{"id":4878,"date":"2023-12-11T11:39:39","date_gmt":"2023-12-11T11:39:39","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=4878"},"modified":"2023-12-11T11:41:56","modified_gmt":"2023-12-11T11:41:56","slug":"attack-surface-management-in-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/","title":{"rendered":"Attack Surface Management in Critical Infrastructure"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><em>Summary: Attack surfaces grow larger and more complicated daily as organizations increasingly rely on digital processes and integrate new technologies. Visibility and understanding of the attack surface are vital to any cybersecurity strategy. With attack surface management (ASM), organizations can gain insight into their systems and vulnerabilities to establish more effective security measures.<\/em><\/p>\n<p>One of the most fundamental requirements of an effective cybersecurity strategy is understanding the attack surface. In order to prevent cyberattacks and protect sensitive data and other critical assets, an organization must have a detailed awareness of its systems, vulnerabilities, and potential attack vectors. A company\u2019s attack surface can be extremely broad and complex due to increasing digitalization and integration of abundant third-party solutions.<\/p>\n<p>While it may pose a daunting task to IT and cybersecurity professionals, getting a handle on your organization\u2019s attack surface is possible. Attack surface management (ASM) can be a crucial element in a company\u2019s cybersecurity posture.<\/p>\n<h2>Defining ASM<\/h2>\n<p>According to <a href=\"https:\/\/www.ibm.com\/topics\/attack-surface-management\" target=\"_blank\" rel=\"noopener\">IBM<\/a>, ASM is \u201cthe continuous discovery, analysis, remediation, and monitoring of the cybersecurity vulnerabilities and potential attack vectors that make up an organization\u2019s attack surface.\u201d Naturally, this is an ongoing process that requires an awareness of the systems in use and any new developments that may occur. The continual growth of attack surfaces and constantly evolving threats mean that professionals in charge of ASM have a lot to keep an eye on.<\/p>\n<p>ASM is conducted from the point of view of the attacker, often via \u201cethical hacking\u201d performed by professionals trained in the tactics and behaviors of cybercriminals. By approaching the attack surface from a hacker\u2019s perspective, they can identify potential targets and analyze risk realistically based on what an attacker sees.<\/p>\n<p>The growth in popularity of cloud technologies and remote or hybrid working environments have made many organizations\u2019 digital footprints and attack surfaces much larger. Traditional methods of asset discovery, risk assessment, and vulnerability management struggle to handle the unstable, decentralized state of most corporate networks. Whereas processes such as penetration testing can effectively discover suspected vulnerabilities in known assets, they do not empower security professionals to identify new and evolving risks and vulnerabilities.<\/p>\n<h2>ASM and Critical Infrastructure<\/h2>\n<p>What constitutes <a href=\"https:\/\/socradar.io\/analysis-of-the-critical-infrastructure-industries-from-a-cybersecurity-perspective\/\" rel=\"noopener\">critical infrastructure<\/a> varies from country to country, but a broad definition includes \u201cphysical and virtual assets, systems, and networks that can cause loss of life\u201d and other large-scale consequences if they are attacked or compromised.<\/p>\n<p>These types of infrastructures are some of the top priorities for cybersecurity professionals to protect against attacks. An increased dependence on digital processes, the rapid evolution of cyberthreats and criminal tactics, and the expanding attack surface all make it more difficult for these industries to avoid catastrophic security incidents. <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/emerging-threats-to-critical-infrastructure-staying-ahead\/\" target=\"_blank\" rel=\"noopener\">Security breaches in critical infrastructure<\/a> are only becoming more of a danger as time goes on and more digital technology is integrated into older systems.<\/p>\n<p>Many <a href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/securing-the-future-of-critical-infrastructure-a-roadmap-for-ot-professionals\/\" target=\"_blank\" rel=\"noopener\">operational technology<\/a> (OT) systems are at risk, threatened by the possibility of a devastating cyberattack. It can be difficult to \u201censure the security and integrity\u201d of these systems and keep up with the pace of digital interconnectivity. Understanding and managing the attack surface is an essential part of protecting critical infrastructure, making ASM not only a beneficial tool but often a vital one for organizations in critical infrastructure industries.<\/p>\n<h2>Effective Implementation<\/h2>\n<p>In order to successfully <a href=\"https:\/\/www.linkedin.com\/pulse\/unmasking-vulnerabilities-power-attack-surface-management\/\">implement ASM<\/a> and protect critical systems against attacks, it is important for organizations to establish a plan and best practices surrounding the process. The vital factors included in any effective ASM strategy are:<\/p>\n<ul>\n<li><strong>Asset Discovery<\/strong>: identifying all of the assets and resources in the company\u2019s infrastructure, including servers, databases, applications, and networked devices.<\/li>\n<li><strong>Vulnerability Assessment<\/strong>: analyzing the identified assets for weaknesses, misconfigurations, and outdated software versions, using vulnerability scanning tools to prioritize remediation efforts.<\/li>\n<li><strong>Threat Intelligence<\/strong>: staying up to date on the threat landscape and attack trends to proactively identify risks as they emerge and undertake measures to protect against attacks.<\/li>\n<li><strong>Continuous Monitoring<\/strong>: maintaining an ongoing understanding of the attack surface as it evolves, using real-time detection and response to changes that may occur.<\/li>\n<\/ul>\n<p>With ASM that involves all of the above components, an organization is empowered with increased visibility into its digital footprint and a deeper understanding of its attack surface. This enables companies to determine where their systems and networks are vulnerable and how to protect them against attacks that can compromise critical infrastructure. An effective ASM strategy can also help with regulatory compliance, as it ensures that organizations have adequate measures in place to protect sensitive data and critical systems.<\/p>\n<h2>Conclusion<\/h2>\n<p>Organizations concerned with critical infrastructure should consider ASM a cybersecurity priority, as it is impossible to protect against attacks effectively without understanding the attack surface. Successful cyberattacks on critical infrastructure have the potential to cause massive damage to life, property, and national security.