{"id":3980,"date":"2023-02-28T14:49:02","date_gmt":"2023-02-28T14:49:02","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3980"},"modified":"2023-02-28T15:07:14","modified_gmt":"2023-02-28T15:07:14","slug":"ferc-rules-to-integrate-insm-into-cip-230222","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/","title":{"rendered":"FERC Rules to Integrate INSM into CIP 230222"},"content":{"rendered":"<p><em>Contrary to what many might believe, energy sustainability and security are not competing imperatives but complementary. The future of energy is decentralized, digitalized, and collaborative \u2013 and runs on smart grids that are reactive and flexible. Intelligent and digitized energy assets offer many benefits, but they are vulnerable to new forms of attack. In response, FERC is seeking to address mounting concerns that the current standards do not address potential vulnerabilities of internal networks to cyber threats.<\/em><\/p>\n<p>Today energy leaders face the vital challenge of balancing energy transition and security. Contrary to what many might believe, sustainability and security are not competing imperatives but complementary. Sustainability and security must be core characteristics of the future energy system, and FERC realizes that. The world can only achieve energy transition with solutions that address both simultaneously. While sustainability remains top of mind for leaders, the real emphasis is strengthening the security of energy systems.<\/p>\n<h2>Energy security is a top priority<\/h2>\n<p>The energy security challenges we face today are not those of the past. New approaches are needed to deal with digitally connected energy assets and systems, extended supply chains, and emerging technologies at scale.<\/p>\n<p>The future of energy is decentralized, digitalized, and collaborative \u2013 and runs on smart grids that are reactive and flexible. Over the coming decades, customers will increasingly adopt intelligent energy devices, from smart lighting and thermostats to smart meters and rooftop solar photovoltaics. These distributed energy resources (DER) offer more choices and control over energy consumption, encourage clean energy practices to combat climate change, and provide resilience.<\/p>\n<p>Intelligent and digitized energy assets offer many benefits, but they are vulnerable to new forms of attack. The energy sector accounts for <a href=\"https:\/\/www.itpro.com\/security\/cyber-attacks\/361142\/why-is-the-energy-sector-so-vulnerable-to-hacking\">16% of all detected cyber-attacks<\/a>. The energy industry is the <a href=\"https:\/\/securityintelligence.com\/posts\/threat-actors-targeted-industries-2020-finance-manufacturing-energy\/\">third most targeted industry<\/a> by cybercriminals. Emergency response, incident reporting, and system design improvements are needed in response to this elevated threat level.<\/p>\n<h2>Cybersecurity considerations for the US energy sector<\/h2>\n<p>The Department of Energy (DOE) has drafted a <a href=\"https:\/\/www.energy.gov\/sites\/default\/files\/2022-10\/Cybersecurity%20Considerations%20for%20Distributed%20Energy%20Resources%20on%20the%20U.S.%20Electric%20Grid.pdf\">report<\/a> highlighting cybersecurity considerations for the energy sector with the introduction of DER. These trends can be summarized in the following points:<\/p>\n<h3>Cyber-attacks against the grid supply<\/h3>\n<p>If a cyberattack could affect thousands or more DER or the overarching systems controlling DER, it would create availability and reliability concerns. Potential attack vectors for DER and the US energy grid are ransomware, supply-chain compromise, botnets, and DER worms.<\/p>\n<h3>Exploitation of Operational Technology (OT)<\/h3>\n<p>Another trend is attackers exploiting and targeting OT systems. The examples of Ukraine and TRITON in the recent past are fine demonstrations of the impact of such attacks. Traditional attack vectors, such as poor data security and access controls, are relevant to new grid technologies. In addition, DER present new threat opportunities and will challenge traditional cybersecurity postures through their administration by many different parties.<\/p>\n<h3>Implied trust and attacker innovation<\/h3>\n<p>Today, an implied trust relationship is typical for electric power control systems communications. For industrial systems to talk to one another, they must trust each other to provide accurate information and commands. Attackers who have inserted themselves into this trust relationship can poison these systems, causing them to act counter to reliability and resilience requirements.<\/p>\n<p>There are better models than implied trust relationships for DER systems. The sheer scale of DER deployment, the wide range of communications options, and the level of access required by various stakeholders underline that implied trust is not a resilient option for DER.<\/p>\n<h2>FERC looks at moving energy security closer to zero trust<\/h2>\n<p>The latter \u2013 implied trust \u2013 is a big concern for FERC. Under the existing NERC CIP reliability standards, network security is focused on defending the security perimeter. Hence, FERC is seeking to address mounting concerns that the current standards do not address potential vulnerabilities of internal networks to cyber threats.<\/p>\n<p>For this reason, FERC has proposed new security requirements for high- and medium-impact bulk electric system (BES) facilities. The proposal would require these facilities to &#8220;<a href=\"https:\/\/www.ferc.gov\/media\/e-1-rm22-3-000\">maintain visibility over communications between networked devices<\/a>.&#8221; More specifically, FERC has directed NERC to develop new or modified Critical Infrastructure Protection (CIP) reliability standards that require internal network security monitoring (INSM) for the CIP-networked environments.<\/p>\n<p>INSM provides constant visibility of communications between networked devices within a trusted zone and detects malicious activity that has bypassed perimeter controls. Additionally, INSM allows for early detection of abnormal network activity, indicating a potential attack and increasing the chances for quick mitigation and recovery.<\/p>\n<p>INSM addresses situations where vendors or individuals with authorized access that are considered trustworthy might still introduce a cybersecurity risk. For example, the SolarWinds attack in 2020 demonstrated how an attacker could bypass network perimeter-based security controls to identify and thwart attacks. This supply chain attack leveraged a trusted vendor to compromise the networks of public and private organizations.<\/p>\n<p>FERC <a href=\"https:\/\/www.ferc.gov\/news-events\/news\/ferc-moves-close-gap-reliability-standards-electric-grid-cyber-systems\">said<\/a> incorporating INSM requirements into the CIP Reliability Standards would help utilities maintain visibility over network communications. Utilities can detect an attacker\u2019s presence and movements and act before the attacker can fully compromise the network. INSM also improves vulnerability assessments and recovery from an attack.