{"id":718,"date":"2024-03-04T08:00:00","date_gmt":"2024-03-04T16:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=718"},"modified":"2024-08-02T14:39:28","modified_gmt":"2024-08-02T21:39:28","slug":"how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/","title":{"rendered":"How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito"},"content":{"rendered":"\n<p>When <a href=\"https:\/\/de.linkedin.com\/in\/benbachmann\/en\">Benjamin Bachmann<\/a> became the Vice President of Group Information Security at <a href=\"https:\/\/www.stroeer.de\/en\/\">Str\u00f6er<\/a>, two years ago, he encountered a significant challenge: the company lacked a comprehensive understanding of its external-facing assets. Str\u00f6er is a leading German media conglomerate with diverse operations spanning over 100 subsidiaries, each managing its own IT department, complicating the task of managing cybersecurity across such a diversified portfolio. This complexity posed not just an IT challenge but a strategic business concern that demanded a solution beyond traditional tools and methodologies. I recently sat down with him to learn more about the complexities of managing a sprawling digital landscape.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Lack of Visibility is a Hurdle<\/h2>\n\n\n\n<p>Ben\u2019s main hurdle was the absence of visibility into the company&#8217;s digital assets. &#8220;When I started, no one monitored our digital assets. It was just a guesstimate,\u201d he admits. Highlighting the exposure risks this posed in leaving the company vulnerable to cyber threats. Str\u00f6er&#8217;s vast enterprise includes outdoor advertising, digital media, dialogue marketing, e-commerce, and digital as a service (DaaS), among others. This broad spectrum of operations presented unique security challenges that required a solution that could provide comprehensive visibility and vulnerability management across its expansive digital landscape.<\/p>\n\n\n<div class=\"inset narrow pullquote right\">\n<p class=\"lede medium-blue\">\u201cCyCognito was a game-changer for us, providing the visibility we needed into our digital assets and allowing us to manage security effectively.\u201d<\/p>\n<h6 class=\"smaller light gray \">Benjamin Bachmann<br \/>Vice President, Group Information Security<\/h6>\n<\/div>\n\n\n<p>CyCognito aligned perfectly with Str\u00f6er&#8217;s complex structure. Its user-friendly interface and powerful search capabilities were exactly what he needed. \u201cIt&#8217;s really nice that you have some really huge search capabilities, so you don&#8217;t have to learn any new language or click 1,000 times to navigate,\u201d he says.&nbsp;<\/p>\n\n\n\n<p>Ben notes that the impact was immediate. He realized they had more assets and vulnerabilities than they initially thought, but we were able to start remediating those vulnerabilities quickly. Onboarding was quick and easy, which was critical for him to start addressing their security gaps.&nbsp;<\/p>\n\n\n\n<p>Within a few weeks of deployment, Ben\u2019s team was able to remediate many of these vulnerabilities, significantly reducing the company&#8217;s risk exposure. \u201cWe saw immediately that we had more assets than we thought we had, and we saw a lot of vulnerabilities we needed to remediate,\u201d he states.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">&#8220;CyCognito was a game-changer for us.&#8221;<\/h2>\n\n\n\n<p>CyCognito enables his security team to uncover hidden assets and vulnerabilities that had previously gone undetected.<strong> <\/strong>&#8220;CyCognito was a game-changer for us, providing the visibility we needed into our digital assets and allowing us to manage security effectively,\u201d<strong> <\/strong>he says. The automatic discovery of assets helped Str\u00f6er avoid costly penetration tests and, more importantly, potential security threats. \u201cWe cannot afford to pen test every website we own every few weeks or months,\u201d he says. \u201cCyCognito helped us a lot because we have a really good continuous understanding of what our defense looks like.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Str\u00f6er | Customer Testimonial\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/xLPGmv220bU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>\u201cWhat was really interesting was to see the amount of cross-site scripting and other web application vulnerabilities we had in websites we own that have not been used by attackers as far as we know,\u201d he says. \u201cAnd those have been fixed.