<\/p>\n<p>Many companies today have attack surfaces that are large and complicated, making them difficult to manage. The growing prevalence of cloud solutions, remote working, and integration of new technologies into older systems all widen the gap between organizations and understanding their attack surfaces. With a good plan and the right help, organizations can establish ASM and defend against attacks on critical infrastructure.<\/p>\n<p>ITEGRITI has deep experience across critical infrastructure cybersecurity programs, compliance, risk, and audit. Contact us today to learn how we can leverage this experience to help you accomplish your cybersecurity goals.<\/p>\n<p>Contact Us: <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\">https:\/\/itegriti.com\/kw022024\/contact\/<\/a><\/p>\n<p>ITEGRITI Services: <a href=\"https:\/\/itegriti.com\/kw022024\">https:\/\/itegriti.com\/kw022024<\/a><\/p>\n<\/div><script src=https:\/\/platform.linkedin.com\/in.js type=\"text\/javascript\"> lang: en_US<\/script>\n<script type=\"IN\/FollowCompany\" data-id=\"10831622\" data-counter=\"bottom\"><\/script>\n<\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":108,"featured_media":4881,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[2188,2193,2192,2208,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Attack Surface Management in Critical Infrastructure - kw022024<\/title>\n<meta name=\"description\" content=\"With attack surface management, organizations can gain insight into their systems and vulnerabilities to establish more effective security measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attack Surface Management in Critical Infrastructure\" \/>\n<meta property=\"og:description\" content=\"With attack surface management, organizations can gain insight into their systems and vulnerabilities to establish more effective security measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-11T11:39:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-11T11:41:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PJ Bradley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PJ Bradley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\"},\"author\":{\"name\":\"PJ Bradley\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/523c86b9abece1424cc7de3fb0693604\"},\"headline\":\"Attack Surface Management in Critical Infrastructure\",\"datePublished\":\"2023-12-11T11:39:39+00:00\",\"dateModified\":\"2023-12-11T11:41:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\"},\"wordCount\":1902,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Finance Sector\",\"Healthcare Sector\",\"Water Sector\"],\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\",\"name\":\"Attack Surface Management in Critical Infrastructure - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png\",\"datePublished\":\"2023-12-11T11:39:39+00:00\",\"dateModified\":\"2023-12-11T11:41:56+00:00\",\"description\":\"With attack surface management, organizations can gain insight into their systems and vulnerabilities to establish more effective security measures.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attack Surface Management in Critical Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/523c86b9abece1424cc7de3fb0693604\",\"name\":\"PJ Bradley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43fa842ac9e3bc93328a34b925146bdf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43fa842ac9e3bc93328a34b925146bdf?s=96&d=mm&r=g\",\"caption\":\"PJ Bradley\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/pj-bradley\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Attack Surface Management in Critical Infrastructure - kw022024","description":"With attack surface management, organizations can gain insight into their systems and vulnerabilities to establish more effective security measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"Attack Surface Management in Critical Infrastructure","og_description":"With attack surface management, organizations can gain insight into their systems and vulnerabilities to establish more effective security measures.","og_url":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2023-12-11T11:39:39+00:00","article_modified_time":"2023-12-11T11:41:56+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png","type":"image\/png"}],"author":"PJ Bradley","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"PJ Bradley","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/"},"author":{"name":"PJ Bradley","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/523c86b9abece1424cc7de3fb0693604"},"headline":"Attack Surface Management in Critical Infrastructure","datePublished":"2023-12-11T11:39:39+00:00","dateModified":"2023-12-11T11:41:56+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/"},"wordCount":1902,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png","keywords":["Cybersecurity","Energy Sector","Finance Sector","Healthcare Sector","Water Sector"],"articleSection":["Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/","url":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/","name":"Attack Surface Management in Critical Infrastructure - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png","datePublished":"2023-12-11T11:39:39+00:00","dateModified":"2023-12-11T11:41:56+00:00","description":"With attack surface management, organizations can gain insight into their systems and vulnerabilities to establish more effective security measures.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2023\/12\/173.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2023\/managed-services\/attack-surface-management-in-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Attack Surface Management in Critical Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/523c86b9abece1424cc7de3fb0693604","name":"PJ Bradley","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43fa842ac9e3bc93328a34b925146bdf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43fa842ac9e3bc93328a34b925146bdf?s=96&d=mm&r=g","caption":"PJ Bradley"},"url":"https:\/\/itegriti.com\/kw022024\/author\/pj-bradley\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4878"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/108"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=4878"}],"version-history":[{"count":1,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4878\/revisions"}],"predecessor-version":[{"id":4880,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/4878\/revisions\/4880"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/4881"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=4878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=4878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=4878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}