{"id":1013,"date":"2024-12-02T06:00:00","date_gmt":"2024-12-02T06:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1013"},"modified":"2024-12-02T06:00:00","modified_gmt":"2024-12-02T06:00:00","slug":"working-in-critical-infrastructure-boost-your-effectiveness-with-these-cybersecurity-certifications","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1013","title":{"rendered":"Working in critical infrastructure? Boost your effectiveness with these cybersecurity certifications"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Hybrid warfare between nation-states is imperilling critical infrastructure around the world, both physically and electronically. Since the start of the Ukraine-Russia conflict, hybrid cyber\/physical attacks on satellite and communications, energy, transportation, water, and other critical sectors have spread across Europe and beyond.<\/p>\n<p>Chinese perpetrators are actively infiltrating <a href=\"https:\/\/industrialcyber.co\/threat-landscape\/chinas-liminal-panda-hackers-target-global-telecom-networks-in-stealthy-cyber-espionage-campaign\/\">telecommunications networks<\/a> in the US and abroad, according to the <a href=\"https:\/\/www.fbi.gov\/news\/press-releases\/joint-statement-from-fbi-and-cisa-on-the-peoples-republic-of-china-targeting-of-commercial-telecommunications-infrastructure\">FBI<\/a>. Germany has also implicated China in the cutting of <a href=\"https:\/\/www.npr.org\/2024\/11\/21\/nx-s1-5198511\/two-undersea-data-cables-damaged-in-the-baltic-sea\">undersea cables<\/a> in the Baltic Sea.<\/p>\n<p>Meanwhile, denial-of-service attacks in the form of ransomware (often funded by nation-states and criminal gangs) also continue to wreak havoc in healthcare, energy, transportation, and manufacturing sectors, the FBI also <a href=\"https:\/\/www.gao.gov\/products\/gao-24-106221\">reports<\/a>.<\/p>\n<p>With attacks against critical infrastructure on the rise, cybersecurity specialists are needed now more than ever. Yet, when it comes to specialized cybersecurity-specific certifications for each of the <a href=\"https:\/\/www.dhs.gov\/critical-infrastructure-sectors\">16 designated critical infrastructure<\/a>\u00a0sectors, only a few exist.<\/p>\n<p>\u201cToday, we don\u2019t have enough sector-specific training out there, but that\u2019s changing,\u201d says Rob T. Lee, chief of research and head of faculty at SANS Institute cybersecurity training firm. \u201cThese employers are now evaluating whether someone qualifies to engage in ITOS and OT systems in critical infrastructure, especially those directly connected to the internet.\u201d<\/p>\n<p>New courses and certifications take years to develop, however, SANS and other training firms have set up cybersecurity certifications in the catch-all categories of industrial control systems (ICS) and in critical infrastructure protection that apply to numerous sectors and the roles within them.<\/p>\n<h2 class=\"wp-block-heading\">Many get layered cybersecurity certifications<\/h2>\n<p>Most organizations with critical infrastructure roles have historically relied on basic certifications that demonstrate proficiency in cybersecurity concepts, processes, or role specialization such as incident response or SOC analyst.<\/p>\n<p>\u201cWhen taking a look at any certifications, especially in critical infrastructure, a lot of IT folks get transferred over from other departments, and then they\u2019re given an additional duty of security,\u201d Lee says. \u201cFor these folks, <a href=\"https:\/\/www.csoonline.com\/article\/575395\/upskilling-the-non-technical-finding-cyber-certification-and-training-for-internal-hires.html\">any general foundational IT security certification will do<\/a>,\u201d Lee says.