>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Don&#39;t ever let your site get too lonely. That is when the zombies come. Nobody wants the zombies come. @michelle_butcher. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a><\/p>\n<p>&mdash; JustSal, probably \u271d\ufe0f\u2693\ufe0f\u2764\ufe0f (@YepItsSal) <a href=\"https:\/\/twitter.com\/YepItsSal\/status\/726793814048948225?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Biggest source of hacking: lack of updates. Check box to get notices for theme updates. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/t.co\/yB7zxe9JCv\">pic.twitter.com\/yB7zxe9JCv<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726793520892252160?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Update!  They&#39;re there for a reason!  <a href=\"https:\/\/twitter.com\/Michele_Butcher?ref_src=twsrc%5Etfw\">@Michele_Butcher<\/a>. Don&#39;t put all your eggs in one basket. <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a><\/p>\n<p>&mdash; Kari E. McLean (@MsMcLean1) <a href=\"https:\/\/twitter.com\/MsMcLean1\/status\/726796384834215936?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Passwords, Attacks, Security (oh my) <a href=\"https:\/\/twitter.com\/Michele_Butcher?ref_src=twsrc%5Etfw\">@Michele_Butcher<\/a> breaks it down at <a href=\"https:\/\/twitter.com\/hashtag\/wcchi?src=hash&amp;ref_src=twsrc%5Etfw\">#wcchi<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/WCChicago?src=hash&amp;ref_src=twsrc%5Etfw\">#WCChicago<\/a> Secret &#8211; it&#39;s not so hard, so do it!<\/p>\n<p>&mdash; Valeria Hunter (@KnowMgr_Hunter) <a href=\"https:\/\/twitter.com\/KnowMgr_Hunter\/status\/726832258389184512?ref_src=twsrc%5Etfw\">May 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Missed Michele Butcher\u2019s talk \u201cPasswords, Attacks, and Security Oh My!\u201d? Learn how to protect your site from hackers AND zombies! We have slides, pictures, and more. <\/p>\n","protected":false},"author":5906591,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[57641],"tags":[577015,805772,276,13412],"class_list":["post-1419","post","type-post","status-publish","format-standard","hentry","category-recap","tag-backups","tag-passwords","tag-security","tag-track-2"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p72ZMx-mT","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1475,"url":"https:\/\/chicago.wordcamp.org\/2016\/recap-andy-nathans-blogging-for-business\/","url_meta":{"origin":1419,"position":0},"title":"Recap: Andy Nathan&#8217;s Blogging for Business","author":"Emily Barney","date":"May 8, 2016","format":false,"excerpt":"Missed Andy Nathan\u2019s talk \u201cBlogging for Business\u201d? Find slides, quotes, pictures and more in our recap!","rel":"","context":"In &quot;Recap&quot;","block_context":{"text":"Recap","link":"https:\/\/chicago.wordcamp.org\/2016\/category\/recap\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/2016.chicago.wordcamp.org\/files\/2016\/02\/cropped-WCP1602-Interior-TopImage-GRAPHIC-composite.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1464,"url":"https:\/\/chicago.wordcamp.org\/2016\/recap-maddy-osmans-wordpress-for-bloggers\/","url_meta":{"origin":1419,"position":1},"title":"Recap: Maddy Osman&#8217;s WordPress for Bloggers","author":"Emily Barney","date":"May 8, 2016","format":false,"excerpt":"Missed Maddy Osman\u2019s talk \u201cUsing WordPress for Bloggers\u201d? Find slides, quotes, pictures and more in our recap!","rel":"","context":"In &quot;Recap&quot;","block_context":{"text":"Recap","link":"https:\/\/chicago.wordcamp.org\/2016\/category\/recap\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/2016.chicago.wordcamp.org\/files\/2016\/02\/cropped-WCP1602-Interior-TopImage-GRAPHIC-composite.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1477,"url":"https:\/\/chicago.wordcamp.org\/2016\/recap-steve-bennetts-choosing-your-wordpress-development-crew\/","url_meta":{"origin":1419,"position":2},"title":"Recap: Steve Bennett&#8217;s Choosing your WordPress Development Crew","author":"Emily Barney","date":"May 9, 2016","format":false,"excerpt":"Missed Steve Bennett's talk \"Choosing your WordPress Development Crew\u201d? Find slides, quotes, pictures and more in our recap!","rel":"","context":"In &quot;Recap&quot;","block_context":{"text":"Recap","link":"https:\/\/chicago.wordcamp.org\/2016\/category\/recap\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/2016.chicago.wordcamp.org\/files\/2016\/02\/cropped-WCP1602-Interior-TopImage-GRAPHIC-composite.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1473,"url":"https:\/\/chicago.wordcamp.org\/2016\/recap-stacy-kvernmos-curing-design-complacency\/","url_meta":{"origin":1419,"position":3},"title":"Recap: Stacy Kvernmo&#8217;s Curing Design Complacency","author":"Emily Barney","date":"May 7, 2016","format":false,"excerpt":"Missed Stacy Kvernmo\u2019s talk \u201cCuring Design Complacency\u201d? Find slides, quotes, pictures and more in our recap!","rel":"","context":"In &quot;Recap&quot;","block_context":{"text":"Recap","link":"https:\/\/chicago.wordcamp.org\/2016\/category\/recap\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/2016.chicago.wordcamp.org\/files\/2016\/02\/cropped-WCP1602-Interior-TopImage-GRAPHIC-composite.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1442,"url":"https:\/\/chicago.wordcamp.org\/2016\/wordcamp-chicago-2016-slides\/","url_meta":{"origin":1419,"position":4},"title":"WordCamp Chicago 2016 Slides","author":"Emily Barney","date":"May 2, 2016","format":false,"excerpt":"Slides from our 2016 WordCamp Chicago speakers - we'll work to keep this list up to date as more are shared online!","rel":"","context":"In &quot;Recap&quot;","block_context":{"text":"Recap","link":"https:\/\/chicago.wordcamp.org\/2016\/category\/recap\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/2016.chicago.wordcamp.org\/files\/2016\/02\/cropped-WCP1602-Interior-TopImage-GRAPHIC-composite.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1490,"url":"https:\/\/chicago.wordcamp.org\/2016\/recap-andrew-wikels-customer-information-security-in-e-commerce\/","url_meta":{"origin":1419,"position":5},"title":"Recap: Andrew Wikel&#8217;s Customer Information Security in E-Commerce","author":"Emily Barney","date":"May 6, 2016","format":false,"excerpt":"Missed Andrew Wikel\u2019s talk \u201cCustomer Information Security in E-Commerce\u201d? Find slides, quotes, pictures and more in our recap!","rel":"","context":"In &quot;Recap&quot;","block_context":{"text":"Recap","link":"https:\/\/chicago.wordcamp.org\/2016\/category\/recap\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/2016.chicago.wordcamp.org\/files\/2016\/02\/cropped-WCP1602-Interior-TopImage-GRAPHIC-composite.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/posts\/1419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/users\/5906591"}],"replies":[{"embeddable":true,"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/comments?post=1419"}],"version-history":[{"count":2,"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/posts\/1419\/revisions"}],"predecessor-version":[{"id":1521,"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/posts\/1419\/revisions\/1521"}],"wp:attachment":[{"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/media?parent=1419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/categories?post=1419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chicago.wordcamp.org\/2016\/wp-json\/wp\/v2\/tags?post=1419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}