{"id":12859,"date":"2021-07-12T12:47:04","date_gmt":"2021-07-12T16:47:04","guid":{"rendered":"https:\/\/brainstation.io\/blog\/?p=12859"},"modified":"2022-01-11T18:04:26","modified_gmt":"2022-01-11T23:04:26","slug":"cybersecurity-what-leaders-need-to-know-in-2021","status":"publish","type":"post","link":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021","title":{"rendered":"Cybersecurity: What Leaders Need to Know"},"content":{"rendered":"\n<p>The need for cybersecurity has exploded in recent years, as the sudden widespread adoption of work-from-home culture has left companies around the world reviewing their cybersecurity systems, standards, and strategies for the future.<\/p>\n\n\n\n<p>That\u2019s why BrainStation gathered four industry experts leading cybersecurity strategy at financial services giant <strong>Mastercard<\/strong>, investment firm <strong>Blackstone<\/strong>, professional networking site <strong>LinkedIn<\/strong>, and software developer <strong>Citrix <\/strong>for a discussion on what leaders need to know about cybersecurity as part of BrainStation\u2019s Digital Leadership Event Series.<\/p>\n\n\n\n<p>You can watch the full panel discussion here:<\/p>\n\n\n<div style=\"padding:56.25% 0 0 0;position:relative;\"><iframe src=\"https:\/\/player.vimeo.com\/video\/573163872?title=0&amp;byline=0&amp;portrait=0&amp;speed=0&amp;badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\/embed\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen=\"\" frameborder=\"0\" style=\"position:absolute;top:0;left:0;width:100%;height:100%;\"><\/iframe><\/div>\n\n\n<h2><strong>What Is Cybersecurity?<\/strong><\/h2>\n\n\n\n<p>Before exploring the ways in which the cybersecurity landscape is changing, our panelists were asked for their ideas of what cybersecurity entails.<\/p>\n\n\n\n<p>Eugene Dvorochkin, Senior Member of the Information Security team at LinkedIn, summarizes cybersecurity as \u201cusing technology, processes, and controls to protect systems, network, and data. Ultimately, everything goes back to the data&#8230;All we\u2019re trying to do is protect that data, protect its integrity, and make sure [there\u2019s no] unauthorized use of it.\u201d<\/p>\n\n\n\n<p>As Kurt Roemer, Chief Security Strategist at Citrix, explains, cybersecurity\u2019s traditional focus on maintaining data\u2019s confidentiality, integrity, and availability should expand to include a fourth factor: safety. \u201cAs we adopt IoT and other artificial intelligence and [augmented reality applications], it\u2019s integrating with our physical world in a way where safety becomes critically important.\u201d<\/p>\n\n\n\n<p>Puneet Bhatnagar, Senior Vice President \/ IAM Lead \u2013 Cybersecurity at Blackstone, takes a more philosophical approach: \u201cI ask myself the fundamental question of \u2018How can I help build trust into the design of systems? Do I feel comfortable signing up for an application when I\u2019m offering my personal details? Do I trust the brand that I\u2019m offering that information to?\u2019 It\u2019s important for corporations to see cybersecurity as everything they need to do to build trust within their applications and ecosystem.\u201d<\/p>\n\n\n\n<p>Sukhmani Dev, Vice President of Digital &amp; Security Solutions at Mastercard, concurs. \u201cWe want to make sure that trust is reflected in every single transaction.\u201d<\/p>\n\n\n\n<p>Achieving that ultimate goal is as dynamic a process as technology itself. Below are just a few of the broader trends our panelists identified.<\/p>\n\n\n\n<h2><strong>Cybersecurity Is More Important Than Ever<\/strong><\/h2>\n\n\n\n<p>COVID-19 and the resulting explosion of work-from-home culture has compressed an evolution that was expected to take a decade into a matter of months. That acceleration means more online activity, more new users, and more complexity in the individual systems those users rely on, all of which spells opportunity for bad actors. The result is a sudden and acute need for more digital security.<\/p>\n\n\n\n<p>Much of that need comes down to simple volume; during lockdown, more people worked and shopped from devices in their homes. Dvorochkin explains, \u201cWhen you\u2019re using your home network, you\u2019re potentially using personal devices like your personal computer or iPhone to access corporate environments and data, and you\u2019re also dependent more on third-party systems such as Zoom or other communication methods. You\u2019re coming into harder-to-secure environments.