<\/p>\n<p>But now with ICS and critical infrastructure certifications widely available, organizations working in or supporting these critical infrastructure sectors are asking for ICS certifications, such as <a href=\"https:\/\/www.giac.org\/certifications\/global-industrial-cyber-security-professional-gicsp\/\">GICSP<\/a> Global Industrial Cybersecurity Professional, and\/or critical infrastructure certifications, such as <a href=\"https:\/\/niccs.cisa.gov\/education-training\/catalog\/tonex-inc\/certified-critical-infrastructure-cybersecurity-expert-ccice\">CCICE<\/a> Certified Critical Infrastructure Security Expert. Today, these two types of certifications apply to most critical infrastructure sectors, particularly in manufacturing, energy, nuclear, water, chemical, commercial facilities, food and agriculture, and the defense industrial base.<\/p>\n<p>Augmented knowledge such as standards and compliance specific to the industry also helps. For example, a medical systems hire with basic knowledge of HIPAA, or in the financial sector, a candidate versed in PCI DSS, or in the telecommunications sector, the candidate understands applicable Telecommunications Industry Association <a href=\"https:\/\/tiaonline.org\/products-and-services\/\">standards<\/a>, and so on.<\/p>\n<p>While ICS and critical infrastructure certifications apply to most critical infrastructure sectors, some sector-specific certifications also exist. For example, healthcare employers may also require a <a href=\"https:\/\/www.isc2.org\/Certifications\/HCISPP\">HCISPP<\/a> Healthcare Information Security and Privacy Practitioner. In the public sector <a href=\"https:\/\/drii.org\/certification\/cpscp\">CPSCP<\/a>, the Certified Public Sector Continuity Professional would apply. In some cases, when healthcare is part of the government, both may apply.<\/p>\n<p>Putting it all together, take the energy sector, for example. Start with foundational cybersecurity certifications, such as <a href=\"https:\/\/www.comptia.org\/certifications\/security\">CompTIA Security+<\/a> or SANS <a href=\"https:\/\/www.giac.org\/certifications\/foundational-cybersecurity-technologies-gfact\/\">GFACT<\/a>. Layer on an <a href=\"https:\/\/www.giac.org\/certifications\/global-industrial-cyber-security-professional-gicsp\/\">ICS certification<\/a> and add in <a href=\"https:\/\/www.energysec.org\/certified-cip-compliance-professional\/\">NERC CP3<\/a> (National Energy Reliability Counsel Certified Compliance Professional) certification, which builds relevant knowledge of <a href=\"https:\/\/www.nerc.com\/pa\/Stand\/Pages\/Default.aspx\">NERC Reliability Standards<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">Sector by sector critical infrastructure certifications<\/h2>\n<p>The Cybersecurity and Infrastructure Security Agency (CISA), under the Department of Homeland Security, has identified <a href=\"https:\/\/www.dhs.gov\/critical-infrastructure-sectors\">16 designated critical infrastructure<\/a>\u00a0sectors and provides resources to manage risk and train or educate workers. In alphabetical order, these include:<\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/chemical-sector\">Chemical Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/commercial-facilities-sector\">Commercial Facilities Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/communications-sector\">Communications Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/critical-manufacturing-sector\">Critical Manufacturing Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/dams-sector\">Dams Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/defense-industrial-base-sector\">Defense Industrial Base Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/emergency-services-sector\">Emergency Services Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/energy-sector\">Energy Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/financial-services-sector\">Financial Services Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/food-and-agriculture-sector\">Food and Agriculture Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/government-facilities-sector\">Government Services and Facilities Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/healthcare-and-public-health-sector\">Healthcare and Public Health Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/information-technology-sector\">Information Technology Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/nuclear-reactors-materials-and-waste-sector\">Nuclear