{"id":57574,"date":"2025-05-20T13:03:09","date_gmt":"2025-05-20T17:03:09","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=57574"},"modified":"2025-10-15T15:44:53","modified_gmt":"2025-10-15T19:44:53","slug":"get-cybersecurity-right-with-the-right-team-of-experts_cyber","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/get-cybersecurity-right-with-the-right-team-of-experts_cyber\/","title":{"rendered":"Get Cybersecurity Right with the Right Team of Experts"},"content":{"rendered":"<h2 style=\"font-weight: 400; text-align: center;\">Discover how our cybersecurity team tackles complex challenges by prioritizing communication and collaboration. Their role-based expertise provides insight and support into every area of cybersecurity \u2013 even the ones you may not realize you needed.<\/h2>\n<hr \/>\n<h2 style=\"font-weight: 400;\">In brief:<\/h2>\n<p style=\"font-weight: 400;\"><strong>The takeaway:<\/strong> Centric Consulting\u2019s cybersecurity team has the right expertise and the right approach to solve your toughest cybersecurity challenges.<\/p>\n<p style=\"font-weight: 400;\"><strong>Like, what kind of challenges?:<\/strong> With today\u2019s ever-evolving cybersecurity threats and regulatory landscapes, you\u2019re pressured to meet cybersecurity compliance deadlines or react quickly to emerging threats, but you may not have a chief information security officer (CISO) or employees with the right skills to do the work.<\/p>\n<p style=\"font-weight: 400;\"><strong>Finding those people can\u2019t be that hard, right?:<\/strong> There\u2019s no shortage of companies offering cybersecurity services. The larger ones come with lots of bodies and a high price tag. Smaller firms offer cookie-cutter solutions that don\u2019t meet your needs.<\/p>\n<p style=\"font-weight: 400;\"><strong>Give it to me straight!:<\/strong> Centric Consulting Cybersecurity Senior Manager and Technical Lead Mike Hamilton says, \u201cI have a lot of clients who have been sold some snake-oil solution guaranteed to stop 100 percent of all breaches. We see this all the time. The marketing in this field is criminal.\u201d<\/p>\n<p style=\"font-weight: 400;\"><strong>OK, so now what?:<\/strong> Read this blog to learn how Hamilton and three of his colleagues \u2014 Jamie Rucker, Matt Kipp and Shane O\u2019Donnell \u2014 work collaboratively to be the right cybersecurity team with the right solutions for your most valuable digital assets.<\/p>\n<hr \/>\n<h2 style=\"font-weight: 400;\">We Start With Conversations, Not Assumptions<\/h2>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-57647\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie-300x300.png\" alt=\"Centric Consulting Jamie Rucker for the Right Team\" width=\"300\" height=\"300\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie-300x300.png 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie-150x150.png 150w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie-768x768.png 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie-600x600.png 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie-415x415.png 415w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie-350x350.png 350w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie-750x750.png 750w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Jamie.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>&#8220;The first step is understanding the organization&#8217;s regulatory landscape and stakeholder needs,&#8221; said <a href=\"https:\/\/centricconsulting.com\/team\/jamie-rucker\/\">Jamie Rucker<\/a>, senior manager and <a href=\"https:\/\/centricconsulting.com\/technology-solutions\/cybersecurity-consulting-services\/governance-risk-and-compliance-services\/\">governance, risk management and capability<\/a> (GRC) lead. &#8220;We meet with key personnel across departments to build consensus about what security means for their specific organization.&#8221;<\/p>\n<p style=\"font-weight: 400;\"><strong>In Rucker\u2019s view, a <a href=\"https:\/\/centricconsulting.com\/blog\/a-modern-approach-to-cybersecurity-in-the-workplace_cyber\/\">successful cybersecurity project<\/a> starts with a conversation \u2014 or dozens of them \u2014 not assumptions.<\/strong><\/p>\n<p style=\"font-weight: 400;\">\u201cIn a recent Centric engagement, I was blessed to have the person I was working with say, \u2018You need to talk to these 30 stakeholders and get an understanding of the perception of our risk team,\u201d he recalled. \u201cThat&#8217;s how I would prefer every single engagement to happen. Invite us in so we can get a good understanding of what\u2019s going on in the organization.