
{"id":2684,"date":"2013-10-17T00:00:00","date_gmt":"2013-10-17T00:00:00","guid":{"rendered":"http:\/\/otava.test\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/"},"modified":"2013-10-17T00:00:00","modified_gmt":"2013-10-17T00:00:00","slug":"secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/","title":{"rendered":"SecureWorld: Larry Ponemon of the Ponemon Institute&#8217;s Keynote Address"},"content":{"rendered":"<p>Online Tech is exhibiting\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">secure<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/overview\">compliant hosting<\/a>\u00a0solutions at <a href=\"https:\/\/www.onlinetech.com\/events\/detroit-secureworld-2013\">Detroit SecureWorld 2013<\/a>, held yesterday and today. In case you missed it, here are some facts from the opening keynote from Dr. Larry Ponemon of the Traverse City-based research firm, The Ponemon Institute:<\/p>\n<figure style=\"width: 600px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" title=\"Larry Ponemon, SecureWorld Detroit 2013\" src=\"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374\" alt=\"Larry Ponemon, SecureWorld Detroit 2013\" width=\"600\" height=\"449\" \/><figcaption class=\"wp-caption-text\">Larry Ponemon, SecureWorld Detroit 2013<\/figcaption><\/figure>\n<p><strong>Facts about IT Security Leaders<\/strong><br \/>\n<em>Dr. Larry Ponemon<\/em><br \/>\nPonemon Institute:<br \/>\n\u2022 Institute dedicated to advancing responsible info management practices.<br \/>\n\u2022 Member of CASRO<br \/>\n\u2022 Majority of active participants are privacy or InfoSec members<\/p>\n<p>11 myths:<\/p>\n<ul>\n<li>Many larger sized companies do not have a fully dedicated CISO (Chief Information Security Officer)<\/li>\n<li>CISO role is complex<\/li>\n<li>CISO lacks budget authority<\/li>\n<li>CISO activities are tactical<\/li>\n<li>They\u2019re advisors<\/li>\n<li>Have a hard time getting exec buy-in<\/li>\n<li>They have wanderlust<\/li>\n<li>Positioned too low in organization<\/li>\n<li>Cisos feel they are undercompensated<\/li>\n<\/ul>\n<p>Most reports are 2-3 years old.<br \/>\n40% have fully dedicated CISO<br \/>\n44% don\u2019t have CISO<br \/>\nThe rest are part-time<\/p>\n<p>Influence:<\/p>\n<ul>\n<li>55% shared influence and control.<\/li>\n<li>22% central influence and control<\/li>\n<li>Can\u2019t call the shots directly.<\/li>\n<li>How is Influence and control divided?<\/li>\n<li>41% geography<\/li>\n<li>30% line of business<\/li>\n<li>14% functional areas<\/li>\n<\/ul>\n<p>Budget authority:<\/p>\n<ul>\n<li>28% full ownership<\/li>\n<li>43% partial ownership (Opx only)<\/li>\n<li>6% partial ownership (capx only)<\/li>\n<li>23% no authority<\/li>\n<li>Most large-sized companies have around $2-4 Million<\/li>\n<\/ul>\n<p>Chain of command &#8211;\u00a0Report to:<\/p>\n<ul>\n<li>CIO (56%)<\/li>\n<li>CFO (15%)<\/li>\n<\/ul>\n<p>If you\u2019re doing your job as a CISO, sometimes you\u2019re going to be reporting about will be in the IT department, or even the CIO. You don\u2019t want to report to the CIO, who could potentially censor that information as it heads farther up the chain.<\/p>\n<p>In general, we see this issue creates some sticky issues.<br \/>\nHow many steps between CEO and CISO:<\/p>\n<ul>\n<li>45% 3 steps<\/li>\n<li>37% more than 3 steps<\/li>\n<\/ul>\n<p>Number of people report to CISO:<br \/>\nAverage is 3-6. Most CISOs are advisors, they don\u2019t need a huge staff. It can be a problem when something needs to be implemented but you aren\u2019t a priority to the staff<\/p>\n<p>How do you measure effectiveness:<br \/>\nIf you boil the ocean, you really only have two measurements (external and internal) &#8211;<\/p>\n<ul>\n<li>36% none<\/li>\n<li>30% mostly internal (softer metric, things like training)<\/li>\n<li>12% mostly external<\/li>\n<li>22% combo of both<\/li>\n<\/ul>\n<p>Rank of critical success factors:<\/p>\n<ul>\n<li>Adequate funding<\/li>\n<li>Preparedness<\/li>\n<li>Support structures<\/li>\n<li>Leadership<\/li>\n<li>Organizational structure<\/li>\n<li>Domain expertise or knowledge<\/li>\n<li>Agility (weirdly ranked low comparatively)<\/li>\n<\/ul>\n<p>What is CISO\u2019s reporting structure:<\/p>\n<ul>\n<li>53% direct line<\/li>\n<li>31% direct plus 1 indirect line<\/li>\n<li>9% direct plus 2 indirect lines<\/li>\n<li>7% only indirect lines<\/li>\n<\/ul>\n<p>Gender differences:<br \/>\n89% male!