
{"id":2685,"date":"2013-10-17T00:00:00","date_gmt":"2013-10-17T00:00:00","guid":{"rendered":"http:\/\/otava.test\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/"},"modified":"2013-10-17T00:00:00","modified_gmt":"2013-10-17T00:00:00","slug":"secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/","title":{"rendered":"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption"},"content":{"rendered":"<p>Online Tech is exhibiting\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">secure<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/overview\">compliant hosting<\/a>\u00a0solutions at\u00a0<a href=\"https:\/\/www.onlinetech.com\/events\/detroit-secureworld-2013\">Detroit SecureWorld 2013<\/a>, held yesterday and today. Online Tech&#8217;s Senior Product Architect Steve Aiello spoke on a panel about network security:<\/p>\n<p><strong>Network Security Industry Panel Discussion<\/strong><br \/>\nPanelists: Steven Aiello, Shane Harsch, Paul Giorgi, Don Gray, and Carl Herberger Moderator: Cathy Luders<\/p>\n<p><em>Where do you see the holes in modern day security programs?<\/em><\/p>\n<p>CH: I think large holes that are obvious: BYOD. I think the mobile problem is being omnipresent. I think the problem isn\u2019t BYOD; it\u2019s being able to connect from many devices. The other two are major trends: the virtualization of the network and software defined networking. Every carrier is forced into the conversation because of Google. It\u2019s extremely difficult and doesn\u2019t have native security. The other is ideology attacks. It makes people that you used to be able to trust less so. The group anon suggests that they don\u2019t have to hack, they just have to ask.<\/p>\n<p>DG: On the subject of BYOD, by making a more porous zone of control, you need to acknowledge that you\u2019re leaking your own data. There are people that don\u2019t have a good idea of the security foundations they have in place with their own companies.<\/p>\n<p>SH: Visibility is key. You\u2019re looking at a changing threat landscape that poses a different type of challenge to ops teams. We all have firewalls, antivirus\u2026static controls, which are now just ante to play the game. 9 out of 10 times, it\u2019s not going to be a usual attack.<\/p>\n<p>SA: There\u2019s a certain level of maturity in different sized organizations. If you have the money to get visibility into your threat landscape then great, but a company needs to understand the risks vs rewards, which can help boost the levels of awareness into what\u2019s important.<\/p>\n<p><em>How does infrastructure design play a role in security?<\/em><\/p>\n<p>SA: What we see, is that security seems like an afterthought. You buy a commercial package, and you find vulnerability, and then find a web app. Things bolted on are going to fail. We need a better discipline to say what is our last line of defense? Are we patched, are our systems hardened? Do we want to spend the time hardening from the inside out, or being soft on the inside and working on that hard candy shell on the outside?<\/p>\n<p>CH: A lot of security folks are network-oriented. We don\u2019t understand the silos within institutions. We\u2019re outsourcing. Your business is given cogs to the cloud, and if your business isn\u2019t able to handle that, then you\u2019ll be attacked. Another problem is that we don\u2019t view our <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">cloud<\/a> sources as a part of our infrastructure.<\/p>\n<p>SH: Our infrastructure isn\u2019t fully patched either. We have to think about things smarter. Where\u2019s the important stuff? Who owns that data? How important is it to the business?<\/p>\n<p><em>Are risk assessments really working, and how do they account for DDOS at commercial banks?<\/em><\/p>\n<p>PG: It\u2019s interesting to see people doing risk assessments (RAs) just to do them, and they don\u2019t do anything about it. I never count the high-level count anymore because some people don\u2019t do anything about it. I think there\u2019s still a place for them, and lots of drivers that need them, but we aren\u2019t acting on it.<\/p>\n<p>CH: I think we have lots of evidence that the way we do RAs should be reexamined. Whether that\u2019s true in every org, that\u2019s in the eye of the beholder. They can be a risk themselves, as they have a problem finding some risks that are there. You can\u2019t scan for a lot of DDOS issues. For base threats it\u2019s lacking.<\/p>\n<p>SA: The place I think RAs fall down, it\u2019s that as IT people we don\u2019t seem to go back to the balance sheet to get information. I don\u2019t see business owners and financial analysts associated in the risk assessments. I agree that a faulty RA can be dangerous. IT people can\u2019t get their head around the finance sheet.