{"id":4040,"date":"2023-04-24T12:41:44","date_gmt":"2023-04-24T12:41:44","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=4040"},"modified":"2023-04-24T12:45:41","modified_gmt":"2023-04-24T12:45:41","slug":"best-practices-for-the-energy-trilemma","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/","title":{"rendered":"Best Practices for the Energy Trilemma 2023"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>Several security and research heavyweights weigh in on the pressing security issues facing the energy sector this year and what can be done about them. Learn what McKinsey, NIST, and FERC have to say about this year\u2019s energy threat climate and which \u201cnext steps\u201d matter most. <\/em><\/p>\n<p>Maintaining the energy trilemma is a monumental task, especially in <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/cybersecurity\/energy-dilemmas-in-2023-energy-trilemma\/\" target=\"_blank\" rel=\"noopener\">today\u2019s threat climate<\/a>. Providing energy that is sustainable, affordable, and secure has never required more time, more resources, more oversight, and more foreplanning. Thankfully, there are some security best practices that, if implemented, will give energy companies the boost they need to feel that at least one of the three elements is safely taken care of.<\/p>\n<p>Drawing from a number of reputable sources \u2013 McKinsey, NIST, and FERC \u2013 reveals several proposed best practices that have bubbled to the surface in the wake of last year\u2019s threats. Here\u2019s a rundown.<\/p>\n<h2>McKinsey: Simplify, cross-train, and digitize<\/h2>\n<p>Research and consulting firm <a href=\"https:\/\/www.mckinsey.com\/industries\/oil-and-gas\/our-insights\/how-people-and-organizational-moves-can-power-up-energy-firms-in-2023\" target=\"_blank\" rel=\"noopener\">McKinsey<\/a> states that leading companies begin their journey towards future-proof viability by simplifying, staying organizationally agile, and digitizing where it makes sense. This aligns not only in operations but within a security context as well.<\/p>\n<p>In simplification, the trend towards uniform platforms and vendor consolidation negates the effects of inherited tool sprawl. A consolidated vendor approach can create cleaner leadership points of contact when troubleshooting security strategy and can build a relationship that lasts long enough for the vendor to provide some real insights.<\/p>\n<p>Organizational agility comes from cross-training your teams (upskilling, reskilling) so you plan workarounds to the ongoing cyber talent crisis right into your strategy. Align tasks around clear business missions (what\u2019s the next big security goal?) and sacrifice work on any other project until those are done. Increased threats and decreased resources result in organizations of all sizes needing to drill deeper into the means they already have and learn to do more with less.<\/p>\n<p>While this hardly bears repeating, increasing digital capabilities \u2013 such as security automation, autonomous detection and response, etc. &#8211; will only pay dividends in the future. First, it\u2019s fewer people on the job doing things manually. Secondly, the few you still have can be most effectively used by being trained on best-in-class solutions, not reinventing the wheel. And last, a little more time and effort and a security budget now (when threats will only trend higher year after year) will warrant a massive sigh of relief in a year to come when advancing ecosystems and emerging threats become even <em>more <\/em>out of reach for outdated processes alone.<\/p>\n<h2>NIST: Governance, supply chain, and measurement<\/h2>\n<p><a href=\"https:\/\/www.nist.gov\/system\/files\/documents\/2023\/01\/19\/CSF_2.0_Concept_Paper_01-18-23.pdf\" target=\"_blank\" rel=\"noopener\">NIST Cybersecurity Framework 2.0<\/a> builds off the original, a set of guidelines designed to reduce risks and introduce best practices for detecting and responding to threats when they occur. This <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/nists-new-cybersecurity-framework-2-0-is-underway\/\" target=\"_blank\" rel=\"noopener\">new version<\/a> focuses largely on the following:<\/p>\n<h3><strong>Governance<\/strong><\/h3>\n<p>This is a significant addition. For years, the NIST framework comprised the Functions \u201cidentify, protect, detect, respond, recover.\u201d Now, \u201cgovern\u201d is being thrown into the mix. Touted as a \u201ccross-cutting Function\u201d, governance can play a part in determining priorities, assessing risks, establishing procedures, and getting clear on roles and responsibilities. The takeaway? More top-down organization is needed to combat ineffective security resource management (in a year when we can afford it the least). This coincides with McKinsey\u2019s first and second points.<\/p>\n<h3><strong>Supply chain security <\/strong><\/h3>\n<p>This problem will only grow bigger, and the advice is to get on it now. As global supply chains (and software supply chains) continue to stretch, each with its own myriad of APIs, OS sources, and vendors of their own, the management becomes almost unreasonable. Add to that the additional partners connected to smart energy devices, charging stations, renewables, and consumer power-monitoring apps, and the real scope of the problem begins to take shape. NIST affirms that \u201ccybersecurity risks in supply chains and third parties are a top risk across organizations\u201d and that since the addition of supply chain security in the last update, \u201ceven more attention has been paid\u201d to building this out. Their advice? A cryptic, \u201cExpand coverage of supply chain.\u201d They leave it open for companies to battle out the details, but the directive is clear.<\/p>\n<h2>FERC: Focus on Insider Threats<\/h2>\n<p>The Federal Energy Regulatory Commission (FERC) <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/ferc-rules-to-integrate-insm-into-cip-230222\/\" target=\"_blank\" rel=\"noopener\">seeks to address concerns<\/a> that current energy security standards do not adequately address the risk of insider threat. Hence, they proposed new security requirements for high- and medium-impact bulk electric system (BES) facilities that would require these facilities to \u201c<a href=\"https:\/\/www.ferc.gov\/media\/e-1-rm22-3-000\" target=\"_blank\" rel=\"noopener\">maintain visibility over communications between networked devices<\/a>.