{"id":13312,"date":"2020-06-30T14:00:04","date_gmt":"2020-06-30T13:00:04","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=13312"},"modified":"2020-06-29T16:26:01","modified_gmt":"2020-06-29T15:26:01","slug":"how-to-effectively-evaluate-your-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/","title":{"rendered":"How to effectively evaluate your cybersecurity"},"content":{"rendered":"<p>Security managers often bring us in to <strong>evaluate their cybersecurity maturity level<\/strong>. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards, and measure exposure to recent attacks.<\/p>\n<p>But these projects are not only the work of systems security managers. These projects also come from executive committees who seek a<strong> 360 view of the security of their institution<\/strong> to better evaluate potential risk. So, what are key success factors that we have seen in the field?<\/p>\n<p>&nbsp;<\/p>\n<h2>Step 1: Know the purpose and expectations of your evaluation<\/h2>\n<p>Evaluations can be entirely different <strong>levels of depth<\/strong>. From a high-level interview with the Chief Security officer to an in-depth assessment of the security mechanisms and processes of all the subsidiaries of a multinational group, everyone can choose their areas of focus and advance step-by-step.<\/p>\n<p>Our first advice is to <strong>keep in mind the objectives of your evaluation<\/strong>. This will allow you to orient yourself toward the right security benchmarks and ultimately define the depth of the evaluation. Do you only want to measure the security maturity of your subsidiary\u2019s information systems or also its efficiency? Perfectly documented security processes and an ISO 27001 certification can unfortunately hide problems on the ground that can expose you to vulnerabilities. It can be judicious to combine a technical test (pentest, red team, etc.) to the evaluation in order to <strong>avoid situations that seem fine on the surface but hide underlying issues<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Step 2: Find and mobilize the right people at the right level, easy to say but harder to do\u2026<\/h2>\n<p>The next difficulty that you can encounter in your assessment is to succeed at meeting the right people. From experience, we advise you to confirm your list of the necessary collaborators as soon as possible.<\/p>\n<p>Logically, this list will certainly depend on the granularity of the analysis but also on the organization of the business. For example, the necessary people will differ if the security staff are at the group level and function as a service center or if they are merged into each entity and service. Consequently, if you want to have a high-level estimate first, it could suffice to only have a half day exchange with the Chief Security Officer, who generally has a sufficient and global vision of the subject.<\/p>\n<p>The second stage of analysis can be performed in gathering information from all actors involved in cybersecurity at the group level. In this group, it can be interesting to meet a large group of people involved in information systems and the cloud.<\/p>\n<p>Finally, when the assessment must be thorough and exhaustive, it becomes necessary to widen the list of collaborators to all of the concerned entities. Obviously, you should expect a larger workload, so do not skimp on preparation and tools to help you in your work. It can also be the right moment to think about your presentation format: face-to-face, distance, strategic, operational, etc.<\/p>\n<p>&nbsp;<\/p>\n<h2>Step 3: Equipment, finding the right balance between too much and not enough<\/h2>\n<p>Choosing the right tools is one of the main assessment challenges that you will face. The more complete the assessment, the more it will require tools that ensure simplification and understanding of the whole project. Indeed, for large evaluations, the <strong>consolidation and restitution of results are two of the great challenges that you will encounter<\/strong>. In particular, commonly used tools don\u2019t take into account the organizational complexity of large groups or the effectiveness of allocated resources. It is for these reasons that, from our side, we have chosen to develop a specific tool.<\/p>\n<p>A good tool also allows you to position yourself against your competitors and understand your exposure to current attack trends and points where your COMEX is particularly sensitive, ensuring you can legitimize the assessment.<\/p>\n<p>So it begins! It\u2019s time to get your hands dirty and start the work of collecting information! There is a classic phrase that applies to these situations: entirely feasible from a distance. Be aware and transparent about the limits of the exercise: those questioned will sometimes have the impression that the assessment is too theoretical and this is normal, according to their objectives. During this phase, it will also be necessary to be able to juggle between the various unknowns because it is not uncommon to have people who are ultimately absent for long periods of time, added parameters, changes in methodology. Make it a point of honor to remain agile.<\/p>\n<p>&nbsp;<\/p>\n<h2>Step 4: Reforming at the right level to act, everything is a question of the point of view<\/h2>\n<p>A good habit to keep is to honestly adapt each reform to each person. From the managerial summaries where we talk about trends without much detail to presentations for technical teams that are highly detailed, adapting the discourse to the necessary format is important to convey the right messages to the right people.<\/p>\n<p>Usually, we start the reforms in terms of the organization\u2019s budget and workforce dedicated to cybersecurity. These very concrete points allow you to attract attention and be able to then analyze the situation from four different angles:<br \/>\n\u00b7 Compliance with different global benchmarks (ISO\/NIST)<br \/>\n\u00b7 Assessment of the level of maturity of different entities compared to others in the same sector or market<br \/>\n\u00b7 Quantification of the effort reach the market level and\/or the required level according to cybersecurity benchmarks<br \/>\n\u00b7 Evaluation of the level of robustness of the organization against the last known cyberattacks<\/p>\n<p>With senior management, the restitution is often going to focus on organizational and governance matters. However, there can always be surprises. In cases where businesses have already been hit by serious cyber attacks, we have had surprisingly precise and technical questions from executive committees. For example, we have been asked for details on encryption algorithms and \u201cHow secure is my active directory?