{"id":60079,"date":"2025-11-12T07:18:03","date_gmt":"2025-11-12T12:18:03","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=60079"},"modified":"2025-11-11T15:21:57","modified_gmt":"2025-11-11T20:21:57","slug":"1-9-million-paradox-will-ai-save-or-cost-you-in-data-breach-costs_cyber","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/1-9-million-paradox-will-ai-save-or-cost-you-in-data-breach-costs_cyber\/","title":{"rendered":"The $1.9 Million Paradox: Will AI Save or Cost You Millions in Data Breach Costs?"},"content":{"rendered":"<h2 style=\"font-weight: 400; text-align: center;\">This blog post explores the dual nature of AI in cybersecurity, revealing how organizations with proper AI governance can save in data breach costs. We\u2019ll provide a practical road map for implementing AI security governance and highlight the most effective strategies for mitigating data breach costs.<\/h2>\n<hr \/>\n<h2 style=\"font-weight: 400;\">In brief:<\/h2>\n<ul>\n<li style=\"font-weight: 400;\">Organizations with mature AI security governance save an average of $1.9 million in data breach costs per incident, while those with unmanaged \u201cshadow AI\u201d face an extra $670,000 in damages.<\/li>\n<li style=\"font-weight: 400;\">Shadow AI dramatically increases breach costs by creating unmanaged attack surfaces that bypass established security controls.<\/li>\n<li style=\"font-weight: 400;\">Most companies lack formal AI policies, regular audits, and proper access controls, leading to higher risk and more expensive breaches.<\/li>\n<li style=\"font-weight: 400;\">Poor AI governance drives up data breach costs, with lost business accounting for nearly a third of the average breach expense.<\/li>\n<li style=\"font-weight: 400;\">Effective AI adoption requires embedding it into existing risk management frameworks and fostering a culture of transparency to minimize regulatory and financial liabilities.<\/li>\n<\/ul>\n<hr \/>\n<p style=\"font-weight: 400;\">Artificial intelligence (AI) is reshaping the economics of cybersecurity \u2014 for better and for worse. According to IBM\u2019s \u201c<a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">Cost of a Data Breach Report 2025<\/a>,\u201d organizations with mature AI security programs save an average of $1.9 million per breach, while those struggling with unmanaged shadow AI incur an additional $670,000 in damages.<\/p>\n<p style=\"font-weight: 400;\">This $1.9 million paradox highlights a critical truth: AI can be a force multiplier for your defenses, or it can open costly gaps when governance lags behind adoption. Many enterprises today face this very tension. <strong>Business units are eager to test AI-powered tools for productivity, but too often, they do so outside sanctioned frameworks, leaving chief security information officers (CISOs) and compliance leaders to play catch-up.<\/strong><\/p>\n<p style=\"font-weight: 400;\">\u201cThe most significant governance failure I see is treating AI adoption as a siloed technology project rather than a core business transformation,\u201d says <a href=\"https:\/\/centricconsulting.com\/team\/shane-odonnell-2\/\">Shane O\u2019Donnell<\/a>, vice president at Centric Consulting.<\/p>\n<p style=\"font-weight: 400;\">AI isn\u2019t neutral in <a href=\"https:\/\/centricconsulting.com\/blog\/a-leaders-guide-to-cybersecurity-cost-optimization\/\">cybersecurity<\/a>. Whether it reduces breach costs dramatically or amplifies them depends on your company\u2019s <a href=\"https:\/\/centricconsulting.com\/blog\/ai-adoption-how-to-navigate-and-establish-ai-governance-security-and-ethics\/\">AI governance<\/a>.<\/p>\n<h2 style=\"font-weight: 400;\">The Current State of AI Security Governance<\/h2>\n<p style=\"font-weight: 400;\">\u201cShadow AI is a significant amplifier of breach cost because it creates a massive, unmanaged attack surface that bypasses established security controls,\u201d O\u2019Donnell warns.<\/p>\n<p style=\"font-weight: 400;\">As adoption accelerates, governance often lags, leaving behind dangerous blind spots. In fact, according to IBM\u2019s \u201c<a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">Cost of a Data Breach Report 2025<\/a>,\u201d 63 percent of organizations currently lack formal AI policies, only 34 percent conduct regular audits for unauthorized AI use, and a staggering 97 percent of AI-related breaches are linked to poor access controls.