{"id":507,"date":"2023-04-05T11:38:46","date_gmt":"2023-04-05T11:38:46","guid":{"rendered":"https:\/\/www.executiveplacements.com\/blog\/?p=507"},"modified":"2025-07-24T08:58:05","modified_gmt":"2025-07-24T08:58:05","slug":"an-in-depth-look-at-the-role-of-chief-information-security-officer","status":"publish","type":"post","link":"https:\/\/www.executiveplacements.com\/blog\/an-in-depth-look-at-the-role-of-chief-information-security-officer\/","title":{"rendered":"An In-Depth Look at the Role of Chief Information Security Officer"},"content":{"rendered":"\n<p>If your calling is that of chief information security officer (CISO), you will be responsible for taking charge of all the security endeavours of your organisation. The role is incredibly diverse, as it extends from overseeing the security of staff members, to that of company assets \u2013 such as its MX Lookup and <a href=\"https:\/\/uptimerobot.com\/free-tools\/ip-subnet-calculator\/\" data-type=\"link\" data-id=\"https:\/\/uptimerobot.com\/free-tools\/ip-subnet-calculator\/\">subnet calculator<\/a> \u2013 and its all-important data. Your work will be cut out for you, most especially, when you\u2019re called upon to manage potential risk assessments, or to supervise the investigation of a security breach.<\/p>\n\n\n\n<p>Your five key duties in the high-energy position of CISO are listed below:<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<ul class=\"wp-block-list\">\n<li>improve the security of your entity \u2013 i.e. across data and assets, the security of a building, staff safety regulations, and the techniques and policies that could reduce any form of risk (e.g. theft, exposure);<\/li>\n\n\n\n<li>oversee daily operations \u2013 such as ensuring that employees keep their log-in information updated; developing and implementing safety standards for your staff contingent as a whole; and combatting any form of disruption or threat;<\/li>\n\n\n\n<li>keep threats at bay \u2013 by evaluating risks and creating appropriate security protocols, collaborating with other <a href=\"https:\/\/www.executiveplacements.com\/Jobs\/ceo-jobs.asp\" target=\"_blank\" rel=\"noreferrer noopener\">C-suite executives<\/a> to develop and implement the necessary security protocols, and upgrading and maintaining security systems to keep fraud and data loss at bay;<\/li>\n\n\n\n<li>maintain data security \u2013 by creating secure logins for information and network access, developing information systems protection, and managing data, both internally and externally, during times of corporate transition; and<\/li>\n\n\n\n<li>investigate past breaches \u2013 to ascertain who instigated the attack, why they did it, and how to fix what went wrong so that its unlikely to happen again.<\/li>\n<\/ul>\n\n\n\n<p>Read more, here: https:\/\/www.indeed.com\/career-advice\/finding-a-job\/what-is-chief-security-officer<\/p>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Reasons why the Role has \u201cArrived\u201d<\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>According to CSOonline.com, \u201cSecurity is evolving into a critical shared service within most organisations. The new security leader has responsibilities not merely to IT, but to improving [the] operational efficiency of the business, and implementing cost-effective risk management measures.<br><br>Those bottom-line improvements come most easily when companies treat security as a business process, assigning a single individual to the matter of coordinating the various risk-management processes of that organisation.<br><br>Corporate security is more than so many technologies. It involves physical, psychological and legal aspects, such as training, encouraging, enforcing and prosecuting. It involves strategic planning, skilled negotiating and practical problem solving. Only an individual with strong business savvy and security knowledge can oversee security planning, implement policies, and select measures appropriate to business requirements,\u201d their expert, Steve Hunt, advises.<\/p>\n<\/div>\n\n\n\n<p>Source: https:\/\/www.csoonline.com\/article\/2113130\/the-need-for-a-chief-security-officer&#8211;cso&#8211;has-arrived.html<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Did you know\u2026?<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p>Approximately 15 million data records were exposed worldwide through data breaches in the third quarter of last year. This is the word from Statistica, a platform that empowers people with data, who also revealed on their website that the figure had increased by 37 percent from 2022\u2019s second quarter.<br><br>When analysing the past two years, i.e. 2020 to 2022, the highest number of exposed data records was detected in the fourth quarter of 2020, at nearly 125 million data sets \u2013 revealing the progress that the corporate world has made in their security endeavours in the time since.  <br>Source: https:\/\/www.statista.com\/statistics\/1307426\/number-of-data-breaches-worldwide\/<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Your Ideal Qualifications and Years of Experience<\/h2>\n\n\n\n<p>Begin with a Bachelor\u2019s degree in Safety Management or Information Technology (with a systems or security focus). An engineering or business degree is also a good starting point. If you wish to study further, you could complete a Masters in Computer Science or Information Science, but a better bet would be to enter the workplace in an entry-level security position and work your way up to take on the chief information security officer role in due course.<\/p>\n<\/div>\n\n\n\n<p><br>In South Africa, for example, the best universities for an Information Technology degree can be found here: <a href=\"https:\/\/edurank.org\/cs\/information-technology\/za\/\">https:\/\/edurank.org\/cs\/information-technology\/za\/<\/a>. Or, if you would like to study IT or Computer Science at a college, you will need a National Senior Certificate, and at least a 50% aggregate for your Home Language and Mathematics. Find a list of reputable colleges, here: <a href=\"https:\/\/www.careersportal.co.za\/course-info\/colleges-where-you-can-study-it\">https:\/\/www.careersportal.co.za\/course-info\/colleges-where-you-can-study-it<\/a>.<br><\/p>\n\n\n\n<p>Because a chief information security officer is an extremely advanced position, the experts at Indeed advise that you will need to amass extensive time in the physical and cyber security realm to be considered, and have worked as a security manager for three to five years \u2013 both leading a team and collaborating with other executives \u2013 to qualify.<\/p>\n\n\n\n<p>See \u201cAdditional short courses and certifications\u201d, under Fast Facts 2, below.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What you can Expert to Earn<\/h2>\n\n\n\n<p>In the US, the median salary per annum for a chief information security officer is US$131 455 [R2&nbsp;339&nbsp;092], with an estimated additional bonus of US$39 060 [R695 028] per annum. The most likely range in salaries, however, veers from an entry-level US$76 000 [R1 352 333] to a senior US$241 000 [R4 288 320]. <\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.glassdoor.com\/Salaries\/chief-security-officer-salary-SRCH_KO0,22.htm\">https:\/\/www.glassdoor.com\/Salaries\/chief-security-officer-salary-SRCH_KO0,22.htm<\/a><\/p>\n\n\n\n<p>In South Africa, however, the average chief information security officer package is a comparably low R1 555 640 per annum, with an average annual bonus of R145 452. The salary range is R 1 085 420 for an entry-level individual, while a CISO with eight or more years of experience could expect to earn R1 953 757. <\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.salaryexpert.com\/salary\/job\/ciso\/south-africa\">https:\/\/www.salaryexpert.com\/salary\/job\/ciso\/south-africa<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing Attack makes Headlines<\/h2>\n\n\n\n<p><em>Computer Weekly<\/em> reported, in August 2022, of a potentially damaging cyber incident that was fought off valiantly by Cisco systems, the US-based multinational digital communications technology firm, after a threat actor sought to conduct a phishing attack on one of the company\u2019s employees.<br><br>The attacker apparently gained access via a Cisco employee\u2019s personal Google account, because their credentials were saved in the browser. After gaining access, the article continues, the attacker carried out various activities to achieve persistence, cover their tracks, and elevate their privileges within the Cisco network \u2013 thereby compromising a few of its servers and obtaining privileged access to domain controllers.<br><br>Fortunately, \u201cthe incident was contained to the corporate IT environment\u201d and no impact was identified \u201cto any products or services, sensitive customer data or employee information, intellectual property, or supply-chain operations\u201d, a Cisco spokesperson revealed.<br><br>\u201cWe have used [our extensive IT monitoring and remediation capabilities] to implement additional protections, block any unauthorised access attempts, and mitigate the security threat]. We are also putting additional emphasis on employee cyber security hygiene and best practices, to avoid similar instances in the future,\u201d the spokesperson added.