\u201d<\/p>\n<p>&nbsp;<\/p>\n<h2>Get started<\/h2>\n<p>As mentioned earlier, the maturity assessment is an effective means for <strong>measuring the effectiveness and progress of your cybersecurity roadmap<\/strong>. Consequently, even if you don\u2019t want to immediately begin an assessment involving all security systems and dozens of teams at your business, <strong>we advise you to familiarize yourself with the approach<\/strong> and its usefulness in starting out with more modest goals.<\/p>\n<p>At Wavestone, with years of experience and expertise, we have developed the <strong>W-Cyber-Benchmark<\/strong>, a multi-use tool that has been implemented by dozens of clients. We know that just writing about it isn\u2019t enough, <a href=\"https:\/\/www.wavestone.com\/en\/contact\/\">so don\u2019t hesitate to contact us to discuss further<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity, properly allocating the budget, comparing level of security to that of others in similar sectors or common standards,&#8230;<\/p>\n","protected":false},"author":1370,"featured_media":13123,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,2777],"tags":[3536,3540,3541,3535,3534,3542,3156,3543],"coauthors":[3507,2605,3485],"class_list":["post-13312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-cybersecurity-digital-trust","tag-analyze","tag-how-to-en","tag-iso27k-en","tag-level","tag-maturity","tag-rex-en","tag-risk-management-en","tag-roadmap-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to effectively evaluate your cybersecurity - RiskInsight<\/title>\n<meta name=\"description\" content=\"Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to effectively evaluate your cybersecurity - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-30T13:00:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1780\" \/>\n\t<meta property=\"og:image:height\" content=\"1068\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anthony GUIEU, Cl\u00e9ment JOLLIET\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anthony GUIEU, Cl\u00e9ment JOLLIET\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/\"},\"author\":{\"name\":\"Anthony GUIEU\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/203d79af180c4e315921357e98fd6856\"},\"headline\":\"How to effectively evaluate your cybersecurity\",\"datePublished\":\"2020-06-30T13:00:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/\"},\"wordCount\":1094,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg\",\"keywords\":[\"Analyze\",\"How-to\",\"ISO27k\",\"Level\",\"Maturity\",\"REX\",\"risk management\",\"Roadmap\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/\",\"name\":\"How to effectively evaluate your cybersecurity - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg\",\"datePublished\":\"2020-06-30T13:00:04+00:00\",\"description\":\"Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg\",\"width\":1780,\"height\":1068},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to effectively evaluate your cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/203d79af180c4e315921357e98fd6856\",\"name\":\"Anthony GUIEU\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-guieu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to effectively evaluate your cybersecurity - RiskInsight","description":"Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How to effectively evaluate your cybersecurity - RiskInsight","og_description":"Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/","og_site_name":"RiskInsight","article_published_time":"2020-06-30T13:00:04+00:00","og_image":[{"width":1780,"height":1068,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Anthony GUIEU, Cl\u00e9ment JOLLIET","twitter_misc":{"Written by":"Anthony GUIEU, Cl\u00e9ment JOLLIET","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/"},"author":{"name":"Anthony GUIEU","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/203d79af180c4e315921357e98fd6856"},"headline":"How to effectively evaluate your cybersecurity","datePublished":"2020-06-30T13:00:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/"},"wordCount":1094,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg","keywords":["Analyze","How-to","ISO27k","Level","Maturity","REX","risk management","Roadmap"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/","name":"How to effectively evaluate your cybersecurity - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg","datePublished":"2020-06-30T13:00:04+00:00","description":"Security managers often bring us in to evaluate their cybersecurity maturity level. We help firms analyze the return on investment for cybersecurity.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/05\/Fotolia_74362160_Subscription_Monthly_M.jpg","width":1780,"height":1068},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/06\/how-to-effectively-evaluate-your-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to effectively evaluate your cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/203d79af180c4e315921357e98fd6856","name":"Anthony GUIEU","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/anthony-guieu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1370"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=13312"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13312\/revisions"}],"predecessor-version":[{"id":13760,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/13312\/revisions\/13760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/13123"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=13312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=13312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=13312"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=13312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}