<br \/>\n11% female<br \/>\nIn privacy, women are more likely to be CPOs than CISOs<\/p>\n<p>CISO tenure:<br \/>\nAverage 2.1 years<br \/>\n51% less than 2 years<br \/>\nWhy? There\u2019s so much demand that they can jump from job to job. The other likely reason is that when something goes wrong, someone needs to be blamed, and that someone is the CISO.<\/p>\n<p>CISO equivalent job titles:<br \/>\nChief Security Officer<br \/>\nSVP Information\/data security<\/p>\n<p>Rationale for establishing CISO function:<\/p>\n<ul>\n<li>52% ex-post response to a security incident or breach.<\/li>\n<li>21% ex-post response to compliance and regulatory snafus.<\/li>\n<\/ul>\n<p>CISO attitudes about present role:<\/p>\n<ul>\n<li>33% good job but not the best<\/li>\n<li>32% bad job but not the worst<\/li>\n<li>24% worst job I ever had<\/li>\n<li>11% best job I ever had<\/li>\n<\/ul>\n<p>How difficult?<\/p>\n<ul>\n<li>43% 9-10 difficult<\/li>\n<li>26% 7-8 difficult<\/li>\n<li>26% 5-6<\/li>\n<\/ul>\n<p>CISO background:<\/p>\n<ul>\n<li>34% tech background<\/li>\n<li>20% law enforcement<\/li>\n<li>16% military<\/li>\n<\/ul>\n<p>How do CISOs spend their time?<br \/>\nMonitoring and audit (23%)<br \/>\nPolicy enforcement (16)<br \/>\nSuggests CISOs are more tactical than strategic &#8211; if you don\u2019t have the relationship between IT ops, you\u2019re not going to get anything done.<\/p>\n<p>CISO role described as Consultant (40%)<\/p>\n<ul>\n<li>Influencer (23%)<\/li>\n<li>Barriers to CISOs success:<\/li>\n<li>Lack of adequate funding (56%)<\/li>\n<li>IT complexity (42%)<\/li>\n<li>Lack of qualified personnel (41)<\/li>\n<li>Greatest accomplishment:<\/li>\n<li>Solved a crime (33%)<\/li>\n<li>Stopped a crime (32%)<\/li>\n<li>Identified system vulnerability (19%)<\/li>\n<\/ul>\n<p>Does CISO report to board?<\/p>\n<ul>\n<li>33% no reporting<\/li>\n<li>30% informal and event driven<\/li>\n<li>20% formal, regular intervals<\/li>\n<\/ul>\n<p>A lot of CISOs like to roll up their shirt sleeves and don\u2019t delegate well, but when you have Chief in your title, you have to back up and learn to delegate more. That\u2019s a common trait you see throughout security. So now you\u2019re a chief, how do you delegate that? It\u2019s a big problem, and a common problem throughout the industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech is exhibiting\u00a0secure\u00a0and\u00a0compliant hosting\u00a0solutions at Detroit SecureWorld 2013, held yesterday and today. In case you missed it, here are some facts from the opening keynote from Dr. Larry Ponemon of the Traverse City-based research firm, The Ponemon Institute: Facts about IT Security Leaders Dr. Larry Ponemon Ponemon Institute: \u2022 Institute dedicated to advancing responsible info management practices. \u2022 Member of CASRO \u2022 Majority of active participants are privacy or InfoSec members 11 myths: Many larger sized companies do not have a fully dedicated CISO (Chief Information Security Officer) CISO role is complex CISO lacks budget authority CISO activities are tactical They\u2019re advisors Have a hard time getting exec buy-in They have wanderlust Positioned too low in organization Cisos feel they are undercompensated Most reports are 2-3 years old. 40% have fully dedicated CISO 44% don\u2019t have CISO The rest are part-time Influence: 55% shared influence and control. 22% central influence and control Can\u2019t call the shots directly. How is Influence and control divided? 