\u201d<\/p>\n\n\n\n<p>For many large international companies, accommodating remote work was relatively straightforward. But for many smaller brick-and-mortar businesses, this meant a first foray into the digital world \u2013 and these are particularly vulnerable to hackers. \u201c[It\u2019s a misconception] that only big, well-known companies are the targets of attacks,\u201d Dvorochkin continues. \u201cHackers have gotten more advanced, but also the tools and techniques that they use have basically become public. Anyone can go online and start hacking any company. It\u2019s not just large, well-known companies that are being targeted by sophisticated hackers \u2013 it can be literally any mom-and-pop shop.\u201d<\/p>\n\n\n\n<p>Dev identifies the growing complexity of systems as another vector. \u201cEverything is more interconnected than ever,\u201d she says. \u201cIf you think about a bank, they may have their suppliers, but then their suppliers have suppliers, and these are massive supply chains. The connection points have grown exponentially in the last few years.\u201d<\/p>\n\n\n\n<p>This means more weak links for hackers to exploit \u2013 and hackers have taken notice.<\/p>\n\n\n\n<h2><strong>Moving From Systems to Users<\/strong><\/h2>\n\n\n\n<p>The growth in scale and complexity also means cybersecurity teams are fighting on more fronts than ever. This in turn is leading to a change in the way cybersecurity experts conceive of their task. If the goal is to secure data within a digital fortress, cybersecurity\u2019s job is to protect the perimeter \u2013 but the perimeter and modes of attacking it are ever-changing. Locking data down is not the answer \u2013 there\u2019s no point in having a system if nobody can access it. Instead, the priority is shifting to, first, confirming the identities of the people accessing it, and second, granting access to only the data they need, rather than the entire system.<\/p>\n\n\n\n<p>\u201cBefore, you might have had certain things that could only be considered secure when they were in the four walls,\u201d Roemer says. \u201cWhat if you turn that around and say, \u2018How do we secure these when it\u2019s outside the four walls, in the cloud?\u2019 When you look at the hybrid work model, you have people working in different situations potentially every week \u2013 in an office, in their home, maybe in a coffee shop again, maybe out traveling. How do you make sure that you\u2019ve got the right security environment available for those individuals?\u201d<\/p>\n\n\n\n<p>For Bhatnagar, this means \u201cthe only real perimeter you have that you can truly secure is your identity perimeter.\u201d This typically demands multi-factor authentication, which helps to verify that people are who they say they are (\u201cThere\u2019s some crazy statistics out there,\u201d Bhatnagar says, \u201clike, more than 90% of breaches originated from some sort of email compromise\u201d).<\/p>\n\n\n\n<p>As a result, \u201cIt\u2019s not enough to just have a good network perimeter or to have a good set of firewalls. You have to move your thinking from being systems- or network-centric to being identity- or user-centric. That\u2019s when we started thinking about these newer paradigms of zero trust. With the kind of volume of information that people are constantly accessing, you\u2019re always going to be playing catch-up if you\u2019re just trying to patch the system or secure the network.\u201d<\/p>\n\n\n\n<p>Shifting focus to the user\u2019s identity helps eliminate access to outside hackers, but it also helps contain risk from the inside by limiting even legitimate users\u2019 access to the data they need. This, of course, depends on the ability to parse the data at your disposal. Dvorochkin explains, \u201cBack in the day, companies were over-privileging people, and they were able to access everything <em>carte blanche<\/em>, which obviously leads to a lot more risk. [You need to be] very specific about all the data that you have. You don\u2019t know what you don\u2019t know, so good identification tagging is very important \u2013 to know exactly where your data is located, how much of it there is, and the transactions you have with it, especially with third-party suppliers. Because, again, we\u2019re becoming more and more dependent on third-party applications, and they\u2019re obviously not at the same level of trust as our internal employees. It all comes back to identification, having a good asset inventory of it, and being able to limit it.