{"id":1562,"date":"2012-03-07T13:47:52","date_gmt":"2012-03-07T12:47:52","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1562"},"modified":"2015-08-17T10:56:49","modified_gmt":"2015-08-17T09:56:49","slug":"byod-ou-en-sont-les-entreprises","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/byod-ou-en-sont-les-entreprises\/","title":{"rendered":"BYOD : o\u00f9 en sont les entreprises ?"},"content":{"rendered":"<p>Le BYOD (Bring Your Own Device) repose sur l\u2019utilisation par le salari\u00e9 de son mat\u00e9riel informatique personnel dans le cadre professionnel.<\/p>\n<h3>Le BYOD, une r\u00e9flexion globale qui reste encore \u00e0 m\u00fbrir<\/h3>\n<p>Le BYOD (Bring Your Own Device) repose sur l\u2019utilisation par le salari\u00e9 de son mat\u00e9riel informatique personnel dans le cadre professionnel. Le support mat\u00e9riel par l\u2019entreprise est alors limit\u00e9, voire inexistant. Actuellement, l\u2019utilisation de terminaux personnels dans les entreprises est d\u00e9j\u00e0 une r\u00e9alit\u00e9, mais force est de constater qu\u2019elle reste peu encadr\u00e9e et expose les grands comptes \u00e0 <a title=\"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ?\" href=\"http:\/\/www.solucominsight.fr\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/\" target=\"_blank\">des risques de s\u00e9curit\u00e9.<\/a><\/p>\n<p>Dans la majorit\u00e9 des entreprises, le BYOD est d\u00e9velopp\u00e9 au travers d\u2019une approche \u00ab\u00a0Add &amp; Use Your Own Device\u00a0\u00bb en compl\u00e9ment de l\u2019offre \u00ab\u00a0poste de travail\u00a0\u00bb de l\u2019entreprise. Ces terminaux personnels restent majoritairement des <em>smartphones<\/em> et l\u2019utilisation de PC personnels se limite souvent \u00e0 des populations pr\u00e9figuratrices (ex. mise \u00e0 disposition de PC virtuels pour des prestataires ou partenaires) ou \u00e0 des d\u00e9ploiements au sein de PME, start-up ou soci\u00e9t\u00e9s dont l\u2019IT est le c\u0153ur de m\u00e9tier (et le BYOD une vitrine).<\/p>\n<p>Depuis 2011, le challenge pos\u00e9 par le BYOD a conduit la plupart des grands comptes \u00e0 d\u00e9finir leur strat\u00e9gie pour en ma\u00eetriser l\u2019\u00e9mergence. Ceci se traduit, pour les plus avanc\u00e9s,\u00a0par l\u2019utilisation d\u2019un <em>smartphone<\/em> personnel pour acc\u00e9der \u00e0 la messagerie et au calendrier (JP Morgan et UBS), voire d\u2019un PC personnel en remplacement de celui de l\u2019entreprise (Cisco et Kraft Food).<\/p>\n<h3>S&#8217;adapter aux besoins utilisateurs&#8230; tout en r\u00e9duisant les co\u00fbts<\/h3>\n<p>Le BYOD r\u00e9pond tout d\u2019abord aux nouveaux modes de travail (mobilit\u00e9, t\u00e9l\u00e9travail\u2026) et de consommation IT des utilisateurs (usages grand public) et permet ainsi une transformation de l\u2019image de l\u2019offre de la DSI (innovation, ouverture, attractivit\u00e9\u2026).<\/p>\n<p>Ce changement de mod\u00e8le induit \u00e9galement une r\u00e9duction du TCO (Total Cost of Ownership) \u00e0 travers :<\/p>\n<ul>\n<li>Un changement de p\u00e9rim\u00e8tre de responsabilit\u00e9 et d\u2019activit\u00e9s pour la DSI (transfert de co\u00fbts). Une partie de la charge actuellement confi\u00e9e \u00e0 l\u2019exploitant informatique est transf\u00e9r\u00e9e \u00e0 l\u2019utilisateur qui devient responsable de son terminal et autonome pour son support (ex. renouvellement de mat\u00e9riel, migration d\u2019OS, etc.) \u00e0 l\u2019aide d\u2019outils simplifi\u00e9s (ex. self-support, booklets, FAQ\u2026)<\/li>\n<\/ul>\n<ul>\n<li>Un gain estim\u00e9 de 10 \u00e0 25% du TCO, principalement sur l\u2019exploitation et le support dans le cadre d\u2019un p\u00e9rim\u00e8tre de responsabilit\u00e9 clairement d\u00e9fini et d\u2019une offre standardis\u00e9e (ce gain inclut une valorisation de la compensation financi\u00e8re vers\u00e9e par l\u2019entreprise \u00e0 l\u2019utilisateur, de l\u2019ordre du co\u00fbt mat\u00e9riel\/logiciel actuellement support\u00e9 par l\u2019entreprise)<\/li>\n<\/ul>\n<h3>Une probl\u00e9matique majeure : les ressources humaines<\/h3>\n<p>Cette d\u00e9marche implique quatre chantiers \u00e0 mener en parall\u00e8le\u00a0(RH\/juridique, infrastructures, standard d\u2019acc\u00e8s aux applications et management des terminaux \u2013 support, outillage\u2026).<\/p>\n<p>Les deux pr\u00e9requis incontournables\u00a0\u00e0 la g\u00e9n\u00e9ralisation du BYOD au sein de l\u2019entreprise sont\u00a0:<\/p>\n<ul>\n<li>La n\u00e9cessit\u00e9 de mener un chantier RH et juridique\u00a0: \u00e0 anticiper dans un contexte encore vierge de toute jurisprudence (ex. respect de la vie priv\u00e9e, discrimination interpersonnelle, risques et impacts sur les modalit\u00e9s de temps de travail, conventions collectives, accords t\u00e9l\u00e9travail entreprise\/branche, responsabilit\u00e9s entreprise \/ utilisateur, charte d\u2019utilisation\u2026)<\/li>\n<\/ul>\n<ul>\n<li>\u00a0L\u2019\u00e9volution des infrastructures r\u00e9seau et s\u00e9curit\u00e9 (acc\u00e8s au SI depuis des locaux internes et externes) n\u00e9cessitant des investissements initiaux cons\u00e9quents<\/li>\n<\/ul>\n<p>Il reste encore quelques \u00e9tapes \u00e0 franchir avant que le concept devienne le quotidien de tous les salari\u00e9s. Une chose est cependant certaine : le BYOD est d\u00e9j\u00e0 l\u00e0, pour en tirer partie, il faut s\u2019y mettre maintenant !