\u201d<\/p>\n<p style=\"font-weight: 400;\">Rucker, a former senior program manager for security GRC at Salesforce and director of compliance management information systems at Navient, uses those interviews to build a framework for the assessment. He has experience with HIPAA, PCI DSS, GDPR and other leading <a href=\"https:\/\/centricconsulting.com\/blog\/understand-and-comply-with-cybersecurity-standards_cyber\/\">security frameworks<\/a>. Decision points include:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Which systems contain sensitive data<\/li>\n<li style=\"font-weight: 400;\">How leaders currently make security decisions<\/li>\n<li style=\"font-weight: 400;\">How the organization defines and measures risk<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><a id=\"MattKipp\"><\/a>With the framework identified, Rucker uses his expertise in issues management, regulatory and compliance training, and policy management to help determine his client\u2019s GRC vision and develop their <a href=\"https:\/\/centricconsulting.com\/blog\/5-steps-to-building-an-it-roadmap_nbp\/\">strategic roadmaps<\/a>.<\/p>\n<p style=\"font-weight: 400;\">\u201cWithout understanding what matters most to the business, even the most technically sound security analysis can miss the mark,\u201d Rucker added.<\/p>\n<h2 style=\"font-weight: 400;\">We Cut Through the Jargon<\/h2>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-57645\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt-300x300.png\" alt=\"Centric Consulting Matt Kipp is the Right Team\" width=\"300\" height=\"300\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt-300x300.png 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt-150x150.png 150w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt-768x768.png 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt-600x600.png 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt-415x415.png 415w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt-350x350.png 350w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt-750x750.png 750w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Matt.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>With the framework, vision and roadmaps in place, Director of IT Risk and Cybersecurity <a href=\"https:\/\/centricconsulting.com\/team\/matt-kipp-2\/\">Matt Kipp<\/a> \u2014 who is also an identity access management (IAM) and security frameworks expert \u2014 can then evaluate the organization&#8217;s existing security structure against industry standards.<\/p>\n<p style=\"font-weight: 400;\">&#8220;My role is to boil things down to what makes sense in the real world,&#8221; Kipp explained. &#8220;Many organizations get overwhelmed by security frameworks because they seem abstract. I make them practical and implementable.&#8221;<\/p>\n<p style=\"font-weight: 400;\">Kipp\u2019s ability to simplify comes from his deep understanding of modern security challenges, built over his 20 years of risk-control experience. <strong>Those decades included serving as lead analyst for SAP GRC for General Motors, which gave him even deeper insight into enterprise-level security requirements.<\/strong><\/p>\n<p style=\"font-weight: 400;\">In his IAM role at Centric, Kipp:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Conducts gap analyses between current practices and required controls<\/li>\n<li style=\"font-weight: 400;\">Ensures control framework alignment to ISO, NIST, PCI, and CMMC standards<\/li>\n<li style=\"font-weight: 400;\">Maps critical data and processes<\/li>\n<li style=\"font-weight: 400;\">Performs IAM reviews and process updates<\/li>\n<li style=\"font-weight: 400;\">Tests internal controls against Sarbanes-Oxley and Information Technology General Controls standards<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">\u201cThere\u2019s a lot of jargon, abbreviations and acronyms in the security field,\u201d Kipp said. \u201cMy goal is to help clients understand what we are testing for and then present our recommendations in clear, understandable terms.\u201d<\/p>\n<p style=\"font-weight: 400;\">Rather than overwhelming clients with security jargon, he presents findings in clear, understandable terms with realistic expectations.<\/p>\n<h2 style=\"font-weight: 400;\">We Put Security to the Test with Penetration Testing<\/h2>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-57648\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1-300x300.png\" alt=\"Centric Consulting Mike Hamilton is the Right Team\" width=\"300\" height=\"300\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1-300x300.png 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1-150x150.png 150w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1-768x768.png 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1-600x600.png 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1-415x415.png 415w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1-350x350.png 350w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1-750x750.png 750w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Mike-1.