{"id":17268,"date":"2024-04-15T13:10:06","date_gmt":"2024-04-15T13:10:06","guid":{"rendered":"https:\/\/acora.s.nomatter.dev\/?p=17268"},"modified":"2024-07-01T13:48:38","modified_gmt":"2024-07-01T13:48:38","slug":"aligning-cyber-security-with-strategic-business-goals","status":"publish","type":"post","link":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/","title":{"rendered":"Strategically Aligning Security with Business Objectives: Insights from Industry Leaders"},"content":{"rendered":"<p><span data-contrast=\"auto\">In recent times, the proficiency of a Security Operations Centre (SOC) extends far beyond its technological infrastructure. And aligning cyber security endeavours with strategic business goals can prove challenging. Success stems from the uniting front of strategic foresight, proactive initiatives, and adaptable responses. In an era of threat evolution, a thriving SOC is built upon the foundations of data-driven methodologies and evidence-backed strategies.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/acora.com\/\"><span data-contrast=\"none\">Acora<\/span><\/a><span data-contrast=\"auto\">&#8216;s Head of Enterprise Security, Simon Crumplin and Head of Cyber Services, James Fernley, recently sat down with <\/span><a href=\"https:\/\/citreno.com\/\"><span data-contrast=\"none\">Citreno<\/span><\/a><span data-contrast=\"auto\">&#8216;s Founder &amp; CEO, Svetla Yankova, to explore what it really takes to build and manage a <a href=\"https:\/\/acora.s.nomatter.dev\/our-services\/managed-services\/cyber-security\/managed-soc\/\">modern-day SOC<\/a>.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Utilising their collective expertise and experience, they highlight the obstacles and optimal methods linked with creating a proficient SOC. They also highlight the significance of data-driven strategies and evidence-based methodologies and the alignment of cyber security endeavours with strategic business goals. This discussion offers valuable perspectives for manoeuvring through the continually shifting realm of cyber security.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Key Insights:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<ol>\n<li><b><span data-contrast=\"auto\">Advancing SOC Maturity:<\/span><\/b><span data-contrast=\"auto\"> Elevating SOC maturity stands as a pivotal necessity in today&#8217;s cyber security landscape. The speakers delve into the role that a SOC plays in bolstering business resilience, stressing the significance of context, intimacy, and the shift to evidential risk management. Gain a deeper insight into how SOCs can progress from being solely IT-focused to encompassing risk management that seamlessly integrate with business operations.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Harmonising Security Strategies with Business Objectives:<\/span><\/b><span data-contrast=\"auto\"> Leaders can implement practical measures to gain a comprehensive understanding of the business environment, facilitating the alignment of security strategies with organisational shifts and objectives.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Embracing Challenging Conversations in Security:<\/span><\/b><span data-contrast=\"auto\"> A notable challenge in security practices is fostering transparent dialogues. Businesses must prioritise addressing vulnerabilities openly. Explore the significance of engaging in difficult discussions about security gaps and risks, rather than evading them due to apprehensions of criticism. Listeners will understand how transparency is pivotal for enhancing security measures and mitigating potential threats.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Strategic Technology Procurement:<\/span><\/b><span data-contrast=\"auto\"> The continual acquisition of technology without a clear strategy reflects the industry&#8217;s inclination towards chasing new trends without first evaluating their effectiveness. This segment explains how to synchronise technology investments with the specific needs and objectives of the organisation, ensuring sustained operational efficiency and effectiveness over time.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li><b><span data-contrast=\"none\">STAM<\/span><\/b> <b><span data-contrast=\"none\">for Go<\/span><\/b><b><span data-contrast=\"none\">ogle Cloud&#8217;s S<\/span><\/b><b><span data-contrast=\"none\">ecOps Platform<\/span><\/b><b><span data-contrast=\"none\">\u00a0\u2013 Powered by Citreno:<\/span><\/b><span data-contrast=\"none\"> Utilising Citreno\u2019s and Acora\u2019s expertise, the collaboration enables fixed-cost engineering subscriptions to further strengthen the robust Google Cloud&#8217;s Security Operations Platform. This allows businesses to enhance their cyber security defences to new heights, ensuring the protection of their critical assets and data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">As organisations confront the intricate landscape of <a href=\"https:\/\/acora.s.nomatter.dev\/our-services\/managed-services\/rdr-cyber-security\/\">cyber security<\/a>, the focus on proactive approaches, alignment with business goals, and fostering transparent communication remains crucial. As we progress further into the digital age, embracing these principles not only safeguards valuable assets but also strengthens business resilience against evolving threats and challenges.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3>Where can I listen to the Podcast?<\/h3>\n<p><span data-contrast=\"auto\">You can check out the full podcast by clicking below! Our accompanying video of the discussion will be available shortly.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<div id=\"buzzsprout-player-14863375\"><\/div>\n<p><script src=\"https:\/\/www.buzzsprout.com\/1632568\/14863375-how-can-a-data-driven-and-evidence-based-soc-help-us-better-manage-risk.js?container_id=buzzsprout-player-14863375&#038;player=small\" type=\"text\/javascript\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent times, the proficiency of a Security Operations Centre (SOC) extends far beyond its technological infrastructure. And aligning cyber security endeavours with strategic business goals can prove challenging. Success stems from the uniting front of strategic foresight, proactive initiatives,&#8230;<\/p>\n","protected":false},"author":16,"featured_media":18250,"comment_status":"closed","ping_status":"open","sticky":false,"template":"full-width-single-post.blade.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[348],"tags":[],"class_list":["post-17268","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Aligning Cyber Security with Strategic Business Goals<\/title>\n<meta name=\"description\" content=\"We sat down with Citreno&#039;s CEO, Svetla Yankova, to discuss aligning cyber security endeavours with strategic business goals.