{"id":1883,"date":"2018-11-13T00:00:00","date_gmt":"2018-11-13T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/11\/13\/how-to-improve-governance-risk-and-compliance\/"},"modified":"2021-01-28T16:18:28","modified_gmt":"2021-01-28T16:18:28","slug":"how-to-improve-governance-risk-and-compliance","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/","title":{"rendered":"How to Improve Governance, Risk and Compliance"},"content":{"rendered":"<div id=\"article-content\">\n<p>The daily challenge for many IT leaders is figuring out how to deal with a constant barrage of security risks and an ever-growing?<a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">regulatory compliance<\/a> landscape.<\/p>\n<p>It&#8217;s a challenge Alissa Johnson has dealt with throughout her career. Johnson is currently the Chief Information Security Officer (CISO) at Xerox, a post she has held since October 2016. Previously, Johnson was the Deputy Chief Information Officer (CIO) in the White House from 2012 until 2015.<\/p>\n<p>In a video interview with <em>eSecurity Planet, <\/em>Johnson provides some insight into how she balances governance, risk and compliance (GRC).<\/p>\n<h2>Tip #1: Anticipate more compliance regulations<\/h2>\n<p>New rules and regulations for IT security and privacy are a common occurrence. In 2018, organizations faced the challenge of figuring out the European Union&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-comply-with-gdpr\/\">General Data Protection Regulation (GDPR)<\/a>, which helped raise awareness of data privacy issues.<\/p>\n<p>&#8220;GDPR, like it, love it or hate it, gave us a wake-up call in how people are starting to think about privacy,&#8221; she said.<\/p>\n<p>Johnson said there is an intersection between privacy and security that GDPR has helped to highlight. From a compliance perspective, she said that it has made IT professionals anticipate that more privacy compliance requirements will be coming (and indeed, one soon followed in <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/california-consumer-privacy-act-the-latest-compliance-challenge\/?b\">California<\/a>). Johnson said it is inevitable that additional national and state privacy compliance efforts will be coming in the years ahead.<\/p>\n<p>&#8220;I think that as a community, we have to continue to anticipate what&#8217;s to come, so we&#8217;re not reactionary,&#8221; she said.<\/p>\n<h2>Tip #2: Map existing controls<\/h2>\n<p>Given that there are multiple privacy and cybersecurity compliance requirements that a global company like Xerox faces, it already has many different security controls. Mapping existing controls to see how they can be used for different compliance efforts is a key step.<\/p>\n<p>&#8220;We found that we had done a really good job at Xerox in terms of our security policies, so if you followed the policies, there wasn&#8217;t a technology investment that had to be made in terms of GDPR,&#8221; Johnson said. &#8220;We made policy changes and we shored up some areas, but we anticipated correctly.&#8221;<\/p>\n<h2>Tip #3: Leverage tools<\/h2>\n<p>At Xerox, Johnson said she has a <a href=\"https:\/\/www.esecurityplanet.com\/products\/grc-tools\/\">GRC tool<\/a> to help the IT organization figure out governance and compliance mandates that need to be addressed and associated risks. Measuring all the variables and seeing how the organization is mitigating and eliminating risk is also part of the Xerox GRC tool. Johnson said she uses a vendor tool that has had some customization for Xerox&#8217;s specific needs.<\/p>\n<p>She said that by looking at governance, compliance and risk at the same time, with the right technology, it&#8217;s possible to figure out the right balance and have things work together succinctly.<\/p>\n<p>&#8220;Sometimes we do the governance and compliance piece and we miss out on the risk cause we&#8217;re trying to answer to all the regulatory bodies,&#8221; she said. &#8220;Compliance with regulatory requirements does not equal security.&#8221;<\/p>\n<h2>Tip #4: Embrace AI and automation<\/h2>\n<p>Most organizations are challenged by a cybersecurity talent shortage that makes it difficult to accomplish all the tasks needed to improve security and governance, risk and compliance efforts.<\/p>\n<p>&#8220;The only way we&#8217;re going to shore up the talent shortage is by allowing <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-ai-is-redefining-cybersecurity\/\">AI [Artificial Intelligence]<\/a>, bots and machine learning to do certain processes for us,&#8221; Johnson said.<\/p>\n<p>Johnson said automation technologies can be useful for lowering risk-based processing, which can also be useful in helping to improve cyber-hygiene.<\/p>\n<p>&#8220;We can definitely have bots that will close ports, remind people of password changes and things like that where I&#8217;m spending lots of resources,&#8221; she said.<\/p>\n<p>Watch the full video interview with Alissa Johnson, CISO of Xerox, below:<\/p>\n<\/p>\n<div id=\"myQSJWPlayer\"><\/div>\n<p><em>Sean Michael Kerner is a senior editor at eSecurityPlanet and InternetNews.com. Follow him on Twitter @TechJournalist.