{"id":19643,"date":"2021-04-29T12:13:22","date_gmt":"2021-04-29T11:13:22","guid":{"rendered":"https:\/\/news.inventrium.net\/?p=19643"},"modified":"2021-04-29T12:13:22","modified_gmt":"2021-04-29T11:13:22","slug":"what-in-the-world-is-a-ciso","status":"publish","type":"post","link":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/","title":{"rendered":"What in the World Is a CISO?"},"content":{"rendered":"

Whilst employment has taken a downward curve over the last year or so, there are a variety of approaches I use when applying for a role to help my CV stand out. One key point is knowing what the job entails before submitting my cover letter and CV. This allows me to tailor my message effectively. Additionally, it enables me to find positions that I might not have originally considered. One position I think more people should be aware of is a CISO. What does this actually mean \u2013 besides being made redundant when a breach is announced? I have personally worked within a CISO-as-a-Service position, but I wanted to get some more insight from those who are working in the trenches daily in an in-house CISO position. Below is what I learned through speaking with some brilliant contacts:<\/p>\n

What I thought being a CISO was:<\/strong><\/h2>\n
\n
\"Plankton<\/figure>\n<\/div>\n
\n
\n
\n
\n
\n
\"Fire<\/figure>\n<\/div>\n
\n
\n
\n
\"critical
via Giphy<\/figcaption><\/figure>\n<\/div>\n
\n
\n
\n
\"The
The Matrix The Architect GIF from\u00a0Thematrix GIFs<\/a><\/figcaption><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n

 <\/p>\n<\/div>\n<\/div>\n

<\/div>\n

Having worked within the cyber security and technology industry for over a decade, I have seen brilliant examples of leadership and not-so-lovely managers. Over time, I have noticed the difference is found in how the senior person approaches their role. Leaders are people who strive for a positive experience, are able to delegate and are willing to let colleagues work in their own way, all whilst retaining a holistic view that is forward-looking.<\/p>\n

As with all industries, it can be difficult to understand from the outside what it truly takes to get to a specific position or what the role itself actually requires. It is also important to note that no role is created by a cookie cutter \u2013 diversity of skills, experiences and more can enhance the organization\u2019s strategy and coverage.\u00a0In fact, research carried out by\u00a0Mckinsey & Company titled \u201cDelivering Through Diversity\u201d<\/a>\u00a0from 2018 revealed that gender diverse senior leadership led to a 20% profit increase \u2013 ethnic diversity even higher. Within security, diversity of thought, skills, points of view, experiences, gender, culture and more bring layers of knowledge, considerations and insights that others might not consider.<\/p>\n

The role of a Chief Information Security Officer (CISO) is no exception to the need for diverse persons. What I found from speaking to contacts within the CISO position was that it is quite easy to find one type of CISO \u2013 that expected cookie-cutter with similar backgrounds \u2013 but difficult to find diverse persons.<\/p>\n

Thankfully, I have the privilege knowing many excellent persons who have broken that mold and who became truly excellent CISOs focused on empowering their teams and bringing security to the forefront of their products and\/or service.<\/p>\n

On a typical day, what is your focus:<\/strong><\/h2>\n

\u201cMy job is to ensure cross functionality does not turn into dysfunctionality\u201d \u2013\u00a0Ian Thornton-Trump<\/a>, CISO at Cyjax.<\/p>\n

The number one response I got from my contacts was that their role is to keep up to date on security news and trends in order to identify how that may or may not affect the organization. Taking those industry insights, a CISO then translates and communicates that knowledge across the different teams and departments.<\/p>\n

\u201cIn addition to making sure I\u2019m up-to-date with any relevant, emerging threats and that any in-flight projects related to current strategy are still ticking along, I work to stay on top of the plethora of emails related to daily BAU activities.\u201d \u2013\u00a0Becky Pinkard<\/a>, CISO at Aldermore Bank PLC.<\/p>\n

One response that stood out to me was\u00a0Christian Toon<\/a>, CISO at Pinsent Masons, who shared that a critical piece of his role is ensuring the team\u2019s well-being and how enabling them to succeed is actually the key to his own success.<\/p>\n

\u201cMore recently the team, that they have what they need (approval, resources, strategy, direction, moral support, mental well-being, &c) to be successful,\u201d he said.<\/p>\n

One person I always enjoy getting insights from is my long-time friend Ian Thornton-Trump, CISO at Cyjax. What is Ian\u2019s daily focus?<\/p>\n