<\/p>\n<p>DG: I think part of the reason they aren\u2019t getting it is that we aren\u2019t making it real for them. I can give them very specific intelligence to give them, but the IT group doesn\u2019t know why it\u2019s as critical as other vulnerabilities. We have to translate the security risk into something the rest of the org is going to be able to digest.<\/p>\n<p>SH: They have value in that they help you where you want to focus. The big important driver is what you want your RA to accomplish. This is impactful to the livelihood of the business. We have to be smarter about how we plan\/budget for that. It\u2019s a business enablement center. If you look at it any other way you\u2019re going to pay a significant price.<\/p>\n<p><em>How can people make infrastructure solutions \u2018out of the box\u2019?<\/em><\/p>\n<p>SH: You\u2019re going to make decisions with zero visibility. You have to talk about how it\u2019s all going to come together, because it\u2019s all commodity. You can make smarter decisions based on business objectives, but you have to decide how to protect it operationally, and how that\u2019s going to translate into the tech.<\/p>\n<p>PG: Networks, and subsequent security is all out of the box for each group. The way we\u2019re going to hybrid clouds and virtualization; that is too unique for a streamline. Address each scenario as something unique.<\/p>\n<p>SA: I think there are opportunities when you look at things in our power for a while. Web facing apps: there\u2019s a lot of tech that allows WFAs to keep things in a static manner. If you have good visibility with FIM (<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">file integrity monitoring<\/a>) and <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\">log monitoring<\/a>, if you\u2019re doing things (load balancing) there are things we take for granted and don\u2019t apply. Nobody likes patching, and no one likes backups. But they\u2019re the most important thing that people can do, the things that give us the biggest value.<\/p>\n<p>CH: If you have the model in your head of doing things as you\u2019ve always done them\u2026consider revising that. Yesterday\u2019s model is going to go away. It\u2019s going to break down. Our new model is going to be like the Netflix CISO\u2026everything is outsourced. Everything is in the cloud. You have to make disruptive techs resilient. And that\u2019s the definition going forward.<\/p>\n<p>DG: When I think of building resilient model, I think the inside the box thinking is, \u201cI\u2019m going to get this tech, implement it, and it\u2019ll fix the trouble.\u201d There is an incredible amount of security in the tools out today, and people today don\u2019t utilize it the way they should. If you don\u2019t have some expertise, bring in an outside resource to help you tighten down that area. Figure out how to be more aggressive with the tech you have already. You have to really take advantage.<\/p>\n<p><em>Can you give us insight into encryption?<\/em><\/p>\n<p>SH: Don\u2019t use the default settings. \u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">Encryption<\/a> is fundamental to security, but you have to think about HOW it\u2019s being used. That doesn\u2019t solve the issue necessarily. Gone are the days when someone\u2019s going to get into your DCs, and steal your servers. It comes down to smarten the infrastructure. Are you watching that traffic? Is there a normal behavior pattern that is now changed? What\u2019s the role of encryption, and how are you going to use it as a tool?<\/p>\n<p>PG: It\u2019s essential. The issue is securing everything, but then not being able to see anything.<\/p>\n<p>SA: There\u2019s no safe haven. I think that there\u2019s some really awesome work we can do here. How are criminals monetizing data. How long do you need to keep encrypted data for. Do you have the maturity for key management? Do you have the budget to bring in an outsourced provider? What\u2019s the risk of losing data if you CAN\u2019T manage properly. It goes back to data classification. If you know there\u2019s data that is org crashing if lost, just encrypt that.<\/p>\n<p>CH: Encryption is tasking on an infrastructure. That\u2019s a rife environment for DOS. In addition, the inspection problem is a big problem. Encapsulation is also a rife environment.<\/p>\n<p>DG: I would look at algorithms. Boundary between where it\u2019s encrypted and decrypted to be used. To me that\u2019s the more opportunity to get benefit of encryption. Controlling how much has to be decrypted.<\/p>\n<p><em>How do you bridge gaps between business, security, and IT?