<\/p>\n<p style=\"font-weight: 400;\"><strong>AI is often approached as a series of siloed technology experiments rather than as part of a broader business transformation.<\/strong> So, instead of embedding AI into existing frameworks such as information technology (IT) risk management, data classification, or <a href=\"https:\/\/centricconsulting.com\/news-and-events\/cybersecurity-expert-discusses-third-party-risk-management-in-crains-cleveland-business\/\">vendor due diligence<\/a>, many organizations create one-off rules and exceptions that are neither scalable nor secure.<\/p>\n<p style=\"font-weight: 400;\">Culture compounds this risk. A zero-tolerance \u201cban\u201d on unapproved AI tools often forces employees to find workarounds. That internal workaround behavior erodes visibility: IT and security teams lose track of how data flows and how models are used. In regulated sectors, that gap morphs into compliance liability.<\/p>\n<p style=\"font-weight: 400;\">However, without policies aligned to existing frameworks and a culture that encourages transparency, enterprises increase both their breach costs and their regulatory liability.<\/p>\n<h2 style=\"font-weight: 400;\">How Poor AI Governance Drives Up Data Breach Costs<\/h2>\n<p style=\"font-weight: 400;\">When AI governance is weak, costs quickly escalate. The average cost of a data breach reached $4.44 million in 2025, with nearly a third of that tied directly to <a href=\"https:\/\/hbr.org\/2023\/05\/the-devastating-business-impacts-of-a-cyber-breach\">lost business costs<\/a>, including customer churn, reputational damage, and the expenses of acquiring new customers to replace those who leave. <strong>This $1.38 million \u201clost business\u201d component makes breaches not only a technical problem, but also a board-level business continuity issue.<\/strong><\/p>\n<p style=\"font-weight: 400;\">The financial burden is even higher in regulated industries. In healthcare, breaches now average $7.42 million, while in financial services the figure sits at $5.56 million. For organizations operating in these industries, poor governance around AI adoption amplifies risk by introducing unmonitored tools and unmanaged data flows \u2014 the exact conditions that make compliance violations and extended downtime more likely.<\/p>\n<p style=\"font-weight: 400;\">In fact, IBM found that in the U.S., breach <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">costs have risen from 2024 to 2025<\/a>, highlighting the protracted financial burden that poor governance and inadequate response strategies can inflict. These long-tail costs include:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Regulatory fines and legal fees<\/li>\n<li style=\"font-weight: 400;\">Ongoing operational disruptions<\/li>\n<li style=\"font-weight: 400;\">Reputational damage and customer churn<\/li>\n<li style=\"font-weight: 400;\">Increased cyber insurance premiums<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong>Shadow AI compounds the problem.<\/strong><\/p>\n<p style=\"font-weight: 400;\">\u201cWhen shadow AI is involved, breach costs can increase by over $600,000,\u201d O\u2019Donnell says. \u201cSecurity teams are blind to these unsanctioned tools, so when an incident occurs, they waste critical time trying to identify the source and scope of a compromise that occurred outside their monitored environment.\u201d<\/p>\n<p style=\"font-weight: 400;\">The cost of a data breach doesn\u2019t end when the breach is contained. In sectors like healthcare, nearly a quarter of damages may accumulate years later. Effective AI governance is essential to limit long-term financial and reputational fallout.<\/p>\n<h2 style=\"font-weight: 400;\">Your AI Security Action Plan<\/h2>\n<p style=\"font-weight: 400;\">AI can deliver significant defensive value \u2014 but only if the governance is strong. Speed and control make the difference.<\/p>\n<p style=\"font-weight: 400;\">Recently, <a href=\"https:\/\/centricconsulting.com\/client-stories\/implementing-ai-governance-for-a-property-and-casualty-insurer_ai\/\" target=\"_blank\" rel=\"noopener\">we helped a leading property and casualty insurer<\/a> design and deploy an AI governance framework that struck the right balance between risk management and agility. The framework gave the client the clarity and guardrails needed to adopt AI responsibly, ensuring sensitive customer data remained protected while still supporting business innovation.