{"id":465,"date":"2017-01-30T17:52:33","date_gmt":"2017-01-30T17:52:33","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=465"},"modified":"2020-01-10T13:45:36","modified_gmt":"2020-01-10T13:45:36","slug":"root-cause-analysis","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/","title":{"rendered":"&#8220;Root Cause&#8221; Analysis of Systemic Cyber Issues"},"content":{"rendered":"<p>ITEGRITI provided one client with deep analysis to determine the &#8220;root cause&#8221; of systemic and repeated cybersecurity issues that had undergone several attempts at process improvement without resolution. By reviewing details of these issues, interviewing SMEs, and drawing on decades of operational experience, several specific areas were identified and concrete action plans were developed to correct the underlying reasons for the repeat issues.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ITEGRITI provided one client with deep analysis to determine the &#8220;root cause&#8221; of systemic and repeated cybersecurity issues that had undergone several attempts &#8230;<\/p>\n","protected":false},"author":3,"featured_media":629,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>&quot;Root Cause&quot; Analysis of Systemic Cyber Issues - kw022024<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Root Cause&quot; Analysis of Systemic Cyber Issues\" \/>\n<meta property=\"og:description\" content=\"ITEGRITI provided one client with deep analysis to determine the &quot;root cause&quot; of systemic and repeated cybersecurity issues that had undergone several attempts ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-30T17:52:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-10T13:45:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Sanchez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Sanchez\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/\"},\"author\":{\"name\":\"Michael Sanchez\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\"},\"headline\":\"&#8220;Root Cause&#8221; Analysis of Systemic Cyber Issues\",\"datePublished\":\"2017-01-30T17:52:33+00:00\",\"dateModified\":\"2020-01-10T13:45:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/\"},\"wordCount\":70,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg\",\"articleSection\":[\"Cybersecurity\",\"Featured\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/\",\"name\":\"\\\"Root Cause\\\" Analysis of Systemic Cyber Issues - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg\",\"datePublished\":\"2017-01-30T17:52:33+00:00\",\"dateModified\":\"2020-01-10T13:45:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg\",\"width\":1200,\"height\":320},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"&#8220;Root Cause&#8221; Analysis of Systemic Cyber Issues\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd\",\"name\":\"Michael Sanchez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g\",\"caption\":\"Michael Sanchez\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\"Root Cause\" Analysis of Systemic Cyber Issues - kw022024","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/","og_locale":"en_US","og_type":"article","og_title":"\"Root Cause\" Analysis of Systemic Cyber Issues","og_description":"ITEGRITI provided one client with deep analysis to determine the \"root cause\" of systemic and repeated cybersecurity issues that had undergone several attempts ...","og_url":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2017-01-30T17:52:33+00:00","article_modified_time":"2020-01-10T13:45:36+00:00","og_image":[{"width":1200,"height":320,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg","type":"image\/jpeg"}],"author":"Michael Sanchez","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Michael Sanchez"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/"},"author":{"name":"Michael Sanchez","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd"},"headline":"&#8220;Root Cause&#8221; Analysis of Systemic Cyber Issues","datePublished":"2017-01-30T17:52:33+00:00","dateModified":"2020-01-10T13:45:36+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/"},"wordCount":70,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg","articleSection":["Cybersecurity","Featured"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/","url":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/","name":"\"Root Cause\" Analysis of Systemic Cyber Issues - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg","datePublished":"2017-01-30T17:52:33+00:00","dateModified":"2020-01-10T13:45:36+00:00","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2017\/01\/root2-1200x320.jpg","width":1200,"height":320},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2017\/cybersecurity\/root-cause-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"&#8220;Root Cause&#8221; Analysis of Systemic Cyber Issues"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/48fee36290b34e574ee630a458a4e7bd","name":"Michael Sanchez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c47a53426b8d138686ed3c71adc554e?s=96&d=mm&r=g","caption":"Michael Sanchez"},"url":"https:\/\/itegriti.com\/kw022024\/author\/itegriti\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/465"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=465"}],"version-history":[{"count":5,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/465\/revisions"}],"predecessor-version":[{"id":980,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/465\/revisions\/980"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/629"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}