{"id":4504,"date":"2018-01-11T10:08:52","date_gmt":"2018-01-11T10:08:52","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=4504"},"modified":"2018-01-11T10:08:52","modified_gmt":"2018-01-11T10:08:52","slug":"4-risk-assessment-frameworks-pick-one","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/","title":{"rendered":"4 Risk Assessment Frameworks: Pick One"},"content":{"rendered":"<p>Amidst the many possibilities that we contend with, once in while you probably prefer a dictum. Evaluating the 4 Risk Assessment <a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg\"><img decoding=\"async\" class=\"size-medium wp-image-4557 alignright\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759-300x163.jpg\" alt=\"Risk Assessment Frameworks\" width=\"300\" height=\"163\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759-300x163.jpg 300w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759-768x418.jpg 768w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Frameworks may be one of those times.<\/p>\n<p>At times I\u00a0thirst for a dictum, especially when I have more\u00a0 &#8216;important&#8217; things to deal with, more lucrative opportunities to pursue. Other things I deem more exciting than &#8216;<em>Risk Assessment Frameworks<\/em>.&#8217;<\/p>\n<p>More &#8216;fanciful&#8217; things.<a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/businessman-using-d-rendering-question-marks-blurred-background-106799759.jpg\"><br \/>\n<\/a><\/p>\n<p>Except, like me you are here,\u00a0 so maybe risk assessment frameworks don&#8217;t qualify.<\/p>\n<h4><a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/network-access-control-objections\/\">The 4 Risk Assessment Frameworks<\/a><\/h4>\n<ul>\n<li>\u00a0ISO 27005<\/li>\n<li>\u00a0Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)<\/li>\n<li>\u00a0Control Objectives for Information and Related Technologies (COBIT)<\/li>\n<li><strong>\u00a0NIST Frameworks:\u00a0 800-53 Series, Cybersecurity Framework<\/strong><\/li>\n<\/ul>\n<h5><a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/Evaluating-Your-IT-Risk-Assessment-Process-201704112.pdf\"><strong>Read more about the Risk Assessment Frameworks here.<\/strong><\/a><\/h5>\n<p>So now you that you have selected the Risk Assessment Framework\u00a0 for your organization, what&#8217;s next?<\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/3Aoog8fXjMc\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Have you considered the outcome of your choice?\u00a0 \u00a0Did you begin with the end in mind?<\/p>\n<p>&nbsp;<\/p>\n<p>Strategy ignites the &#8216;<a href=\"http:\/\/bit.ly\/2DIQSIz\">PoP<\/a>.&#8217;\u00a0 <strong>P<\/strong>repare <strong>o<\/strong>n <strong>P<\/strong>urpose.<\/p>\n<p>&nbsp;<\/p>\n<p>Therefore, your chosen <a href=\"http:\/\/searchcio.techtarget.com\/definition\/risk-assessment-framework-RAF\">Risk Management framework<\/a>\u00a0 helps to birth a sound Risk Assessment Strategy.<\/p>\n<p>&nbsp;<\/p>\n<p>It must answer the following questions:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Is the IT professional that is responsible for the risk assessment, whether the Chief Information Security Officer (CISO) or Chief Information Officer (CIO) or other,\u00a0 part of the executive management team or has a direct channel of communication to it?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Does he\/she have a\u00a0 clear understanding of the organization\u2019s business goals, potential\u00a0 threats,\u00a0 and the likelihood of compromise and\/or the impact loss?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Has the chosen security framework been evaluated in light of the risk level that is appropriate for the organization and its key assets?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Does the outcome of the risk assessment include the development of an effective risk-mitigation and data-protection strategy that addresses the entire organization, including mobile workers, third-party vendors and supply chain partners?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>\u00a0Most organizations have already been breached. Others will be. There is no perfect security system that will prevent a breach. Does the security strategy include this reality?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>The best strategy is to put state-of-the-art protections in place as you apply diligence. And, to have an appropriate focus on swift breach detection, response and recovery. Does executive management embrace this philosophy and therefore ready to make the evolving financial investment?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>Has a\u00a0 road map been created for the evolution of the Capability Maturity Model (CMM) with the ultimate goal of continuous process improvement? And, is monitoring feedback from current processes while introducing innovations to meet the organization\u2019s needs the natural security posture?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Did you catch the spin in this post?<\/p>\n<p>I asked you to pick one of the Risk Assessment Frameworks but, &#8216;suggested&#8217; that you highly consider the NIST Frameworks.<\/p>\n<p>&nbsp;<\/p>\n<p>Oh the power of fonts!