Coffee, read intel reports flag items of interest to the Threat Intel Team to make sure they are on top of things \u2013 they generally are. Take a gander at social media and plunge into the work of the day be it media commentary, reporting or marketing campaign related \u2013 very unlike CISO but we are a start-up so everyone contributes cross functionally. My job is to ensure cross functionality does not turn into dysfunctionality, so I work with the COO very closely. I also have a role in product development and public advocacy for the importance of CTI as a robust, effective and inexpensive solution to help against cyber-crime.<\/p><\/blockquote>\n

Whilst each response is different, we can already see a theme throughout \u2013 the role of a CISO is taking that holistic view of the organization. They\u2019re about knowing their team and empowering them to achieve what they need whilst knowing what\u2019s next in terms of the threats confronting the organisation.<\/p>\n

What being a CISO really is:<\/strong><\/h2>\n
\n
\n
\n
\"All<\/figure>\n<\/div>\n
\n
\"Do<\/figure>\n<\/div>\n

 <\/p>\n

\n
\"Fernando
via Giphy<\/figcaption><\/figure>\n<\/div>\n
\n
\"Bernie
Bernie Sanders IAm Once Again Asking For Your Financial Support GIF from\u00a0Berniesanders GIFs<\/a><\/figcaption><\/figure>\n<\/div>\n<\/div>\n<\/div>\n
\n
\n
\n
\n
\n
\n
\n
<\/div>\n<\/div>\n
<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n

 <\/p>\n<\/div>\n<\/div>\n

What is the true purpose of a CISO?\u00a0<\/strong><\/h2>\n

Whilst you might feel we\u2019ve answered this already, I was curious what my connections thought their purpose was. Speaking with\u00a0Wolfgang Goerlich<\/a>, Advisory CISO at DUO Security, he explained that, \u201cThe CISO negotiates with peers and business partners. The CISO marshals support, budgets and people. The CISO protects the organization by securing the technology that enables the organization.\u201d<\/p>\n

Becky\u2019s response was within the same thread: \u201cThe true purpose of the CISO is to interpret and align the company\u2019s risk appetite with security opportunity to create and then drive the best strategy for securing the business and ultimately to ensure the right security for customers.\u201d<\/p>\n

To me, both Wolfgang and Becky\u2019s responses go back to CISOs having that holistic view. It\u2019s about taking stock of all the little complexities along the way, ultimately lining them up and appropriately assessing them.<\/p>\n

Ian highlights this further: \u201cLeadership and awareness of what is going on, why it\u2019s going on and who may be victimized by the events unfolding. \u201c<\/p>\n

What area would you say you are best in?<\/strong><\/h2>\n

You may have heard the following many times: \u201cThe more senior your role, the less hands-on\/technical you can be.\u201d However, I found an interesting point that both Becky made.<\/p>\n

My cyber security career consisted of hands-on, technical roles for the first 10 years, which has helped me immensely as my career has grown on the management and CISO side \u2013 I think this is my strongest area, as a result.<\/p><\/blockquote>\n

Whereas, Wolfgang tells us if he could \u2018go back\u2019 and focus on one skill before \u2018leveling up\u2019 to a CISO, it would be on specializing.<\/p>\n

It\u2019s fashionable to talk about the C in CISO. The CISO is a business executive first, a technologist second. That\u2019s true and it\u2019s often said. The longer I\u2019m out of the trenches, the more difficult the technologist aspect of the job becomes. I would level up on Infrastructure-as-a-Service and Software-as-a-Service security.<\/p><\/blockquote>\n

Meanwhile, Christian sees the value of his interpersonal skills and understanding people: \u201cI\u2019ve recently perfected the perfect home brew ale, oh wait, security thing\u2026 for me it\u2019s all about the soft skills \u2013 bringing people together to achieve what needs to be done to best secure the business.\u201d<\/p>\n

At times, being able to see through what someone is saying, breaking down the words and reading between, is Ian\u2019s greatest asset. he shares.<\/p>\n

Is bulls**t detection on the list? Understanding the noise of FUD to discern an interesting event or product in the marketplace. There is a lot of FUD to sort through, be it an article that vastly overstates the \u201cdanger\u201d of a new vulnerability or a vendor that claims they are the 100%, well, anything. Sure, with 20+ years in the industry and a lot of time in a uniform, I\u2019ve picked up a few tips and tricks, but at the end of the day, I would say I\u2019m adaptable, and adaptability helps build an\u00a0agile<\/a>\u00a0organization.<\/p><\/blockquote>\n

If you could go back and focus on one skill before \u2018leveling up\u2019 to a CISO, what would it be?<\/p>\n

Becky and Ian took the opposite views to focus more on the risk and team management skills. Here\u2019s Becky.<\/p>\n

I never ran a risk function, so I\u2019d wish to have spent more time in this area before landing the CISO role. While I\u2019ve had probably hundreds of risk-based conversations throughout my career prior to the CISO role, the language and slant is different from the CISO lens. I think experiencing ownership of that function in the past would have helped me to feel more comfortable going into the \u201cdeep end of risk\u201d in the CISO shoes!<\/p><\/blockquote>\n