<\/p>\n<p><strong>[Article r\u00e9dig\u00e9 en collaboration avec Ronan Caron et Adrien Calvayrac]<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le BYOD (Bring Your Own Device) repose sur l\u2019utilisation par le salari\u00e9 de son mat\u00e9riel informatique personnel dans le cadre professionnel. Le BYOD, une r\u00e9flexion globale qui reste encore \u00e0 m\u00fbrir Le BYOD (Bring Your Own Device) repose sur l\u2019utilisation&#8230;<\/p>\n","protected":false},"author":38,"featured_media":3381,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37,35],"tags":[64,246,141,378,377],"coauthors":[941,1017],"class_list":["post-1562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-innovation","category-strategie-projets-it","tag-byod","tag-mobilite","tag-poste-de-travail","tag-tco","tag-tendances-marche-byod"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BYOD : o\u00f9 en sont les entreprises ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD : o\u00f9 en sont les entreprises ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Le BYOD (Bring Your Own Device) repose sur l\u2019utilisation par le salari\u00e9 de son mat\u00e9riel informatique personnel dans le cadre professionnel. Le BYOD, une r\u00e9flexion globale qui reste encore \u00e0 m\u00fbrir Le BYOD (Bring Your Own Device) repose sur l\u2019utilisation...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-07T12:47:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-17T09:56:49+00:00\" \/>\n<meta name=\"author\" content=\"Yannick Taupiac, Ronan Caron\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yannick Taupiac, Ronan Caron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/\"},\"author\":{\"name\":\"Yannick Taupiac\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/43837991ee6e3675e3df04bc434a1384\"},\"headline\":\"BYOD : o\u00f9 en sont les entreprises ?\",\"datePublished\":\"2012-03-07T12:47:52+00:00\",\"dateModified\":\"2015-08-17T09:56:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/\"},\"wordCount\":650,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"BYOD\",\"Mobilit\u00e9\",\"poste de travail\",\"TCO\",\"tendances march\u00e9 BYOD\"],\"articleSection\":[\"M\u00e9tiers - Digital &amp; innovation\",\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/\",\"name\":\"BYOD : o\u00f9 en sont les entreprises ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2012-03-07T12:47:52+00:00\",\"dateModified\":\"2015-08-17T09:56:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD : o\u00f9 en sont les entreprises ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/43837991ee6e3675e3df04bc434a1384\",\"name\":\"Yannick Taupiac\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/yannick-taupiac\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD : o\u00f9 en sont les entreprises ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/","og_locale":"en_US","og_type":"article","og_title":"BYOD : o\u00f9 en sont les entreprises ? - RiskInsight","og_description":"Le BYOD (Bring Your Own Device) repose sur l\u2019utilisation par le salari\u00e9 de son mat\u00e9riel informatique personnel dans le cadre professionnel. Le BYOD, une r\u00e9flexion globale qui reste encore \u00e0 m\u00fbrir Le BYOD (Bring Your Own Device) repose sur l\u2019utilisation...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/","og_site_name":"RiskInsight","article_published_time":"2012-03-07T12:47:52+00:00","article_modified_time":"2015-08-17T09:56:49+00:00","author":"Yannick Taupiac, Ronan Caron","twitter_misc":{"Written by":"Yannick Taupiac, Ronan Caron","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/"},"author":{"name":"Yannick Taupiac","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/43837991ee6e3675e3df04bc434a1384"},"headline":"BYOD : o\u00f9 en sont les entreprises ?","datePublished":"2012-03-07T12:47:52+00:00","dateModified":"2015-08-17T09:56:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/"},"wordCount":650,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#primaryimage"},"thumbnailUrl":"","keywords":["BYOD","Mobilit\u00e9","poste de travail","TCO","tendances march\u00e9 BYOD"],"articleSection":["M\u00e9tiers - Digital &amp; innovation","M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/","name":"BYOD : o\u00f9 en sont les entreprises ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#primaryimage"},"thumbnailUrl":"","datePublished":"2012-03-07T12:47:52+00:00","dateModified":"2015-08-17T09:56:49+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/03\/byod-ou-en-sont-les-entreprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"BYOD : o\u00f9 en sont les entreprises ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/43837991ee6e3675e3df04bc434a1384","name":"Yannick Taupiac","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/yannick-taupiac\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1562"}],"version-history":[{"count":18,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1562\/revisions"}],"predecessor-version":[{"id":8170,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1562\/revisions\/8170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1562"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}