<\/p>\n<p style=\"font-weight: 400;\">Yet the flip side is stark. Malicious actors now use generative AI to escalate phishing sophistication, create targeted malware, and accelerate reconnaissance. <strong>Internally, poorly configured AI tools can overwhelm analysts with false positives, misdirect efforts, or escape visibility when not tied to response workflows.<\/strong><\/p>\n<p style=\"font-weight: 400;\">That\u2019s why organizations need a deliberate, phased action plan:<\/p>\n<h3 style=\"font-weight: 400;\">Immediate Actions (30\u201360 Days)<\/h3>\n<p style=\"font-weight: 400;\">The first step is gaining visibility and control. Organizations often underestimate the extent to which unsanctioned AI is already in use across their departments. Employees may be pasting source code into public large language models (LLMs) or using consumer-grade AI apps to process sensitive client data.<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Discover Shadow AI:<\/strong> Use <a href=\"https:\/\/www.cisco.com\/site\/us\/en\/learn\/topics\/security\/what-is-secure-access-service-edge-sase.html\" target=\"_blank\" rel=\"noopener\">Secure Access Service Edge<\/a> (SASE) or <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-a-cloud-access-security-broker-casb\" target=\"_blank\" rel=\"noopener\">Cloud Access Security Broke<\/a>r (CASB) tools to inspect traffic and identify connections to AI services. This gives security teams the visibility they need to understand the scope of unmonitored AI use.<\/li>\n<li style=\"font-weight: 400;\"><strong>Define Acceptable Use:<\/strong> Update your acceptable use policies to explicitly cover AI tools. Categorize them as \u201capproved,\u201d \u201cprohibited,\u201d or \u201capproved with limitations.\u201d This provides guardrails for employees and sets a foundation for enforcement.<\/li>\n<li style=\"font-weight: 400;\"><strong>Secure Access:<\/strong> Apply <a href=\"https:\/\/centricconsulting.com\/blog\/the-role-of-identity-access-management-in-cybersecurity_cyber\/\">least-privilege principles<\/a> immediately, even in the short term. Limit who can train, query, or modify AI models. Most breaches stem from poor access controls, and this is one of the fastest ways to reduce risk.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">By addressing these three steps within the first two months, leaders establish a baseline of visibility and accountability, which is critical for preventing shadow AI from silently expanding the organization\u2019s attack surface.<\/p>\n<h3 style=\"font-weight: 400;\">Medium-Term Strategy (3\u20136 Months)<\/h3>\n<p style=\"font-weight: 400;\">Once visibility and basic controls are in place, your focus should shift to strengthening the enterprise security posture. At this stage, the goal is to reduce investigation time, accelerate containment and embed AI into core IT processes.<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Integrate AI Into DevSecOps:<\/strong> Embedding security earlier in the software development life cycle helps identify and remediate flaws when they are cheapest to fix. This shift-left approach reduces the number of exploitable vulnerabilities in production. AI tools should be tested and governed just like any other code or service in the pipeline.<\/li>\n<li style=\"font-weight: 400;\"><strong>Optimize Your SIEM:<\/strong> Many breaches become more costly simply because logs are siloed and incomplete. A well-tuned <a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/security-information-and-event-management-siem\" target=\"_blank\" rel=\"noopener\">security information and event management<\/a> (SIEM) platform or data lake that consolidates AI activity logs alongside other system data helps analysts quickly correlate incidents and reduces wasted time during investigations.<\/li>\n<li style=\"font-weight: 400;\"><strong>Train Your Teams:<\/strong> Governance is primarily a cultural shift. Employees should understand both the risks of shadow AI and the benefits of sanctioned tools. Training at this stage should also focus on security teams, ensuring they know how to baseline, tune and integrate AI tools effectively to avoid \u201cgarbage in, garbage out\u201d scenarios.