\u201d<\/p>\n\n\n\n<h2><strong>Culture and Education Are Key<\/strong><\/h2>\n\n\n\n<p>You can\u2019t implement any kind of cybersecurity strategy unless your teammates are on board. And human beings are always the weakest link in the cybersecurity chain \u2013 most hacking is done not by writing code but by posing as an authority and tricking someone into giving up a password. The solution here is as much social as it is technological.<\/p>\n\n\n\n<p>\u201cCybersecurity is not one person or one team\u2019s responsibility,\u201d Bhatnagar says. \u201cEverybody needs to roll up their sleeves and own it. We lay a lot of emphasis on end-user awareness training, helping them identify phishing emails, doing simulations of phishing, and incrementally advancing the complexity of these simulations, just so we\u2019re constantly educating our people.\u201d<\/p>\n\n\n\n<p>This can directly cut down on individual instances of data breaches, but it also helps cultivate a company-wide culture that values cybersecurity. \u201cOnce you put that out there, it\u2019s a language that everybody understands \u2013 that it\u2019s not just your cybersecurity professionals who need to be super technical, but that there\u2019s a general framework other business leaders can understand. You can use that to raise awareness and to get the budget and the funding and the resources you need to keep making strategic improvements.\u201d<\/p>\n\n\n\n<p>Dev seconds the importance of corporate culture. \u201cAnd along with culture,\u201d she says, \u201cI would also say training\u2026.It\u2019s a very different way of thinking and operating, as compared to legacy systems. The rest of the technology, design, and so on will fall in place if you have the attitude to culture right.\u201d<\/p>\n\n\n\n<p>For Roemer, this starts at the top. \u201cSecurity is a shared responsibility, and we all need to be security practitioners. Leadership needs to go to HR and let them know that security capabilities are needed across the organization and talk about how they can provide reskilling and advancement opportunities for those who find security to be a compelling career, and be able to pull those individuals \u2013 not just from the IT organization but from across the org, as it makes sense \u2013 and so reach out to the rest of the organization [and communicate that] we desperately need additional security professionals and we all need to be considered practitioners.\u201d<\/p>\n\n\n\n<h2><strong>Shifting From Tactics to Platforms<\/strong><\/h2>\n\n\n\n<p>Somewhat paradoxically, given the shift in focus from total system security to the user identity perimeter, we\u2019re also seeing a shift away from tactics and toward platforms \u2013 that is, to organizing cybersecurity efforts into a holistic strategy, rather than an array of individual patches.<\/p>\n\n\n\n<p>Roemer explains, \u201cThe reason for this is that it has become very difficult to manage [a collection of] point products. They don\u2019t integrate well, and we don\u2019t have the resources to use them to their effectiveness. So the more we can build and consolidate into a platform, the more we can amplify security capabilities.\u201d<\/p>\n\n\n\n<p>Dvorochkin adds that this means co-ordinating not just tactics but also entire teams. \u201cOftentimes, technology domains or functions are siloed. We\u2019re obviously all trying to achieve the same goal, which is to make the firm successful.\u201d<\/p>\n\n\n\n<p>For Bhatnagar, a more strategic approach includes having a well-staffed and -funded security operations center. While it\u2019s always good to be proactive, that doesn\u2019t mean a breach won\u2019t eventually happen, and when it does, it\u2019s imperative that an organization is ready to spring into action. \u201cThere\u2019s always things that are going to come out of left field, because hackers continue to get more advanced, and their techniques continue to get more persistent.\u201d<\/p>\n\n\n\n<h2><strong>Cybersecurity Is Always Dynamic<\/strong><\/h2>\n\n\n\n<p>Dvorochkin echoes Bhatnagar\u2019s sentiment \u2013 responsiveness is crucial. Cybersecurity strategy needs to be dynamic in order to counter attacks both proactively and reactively. On the reactive side, he says, \u201cIt\u2019s not a matter of <em>if<\/em>, it\u2019s a matter of <em>when<\/em> you\u2019ll get breached; it\u2019s almost impossible to fully be protected on an ongoing basis. Something eventually is going to get through. Protecting the perimeter is important, having good detective controls is important \u2013 but you also need to have a good response, good evaluation, and be able to test yourself.