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Major Progress in the First Six Months<\/h2>\n\n\n\n<p>Within the first six months of running CyCognito, Ben\u2019s security team mitigated a number of vulnerabilities. \u201cMost companies had some shadow servers that no one was administering anymore,\u201d he says. \u201cIt was quite nice to see them from the outside and take action. We shut down some websites as well.\u201d<\/p>\n\n\n\n<p>Although Ben has seen the number of hidden vulnerabilities cut in half when new companies are acquired, new services are launched, or a product or company is integrated, he has noticed an increase in the company\u2019s digital footprint, but can quickly spot that trend and take corrective action.<\/p>\n\n\n<div class=\"inset narrow pullquote right\">\n<p class=\"lede medium-blue\">\u201cCyCognito is worth every cent we pay, and it helps me sleep better because I know we\u2019re checking our internet-facing assets on a regular basis.\u201d<\/p>\n<h6 class=\"smaller light gray \">Benjamin Bachmann<br \/>Vice President, Group Information Security<\/h6>\n<\/div>\n\n\n<p>CyCognito has fundamentally shifted Ben\u2019s approach to be more proactive. It&#8217;s not just about discovering and fixing vulnerabilities; it&#8217;s about continuously monitoring Str\u00f6er\u2019s digital landscape. This continuous insight allows his team to catch and remediate issues much faster. Additionally, it&#8217;s made his team and subsidiaries more operationally efficient. He can now easily inform a subsidiary about its expanding digital footprint, and in turn, receive clear instructions on how to address vulnerabilities. \u201cOn my end, we save a lot of time because I can just click into the platform and tell one of the companies \u2018your Internet footprint is larger,\u201d he says. \u201cAnd our subsidiaries probably save time as well because CyCognito delivers quite nice instructions on how to fix vulnerabilities, for instance, or how to validate if it&#8217;s really there.\u201d<\/p>\n\n\n\n<p>His team monitors around 40,000 assets through CyCognito, which includes not just our websites but also assets hosted on cloud services like Amazon Web Services, Microsoft Azure, and Google Cloud. CyCognito has become an essential tool for Ben, his team, and subsidiaries, enabling them to maintain a strong cybersecurity posture across its entire digital landscape.<\/p>\n\n\n\n<p>\u201cEveryone in the company is positive about CyCognito and is interested in having a good risk level,\u201d he says.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CISOs Should Not to Rest on Known Defenses<\/h2>\n\n\n\n<p>Ben urges CISOs not to rest on known defenses or periodic manual testing alone. The digital landscape is always evolving, and threats are constantly emerging. Investing in a platform like CyCognito that allows for automatic and continuous scanning and testing of both known and unknown assets, is crucial.\u00a0&#8220;CyCognito is worth every cent we pay, and it helps me sleep better because I know we\u2019re checking our internet-facing assets on a regular basis,&#8221; he concluded.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Key Results<\/h6>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gained continuous visibility into all 40,000 assets in their external attack surface for the first time including subsidiaries and joint ventures<\/li>\n\n\n\n<li>Discovered previously hidden vulnerabilities, which improved the company\u2019s security posture, and helped the company avoid excessive pen tests<\/li>\n\n\n\n<li>Reduced external attack surface footprint by shutting down shadow servers and unmanaged websites<\/li>\n\n\n\n<li>Enabled more than 50 subsidiaries to perform independent monitoring with the centralized CyCognito platform, reducing remediation time<\/li>\n\n\n\n<li>Gained comprehensive reporting used to inform the Board of Directors of subsidiary risk levels and improvements<\/li>\n<\/ul>\n\n\n\n<p>Read the <a href=\"\/customers\/stroer.php\">full story<\/a> here<strong>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Benjamin Bachmann, VP of Group Information Security at Str\u00f6er, transformed the German media conglomerate&#8217;s security posture by implementing CyCognito. <\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[136,137,138],"class_list":["post-718","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-customer-experience","tag-customer-success","tag-stroer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"Benjamin Bachmann, VP of Group Information Security at Str\u00f6er, transformed the German media conglomerate&#039;s security posture by implementing CyCognito.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Ben Bachmann at Str\u00f6er Uncovers and Secures Hidden Digital Assets with CyCognito\" \/>\n<meta property=\"og:description\" content=\"Benjamin Bachmann, VP of Group Information Security at Str\u00f6er, transformed the German media conglomerate&#039;s security posture by implementing CyCognito.