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">By the six-month mark, organizations should be positioned to respond to AI-related incidents faster and with more confidence, while enabling employees to use approved tools productively.<\/p>\n<h3 style=\"font-weight: 400;\">Long-Term Governance (6\u201312 Months)<\/h3>\n<p style=\"font-weight: 400;\">In the longer term, your priority becomes embedding governance frameworks and preparing for emerging risks. AI is not static. Its models evolve, attackers adapt and regulations shift and sometimes tighten. Long-term governance ensures organizations remain resilient.<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Build a Comprehensive Governance Framework:<\/strong> Align with <a href=\"https:\/\/centricconsulting.com\/blog\/understand-and-comply-with-cybersecurity-standards_cyber\/\">cybersecurity standards<\/a> such as the <a href=\"https:\/\/www.nist.gov\/itl\/ai-risk-management-framework\" target=\"_blank\" rel=\"noopener\">NIST AI Risk Management Framework<\/a> or <a href=\"https:\/\/www.iso.org\/sectors\/it-technologies\/ai\" target=\"_blank\" rel=\"noopener\">ISO\/IEC AI standard<\/a>s. These frameworks help establish consistent oversight across people, processes and technology.<\/li>\n<li style=\"font-weight: 400;\"><strong>Automate Threat Hunting With AI:<\/strong> Advanced AI models can proactively surface anomalies across endpoints, cloud platforms and networks, identifying patterns that humans would miss. This reduces dwell time and minimizes long-tail breach costs.<\/li>\n<li style=\"font-weight: 400;\"><strong>Prepare for Quantum-Era Threats:<\/strong> While still emerging, quantum computing poses significant risks to today\u2019s cryptography. Forward-looking organizations should begin evaluating cryptographic agility and data protection strategies now to avoid future disruption.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">By the one-year mark, organizations that follow this road map will not only reduce their current breach exposure but also position themselves for sustainable compliance, resilience and innovation.<\/p>\n<p style=\"font-weight: 400;\">Governance maturity doesn\u2019t happen overnight, but every step builds resilience. <strong>Quick wins like shadow AI discovery and access control set the foundation. Medium-term strategies strengthen integration and response.<\/strong> <strong>And long-term governance embeds AI into the enterprise\u2019s risk management fabric.<\/strong> The payoff: millions saved in breach costs and the confidence to innovate with AI securely.<\/p>\n<p style=\"font-weight: 400;\">Like any business transformation, success depends on measurement. The next step is to define the key performance indicators (KPIs) and return on investment (ROI) metrics that will demonstrate governance maturity and prove the financial impact of your AI security strategy.<\/p>\n<h2 style=\"font-weight: 400;\">AI Governance KPIs: Measuring ROI and Compliance<\/h2>\n<p style=\"font-weight: 400;\">Implementing AI governance is only half the battle. Proving its value is what secures long-term support from executives and the board. That requires tracking metrics that clearly demonstrate reduced risk, improved efficiency, and faster innovation.<\/p>\n<p style=\"font-weight: 400;\">The most meaningful measures focus on both security outcomes and business impact:<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Detection and Response Speed:<\/strong> Improvements in mean time to detect (MTTD) and mean time to contain (MTTC) show how quickly your teams can identify and neutralize threats.<\/li>\n<li style=\"font-weight: 400;\"><strong>Visibility Into Shadow AI:<\/strong> Tracking the ratio of sanctioned to unsanctioned tools highlights how effective governance efforts are at reducing blind spots.<\/li>\n<li style=\"font-weight: 400;\"><strong>Access Control Effectiveness:<\/strong> Monitoring violations or privilege escalation events reveals how well policies are being enforced.<\/li>\n<li style=\"font-weight: 400;\"><strong>Investigation Efficiency:<\/strong> Reduced time to analyze and scope incidents proves that governance is cutting through complexity.