<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6d6f8e6247-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d6f8e6247\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d6f8e6247\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d6f8e6247\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d6f8e6247\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d6f8e6247\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d6f8e6247\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The daily challenge for many IT leaders is figuring out how to deal with a constant barrage of security risks and an ever-growing?regulatory compliance landscape. It&#8217;s a challenge Alissa Johnson has dealt with throughout her career. Johnson is currently the Chief Information Security Officer (CISO) at Xerox, a post she has held since October 2016. [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[23],"tags":[2212,9245,26264,30744,27742],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[237,253,143],"class_list":["post-1883","post","type-post","status-publish","format-standard","hentry","category-compliance","tag-artificial-intelligence","tag-automation","tag-gdpr","tag-governance-risk-and-compliance","tag-grc","b2b_audience-awareness-and-consideration","b2b_product-governance","b2b_product-regulatory-compliance","b2b_product-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Improve Governance, Risk and Compliance<\/title>\n<meta name=\"description\" content=\"VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Improve Governance, Risk and Compliance\" \/>\n<meta property=\"og:description\" content=\"VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-13T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:18:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sean Michael Kerner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Michael Kerner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/\"},\"author\":{\"name\":\"Sean Michael Kerner\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\"},\"headline\":\"How to Improve Governance, Risk and Compliance\",\"datePublished\":\"2018-11-13T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:18:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/\"},\"wordCount\":632,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"artificial intelligence\",\"automation\",\"GDPR\",\"Governance Risk and Compliance\",\"GRC\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/\",\"name\":\"How to Improve Governance, Risk and Compliance\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2018-11-13T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:18:28+00:00\",\"description\":\"VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Improve Governance, Risk and Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\",\"name\":\"Sean Michael Kerner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"caption\":\"Sean Michael Kerner\"},\"description\":\"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Improve Governance, Risk and Compliance","description":"VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"How to Improve Governance, Risk and Compliance","og_description":"VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises.","og_url":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/","og_site_name":"eSecurity Planet","article_published_time":"2018-11-13T00:00:00+00:00","article_modified_time":"2021-01-28T16:18:28+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Sean Michael Kerner","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sean Michael Kerner","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/"},"author":{"name":"Sean Michael Kerner","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0"},"headline":"How to Improve Governance, Risk and Compliance","datePublished":"2018-11-13T00:00:00+00:00","dateModified":"2021-01-28T16:18:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/"},"wordCount":632,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["artificial intelligence","automation","GDPR","Governance Risk and Compliance","GRC"],"articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/","url":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/","name":"How to Improve Governance, Risk and Compliance","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2018-11-13T00:00:00+00:00","dateModified":"2021-01-28T16:18:28+00:00","description":"VIDEO: Alissa Johnson, CISO at Xerox and former Deputy CIO at the White House, outlines compliance steps that could help all enterprises.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/compliance\/how-to-improve-governance-risk-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Improve Governance, Risk and Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0","name":"Sean Michael Kerner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","caption":"Sean Michael Kerner"},"description":"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.","url":"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/1883"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=1883"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/1883\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=1883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=1883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=1883"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=1883"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=1883"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=1883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}