<\/p>\n\n\n\n<p>While the consensus among industry experts, such as Immuniweb founder and CEO Illia Kolochenko, was that the firm had been lucky \u2013 she emphasised the importance of security vendors and CISOs alike preparing \u201cfor a continually growing volume and sophistication of cyber attacks\u201d in the future. <br>Read more here: <a href=\"https:\/\/www.computerweekly.com\/news\/252523706\/Cisco-averts-cyber-disaster-after-successful-phishing-attack\">https:\/\/www.computerweekly.com\/news\/252523706\/Cisco-averts-cyber-disaster-after-successful-phishing-attack<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Security Concerns 2023<\/h2>\n\n\n\n<p>For CISOs not entirely sure how to keep the sleepless nights at bay in this challenging field, a Forbes article highlights four trends to keep in mind as the year progresses. They are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>the added threat of security breaches due to remote workers<\/em>: this requires setting the tone on the responsibilities of working from home, so that all employees feel empowered in relation to, and accountable for, their own data security;<\/li>\n\n\n\n<li><em>understanding that AI and machine learning present a double-edged sword<\/em>: while they can filter spam, reject phishing attempts, and prevent a data leak, they can also be used by cyber criminals to gather data, launch an attack, or distribute ransomware. AI must therefore always be employed alongside human comprehension to make it safer and more strategic;<\/li>\n\n\n\n<li><em>employing zero-trust architecture, even if staff members must jump through more hoops to log on<\/em>: it enables greater visibility and control over both users and the overall IT environment. Get your team on board with the decision, by emphasising what you are trying to protect, and from whom; and<\/li>\n\n\n\n<li><em>retain the good staff you have recruited<\/em>: it may sound like a no-brainer, but in an industry where there are more positions going, with excellent salary packages, than any other, the best of the bunch won\u2019t tolerate a toxic environment, unfair overtime, or work that lacks meaning. Your job is therefore to hire for the long-term, by turning every interview into a conversation that seeks out culture fit, personality, and the applicable skills and experience in a potential candidate.<\/li>\n<\/ul>\n\n\n\n<p>Source: <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/10\/28\/four-cybersecurity-trends-every-ciso-needs-to-address\/\">https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/10\/28\/four-cybersecurity-trends-every-ciso-needs-to-address\/<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading\">Fast Fact 1: Reading up a storm<\/h3>\n\n\n\n<p>Here are four books for a chief information security officer to delve into, to keep the brain cells firing after hours:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Clouiter, R. (2015). <em>Becoming A Global Chief Security Executive Officer. A How To Guide for Next Generation Security Leaders <\/em>(UK: Butterworth Heinemann) \u2013 provides tangible, proven, and practical approaches to optimise a security leader&#8217;s ability to lead both today&#8217;s, and tomorrow&#8217;s, multidisciplined security, risk, and privacy function.<\/li>\n\n\n\n<li>McClure, S., Scambray, J. and Kurtz, G. (2012). <em>Hacking Exposed 7 \u2013 Network Security Secrets And Solutions<\/em>. (US: McGraw Hill) \u2013 bolster your system\u2019s security and defeat the tools and tactics of cyber-criminals, with the expert advice and defence strategies provided by these three authors.<\/li>\n\n\n\n<li>Ferraro, P. (2016). <em>Cyber Security. Everything An Executive Needs To Know<\/em>. (US: Philip J. Ferraro LLC) \u2013 helps you understand each of the significant areas of cyber security, while learning exactly what steps you, as a leader, can take to properly prepare your organisation to face today\u2019s constantly evolving threat landscape.<\/li>\n\n\n\n<li>Perlroth, N. (2021)<em> This Is How They Tell Me the World Ends. The Cyber Weapons Arms Race<\/em>. (UK: Bloomsbury Publishing) \u2013 exposes the motivations and misgivings of the people helping governments hack into our devices. Lays bare the stark realities of disinformation, hacking, and software vulnerability that are the Achilles\u2019 heel of modern democracy.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Fast fact 2: Additional short courses and certifications<\/h3>\n\n\n\n<p>Most individuals in the CISO role will invest in additional certifications and\/or licences every now and then, when they feel the need to refresh their knowledge or upskill in certain areas.