<\/em><\/p>\n<p>DG: Doughnuts! It comes down to personal relationships. The better you can do at that, the more heads-up emails you\u2019re going to get. To me, developers, infrastructure guys\u2026they all like doughnuts.<\/p>\n<p>SH: Honestly, leadership and purpose. Until we see a fundamental shift in a leadership perspective with how businesses were run, we\u2019re going to have trouble. That comes from a leadership perspective. If seniorship doesn\u2019t buy into security, there are no amount of doughnuts that are going to change that.<\/p>\n<p>SH: Speed of business won\u2019t allow thorough security checks with traditional tools.<\/p>\n<p>View Aiello&#8217;s data encryption video series in our <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/videos\/\">Encryption Wiki<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech is exhibiting\u00a0secure\u00a0and\u00a0compliant hosting\u00a0solutions at\u00a0Detroit SecureWorld 2013, held yesterday and today. Online Tech&#8217;s Senior Product Architect Steve Aiello spoke on a panel about network security: Network Security Industry Panel Discussion Panelists: Steven Aiello, Shane Harsch, Paul Giorgi, Don Gray, and Carl Herberger Moderator: Cathy Luders Where do you see the holes in modern day security programs? CH: I think large holes that are obvious: BYOD. I think the mobile problem is being omnipresent. I think the problem isn\u2019t BYOD; it\u2019s being able to connect from many devices. The other two are major trends: the virtualization of the network and software defined networking. Every carrier is forced into the conversation because of Google. It\u2019s extremely difficult and doesn\u2019t have native security. The other is ideology attacks. It makes people that you used to be able to trust less so. The group anon suggests that they don\u2019t have to hack, they just have to ask. DG: On the subject of BYOD, by making a more porous zone of control, you need to acknowledge that you\u2019re leaking your own data. There are people that don\u2019t have a good idea of the security foundations they have in place with their own companies. SH:&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2685","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption | OTAVA<\/title>\n<meta name=\"description\" content=\"An in-depth review of Senior Product Architect Steve Aiello&#039;s network security panel presentation at SecureWorld Detroit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption\" \/>\n<meta property=\"og:description\" content=\"An in-depth review of Senior Product Architect Steve Aiello&#039;s network security panel presentation at SecureWorld Detroit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-17T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption\",\"datePublished\":\"2013-10-17T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/\"},\"wordCount\":1578,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/\",\"url\":\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/\",\"name\":\"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-10-17T00:00:00+00:00\",\"description\":\"An in-depth review of Senior Product Architect Steve Aiello's network security panel presentation at SecureWorld Detroit.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption | OTAVA","description":"An in-depth review of Senior Product Architect Steve Aiello's network security panel presentation at SecureWorld Detroit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/","og_locale":"en_US","og_type":"article","og_title":"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption","og_description":"An in-depth review of Senior Product Architect Steve Aiello's network security panel presentation at SecureWorld Detroit.","og_url":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/","og_site_name":"OTAVA","article_published_time":"2013-10-17T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption","datePublished":"2013-10-17T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/"},"wordCount":1578,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/","url":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/","name":"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-10-17T00:00:00+00:00","description":"An in-depth review of Senior Product Architect Steve Aiello's network security panel presentation at SecureWorld Detroit.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/secureworld-detroit-network-security-panel-discusses-risk-assessments-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"SecureWorld Detroit: Network Security Panel Discusses Risk Assessments; Encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2685"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2685\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2685"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}