Reactors, Materials, and Waste Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/transportation-systems-sector\">Transportation Systems Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/water-and-wastewater-sector\">Water and Wastewater Sector<\/a><\/p>\n<h2 class=\"wp-block-heading\">Foundational cybersecurity certifications<\/h2>\n<p>Keep in mind that foundational certifications for entry-level security administration and response proficiency usually call for the fewest pre-requisites, while certifications in management, compliance, audit and other higher-level job functions require more prerequisites such as proficiency and experience, other courses and certifications, and \/or a college degree.<\/p>\n<p>Below, we list certifications in order of beginner\/entry-level to management, noting that many more certifications for specific job roles (admin, responder, SOC analyst, etc.) are also available, but there are too numerous to list here.<\/p>\n<p><a href=\"https:\/\/www.comptia.org\/certifications\/security\">CompTIA Security+<\/a> baseline skills to perform core security functions<\/p>\n<p><a href=\"https:\/\/www.giac.org\/certifications\/foundational-cybersecurity-technologies-gfact\/\">GFACT<\/a> GIAC foundational cybersecurity technologies<\/p>\n<p><a href=\"https:\/\/www.isc2.org\/Certifications\/CISSP\">CISSP<\/a>\u00a0Certified Information Systems Security Professional<\/p>\n<p><a href=\"https:\/\/trainingcamp.com\/training\/issep-certification-boot-camp\/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=21338023419&amp;utm_term=issep%20certification&amp;tm=tt&amp;ap=gads&amp;aaid=adaZSRI4WzlpY&amp;gad_source=1&amp;gbraid=0AAAAAD_v7FyRKEBaNv5deIcZe1QS0asRU&amp;gclid=EAIaIQobChMIz4LOroLdiQMVyC5ECB390TZnEAAYASAAEgJ7_PD_BwE\">ISC2<\/a> ISSEP Information Systems Security Engineering Professional<\/p>\n<p>Various certifications for functional roles within cybersecurity and risk management, such as <a href=\"https:\/\/www.stationx.net\/best-soc-analyst-certifications\/#:~:text=continuing%20education%20units.-,Why%20You%20Should%20Obtain%20It,employers%20want%20applicants%20to%20have.\">Certified SOC Analyst<\/a>, <a href=\"https:\/\/www.isaca.org\/credentialing\/cisa\">CISA<\/a> Certified Information Systems Auditor, various <a href=\"https:\/\/www.giac.org\/certifications\">GIAC<\/a> certifications, <a href=\"https:\/\/www.isc2.org\/certifications\/cgrc\">GGRC<\/a> Governance, Risk and Compliance Certification, etc.<\/p>\n<p><a href=\"https:\/\/www.isaca.org\/credentialing\/cism\">CISM<\/a> Certified Information Security Manager<\/p>\n<p>CompTIA <a href=\"https:\/\/www.comptia.org\/certifications\/securityx\">SecurityX<\/a> (expert)<\/p>\n<p><a href=\"https:\/\/www.c4sem.org\/ccso\">CCSO<\/a> Certified Chief Security Officer<\/p>\n<h2 class=\"wp-block-heading\">General critical infrastructure certifications<\/h2>\n<p>For many sectors, ICS and critical infrastructure certifications generally apply, including:<\/p>\n<p><a href=\"https:\/\/niccs.cisa.gov\/education-training\/catalog\/tonex-inc\/certified-critical-infrastructure-cybersecurity-expert-ccice\">CCICE<\/a> Certified Critical Infrastructure Security Expert<\/p>\n<p><a href=\"https:\/\/www.giac.org\/certifications\/global-industrial-cyber-security-professional-gicsp\/\">GICSP<\/a> Global Industrial Cybersecurity Professional<\/p>\n<p><a href=\"https:\/\/www.c4sem.org\/ccips\">CCIPS<\/a> Certified Critical Infrastructure Protection Specialist<\/p>\n<p><a href=\"https:\/\/www.giac.org\/certifications\/critical-infrastructure-protection-gcip\/\">GCIP<\/a>, SANS GIAC Critical Infrastructure Protection<\/p>\n<p><a href=\"https:\/\/www.isa.org\/certification\/certificate-programs\/isa-iec-62443-cybersecurity-certificate-program\">ISA 62443<\/a> International Society of Automation cybersecurity certificate program<\/p>\n<p><a href=\"https:\/\/pecb.com\/en\/education-and-certification-for-individuals\/iso-28000\/iso-28000-foundation\">ISO 2800<\/a> Supply Chain Security Certifications<\/p>\n<p><a href=\"https:\/\/www.drii.org\/certificationoverview\">Disaster Recovery Institute (various certs<\/a>)<\/p>\n<p>While not certificates per se, CISA shares critical infrastructure <a href=\"https:\/\/training.fema.gov\/is\/cisr.aspx\">security, awareness, and resilience training courses<\/a> that also apply across multiple sectors.