{"id":11163,"date":"2020-11-10T10:15:16","date_gmt":"2020-11-10T10:15:16","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/?p=11163"},"modified":"2023-10-05T18:43:42","modified_gmt":"2023-10-05T18:43:42","slug":"defense-offense-giving-cisos-due","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/defense-offense-giving-cisos-due\/","title":{"rendered":"From Defense to Offense: Giving CISOs Their Due"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"11163\" class=\"elementor elementor-11163\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-35b9e066 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35b9e066\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67ba3069\" data-id=\"67ba3069\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a2e413e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a2e413e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-318bdeb\" data-id=\"318bdeb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ffe68d3 elementor-widget elementor-widget-heading\" data-id=\"ffe68d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">In today's unparalleled era of disruption, forward-thinking CISOs can become key to company transformation -- but this means resetting relationships with the board and C-suite.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-6365212 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6365212\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-677971a\" data-id=\"677971a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bff0ffa elementor-widget elementor-widget-text-editor\" data-id=\"bff0ffa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>After polling almost 1,300 organizations, EY found that only 36% of organizations take cybersecurity into account when planning new ventures. In its &#8220;<a href=\"https:\/\/assets.ey.com\/content\/dam\/ey-sites\/ey-com\/en_gl\/topics\/advisory\/ey-global-information-security-survey-2020-report-single-pages.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\"> Global Information Security Survey 2020<\/a>,&#8221; the firm reports that the uptick in activist attacks \u2014 which the report pegs as the second-most common source of significant or material breaches \u2014 illustrates why <a href=\"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/cyber-security-maturity-stagnates-because-cisos-are-structurally-prevented-from-looking-beyond-day-to-day-firefighting\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity <\/a>needs to be part of every aspect of the business. CISOs who aren&#8217;t frequently interacting with senior company leaders will likely be overshadowed, potentially resulting in the launch of new products or services that are vulnerable to cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-4b947de elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4b947de\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e8604cb\" data-id=\"e8604cb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c23332b elementor-widget elementor-widget-text-editor\" data-id=\"c23332b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unfortunately, CISOs aren&#8217;t there yet, and cybercrime increases by the day. According to EY, six in 10 organizations have weathered a significant cyber incident in the past 12 months, and 48% of boards suspect that cyberattacks and data breaches will affect their business in the coming year. About 21% of the attacks were traced to &#8220;hacktivists&#8221; \u2014 tech-savvy political and social activists \u2014 who are second only to organized crime (23%).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5c9bec8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5c9bec8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d33db3f\" data-id=\"d33db3f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d753cc4 elementor-widget elementor-widget-heading\" data-id=\"d753cc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Boards Still Working in the Dark<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-68b1f80 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68b1f80\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e46aded\" data-id=\"e46aded\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a59b84d elementor-widget elementor-widget-text-editor\" data-id=\"a59b84d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Most boards understand that they need to pay closer attention to cybersecurity. This fact was underlined in the EY report, which indicates that 72% of boards see cyber-risk as &#8220;significant.&#8221; Moreover, CEOs expect widespread corporate\u00a0<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/why-cyberattacks-are-the-no-1-risk-\/a\/d-id\/1333616\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">cyberattacks will pose the biggest threat to the global economy<\/a>\u00a0over the next decade.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0470261 elementor-widget elementor-widget-text-editor\" data-id=\"0470261\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>But while boards acknowledge cyber-risk exists, just about half (52%) of respondents say that their <a href=\"https:\/\/www.darkreading.com\/risk\/why-cyber-risk-is-a-c-suite-issue\/a\/d-id\/1336260\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\"> board is fully up to speed<\/a> on the nature of those risks. Further, 43% say their board doesn&#8217;t fully appreciate the value and needs of the cybersecurity team. This should not startle anyone because in 60% of organizations the cybersecurity chief has no official board or executive management role, and only 54% of organizations make cybersecurity a regular item on the board agenda. A mere 32% of security leaders discuss strategic issues and drive change with the board.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2433b2 elementor-widget elementor-widget-text-editor\" data-id=\"d2433b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This scenario needs to change \u2014 but how? A good start would be for CISOs to reconsider the way they communicate with their boards. For example, in the EY report, only a quarter of the respondents could put a dollar figure on the value of their cybersecurity spending in addressing critical business risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c9a0d96 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c9a0d96\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-196a5e7\" data-id=\"196a5e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d528e1 elementor-widget elementor-widget-heading\" data-id=\"8d528e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Remains an Afterthought<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-84376bd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"84376bd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-212bf66\" data-id=\"212bf66\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-caad664 elementor-widget elementor-widget-text-editor\" data-id=\"caad664\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Because activists are waging cyberattacks and digital transformation is now driving the business agenda, the cybersecurity department can&#8217;t continue to play its traditional reactive role. It has to be on the offensive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd0b511 elementor-widget elementor-widget-text-editor\" data-id=\"dd0b511\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As mentioned earlier, only 36% of the EY respondents say their cybersecurity team plays a part in planning new business initiatives. Instead, the security team should be an integral member of the product planning team rather than being summoned later. EY calls this &#8220;Security by Design,&#8221; where cybersecurity is a central consideration right from the get-go of any new project. If security protection is continually treated as a product retrofit, the result will be expensive, less-than-perfect solutions and clunky implementations. Today, when almost every organization is revising its products, services, operational processes, and organizational structures to align with the realities of digital business, treating cyber threats as an afterthought during product development is a nonstarter.