<\/p>\n<p>&nbsp;<\/p>\n<p>Really though,<\/p>\n<p>&nbsp;<\/p>\n<p><em>It&#8217;s\u00a0 just a suggestion. No dictum here.<br \/>\n<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Regardless of your choice, remember that a framework is effective only when it is able to <strong>identify<\/strong>, <strong>protect<\/strong>, <strong>detect<\/strong>, <strong>respond<\/strong> and <strong>recover<\/strong> from a breach.<\/p>\n<p>&nbsp;<\/p>\n<p>You are an architect my friend.<\/p>\n<p>&nbsp;<\/p>\n<p>So,<\/p>\n<p>&nbsp;<\/p>\n<p>Go ahead, flex those muscles and build!<\/p>\n<p>&nbsp;<\/p>\n<p>Build from a sound Risk Assessment Framework.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amidst the many possibilities that we contend with, once in while you probably prefer a dictum. Evaluating the 4 Risk Assessment Frameworks may be one of those times. At times I\u00a0thirst for a dictum, especially when I have more\u00a0 &#8216;important&#8217; things to deal with, more lucrative opportunities to pursue. Other things I deem more exciting [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4557,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[539],"tags":[586],"class_list":["post-4504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-risk","tag-risk-management-frameworks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>4 Risk Assessment Frameworks: Pick One - TechTonic Times<\/title>\n<meta name=\"description\" content=\"Risk Assessment Frameworks enable the right lens through which Security professionals determine the strategy and focus for their organization&#039;s risk level.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Risk Assessment Frameworks: Pick One - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Risk Assessment Frameworks enable the right lens through which Security professionals determine the strategy and focus for their organization&#039;s risk level.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-11T10:08:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"4 Risk Assessment Frameworks: Pick One\",\"datePublished\":\"2018-01-11T10:08:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/\"},\"wordCount\":518,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg\",\"keywords\":[\"Risk Management Frameworks\"],\"articleSection\":[\"cybersecurity risk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/\",\"name\":\"4 Risk Assessment Frameworks: Pick One - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg\",\"datePublished\":\"2018-01-11T10:08:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Risk Assessment Frameworks enable the right lens through which Security professionals determine the strategy and focus for their organization's risk level.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg\",\"width\":800,\"height\":435,\"caption\":\"Risk Assessment Frameworks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Risk Assessment Frameworks: Pick One\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 Risk Assessment Frameworks: Pick One - TechTonic Times","description":"Risk Assessment Frameworks enable the right lens through which Security professionals determine the strategy and focus for their organization's risk level.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/","og_locale":"en_US","og_type":"article","og_title":"4 Risk Assessment Frameworks: Pick One - TechTonic Times","og_description":"Risk Assessment Frameworks enable the right lens through which Security professionals determine the strategy and focus for their organization's risk level.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/","og_site_name":"TechTonic Times","article_published_time":"2018-01-11T10:08:52+00:00","og_image":[{"width":800,"height":435,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"4 Risk Assessment Frameworks: Pick One","datePublished":"2018-01-11T10:08:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/"},"wordCount":518,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg","keywords":["Risk Management Frameworks"],"articleSection":["cybersecurity risk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/","name":"4 Risk Assessment Frameworks: Pick One - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg","datePublished":"2018-01-11T10:08:52+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Risk Assessment Frameworks enable the right lens through which Security professionals determine the strategy and focus for their organization's risk level.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2018\/01\/dreamstime_s_106799759.jpg","width":800,"height":435,"caption":"Risk Assessment Frameworks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/4-risk-assessment-frameworks-pick-one\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"4 Risk Assessment Frameworks: Pick One"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=4504"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4504\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/4557"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=4504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=4504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=4504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}