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>While Rucker and Kipp focus on frameworks and governance, Mike Hamilton puts his clients\u2019 systems to the test. Centric\u2019s senior manager and technical lead for <a href=\"https:\/\/centricconsulting.com\/blog\/securing-your-business-with-penetration-testing\/\">pen testing<\/a>, Hamilton brings a criminal justice background and mindset to identifying and exploiting vulnerabilities in clients\u2019 networks to show where the weaknesses lie.<\/p>\n<p style=\"font-weight: 400;\"><strong>&#8220;Most companies focus on flashy, advanced threats while neglecting the basics,&#8221; Mike notes. &#8220;Our job is to show them how attackers actually get in, which is usually through simple vulnerabilities and human error.&#8221;<\/strong><\/p>\n<p style=\"font-weight: 400;\">In addition to pen testing, Hamilton\u2019s technical expertise includes:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Network and system reconnaissance, scanning, and enumeration<\/li>\n<li style=\"font-weight: 400;\">Social engineering (manipulating employees to gain access)<\/li>\n<li style=\"font-weight: 400;\">Vendor solution validation (testing if security products deliver on their promises)<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">He uses both manual and automated techniques to thoroughly test client systems, networks, web applications, and infrastructure components. Regarding AI, Hamilton pointed out that its relationship with cybersecurity is complicated.<\/p>\n<p style=\"font-weight: 400;\">\u201c<a href=\"https:\/\/centricconsulting.com\/blog\/3-ai-and-cybersecurity-conversations-business-leaders-arent-having\/\">AI is everywhere<\/a> now \u2014 in our phones, in apps, in every Google search,\u201d he said. \u201cAs security experts, we do see how we can use it for offensive security and penetration, and it can automate many tasks.<\/p>\n<p style=\"font-weight: 400;\"><strong>\u201cHowever,\u201d he continued, \u201cwe also see AI as a huge attack surface and something that bad actors can abuse and manipulate. A hands-on keyboard threat actor probably needs to be dealt with by hands-on keyboard smart defenders who know how to use AI.&#8221;<\/strong><\/p>\n<p style=\"font-weight: 400;\">Besides, many attacks don\u2019t involve much technology at all. That\u2019s where Hamilton\u2019s experience as a correction officer comes into play.<\/p>\n<p style=\"font-weight: 400;\">\u201cWe\u2019ve successfully gained unauthorized access to secure facilities, including bank vaults and server rooms, by posing as repair personnel or using other social engineering tactics,\u201d he said. &#8220;Companies often have a false sense of security from expensive alarm systems, for example, which they haven&#8217;t properly tested. We kick the tires on those products to see if they actually do what they claim.&#8221;<\/p>\n<h2 style=\"font-weight: 400;\">Seek a Cybersecurity Partner Who Values Results, Not Checklists<\/h2>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-57646\" src=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane-300x300.png\" alt=\"Centric Consulting Shane O'Donnell is part of the Right Team\" width=\"300\" height=\"300\" srcset=\"https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane-300x300.png 300w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane-150x150.png 150w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane-768x768.png 768w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane-600x600.png 600w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane-415x415.png 415w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane-350x350.png 350w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane-750x750.png 750w, https:\/\/centricconsulting.com\/wp-content\/uploads\/2025\/05\/The-Right-Team_Trading-Cards_Cyber_Shane.png 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>As vice president of Cybersecurity Consulting Services, <a href=\"https:\/\/centricconsulting.com\/team\/shane-odonnell-2\/\">Shane O&#8217;Donnell<\/a> brings nearly 20 years of experience in GRC to coordinate the work of cybersecurity experts like Rucker, Kipp and Hamilton. His goal: to translate the team&#8217;s findings into actionable business decisions.