<\/p>\n<p>The new or modified CIP reliability standards will be forward-looking and objective-based and address three security objectives that pertain to INSM.<\/p>\n<ul>\n<li>Develop baselines of network traffic inside the CIP-networked environment.<\/li>\n<li>Monitor and detect unauthorized activity, connections, devices, and software inside the CIP-networked environment.<\/li>\n<li>Identify anomalous activity to a high level of confidence by logging network traffic, maintaining logs and other data collected regarding network traffic, and implementing measures to minimize the likelihood of an attacker removing the evidence of their tactics, techniques, and procedures (TTPs) from compromised devices.<\/li>\n<\/ul>\n<p>FERC explained that NERC might, in the future, extend INSM to medium and low-impact bulk electric cyber systems with no broadband access. Hence, FERC tasked NERC to study the risks posed by the lack of INSM and the feasibility of implementing INSM at these facilities. FERC directed NERC to submit the new standards for approval within 15 months and submit its report on medium and low-impact bulk electric system cyber systems with no broadband access within 12 months.<\/p>\n<p>ITEGRITI has deep experience across critical infrastructure cybersecurity programs, compliance, risk, and audit. Contact us today to learn how we can leverage this experience to help you accomplish your cybersecurity goals.<\/p>\n<p>&nbsp;<\/p>\n<p>Contact Us: <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">https:\/\/itegriti.com\/kw022024\/contact\/<\/a><\/p>\n<p>ITEGRITI Services: <a href=\"https:\/\/itegriti.com\/kw022024\">https:\/\/itegriti.com\/kw022024<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Contrary to what many might believe, energy sustainability and security are not competing imperatives but complementary. The future of energy is decentralized, digitalized, and collaborative \u2013 and runs on smart grids that are reactive and flexible. Intelligent and digitized energy assets offer many benefits, but they are vulnerable to new [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":3981,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[2188,2193],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FERC Rules to Integrate INSM into CIP 230222 - kw022024<\/title>\n<meta name=\"description\" content=\"FERC is seeking to address mounting concerns that the current standards do not address potential vulnerabilities of internal networks to cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FERC Rules to Integrate INSM into CIP 230222\" \/>\n<meta property=\"og:description\" content=\"FERC is seeking to address mounting concerns that the current standards do not address potential vulnerabilities of internal networks to cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-28T14:49:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-28T15:07:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Katrina Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katrina Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/\"},\"author\":{\"name\":\"Katrina Thompson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\"},\"headline\":\"FERC Rules to Integrate INSM into CIP 230222\",\"datePublished\":\"2023-02-28T14:49:02+00:00\",\"dateModified\":\"2023-02-28T15:07:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/\"},\"wordCount\":1051,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/\",\"name\":\"FERC Rules to Integrate INSM into CIP 230222 - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png\",\"datePublished\":\"2023-02-28T14:49:02+00:00\",\"dateModified\":\"2023-02-28T15:07:14+00:00\",\"description\":\"FERC is seeking to address mounting concerns that the current standards do not address potential vulnerabilities of internal networks to cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png\",\"width\":800,\"height\":450,\"caption\":\"Network connection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FERC Rules to Integrate INSM into CIP 230222\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\",\"name\":\"Katrina Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"caption\":\"Katrina Thompson\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FERC Rules to Integrate INSM into CIP 230222 - kw022024","description":"FERC is seeking to address mounting concerns that the current standards do not address potential vulnerabilities of internal networks to cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/","og_locale":"en_US","og_type":"article","og_title":"FERC Rules to Integrate INSM into CIP 230222","og_description":"FERC is seeking to address mounting concerns that the current standards do not address potential vulnerabilities of internal networks to cyber threats.","og_url":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2023-02-28T14:49:02+00:00","article_modified_time":"2023-02-28T15:07:14+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png","type":"image\/png"}],"author":"Katrina Thompson","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Katrina Thompson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/"},"author":{"name":"Katrina Thompson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136"},"headline":"FERC Rules to Integrate INSM into CIP 230222","datePublished":"2023-02-28T14:49:02+00:00","dateModified":"2023-02-28T15:07:14+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/"},"wordCount":1051,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png","keywords":["Cybersecurity","Energy Sector"],"articleSection":["Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/","url":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/","name":"FERC Rules to Integrate INSM into CIP 230222 - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png","datePublished":"2023-02-28T14:49:02+00:00","dateModified":"2023-02-28T15:07:14+00:00","description":"FERC is seeking to address mounting concerns that the current standards do not address potential vulnerabilities of internal networks to cyber threats.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/02\/Itegriti-134.png","width":800,"height":450,"caption":"Network connection"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"FERC Rules to Integrate INSM into CIP 230222"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136","name":"Katrina Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","caption":"Katrina Thompson"},"url":"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3980"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3980"}],"version-history":[{"count":3,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3980\/revisions"}],"predecessor-version":[{"id":3989,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3980\/revisions\/3989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3981"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}