{"id":18251,"date":"2021-02-18T03:19:20","date_gmt":"2021-02-17T16:19:20","guid":{"rendered":"https:\/\/cyberleadershipinstitute.com\/index.php\/build-your-security-operations-program-from-the-ground-up\/"},"modified":"2023-01-29T07:19:45","modified_gmt":"2023-01-29T07:19:45","slug":"build-your-security-operations-program-from-the-ground-up","status":"publish","type":"page","link":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/","title":{"rendered":"Build Your Security Operations Program from the Ground Up"},"content":{"rendered":"

Build Your Security Operations Program <\/span><\/span>from<\/span><\/span> the Ground Up<\/span><\/span> <\/span><\/span><\/span><\/strong><\/h1>\n

Establish <\/span>threat <\/span>aware and adaptive detection and response capability<\/span>.<\/span><\/span><\/span><\/p>\n

If you’re already a member, click here<\/a> to log in.<\/p>\n

Major Business Pain Points<\/strong><\/h2>\n
    \n
  • Analysts cannot monitor and track events coming from multiple tools because they have no visibility into the threat environment.<\/span><\/span><\/span><\/span><\/li>\n
  • Incident management takes away time from problem management because processes are ad hoc and the continuous monitoring, collection, and analysis of massive volumes of security event data is responsive rather than tactical.<\/span> <\/span><\/span><\/span><\/span><\/li>\n
  • Organizations are struggling to defend against and prevent threats while juggling business, compliance, and consumer obligations.<\/span> <\/span><\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n

    \"Build<\/span><\/p>\n

    Recommendations<\/strong><\/h2>\n

    Key Points<\/strong><\/em><\/h3>\n
      \n
    • Security operations is no longer a\u202f<\/span><\/span>center<\/span><\/span><\/em>\u202fbut a\u202f<\/span><\/span>process<\/span><\/span><\/em>.<\/span><\/span><\/strong>\u202fThe need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.<\/span> <\/span><\/span><\/span><\/span><\/span><\/li>\n
    • Raw data without correlation is a waste of time, money, and effort.<\/span><\/span><\/strong>\u202f<\/strong>A SIEM on its own will not provide this contextualization and needs configuration. Prevention, detection, analysis, and response processes must contextualize threat data and supplement one another \u2013 true value will only be realized once all four functions operate as a unified process.<\/span> <\/span><\/span><\/span><\/span><\/span><\/li>\n
    • If you are not communicating, then you are not secure.<\/span><\/span><\/strong>\u202f<\/span><\/span>Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process.<\/span> <\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n

      \"Build<\/span><\/p>\n

      Approach<\/strong><\/em><\/h3>\n
        \n
      • A centralized security operations process actively transforms security events and threat information into actionable intelligence, driving security prevention, detection, analysis, and response processes that address the increasing sophistication of cyberthreats while guiding continuous improvement.<\/span> <\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n
      • This blueprint will walk through the steps of developing a flexible and systematic security operations program relevant to your organization.<\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n

        Methodology and Tools<\/strong><\/h2>\n

        Executive Brief<\/strong><\/h3>\n

        Read <\/span><\/span>the<\/span><\/span> concise Executive Brief to find out why you should build a security operations <\/span><\/span>program and<\/span><\/span> review the methodology. <\/span><\/span> <\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

          \n
        • Build Your Security Operations Program <\/span><\/span>from<\/span><\/span> the Ground Up \u2013 Executive Brief<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
        • Build Your Security Operations Program <\/span><\/span>from<\/span><\/span> the Ground Up \u2013 Phases 1-4<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

          1. Establish your foundation<\/span><\/span> <\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

          Determine how to establish the foundation of your security operations.<\/span><\/span> <\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

            \n
          • Build Your Security Operations Program <\/span><\/span>from<\/span><\/span> the Ground Up \u2013 Phase 1: Establish Your Foundation<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
          • Information Security Pressure Analysis Tool<\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

            2. Assess your current state<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

            Assess the maturity of your prevention, detection, analysis, and response processes.<\/span><\/span> <\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

              \n
            • Build Your Security Operations Program <\/span><\/span>from<\/span><\/span> the Ground Up \u2013 Phase 2: Assess Your Current State<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
            • Security Operations Roadmap Tool<\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

              3. Design your target state<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

              Design a target state and improve your governance and policy solutions.<\/span><\/span> <\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

                \n
              • Build Your Security Operations Program <\/span><\/span>from<\/span><\/span> the Ground Up \u2013 Phase 3: Design Your Target State<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
              • Security Operations Policy<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

                4. Develop an implementation roadmap<\/span><\/span> <\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

                Make your case to the board and develop a roadmap for your prioritized security initiatives.<\/span><\/span> <\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