\u201d<\/p>\n\n\n\n<p>On the proactive side, this means constantly evaluating your strategy; you can\u2019t just set it and forget it. \u201c[There\u2019s a] misconception that, \u2018Okay, well, we invested in technology, we did this one-time setup, we have a cybersecurity program, we\u2019re good to go,\u201d Dvorochkin continues. \u201cA one-time setup of implementing some tools \u2013 it\u2019s not going to protect you. Technology changes almost on a daily basis because of the synergistic relationship between tech and cyber, and cybersecurity is changing just as fast. So you have to be dynamic, you have to always be up to date, and you have to have good investment from your company \u2013 because cybersecurity is not cheap.\u201d<\/p>\n\n\n\n<p>\u201cConsider your information technology portfolio a set of investments,\u201d Roemer adds. \u201cAs with your personal investments, go through from time to time and re-evaluate what\u2019s working well, what\u2019s not, and where you need to dump the dogs and move on to something that\u2019s going to give you a better return. Security is very much like that. We need the agility, and if you consider your information technology portfolio not as a sunk set of decisions but as a set of investments that are constantly evaluated, you can help to move forward and address today\u2019s and tomorrow\u2019s security needs.\u201d<br><\/p>\n\n\n\n<p>(<em>This article was last updated in January 2022.<\/em>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Watch a recap of Cybersecurity: What Leaders Need to Know in 2021 \u2013 the latest in BrainStation\u2019s Digital Leadership Event Series. <\/p>\n","protected":false},"author":117,"featured_media":12864,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[783,1294],"tags":[1259,1295],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity: What Leaders Need to Know | BrainStation\u00ae Blog<\/title>\n<meta name=\"description\" content=\"Watch a recap of Cybersecurity: What Leaders Need to Know \u2013 the latest in BrainStation\u2019s Digital Leadership Event Series.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: What Leaders Need to Know | BrainStation\u00ae Blog\" \/>\n<meta property=\"og:description\" content=\"Watch a recap of Cybersecurity: What Leaders Need to Know \u2013 the latest in BrainStation\u2019s Digital Leadership Event Series.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021\" \/>\n<meta property=\"og:site_name\" content=\"BrainStation\u00ae Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-12T16:47:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-11T23:04:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d2re7sjnpekmig.cloudfront.net\/prod\/wp-content\/uploads\/2021\/07\/12130842\/Blog-Header-Cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2320\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Salvatore Ciolfi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/brainstation.io\/blog\/#website\",\"url\":\"https:\/\/brainstation.io\/blog\/\",\"name\":\"BrainStation\u00ae Blog\",\"description\":\"The Digital Learning Company\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/brainstation.io\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#primaryimage\",\"url\":\"https:\/\/d2re7sjnpekmig.cloudfront.net\/prod\/wp-content\/uploads\/2021\/07\/12130842\/Blog-Header-Cybersecurity.jpg\",\"contentUrl\":\"https:\/\/d2re7sjnpekmig.cloudfront.net\/prod\/wp-content\/uploads\/2021\/07\/12130842\/Blog-Header-Cybersecurity.jpg\",\"width\":2320,\"height\":800,\"caption\":\"What you need to know about Cybersecurity\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#webpage\",\"url\":\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021\",\"name\":\"Cybersecurity: What Leaders Need to Know | BrainStation\u00ae Blog\",\"isPartOf\":{\"@id\":\"https:\/\/brainstation.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#primaryimage\"},\"datePublished\":\"2021-07-12T16:47:04+00:00\",\"dateModified\":\"2022-01-11T23:04:26+00:00\",\"author\":{\"@id\":\"https:\/\/brainstation.io\/blog\/#\/schema\/person\/99f0015e670fb1cad9734f1861ce31af\"},\"description\":\"Watch a recap of Cybersecurity: What Leaders Need to Know \u2013 the latest in BrainStation\u2019s Digital Leadership Event Series.