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strategically Aligning Security with Business Objectives: Insights from Industry Leaders\" \/>\n<meta property=\"og:description\" content=\"We sat down with Citreno&#039;s CEO, Svetla Yankova, to discuss aligning cyber security endeavours with strategic business goals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/\" \/>\n<meta property=\"og:site_name\" content=\"Acora NL Test\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-15T13:10:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-01T13:48:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/04\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Acora Press Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Acora Press Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/\"},\"author\":{\"name\":\"The Acora Press Team\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\"},\"headline\":\"Strategically Aligning Security with Business Objectives: Insights from Industry Leaders\",\"datePublished\":\"2024-04-15T13:10:06+00:00\",\"dateModified\":\"2024-07-01T13:48:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/\"},\"wordCount\":511,\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/04\\\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg\",\"articleSection\":[\"Announcements\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/\",\"name\":\"Aligning Cyber Security with Strategic Business Goals\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/04\\\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg\",\"datePublished\":\"2024-04-15T13:10:06+00:00\",\"dateModified\":\"2024-07-01T13:48:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\"},\"description\":\"We sat down with Citreno's CEO, Svetla Yankova, to discuss aligning cyber security endeavours with strategic business goals.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/04\\\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg\",\"contentUrl\":\"https:\\\/\\\/acora-staging.b-cdn.net\\\/app\\\/uploads\\\/sites\\\/5\\\/2024\\\/04\\\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Aligning security with business objectives\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/announcements\\\/aligning-cyber-security-with-strategic-business-goals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Announcements\",\"item\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/category\\\/announcements\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Strategically Aligning Security with Business Objectives: Insights from Industry Leaders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#website\",\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/\",\"name\":\"Acora NL Test\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/#\\\/schema\\\/person\\\/90ace47b87c23ca035fe2b7bcb298267\",\"name\":\"The Acora Press Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g\",\"caption\":\"The Acora Press Team\"},\"url\":\"https:\\\/\\\/acora.s.nomatter.dev\\\/nltest\\\/news\\\/author\\\/marketingteamacora-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Aligning Cyber Security with Strategic Business Goals","description":"We sat down with Citreno's CEO, Svetla Yankova, to discuss aligning cyber security endeavours with strategic business goals.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Strategically Aligning Security with Business Objectives: Insights from Industry Leaders","og_description":"We sat down with Citreno's CEO, Svetla Yankova, to discuss aligning cyber security endeavours with strategic business goals.","og_url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/","og_site_name":"Acora NL Test","article_published_time":"2024-04-15T13:10:06+00:00","article_modified_time":"2024-07-01T13:48:38+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/04\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg","type":"image\/jpeg"}],"author":"The Acora Press Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"The Acora Press Team","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/#article","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/"},"author":{"name":"The Acora Press Team","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267"},"headline":"Strategically Aligning Security with Business Objectives: Insights from Industry Leaders","datePublished":"2024-04-15T13:10:06+00:00","dateModified":"2024-07-01T13:48:38+00:00","mainEntityOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/"},"wordCount":511,"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/04\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg","articleSection":["Announcements"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/","url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/","name":"Aligning Cyber Security with Strategic Business Goals","isPartOf":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/#primaryimage"},"image":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/#primaryimage"},"thumbnailUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/04\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg","datePublished":"2024-04-15T13:10:06+00:00","dateModified":"2024-07-01T13:48:38+00:00","author":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267"},"description":"We sat down with Citreno's CEO, Svetla Yankova, to discuss aligning cyber security endeavours with strategic business goals.","breadcrumb":{"@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/#primaryimage","url":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/04\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg","contentUrl":"https:\/\/acora-staging.b-cdn.net\/app\/uploads\/sites\/5\/2024\/04\/Simon-Crumplin-and-Svetla-Podcast-SOC-1.jpg","width":1920,"height":1080,"caption":"Aligning security with business objectives"},{"@type":"BreadcrumbList","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/announcements\/aligning-cyber-security-with-strategic-business-goals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/acora.s.nomatter.dev\/nltest\/"},{"@type":"ListItem","position":2,"name":"Announcements","item":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/category\/announcements\/"},{"@type":"ListItem","position":3,"name":"Strategically Aligning Security with Business Objectives: Insights from Industry Leaders"}]},{"@type":"WebSite","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#website","url":"https:\/\/acora.s.nomatter.dev\/nltest\/","name":"Acora NL Test","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acora.s.nomatter.dev\/nltest\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/acora.s.nomatter.dev\/nltest\/#\/schema\/person\/90ace47b87c23ca035fe2b7bcb298267","name":"The Acora Press Team","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f49ea7f3b1a87fbd47967cc4ca7d8fb465a57c950c1f45269f891b4066daec14?s=96&d=mm&r=g","caption":"The Acora Press Team"},"url":"https:\/\/acora.s.nomatter.dev\/nltest\/news\/author\/marketingteamacora-com\/"}]}},"_links":{"self":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/17268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/comments?post=17268"}],"version-history":[{"count":14,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/17268\/revisions"}],"predecessor-version":[{"id":18302,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/posts\/17268\/revisions\/18302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media\/18250"}],"wp:attachment":[{"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/media?parent=17268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/categories?post=17268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acora.s.nomatter.dev\/nltest\/wp-json\/wp\/v2\/tags?post=17268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}