\u201cWow tough one,\u201d said Ian. \u201cCertainly, it would not be technical certs. I\u2019ve got a bunch of them, but as I think about the question,\u00a0I would say more opportunities to build teams. Most of my experience has been gained from ad-hoc team management as either an incident handler or on a security project or sec ops.\u201d<\/p>\n

Whilst your journey in the career is definitely going to affect where your expertise is and ultimately where you wish you had more experience in, the constant throughout my discussions were:<\/p>\n

    \n
  1. Hands-on experience with technology is brilliant and will enhance your understanding in order to better understand the problems your organization faces and rate the risks proportionately.<\/li>\n
  2. Most importantly, people matter, your team matters and the relationship you build with them affects your success.<\/li>\n<\/ol>\n

    My view is information security is:<\/strong><\/h2>\n

    People, process, and technology<\/a>\u00a0\u2013 but people are first for a reason.<\/p>\n

    Taking a bit of a different view, and actually in line with the whole purpose of my writing this article to begin with, Christian shares, \u201cIf I could go back, I wouldn\u2019t want to level up. I\u2019d want to start sooner. A misguided youth didn\u2019t open my eyes to white hat security until very late, let alone the idea that I could even make a career out of it. But an area I wish I knew more about is mental resilience and emotional intelligence.\u201d<\/p>\n