\",\"breadcrumb\":{\"@id\":\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/brainstation.io\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: What Leaders Need to Know\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/brainstation.io\/blog\/#\/schema\/person\/99f0015e670fb1cad9734f1861ce31af\",\"name\":\"Salvatore Ciolfi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/brainstation.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fe43ebb96f218a31fab76013fee77938?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fe43ebb96f218a31fab76013fee77938?s=96&d=mm&r=g\",\"caption\":\"Salvatore Ciolfi\"},\"url\":\"https:\/\/brainstation.io\/blog\/author\/sciolfi\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: What Leaders Need to Know | BrainStation\u00ae Blog","description":"Watch a recap of Cybersecurity: What Leaders Need to Know \u2013 the latest in BrainStation\u2019s Digital Leadership Event Series.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: What Leaders Need to Know | BrainStation\u00ae Blog","og_description":"Watch a recap of Cybersecurity: What Leaders Need to Know \u2013 the latest in BrainStation\u2019s Digital Leadership Event Series.","og_url":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021","og_site_name":"BrainStation\u00ae Blog","article_published_time":"2021-07-12T16:47:04+00:00","article_modified_time":"2022-01-11T23:04:26+00:00","og_image":[{"width":2320,"height":800,"url":"https:\/\/d2re7sjnpekmig.cloudfront.net\/prod\/wp-content\/uploads\/2021\/07\/12130842\/Blog-Header-Cybersecurity.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Salvatore Ciolfi","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/brainstation.io\/blog\/#website","url":"https:\/\/brainstation.io\/blog\/","name":"BrainStation\u00ae Blog","description":"The Digital Learning Company","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/brainstation.io\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#primaryimage","url":"https:\/\/d2re7sjnpekmig.cloudfront.net\/prod\/wp-content\/uploads\/2021\/07\/12130842\/Blog-Header-Cybersecurity.jpg","contentUrl":"https:\/\/d2re7sjnpekmig.cloudfront.net\/prod\/wp-content\/uploads\/2021\/07\/12130842\/Blog-Header-Cybersecurity.jpg","width":2320,"height":800,"caption":"What you need to know about Cybersecurity"},{"@type":"WebPage","@id":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#webpage","url":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021","name":"Cybersecurity: What Leaders Need to Know | BrainStation\u00ae Blog","isPartOf":{"@id":"https:\/\/brainstation.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#primaryimage"},"datePublished":"2021-07-12T16:47:04+00:00","dateModified":"2022-01-11T23:04:26+00:00","author":{"@id":"https:\/\/brainstation.io\/blog\/#\/schema\/person\/99f0015e670fb1cad9734f1861ce31af"},"description":"Watch a recap of Cybersecurity: What Leaders Need to Know \u2013 the latest in BrainStation\u2019s Digital Leadership Event Series.","breadcrumb":{"@id":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/brainstation.io\/blog\/cybersecurity-what-leaders-need-to-know-in-2021#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/brainstation.io\/blog"},{"@type":"ListItem","position":2,"name":"Cybersecurity: What Leaders Need to Know"}]},{"@type":"Person","@id":"https:\/\/brainstation.io\/blog\/#\/schema\/person\/99f0015e670fb1cad9734f1861ce31af","name":"Salvatore Ciolfi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/brainstation.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fe43ebb96f218a31fab76013fee77938?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fe43ebb96f218a31fab76013fee77938?s=96&d=mm&r=g","caption":"Salvatore Ciolfi"},"url":"https:\/\/brainstation.io\/blog\/author\/sciolfi"}]}},"_links":{"self":[{"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/posts\/12859"}],"collection":[{"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/comments?post=12859"}],"version-history":[{"count":7,"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/posts\/12859\/revisions"}],"predecessor-version":[{"id":12972,"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/posts\/12859\/revisions\/12972"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/media\/12864"}],"wp:attachment":[{"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/media?parent=12859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/categories?post=12859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brainstation.io\/blog\/wp-json\/wp\/v2\/tags?post=12859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}