\u201d<\/p>\n<p>Specifically, this translates to directing the North American Electric Reliability Corporation (NERC) to come up with some new Critical Infrastructure Protection (CIP) standards taking internal threats more into mind. In the meantime, the hint is clear, and there\u2019s no need for the private sector to wait: Find ways to reduce internal risk and consult with outside security agents if necessary.<\/p>\n<p data-pm-slice=\"1 1 &#091;&#093;\">ITEGRITI has deep experience across critical infrastructure cybersecurity programs, compliance, risk, and audit.\u00a0 Contact us today to learn how we can leverage this experience to help you accomplish your cybersecurity goals.<\/p>\n<p>Contact Us: <a class=\"ProsemirrorEditor-link\" href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">https:\/\/itegriti.com\/kw022024\/contact\/<\/a><\/p>\n<p>ITEGRITI Services: <a class=\"ProsemirrorEditor-link\" href=\"https:\/\/itegriti.com\/kw022024\">https:\/\/itegriti.com\/kw022024<\/a><\/p>\n<\/div><script src=https:\/\/platform.linkedin.com\/in.js type=\"text\/javascript\"> lang: en_US<\/script>\n<script type=\"IN\/FollowCompany\" data-id=\"10831622\" data-counter=\"bottom\"><\/script>\n<\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":53,"featured_media":4043,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[2188,2193],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best Practices for the Energy Trilemma 2023 - kw022024<\/title>\n<meta name=\"description\" content=\"Several security and research heavyweights weigh in on the pressing security issues facing the energy sector this year and what can be done.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Practices for the Energy Trilemma 2023\" \/>\n<meta property=\"og:description\" content=\"Several security and research heavyweights weigh in on the pressing security issues facing the energy sector this year and what can be done.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-24T12:41:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-24T12:45:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Katrina Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katrina Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/\"},\"author\":{\"name\":\"Katrina Thompson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\"},\"headline\":\"Best Practices for the Energy Trilemma 2023\",\"datePublished\":\"2023-04-24T12:41:44+00:00\",\"dateModified\":\"2023-04-24T12:45:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/\"},\"wordCount\":1652,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/\",\"name\":\"Best Practices for the Energy Trilemma 2023 - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png\",\"datePublished\":\"2023-04-24T12:41:44+00:00\",\"dateModified\":\"2023-04-24T12:45:41+00:00\",\"description\":\"Several security and research heavyweights weigh in on the pressing security issues facing the energy sector this year and what can be done.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Best Practices for the Energy Trilemma 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\",\"name\":\"Katrina Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"caption\":\"Katrina Thompson\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best Practices for the Energy Trilemma 2023 - kw022024","description":"Several security and research heavyweights weigh in on the pressing security issues facing the energy sector this year and what can be done.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/","og_locale":"en_US","og_type":"article","og_title":"Best Practices for the Energy Trilemma 2023","og_description":"Several security and research heavyweights weigh in on the pressing security issues facing the energy sector this year and what can be done.","og_url":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2023-04-24T12:41:44+00:00","article_modified_time":"2023-04-24T12:45:41+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png","type":"image\/png"}],"author":"Katrina Thompson","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Katrina Thompson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/"},"author":{"name":"Katrina Thompson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136"},"headline":"Best Practices for the Energy Trilemma 2023","datePublished":"2023-04-24T12:41:44+00:00","dateModified":"2023-04-24T12:45:41+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/"},"wordCount":1652,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png","keywords":["Cybersecurity","Energy Sector"],"articleSection":["Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/","url":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/","name":"Best Practices for the Energy Trilemma 2023 - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png","datePublished":"2023-04-24T12:41:44+00:00","dateModified":"2023-04-24T12:45:41+00:00","description":"Several security and research heavyweights weigh in on the pressing security issues facing the energy sector this year and what can be done.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/04\/Untitled-design.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2023\/compliance\/best-practices-for-the-energy-trilemma\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Best Practices for the Energy Trilemma 2023"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136","name":"Katrina Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","caption":"Katrina Thompson"},"url":"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4040"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=4040"}],"version-history":[{"count":3,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4040\/revisions"}],"predecessor-version":[{"id":4045,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4040\/revisions\/4045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/4043"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=4040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=4040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=4040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}