<br><br>Examples may include the University of Cape Town\u2019s Data Protection and Privacy online short course, which is geared towards driving the design and implementation of data policy in your organisation (sign up here: <a href=\"https:\/\/uct-online.getsmarter.com\/presentations\/lp\/uct-data-protection-and-privacy-online-short-course\/\">https:\/\/uct-online.getsmarter.com\/presentations\/lp\/uct-data-protection-and-privacy-online-short-course\/<\/a>); and the three best certification for CISOs and aspiring CISOs, recommended by TechTarget (click here: <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/answer\/What-CISO-certifications-are-the-most-important-to-have\">https:\/\/www.techtarget.com\/searchsecurity\/answer\/What-CISO-certifications-are-the-most-important-to-have<\/a>), which are the:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Certified Information Systems Security Professional (CISSP);<\/li>\n\n\n\n<li>Certified Chief Information Security Officer (CCISO); and<\/li>\n\n\n\n<li>Certified Information Security Manager (CISM).<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Fast fact 3: International conferences<\/h3>\n\n\n\n<p>A useful list of upcoming security conferences appears on CSO US, making it easy for busy individuals to select the events that will have most impact for them, or are closest by to reduce travel time. As the CSO editor enthuses, \u201cThere is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don\u2019t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by an industry expert.\u201d<br><br>Check out the full list of conferences and events, here: <a href=\"https:\/\/www.csoonline.com\/article\/3155500\/the-cso-guide-to-top-security-conferences.html\">https:\/\/www.csoonline.com\/article\/3155500\/the-cso-guide-to-top-security-conferences.html<br><br><\/a>For those lucky enough to receive an invite to attend the next Global Cyber Innovation Summit (GCIS), it will take place from 10-11 April 2024 at the Sagamore Pendry Hotel, Baltimore, Maryland, US. Bob Ackerman, chairman of the GCIS forum, describes the event as: \u201cUnlike any other in the cybersecurity realm, convening thought leaders from Fortune 100 CISOs, cybersecurity <a rel=\"noreferrer noopener\" href=\"https:\/\/www.executiveplacements.com\/blog\/so-you-want-to-be-a-ceo\/\" target=\"_blank\">CEOs<\/a>, policy makers, cyber investors and the intelligence community in a trusted, non-commercial setting. GCIS raises the level of dialogue and facilitates collaboration on how we, as a community, can attempt to meet the challenges of the rapidly evolving threat landscape and move the future of cyber innovation forward in actionable ways.\u201d&nbsp;<\/p>\n\n\n\n<p>Find out more, here: <a href=\"https:\/\/www.businesswire.com\/news\/home\/20230331005327\/en\/The-Global-Cyber-Innovation-Summit-the-CISO-Invitation-only-Event-Returns-in-2023-to-Set-the-Global-Agenda-for-Cybersecurity\">https:\/\/www.businesswire.com\/news\/home\/20230331005327\/en\/The-Global-Cyber-Innovation-Summit-the-CISO-Invitation-only-Event-Returns-in-2023-to-Set-the-Global-Agenda-for-Cybersecurity<\/a><\/p>\n\n\n\n<p>\u2022 Exchange rates are correct at the time of publication.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Further Reading<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.executiveplacements.com\/blog\/creating-value-in-the-cfo-role\/\">Creating Value in the CFO Role<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.executiveplacements.com\/blog\/landing-an-executive-job\/\">Landing an executive job<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.executiveplacements.com\/blog\/what-does-a-clo-do\/\">What does a CLO do?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.executiveplacements.com\/blog\/becoming-a-coo-how-to-set-the-operational-direction\/\">Becoming a COO \u2013 how to set the operational direction<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Sources<\/h5>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.betterteam.com\/chief-security-officer-cso-job-description#:~:text=Chief%20security%20officers%20(CSO)%20are,and%20all%20records%20of%20information\">https:\/\/www.betterteam.com\/chief-security-officer-cso-job-description#:~:text=Chief%20security%20officers%20(CSO)%20are,and%20all%20records%20of%20information<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.indeed.com\/career-advice\/finding-a-job\/what-is-chief-security-officer\">https:\/\/www.indeed.com\/career-advice\/finding-a-job\/what-is-chief-security-officer<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.csoonline.com\/article\/2113130\/the-need-for-a-chief-security-officer--cso--has-arrived.html\">https:\/\/www.csoonline.com\/article\/2113130\/the-need-for-a-chief-security-officer&#8211;cso&#8211;has-arrived.html<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.statista.com\/statistics\/1307426\/number-of-data-breaches-worldwide\/\">https:\/\/www.statista.com\/statistics\/1307426\/number-of-data-breaches-worldwide\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/adapt.com.au\/resources\/articles\/security\/why-businesses-now-need-a-chief-security-officer-cso\">https:\/\/adapt.com.au\/resources\/articles\/security\/why-businesses-now-need-a-chief-security-officer-cso<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/manicaa.com\/catalog\/product\/view\/id\/3792213\/s\/becoming-a-global-chief-security-executive-officer-a-how-to-guide-for-next-generation-security-leaders\/\">https:\/\/manicaa.com\/catalog\/product\/view\/id\/3792213\/s\/becoming-a-global-chief-security-executive-officer-a-how-to-guide-for-next-generation-security-leaders\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.amazon.com\/Hacking-Exposed-Network-Security-Solutions\/\">https:\/\/www.amazon.com\/Hacking-Exposed-Network-Security-Solutions\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.amazon.com\/Cyber-Security-Everything-Executive-Needs\/dp\/1988071208\">https:\/\/www.amazon.com\/Cyber-Security-Everything-Executive-Needs\/dp\/1988071208<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.amazon.com\/This-They-Tell-World-Ends\/dp\/1635576059\">https:\/\/www.amazon.com\/This-They-Tell-World-Ends\/dp\/1635576059<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/edurank.org\/cs\/information-technology\/za\/\">https:\/\/edurank.org\/cs\/information-technology\/za\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.careersportal.co.za\/course-info\/colleges-where-you-can-study-it\">https:\/\/www.careersportal.co.za\/course-info\/colleges-where-you-can-study-it<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.glassdoor.com\/Salaries\/chief-security-officer-salary-SRCH_KO0,22.htm\">https:\/\/www.glassdoor.com\/Salaries\/chief-security-officer-salary-SRCH_KO0,22.htm<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.salaryexpert.com\/salary\/job\/ciso\/south-africa\">https:\/\/www.salaryexpert.com\/salary\/job\/ciso\/south-africa<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uct-online.getsmarter.com\/presentations\/lp\/uct-data-protection-and-privacy-online-short-course\/\">https:\/\/uct-online.getsmarter.com\/presentations\/lp\/uct-data-protection-and-privacy-online-short-course\/<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/answer\/What-CISO-certifications-are-the-most-important-to-have\">https:\/\/www.techtarget.com\/searchsecurity\/answer\/What-CISO-certifications-are-the-most-important-to-have<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.csoonline.com\/article\/3155500\/the-cso-guide-to-top-security-conferences.html\">https:\/\/www.csoonline.com\/article\/3155500\/the-cso-guide-to-top-security-conferences.html<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.computerweekly.com\/news\/252523706\/Cisco-averts-cyber-disaster-after-successful-phishing-attack\">https:\/\/www.computerweekly.com\/news\/252523706\/Cisco-averts-cyber-disaster-after-successful-phishing-attack<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.businesswire.com\/news\/home\/20230331005327\/en\/The-Global-Cyber-Innovation-Summit-the-CISO-Invitation-only-Event-Returns-in-2023-to-Set-the-Global-Agenda-for-Cybersecurity\">https:\/\/www.businesswire.com\/news\/home\/20230331005327\/en\/The-Global-Cyber-Innovation-Summit-the-CISO-Invitation-only-Event-Returns-in-2023-to-Set-the-Global-Agenda-for-Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/10\/28\/four-cybersecurity-trends-every-ciso-needs-to-address\/\">https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/10\/28\/four-cybersecurity-trends-every-ciso-needs-to-address\/<\/a><\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If your calling is that of chief information security officer (CISO), you will be responsible for taking charge of all the security endeavours of your organisation. The role is incredibly diverse, as it extends from overseeing the security of staff members, to that of company assets \u2013 such as its MX Lookup and subnet calculator [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":513,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-507","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-executive-jobs"],"_links":{"self":[{"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/posts\/507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/comments?post=507"}],"version-history":[{"count":9,"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/posts\/507\/revisions"}],"predecessor-version":[{"id":588,"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/posts\/507\/revisions\/588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/media\/513"}],"wp:attachment":[{"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/media?parent=507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/categories?post=507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.executiveplacements.com\/blog\/wp-json\/wp\/v2\/tags?post=507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}