{"id":9229,"date":"2020-05-26T08:58:00","date_gmt":"2020-05-26T13:58:00","guid":{"rendered":"https:\/\/colombiainteligente.org\/?p=9229"},"modified":"2022-12-30T09:00:11","modified_gmt":"2022-12-30T14:00:11","slug":"lessons-from-leaders-to-master-cybersecurity-execution","status":"publish","type":"post","link":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/","title":{"rendered":"Lessons from leaders to master cybersecurity execution"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"9229\" class=\"elementor elementor-9229\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79148795 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79148795\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1ece4ebf\" data-id=\"1ece4ebf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a61c7e5 elementor-widget elementor-widget-text-editor\" data-id=\"7a61c7e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.14.0 - 26-06-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Cyberattacks are commonplace. They can have a massive impact on organizations, as well as their customers, partners, employees and the bottom line. Many organizations are finding it hard to reconcile the level of their cybersecurity innovation investments with the cyber resilience outcomes for their business. Even worse, choosing the wrong strategy to invest in cybersecurity technologies can cost the organization far more than wasted cash; it can damage an organization\u2019s brand, reputation, and future prosperity.<\/p><p>Cyber resilience is the ability to defend against attacks while continuing to do \u00abbusiness as usual\u00bb successfully. Our statistical analysis revealed a group of leaders who were characterized as among the highest performers in at least three of the following four categories: stop more attacks, find breaches faster, fix breaches faster and reduce breach impact.<\/p><p>Para leer m\u00e1s ingrese a:<\/p><p><a href=\"https:\/\/www.accenture.com\/us-en\/insights\/security\/invest-cyber-resilience\">https:\/\/www.accenture.com\/us-en\/insights\/security\/invest-cyber-resilience<\/a><\/p><p><a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-116\/Accenture-Cybersecurity-Report-2020.pdf#zoom=40\">https:\/\/www.accenture.com\/_acnmedia\/PDF-116\/Accenture-Cybersecurity-Report-2020.pdf#zoom=40<\/a><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div style=\"text-align:center\" class=\"yasr-auto-insert-visitor\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber resilience is the ability to defend against attacks while continuing to do \u00abbusiness as usual\u00bb successfully. Our statistical analysis revealed a group of leaders who were characterized as among the highest performers in at least three of the following four categories: stop more attacks, find breaches faster, fix breaches faster and reduce breach impact.<\/p>","protected":false},"author":27,"featured_media":9230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[55,53],"tags":[],"class_list":["post-9229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalizacion","category-tendencias"],"yasr_visitor_votes":{"number_of_votes":0,"sum_votes":0,"stars_attributes":{"read_only":false,"span_bottom":false}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lessons from leaders to master cybersecurity execution - Colombia Inteligente<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lessons from leaders to master cybersecurity execution - Colombia Inteligente\" \/>\n<meta property=\"og:description\" content=\"Cyber resilience is the ability to defend against attacks while continuing to do &quot;business as usual&quot; successfully. Our statistical analysis revealed a group of leaders who were characterized as among the highest performers in at least three of the following four categories: stop more attacks, find breaches faster, fix breaches faster and reduce breach impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/colombiainteligente.org\/es_co\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/\" \/>\n<meta property=\"og:site_name\" content=\"Colombia Inteligente\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-26T13:58:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-30T14:00:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/04-08-innovate.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Luisa Buitrago\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:site\" content=\"@colombiaintelig\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luisa Buitrago\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo estimado de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/\"},\"author\":{\"name\":\"Luisa Buitrago\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/7a8c7be348df0b891a16dc2fe342977d\"},\"headline\":\"Lessons from leaders to master cybersecurity execution\",\"datePublished\":\"2020-05-26T13:58:00+00:00\",\"dateModified\":\"2022-12-30T14:00:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/\"},\"wordCount\":161,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/04-08-innovate.png\",\"articleSection\":[\"Digitalizaci\u00f3n\",\"Tendencias\"],\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/\",\"name\":\"Lessons from leaders to master cybersecurity execution - Colombia Inteligente\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/04-08-innovate.png\",\"datePublished\":\"2020-05-26T13:58:00+00:00\",\"dateModified\":\"2022-12-30T14:00:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/04-08-innovate.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/04-08-innovate.png\",\"width\":400,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/tendencias\\\/lessons-from-leaders-to-master-cybersecurity-execution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/colombiainteligente.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lessons from leaders to master cybersecurity execution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#website\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"name\":\"Colombia Inteligente\",\"description\":\"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano\",\"publisher\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/colombiainteligente.