<\/p>\n<h2 class=\"wp-block-heading\">Sector-specific cybersecurity certifications<\/h2>\n<p>CISA also shares training and education resources to augment any certifications or lack thereof, specifically for the:<\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\/chemical-sector\">Chemical Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/commercial-facilities-sector\">Commercial Facilities Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/dams-sector-training\">Dams Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/emergency-services-sector-training\">Emergency Services Sector<\/a><\/p>\n<p><a href=\"https:\/\/www.cisa.gov\/nuclear-sector-training\">Nuclear Reactors, Materials, and Waste Sector<\/a><\/p>\n<p>Additionally, some specialized cybersecurity certifications specific to government, defense, emergency services, manufacturing, energy, healthcare and IT can also apply to a subset of industries within those sectors.<\/p>\n<p>For example, cybersecurity professionals working in organizations that service government and defense agencies should also consider the <a href=\"https:\/\/www.fismacenter.com\/default.asp?lnc=certifications\">FISMA CFCP<\/a> Certified FISMA Compliance Professional, which applies specifically to federal sectors and those servicing federal sectors, including the defense industrial base, government services and facilities, nuclear reactor\/waste and public healthcare.<\/p>\n<p>To work in the <a href=\"https:\/\/www.dhs.gov\/defense-industrial-base-sector\">Defense Industrial Base<\/a>, cyber security pros will also benefit from various certifications designed to meet <a href=\"https:\/\/www.infosecinstitute.com\/solutions\/government\/#bootcamps\">DoD 8570\/8140<\/a>.<\/p>\n<p>Additionally, <a href=\"https:\/\/drii.org\/certification\/cpscp\">CPSCP<\/a> Certified Public Sector Continuity Professional applies to most public sector agencies, healthcare included.<\/p>\n<p>Below, we break down these and other sector-specific certifications, some of which we combine with applicable subsets of related sectors.<\/p>\n<h3 class=\"wp-block-heading\">Emergency Services:<\/h3>\n<p><a href=\"https:\/\/training.fema.gov\/emicourses\/emicatalog.aspx\">FEMA EMI Courses<\/a><\/p>\n<p><a href=\"https:\/\/pecb.com\/en\/education-and-certification-for-individuals\/iso-22320\">ISO 22320<\/a>\u00a0Homeland Security (Specific to Emergency Services)<\/p>\n<p><a href=\"https:\/\/www.c4sem.org\/chsm\">CHSM<\/a> Certified Homeland Security Manager<\/p>\n<h3 class=\"wp-block-heading\">Critical Manufacturing, Nuclear\/Waste, Water and Energy:<\/h3>\n<p><a href=\"https:\/\/www.cisa.gov\/resources-tools\/programs\/ics-training-available-through-cisa\">ICS-CERT<\/a> Industrial Control System certification through CISA<\/p>\n<p><a href=\"https:\/\/www.isa.org\/certification\/certificate-programs\/isa-iec-62443-cybersecurity-certificate-program\">ISA 62443<\/a> cybersecurity certificate for ICS (Industrial Control Systems)<\/p>\n<p><a href=\"https:\/\/www.isa.org\/certification\/certificate-programs\/cap-associate-certificate-program\">CAP<\/a> Certified Automation Specialist<\/p>\n<p><a href=\"https:\/\/www.isa.org\/certification\/ccst\">CCST<\/a> Certified Control Systems Technician<\/p>\n<p><a href=\"https:\/\/www.giac.org\/certifications\/global-industrial-cyber-security-professional-gicsp\/\">GICSP<\/a> Global Industrial Cyber Security Professional<\/p>\n<p><a href=\"https:\/\/www.bsigroup.com\/en-GB\/iso-28000-supply-chain-security-management\/\">ISO 28000 Cert<\/a> for manufacturing supply chain<\/p>\n<p><a href=\"https:\/\/www.exida.com\/ICS-Cybersecurity\">ISA 62443 <\/a>Industrial Automated Control Systems (IACS)<\/p>\n<p><a href=\"https:\/\/www.c4sem.org\/ccips\">CCIPS<\/a> Certified Critical Infrastructure