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-04T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T21:39:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-03-04-2400x1256-email.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brittany Busa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brittany Busa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/\"},\"author\":{\"name\":\"Brittany Busa\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5be59cef076adbe9afec1e29a7ba4ac8\"},\"headline\":\"How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito\",\"datePublished\":\"2024-03-04T16:00:00+00:00\",\"dateModified\":\"2024-08-02T21:39:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/\"},\"wordCount\":1062,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Customer Experience\",\"Customer Success\",\"Str\u00f6er\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/\",\"name\":\"How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2024-03-04T16:00:00+00:00\",\"dateModified\":\"2024-08-02T21:39:28+00:00\",\"description\":\"Benjamin Bachmann, VP of Group Information Security at Str\u00f6er, transformed the German media conglomerate's security posture by implementing CyCognito.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5be59cef076adbe9afec1e29a7ba4ac8\",\"name\":\"Brittany Busa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d95366a05353af907b94eee4f26c6361?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d95366a05353af907b94eee4f26c6361?s=96&d=mm&r=g\",\"caption\":\"Brittany Busa\"},\"description\":\"Customer Marketing and Advocacy Lead\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/brittany-busa\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito | CyCognito Blog","description":"Benjamin Bachmann, VP of Group Information Security at Str\u00f6er, transformed the German media conglomerate's security posture by implementing CyCognito.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/","og_locale":"en_US","og_type":"article","og_title":"How Ben Bachmann at Str\u00f6er Uncovers and Secures Hidden Digital Assets with CyCognito","og_description":"Benjamin Bachmann, VP of Group Information Security at Str\u00f6er, transformed the German media conglomerate's security posture by implementing CyCognito.","og_url":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/","og_site_name":"CyCognito Blog","article_published_time":"2024-03-04T16:00:00+00:00","article_modified_time":"2024-08-02T21:39:28+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-03-04-2400x1256-email.jpg","type":"image\/jpeg"}],"author":"Brittany Busa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brittany Busa","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/"},"author":{"name":"Brittany Busa","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5be59cef076adbe9afec1e29a7ba4ac8"},"headline":"How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito","datePublished":"2024-03-04T16:00:00+00:00","dateModified":"2024-08-02T21:39:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/"},"wordCount":1062,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Customer Experience","Customer Success","Str\u00f6er"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/","url":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/","name":"How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2024-03-04T16:00:00+00:00","dateModified":"2024-08-02T21:39:28+00:00","description":"Benjamin Bachmann, VP of Group Information Security at Str\u00f6er, transformed the German media conglomerate's security posture by implementing CyCognito.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/how-ben-bachmann-vp-of-group-information-security-at-stroer-uncovers-and-secures-hidden-digital-assets-with-cycognito\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Str\u00f6er, Uncovers and Secures Hidden Digital Assets with CyCognito"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5be59cef076adbe9afec1e29a7ba4ac8","name":"Brittany Busa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d95366a05353af907b94eee4f26c6361?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d95366a05353af907b94eee4f26c6361?s=96&d=mm&r=g","caption":"Brittany Busa"},"description":"Customer Marketing and Advocacy Lead","url":"https:\/\/www.cycognito.com\/blog\/author\/brittany-busa\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=718"}],"version-history":[{"count":20,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/718\/revisions"}],"predecessor-version":[{"id":1020,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/718\/revisions\/1020"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}