                  \n
                • Build Your Security Operations Program <\/span><\/span>from<\/span><\/span> the Ground Up \u2013 Phase 4: Develop an Implementation Roadmap<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
                • In-House vs. Outsourcing Decision-Making Tool<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
                • Security Operations MSSP RFP Template<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
                • Security Operations Project Charter Template<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
                • Security Operations RACI Tool<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
                • Security Operations Metrics Summary Document<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

                  All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.<\/p>\n","protected":false},"excerpt":{"rendered":"

                  Build Your Security Operations Program from the Ground Up  Establish threat aware and adaptive detection and response capability. If you’re already a member, click […]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"acf":[],"yoast_head":"\nBuild Your Security Operations Program from the Ground Up - Cyber Leadership Institute<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Build Your Security Operations Program from the Ground Up\" \/>\n<meta property=\"og:description\" content=\"Establish threat aware and adaptive detection and response capability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Leadership Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/cyberleadershipinstitute\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-29T07:19:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Build-Your-Security-Operations-Program-from-the-Ground-Up-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"791\" \/>\n\t<meta property=\"og:image:height\" content=\"447\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Build Your Security Operations Program from the Ground Up\" \/>\n<meta name=\"twitter:description\" content=\"Build Your Security Operations Program from the Ground Up Establish threat aware and adaptive detection and response\" \/>\n<meta name=\"twitter:site\" content=\"@C_L_Institute\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/\",\"name\":\"Build Your Security Operations Program from the Ground Up - Cyber Leadership Institute\",\"isPartOf\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"datePublished\":\"2021-02-17T16:19:20+00:00\",\"dateModified\":\"2023-01-29T07:19:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#primaryimage\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"width\":2400,\"height\":1274},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberleadershipinstitute.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Build Your Security Operations Program from the Ground Up\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"name\":\"Cyber Leadership Institute\",\"description\":\"Know You're Ready\",\"publisher\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\",\"name\":\"Cyber Leadership Institute\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"width\":512,\"height\":512,\"caption\":\"Cyber Leadership Institute\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/cyberleadershipinstitute\",\"https:\/\/x.com\/C_L_Institute\",\"https:\/\/www.instagram.com\/cyber_leadership_institute\/\",\"https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Build Your Security Operations Program from the Ground Up - Cyber Leadership Institute","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Build Your Security Operations Program from the Ground Up","og_description":"Establish threat aware and adaptive detection and response capability.","og_url":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/","og_site_name":"Cyber Leadership Institute","article_publisher":"https:\/\/facebook.com\/cyberleadershipinstitute","article_modified_time":"2023-01-29T07:19:45+00:00","og_image":[{"width":791,"height":447,"url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Build-Your-Security-Operations-Program-from-the-Ground-Up-.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Build Your Security Operations Program from the Ground Up","twitter_description":"Build Your Security Operations Program from the Ground Up Establish threat aware and adaptive detection and response","twitter_site":"@C_L_Institute","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/","url":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/","name":"Build Your Security Operations Program from the Ground Up - Cyber Leadership Institute","isPartOf":{"@id":"https:\/\/cyberleadershipinstitute.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#primaryimage"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","datePublished":"2021-02-17T16:19:20+00:00","dateModified":"2023-01-29T07:19:45+00:00","breadcrumb":{"@id":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#primaryimage","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","width":2400,"height":1274},{"@type":"BreadcrumbList","@id":"https:\/\/cyberleadershipinstitute.com\/build-your-security-operations-program-from-the-ground-up\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberleadershipinstitute.com\/"},{"@type":"ListItem","position":2,"name":"Build Your Security Operations Program from the Ground Up"}]},{"@type":"WebSite","@id":"https:\/\/cyberleadershipinstitute.com\/#website","url":"https:\/\/cyberleadershipinstitute.com\/","name":"Cyber Leadership Institute","description":"Know You're Ready","publisher":{"@id":"https:\/\/cyberleadershipinstitute.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberleadershipinstitute.com\/#organization","name":"Cyber Leadership Institute","url":"https:\/\/cyberleadershipinstitute.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","width":512,"height":512,"caption":"Cyber Leadership Institute"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/cyberleadershipinstitute","https:\/\/x.com\/C_L_Institute","https:\/\/www.instagram.com\/cyber_leadership_institute\/","https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"authorship-box-avatar":false,"authorship-box-related":false},"uagb_author_info":{"display_name":"anirtac arim","author_link":"https:\/\/cyberleadershipinstitute.com\/author\/cat\/"},"uagb_comment_info":0,"uagb_excerpt":"Build Your Security Operations Program from the Ground Up  Establish threat aware and adaptive detection and response capability. If you’re already a member, click […]","_links":{"self":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/18251"}],"collection":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/comments?post=18251"}],"version-history":[{"count":10,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/18251\/revisions"}],"predecessor-version":[{"id":35233,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/18251\/revisions\/35233"}],"wp:attachment":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/media?parent=18251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}