<\/p>\n<p style=\"font-weight: 400;\">&#8220;Our clients need cybersecurity that balances protection with practicality,&#8221; O&#8217;Donnell said. &#8220;We&#8217;re that middle ground between the big firms that charge premium rates and the budget providers that just throw bodies with cookie-cutter solutions at the problem.&#8221;<\/p>\n<p style=\"font-weight: 400;\">Through his leadership, O&#8217;Donnell ensures that:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Assessment findings align with business objectives<\/li>\n<li style=\"font-weight: 400;\">Recommendations are prioritized based on risk and feasibility<\/li>\n<li style=\"font-weight: 400;\">Clients receive a clear, jargon-free report that they can act upon<\/li>\n<li style=\"font-weight: 400;\">The assessment provides genuine value rather than checkbox compliance<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">O&#8217;Donnell&#8217;s background makes him especially suited for this leadership role. With extensive experience growing and mentoring high-performing technical teams, he understands both the technical and human aspects of cybersecurity challenges. <strong>However, he says Centric&#8217;s unique culture and approach to teamwork help the cybersecurity team achieve these objectives.<\/strong><\/p>\n<p style=\"font-weight: 400;\">&#8220;At previous places I&#8217;ve worked, the employees competed against their peers,&#8221; he said. &#8220;They were told, explicitly and implicitly, &#8216;You&#8217;re being measured against the person sitting next to you,&#8217; and the metric often came down to speed. That doesn&#8217;t lead to the right team environment.<\/p>\n<p style=\"font-weight: 400;\">&#8220;When you&#8217;re looking for the right team,&#8221; O&#8217;Donnell concludes, &#8220;you need to find a place where everyone can succeed, not a place where people are judged on how quickly they appear to wrap up projects or the number of hours they log. Our focus on outcomes creates a healthier, more sustainable approach that leads to more secure systems for our clients.&#8221;<\/p>\n<p style=\"font-weight: 400;\">\n        <div class=\"inline-cta dark blue\">\n            <div class=\"inline-cta--content\">\n                User access management isn\u2019t a one-and-done step within your organization. We look at the dangers of user access complacency and how you can combat it.\n            <\/div>\n            <div class=\"inline-cta--button\">\n                <a\n                    class=\"button\"\n                    href=\"https:\/\/centricconsulting.com\/resources\/cybersecurity-is-not-a-device-effective-approaches-to-managing-cyber-risk\/\"\n                    target=\"_blank\"\n                    >\n\n                    Get the White Paper\n                <\/a>\n            <\/div>\n        <\/div>\n<div>\n<div>\n<p class=\"paragraph\" style=\"text-align: center;\"><em><span class=\"normaltextrun\">Do you need to bridge your <a href=\"https:\/\/centricconsulting.com\/technology-solutions\/cybersecurity-consulting-services\/\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> talent gap right now? Find out how we\u2019ll build the right team to deliver the scalable, on-demand expertise you need to future-proof your cybersecurity model.<\/span><\/em><\/p>\n<\/div>\n<\/div>\n<p style=\"text-align: center;\"><a class=\"button-text\" href=\"https:\/\/centricconsulting.com\/contact\/\">Let\u2019s talk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover how our cybersecurity experts tackles complex challenges by prioritizing communication and collaboration.<\/p>\n","protected":false},"author":258,"featured_media":57643,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[23785],"coauthors":[15855],"class_list":["post-57574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cybersecurity","resource-categories-blogs","orbitmedia_post_topic-cybersecurity"],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2025-12-05 07:11:54","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/57574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/258"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=57574"}],"version-history":[{"count":19,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/57574\/revisions"}],"predecessor-version":[{"id":59768,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/57574\/revisions\/59768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/57643"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=57574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=57574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=57574"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=57574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}