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#organization\",\"name\":\"Colombia Inteligente\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"contentUrl\":\"https:\\\/\\\/colombiainteligente.org\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Image.png\",\"width\":588,\"height\":274,\"caption\":\"Colombia Inteligente\"},\"image\":{\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/colombiaintelig\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/colombiainteligente\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/colombiainteligente.org\\\/#\\\/schema\\\/person\\\/7a8c7be348df0b891a16dc2fe342977d\",\"name\":\"Luisa Buitrago\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g\",\"caption\":\"Luisa Buitrago\"},\"url\":\"https:\\\/\\\/colombiainteligente.org\\\/es_co\\\/author\\\/luisa-buitragocolombiainteligente-org\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lessons from leaders to master cybersecurity execution - Colombia Inteligente","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/","og_locale":"es_ES","og_type":"article","og_title":"Lessons from leaders to master cybersecurity execution - Colombia Inteligente","og_description":"Cyber resilience is the ability to defend against attacks while continuing to do \"business as usual\" successfully. Our statistical analysis revealed a group of leaders who were characterized as among the highest performers in at least three of the following four categories: stop more attacks, find breaches faster, fix breaches faster and reduce breach impact.","og_url":"https:\/\/colombiainteligente.org\/es_co\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/","og_site_name":"Colombia Inteligente","article_published_time":"2020-05-26T13:58:00+00:00","article_modified_time":"2022-12-30T14:00:11+00:00","og_image":[{"width":400,"height":225,"url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/04-08-innovate.png","type":"image\/png"}],"author":"Luisa Buitrago","twitter_card":"summary_large_image","twitter_creator":"@colombiaintelig","twitter_site":"@colombiaintelig","twitter_misc":{"Escrito por":"Luisa Buitrago","Tiempo estimado de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/#article","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/"},"author":{"name":"Luisa Buitrago","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/7a8c7be348df0b891a16dc2fe342977d"},"headline":"Lessons from leaders to master cybersecurity execution","datePublished":"2020-05-26T13:58:00+00:00","dateModified":"2022-12-30T14:00:11+00:00","mainEntityOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/"},"wordCount":161,"commentCount":0,"publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/04-08-innovate.png","articleSection":["Digitalizaci\u00f3n","Tendencias"],"inLanguage":"es-CO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/","url":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/","name":"Lessons from leaders to master cybersecurity execution - Colombia Inteligente","isPartOf":{"@id":"https:\/\/colombiainteligente.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/#primaryimage"},"image":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/04-08-innovate.png","datePublished":"2020-05-26T13:58:00+00:00","dateModified":"2022-12-30T14:00:11+00:00","breadcrumb":{"@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/"]}]},{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/#primaryimage","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/04-08-innovate.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/12\/04-08-innovate.png","width":400,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/colombiainteligente.org\/tendencias\/lessons-from-leaders-to-master-cybersecurity-execution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/colombiainteligente.org\/"},{"@type":"ListItem","position":2,"name":"Lessons from leaders to master cybersecurity execution"}]},{"@type":"WebSite","@id":"https:\/\/colombiainteligente.org\/#website","url":"https:\/\/colombiainteligente.org\/","name":"Colombia Inteligente","description":"Alianza estrat\u00e9gica, conformada por empresas y entidades, para la inserci\u00f3n integral y eficiente de las redes inteligentes a la infraestructura del sector el\u00e9ctrico colombiano","publisher":{"@id":"https:\/\/colombiainteligente.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/colombiainteligente.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/colombiainteligente.org\/#organization","name":"Colombia Inteligente","url":"https:\/\/colombiainteligente.org\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/","url":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","contentUrl":"https:\/\/colombiainteligente.org\/wp-content\/uploads\/2022\/07\/Image.png","width":588,"height":274,"caption":"Colombia Inteligente"},"image":{"@id":"https:\/\/colombiainteligente.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/colombiaintelig","https:\/\/www.linkedin.com\/company\/colombiainteligente\/"]},{"@type":"Person","@id":"https:\/\/colombiainteligente.org\/#\/schema\/person\/7a8c7be348df0b891a16dc2fe342977d","name":"Luisa Buitrago","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52ddc2638a82d555a120840263ecb4ee82a5e480ee730faa01e9b11ef7441d42?s=96&d=mm&r=g","caption":"Luisa Buitrago"},"url":"https:\/\/colombiainteligente.org\/es_co\/author\/luisa-buitragocolombiainteligente-org\/"}]}},"_links":{"self":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/comments?post=9229"}],"version-history":[{"count":5,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9229\/revisions"}],"predecessor-version":[{"id":9236,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/posts\/9229\/revisions\/9236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media\/9230"}],"wp:attachment":[{"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/media?parent=9229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/categories?post=9229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/colombiainteligente.org\/es_co\/wp-json\/wp\/v2\/tags?post=9229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}