41% geography 30% line of business 14% functional areas Budget authority: 28% full ownership 43% partial ownership (Opx only) 6% partial ownership (capx only) 23% no authority Most large-sized companies have around $2-4 Million Chain of&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2684","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SecureWorld: Larry Ponemon of the Ponemon Institute&#039;s Keynote Address | OTAVA<\/title>\n<meta name=\"description\" content=\"A lot of CISOs like to roll up their shirt sleeves and don\u2019t delegate well, but when you have Chief in your title, you have to back up and delegate more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SecureWorld: Larry Ponemon of the Ponemon Institute&#039;s Keynote Address\" \/>\n<meta property=\"og:description\" content=\"A lot of CISOs like to roll up their shirt sleeves and don\u2019t delegate well, but when you have Chief in your title, you have to back up and delegate more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-17T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"SecureWorld: Larry Ponemon of the Ponemon Institute&#8217;s Keynote Address\",\"datePublished\":\"2013-10-17T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/\"},\"wordCount\":678,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/\",\"url\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/\",\"name\":\"SecureWorld: Larry Ponemon of the Ponemon Institute's Keynote Address | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374\",\"datePublished\":\"2013-10-17T00:00:00+00:00\",\"description\":\"A lot of CISOs like to roll up their shirt sleeves and don\u2019t delegate well, but when you have Chief in your title, you have to back up and delegate more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#primaryimage\",\"url\":\"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374\",\"contentUrl\":\"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SecureWorld: Larry Ponemon of the Ponemon Institute&#8217;s Keynote Address\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SecureWorld: Larry Ponemon of the Ponemon Institute's Keynote Address | OTAVA","description":"A lot of CISOs like to roll up their shirt sleeves and don\u2019t delegate well, but when you have Chief in your title, you have to back up and delegate more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/","og_locale":"en_US","og_type":"article","og_title":"SecureWorld: Larry Ponemon of the Ponemon Institute's Keynote Address","og_description":"A lot of CISOs like to roll up their shirt sleeves and don\u2019t delegate well, but when you have Chief in your title, you have to back up and delegate more.","og_url":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/","og_site_name":"OTAVA","article_published_time":"2013-10-17T00:00:00+00:00","og_image":[{"url":"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"SecureWorld: Larry Ponemon of the Ponemon Institute&#8217;s Keynote Address","datePublished":"2013-10-17T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/"},"wordCount":678,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#primaryimage"},"thumbnailUrl":"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/","url":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/","name":"SecureWorld: Larry Ponemon of the Ponemon Institute's Keynote Address | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#primaryimage"},"thumbnailUrl":"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374","datePublished":"2013-10-17T00:00:00+00:00","description":"A lot of CISOs like to roll up their shirt sleeves and don\u2019t delegate well, but when you have Chief in your title, you have to back up and delegate more.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#primaryimage","url":"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374","contentUrl":"https:\/\/d3j5vwomefv46c.cloudfront.net\/photos\/large\/815615771.png?1381934374"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/secureworld-larry-ponemon-of-the-ponemon-institutes-keynote-address\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"SecureWorld: Larry Ponemon of the Ponemon Institute&#8217;s Keynote Address"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2684"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2684\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2684"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}