Protection Specialist<\/p>\n<p><a href=\"\/www.giac.org\/certifications\/critical-infrastructure-protection-gcip\">GCIP<\/a> GIAC Critical Infrastructure Protection (GCIP) practitioner certification for NERC CIP (National Energy Reliability Council Critical Infrastructure Protection)<\/p>\n<p><a href=\"https:\/\/training.fema.gov\/emicourses\/emicatalog.aspx\">FEMA EMI Courses<\/a><\/p>\n<h3 class=\"wp-block-heading\">Financial Services:\u00a0<\/h3>\n<p><a href=\"https:\/\/www.aicpa-cima.com\/cpe-learning\/course\/soc--for-cybersecurity-certificate-program\">AICPA SOC for Cybersecurity<\/a> Certificate (accounting and finance)<\/p>\n<p><a href=\"https:\/\/www.basel-iii-association.com\/Questions_About_The_Certification_And_The_Exams_1.pdf\">BCPA<\/a> Basil ii Compliance certification<\/p>\n<p><a href=\"https:\/\/www.pcisecuritystandards.org\/assessors_and_solutions\/pci_professionals\">PCIP<\/a> PCI SSC Payment Card Industry Professional<\/p>\n<p><a href=\"https:\/\/www.isaca.org\/credentialing\/cisa\">CISA<\/a> Certified Information System Auditor<\/p>\n<p><a href=\"https:\/\/www.isc2.org\/certifications\/cgrc\">GGRC<\/a> Governance, Risk and Compliance<\/p>\n<h3 class=\"wp-block-heading\">Healthcare and Public Health:\u00a0<\/h3>\n<p><a href=\"https:\/\/www.isc2.org\/Certifications\/HCISPP\">HCISPP<\/a> Healthcare Information Security and Privacy Professional (sunsets in 2026, ISC2 update course not yet available)<\/p>\n<p><a href=\"https:\/\/drii.org\/certification\/ahpcp\">AHPCP<\/a> Associated Healthcare Provider Continuity Professional or <a href=\"https:\/\/drii.org\/certification\/cpscp\">CPSCP<\/a> Certified Public Sector Continuity Professional \u00a0<\/p>\n<p><a href=\"https:\/\/www.iahss.org\/?page=certifications\">CHPA<\/a> Certified Healthcare Protection Administrator<\/p>\n<p><a href=\"https:\/\/www.hipaaacademy.net\/credential-offerings\/certified-hipaa-professional-chp\/\">CHP<\/a> Certified HIPAA Professional<\/p>\n<h3 class=\"wp-block-heading\"><strong>Information Technology:\u00a0<\/strong><a href=\"https:\/\/www.dhs.gov\/information-technology-sector\"><\/a><strong> <\/strong><strong><\/strong><\/h3>\n<p><a href=\"https:\/\/www.eccouncil.org\/programs\/certified-ethical-hacker-ceh\/\">CEH<\/a> Certified Ethical Hacker<\/p>\n<p><a href=\"https:\/\/apmg-international.com\/product\/cobit-5\">COBIT<\/a> 5 IT Governance Framework<\/p>\n<p><a href=\"https:\/\/www.peoplecert.org\/browse-certifications\/it-governance-and-service-management\/COBIT5-10\/cobit-5-assessor-2024\">COBIT 5 Assessor<\/a><\/p>\n<p>Certifications may be the ultimate goal for onboarding cybersecurity skills into critical infrastructure sectors, but foundational cybersecurity training often makes a difference in keeping a utility up and running even in times of hybrid warfare, Lee contends.<\/p>\n<p>\u201cWe\u2019ve run programs, including mass training for Ukrainians who work in their infrastructure, and we focused more on basic hygiene than getting a specific certification,\u201d Lee explains. \u201cWe\u2019re doing mass training to make a difference, and Ukraine is staving off many cyber infrastructure attacks. This shows how basic foundational cybersecurity training makes a difference across the critical infrastructure.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Hybrid warfare between nation-states is imperilling critical infrastructure around the world, both physically and electronically. Since the start of the Ukraine-Russia conflict, hybrid cyber\/physical attacks on satellite and communications, energy, transportation, water, and other critical sectors have spread across Europe and beyond. Chinese perpetrators are actively infiltrating telecommunications networks in the US and abroad, according [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1014,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1013"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1013"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1013\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1014"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}