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75927aa elementor-widget elementor-widget-text-editor\" data-id=\"75927aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>That said, organizations have a long way to go. The EY report shows they are spending on business as usual, not on new initiatives. In fact, some 17% of organizations spend 5% or less of their cybersecurity budget on new initiatives; 44% spend less than 15%. And while artificial intelligence \u2014 currently the best way to combat cyberattacks \u2014 is playing a bigger part in organizational decision-making, operations, and customer communications, only 5% cite an increased focus on artificial intelligence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff5c6f3 elementor-widget elementor-widget-text-editor\" data-id=\"ff5c6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>By applying the PIVOT principles, organizations can avoid the agile spiral and manage the human side of change to get unstuck and accelerate transformation.Brought to you by CGI<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a2af40e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a2af40e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fb11913\" data-id=\"fb11913\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2cca705 elementor-widget elementor-widget-heading\" data-id=\"2cca705\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Agents of Transformation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-f61bf87 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f61bf87\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3172379\" data-id=\"3172379\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20ddba1 elementor-widget elementor-widget-text-editor\" data-id=\"20ddba1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>CISOs are now in a position where they must \u2014 somehow \u2014 reinvent how they work and how they are perceived within their organizations. Historically, they have been the company&#8217;s risk-averse first line of defense against cyberattacks, and have been viewed as such. But this state of affairs needs to evolve.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c372f8e elementor-widget elementor-widget-text-editor\" data-id=\"c372f8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>&#8220;CISOs cannot afford to be seen as blockers of innovation; they must be problem-solvers,&#8221; says Kris Lovejoy, EY Global Advisory Cybersecurity Leader, in\u00a0<a href=\"https:\/\/assets.ey.com\/content\/dam\/ey-sites\/ey-com\/en_gl\/topics\/advisory\/ey-global-information-security-survey-2020-report-single-pages.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"broken_link\">EY&#8217;s report<\/a>. &#8220;The way we&#8217;ve organized cybersecurity is as a backward-looking function, when it is capable of being a forward-looking, value-added function. When cybersecurity speaks the language of business, it takes that critical first step of both hearing and being understood. It starts to demonstrate value because it can directly tie business drivers to what cybersecurity is doing to enable them, justifying its spend and effectiveness.&#8221;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da69bb9 elementor-widget elementor-widget-text-editor\" data-id=\"da69bb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>But do current CISOs have the right skills and experience to work in this new way and serve in a more proactive and forward-thinking role? That&#8217;s an open question, and the answer will probably demand a new breed of CISO whose job is not driven mainly by threat abatement and compliance. In addition to technical skills, the new CISO will need commercial knowhow, solid communication skills, and the ability to work collaboratively.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85208f8 elementor-widget elementor-widget-text-editor\" data-id=\"85208f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Living up to this new job description will require the cybersecurity leader to adapt to new modes of working. It&#8217;ll be disruptive in the short term, but worth it. It&#8217;s an opportunity for cybersecurity to become an essential business partner at core of the organization&#8217;s value chain, one that leads transformation and continually demonstrates its value.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s unparalleled era of disruption, forward-thinking CISOs can become key to company transformation &#8212; but this means resetting relationships with the board and C-suite.<\/p>\n","protected":false},"author":166,"featured_media":11164,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[946,945,944,943],"ppma_author":[1950],"class_list":["post-11163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-board","tag-c-suite","tag-chief-nformation-security-officer","tag-ciso"],"authors":[{"term_id":1950,"user_id":166,"is_guest":0,"slug":"marc-wilczek","display_name":"Marc Wilczek","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_00058d24-991e-4fe8-b65f-2188edaded40-150x150.jpg","user_url":"http:\/\/www.marcwilczek.com","last_name":"Wilczek","first_name":"Marc","job_title":"","description":"Marc Wilczek, Chief Operating Officer at Link11, is a columnist and recognized thought leader helping organizations drive their digital technology. Over the past 20 years, he has held various senior leadership roles across the ICT industry. Previously, he was a member of the management board of T-Systems\u2019 Computing Services &amp; Solutions (CSS) division. Besides being a public speaker, he has authored dozens of publications featured in CIO Magazine, InformationWeek, Bloomberg, Information Management, DarkReading, ZDNet, and others."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/11163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=11163"}],"version-history":[{"count":7,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/11163\/revisions"}],"predecessor-version":[{"id":33311,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/11163\/revisions\/33311"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/11164"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=11163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=11163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=11163"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=11163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}