    Reality is, there is no perfect CISO; there is no true cookie-cutter for either the role or the person. I think organizations would massively benefit from a variety of persons pursuing this position, adding that context to industry trends, handling the team effectively and bringing insights from their industry experience. This can be either with an in-house or\u00a0vCISO<\/a> position. In order to achieve this, organizations will be required to ensure their hiring process allows for diverse opportunities. Targeting diverse persons who might be a strong CISO but may not originally have considered this is most interesting to me.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Whilst employment has taken a downward curve over the last year or so, there are a variety of approaches I use when applying for a role to help my CV stand out. One key point is knowing what the job entails before submitting my cover letter and CV. This allows me to tailor my message […]<\/p>\n","protected":false},"author":372,"featured_media":19644,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[248,85],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\nWhat in the World Is a CISO? - Inventrium Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What in the World Is a CISO? - Inventrium Magazine\" \/>\n<meta property=\"og:description\" content=\"Whilst employment has taken a downward curve over the last year or so, there are a variety of approaches I use when applying for a role to help my CV stand out. One key point is knowing what the job entails before submitting my cover letter and CV. This allows me to tailor my message […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/\" \/>\n<meta property=\"og:site_name\" content=\"Inventrium Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Inventrium\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-29T11:13:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.inventrium.net\/wp-content\/uploads\/2021\/04\/What-World-CISO.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bolu Adebayo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inventrium\" \/>\n<meta name=\"twitter:site\" content=\"@inventrium\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bolu Adebayo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/\"},\"author\":{\"name\":\"Bolu Adebayo\",\"@id\":\"https:\/\/news.inventrium.net\/#\/schema\/person\/2e02fecdafb255f883ef725c2ac2c831\"},\"headline\":\"What in the World Is a CISO?\",\"datePublished\":\"2021-04-29T11:13:22+00:00\",\"dateModified\":\"2021-04-29T11:13:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/\"},\"wordCount\":1805,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/news.inventrium.net\/#organization\"},\"articleSection\":[\"Security\",\"Tech News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/\",\"url\":\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/\",\"name\":\"What in the World Is a CISO? - Inventrium Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/news.inventrium.net\/#website\"},\"datePublished\":\"2021-04-29T11:13:22+00:00\",\"dateModified\":\"2021-04-29T11:13:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/news.inventrium.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What in the World Is a CISO?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/news.inventrium.net\/#website\",\"url\":\"https:\/\/news.inventrium.net\/\",\"name\":\"Inventrium Magazine\",\"description\":\"Supporting Businesses through Technology\",\"publisher\":{\"@id\":\"https:\/\/news.inventrium.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/news.inventrium.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/news.inventrium.net\/#organization\",\"name\":\"Inventrium Technology Magazine\",\"url\":\"https:\/\/news.inventrium.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/news.inventrium.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/news.inventrium.net\/wp-content\/uploads\/2018\/11\/inventrium-magazine-logonew.png\",\"contentUrl\":\"https:\/\/news.inventrium.net\/wp-content\/uploads\/2018\/11\/inventrium-magazine-logonew.png\",\"width\":325,\"height\":116,\"caption\":\"Inventrium Technology Magazine\"},\"image\":{\"@id\":\"https:\/\/news.inventrium.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Inventrium\/\",\"https:\/\/twitter.com\/inventrium\",\"https:\/\/www.instagram.com\/inventrium\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/news.inventrium.net\/#\/schema\/person\/2e02fecdafb255f883ef725c2ac2c831\",\"name\":\"Bolu Adebayo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/news.inventrium.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/752822fb262a144ceb448cc1b52e20d3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/752822fb262a144ceb448cc1b52e20d3?s=96&d=mm&r=g\",\"caption\":\"Bolu Adebayo\"},\"url\":\"https:\/\/news.inventrium.net\/author\/bolu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What in the World Is a CISO? - Inventrium Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/","og_locale":"en_US","og_type":"article","og_title":"What in the World Is a CISO? - Inventrium Magazine","og_description":"Whilst employment has taken a downward curve over the last year or so, there are a variety of approaches I use when applying for a role to help my CV stand out. One key point is knowing what the job entails before submitting my cover letter and CV. This allows me to tailor my message […]","og_url":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/","og_site_name":"Inventrium Magazine","article_publisher":"https:\/\/www.facebook.com\/Inventrium\/","article_published_time":"2021-04-29T11:13:22+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/news.inventrium.net\/wp-content\/uploads\/2021\/04\/What-World-CISO.jpg","type":"image\/jpeg"}],"author":"Bolu Adebayo","twitter_card":"summary_large_image","twitter_creator":"@inventrium","twitter_site":"@inventrium","twitter_misc":{"Written by":"Bolu Adebayo","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/#article","isPartOf":{"@id":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/"},"author":{"name":"Bolu Adebayo","@id":"https:\/\/news.inventrium.net\/#\/schema\/person\/2e02fecdafb255f883ef725c2ac2c831"},"headline":"What in the World Is a CISO?","datePublished":"2021-04-29T11:13:22+00:00","dateModified":"2021-04-29T11:13:22+00:00","mainEntityOfPage":{"@id":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/"},"wordCount":1805,"commentCount":0,"publisher":{"@id":"https:\/\/news.inventrium.net\/#organization"},"articleSection":["Security","Tech News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/","url":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/","name":"What in the World Is a CISO? - Inventrium Magazine","isPartOf":{"@id":"https:\/\/news.inventrium.net\/#website"},"datePublished":"2021-04-29T11:13:22+00:00","dateModified":"2021-04-29T11:13:22+00:00","breadcrumb":{"@id":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/news.inventrium.net\/what-in-the-world-is-a-ciso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.inventrium.net\/"},{"@type":"ListItem","position":2,"name":"What in the World Is a CISO?"}]},{"@type":"WebSite","@id":"https:\/\/news.inventrium.net\/#website","url":"https:\/\/news.inventrium.net\/","name":"Inventrium Magazine","description":"Supporting Businesses through Technology","publisher":{"@id":"https:\/\/news.inventrium.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.inventrium.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/news.inventrium.net\/#organization","name":"Inventrium Technology Magazine","url":"https:\/\/news.inventrium.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.inventrium.net\/#\/schema\/logo\/image\/","url":"https:\/\/news.inventrium.net\/wp-content\/uploads\/2018\/11\/inventrium-magazine-logonew.png","contentUrl":"https:\/\/news.inventrium.net\/wp-content\/uploads\/2018\/11\/inventrium-magazine-logonew.png","width":325,"height":116,"caption":"Inventrium Technology Magazine"},"image":{"@id":"https:\/\/news.inventrium.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Inventrium\/","https:\/\/twitter.com\/inventrium","https:\/\/www.instagram.com\/inventrium\/"]},{"@type":"Person","@id":"https:\/\/news.inventrium.net\/#\/schema\/person\/2e02fecdafb255f883ef725c2ac2c831","name":"Bolu Adebayo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/news.inventrium.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/752822fb262a144ceb448cc1b52e20d3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/752822fb262a144ceb448cc1b52e20d3?s=96&d=mm&r=g","caption":"Bolu Adebayo"},"url":"https:\/\/news.inventrium.net\/author\/bolu\/"}]}},"jetpack_featured_media_url":"https:\/\/news.inventrium.net\/wp-content\/uploads\/2021\/04\/What-World-CISO.jpg","jetpack_likes_enabled":true,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/posts\/19643"}],"collection":[{"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/users\/372"}],"replies":[{"embeddable":true,"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/comments?post=19643"}],"version-history":[{"count":1,"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/posts\/19643\/revisions"}],"predecessor-version":[{"id":19645,"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/posts\/19643\/revisions\/19645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/media\/19644"}],"wp:attachment":[{"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/media?parent=19643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/categories?post=19643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.inventrium.net\/wp-json\/wp\/v2\/tags?post=19643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}