<\/li>\n<li style=\"font-weight: 400;\"><strong>Operational and Innovation Gains:<\/strong> Hours saved from automated governance tasks, along with the number of AI projects cleared for secure deployment, demonstrate that governance accelerates business rather than slowing it.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Together, these metrics form a story leaders can share with boards and regulators: Governance not only reduces risk but also improves productivity and enables safe adoption of new technologies.<\/p>\n<p style=\"font-weight: 400;\"><strong>Measuring governance success requires more than tracking security events \u2014 it means showing how governance reduces costs, strengthens compliance, and accelerates business growth.<\/strong> When tied to the right KPIs, AI governance becomes a board-level win.<\/p>\n<p style=\"font-weight: 400;\">While these KPIs are universal, every industry has its own compliance challenges, risk profile and cost drivers. The next section explores how AI governance looks different in healthcare, financial services, manufacturing and technology.<\/p>\n<h2 style=\"font-weight: 400;\">Shadow AI Prevention in Regulated Industries<\/h2>\n<p style=\"font-weight: 400;\"><strong>While the core principles of AI governance apply across sectors, every industry faces unique risks, compliance requirements, and operational realities.<\/strong> Recognizing these differences helps CISOs and IT leaders tailor governance frameworks to their organization\u2019s needs.<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><strong>Healthcare:<\/strong> Regulations like HIPAA demand strict oversight of data residency, sovereignty and auditability. Governance frameworks in this sector must provide end-to-end visibility into <a href=\"https:\/\/centricconsulting.com\/client-stories\/using-ai-to-capture-unstructured-medical-records-data\/\" target=\"_blank\" rel=\"noopener\">how patient data is stored, processed and used<\/a> for AI training \u2014 and include exhaustive audit trails that can withstand regulatory scrutiny.<\/li>\n<li style=\"font-weight: 400;\"><strong>Financial Services:<\/strong> <a href=\"https:\/\/centricconsulting.com\/blog\/ai-in-financial-services-unlock-efficiency-innovation_ai\/\" target=\"_blank\" rel=\"noopener\">AI adoption in finance<\/a> introduces additional challenges around vendor due diligence, least-privilege access, and auditable controls across the AI life cycle. Contracts with AI vendors must prohibit the use of sensitive data for model training and ensure data segregation.<\/li>\n<li style=\"font-weight: 400;\"><strong>Manufacturing:<\/strong> As operational technology (OT) and <a href=\"https:\/\/centricconsulting.com\/blog\/4-things-you-should-know-about-smart-iot-sensors\/\">Internet of Things (IoT) systems<\/a> integrate AI for predictive maintenance and automation, governance must account for risks beyond IT networks. Poorly governed AI models can introduce vulnerabilities into production systems, resulting in direct financial losses due to downtime. Governance frameworks must bridge IT and OT security domains.<\/li>\n<li style=\"font-weight: 400;\"><strong>Technology:<\/strong> For tech companies, speed of innovation is critical, but so is governance maturity. With rapid deployment cycles and distributed teams, there\u2019s an elevated risk of shadow AI tools entering the environment unchecked. Governance here must focus on scalable frameworks that allow innovation without sacrificing visibility or compliance.<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Tailoring policies, controls, and <a href=\"https:\/\/centricconsulting.com\/news-and-events\/cybersecurity-expert-discusses-third-party-risk-management-in-crains-cleveland-business\/\" target=\"_blank\" rel=\"noopener\">vendor strategies<\/a> to your sector is critical to managing breach costs and sustaining innovation. By aligning AI security frameworks with sector requirements \u2014 whether HIPAA, financial reporting, OT\/IoT integration, or rapid deployment environments \u2014 organizations can reduce data breach costs and adopt AI responsibly.<\/p>\n<h2 style=\"font-weight: 400;\">The Key to Controlling Data Breach Costs<\/h2>\n<p style=\"font-weight: 400;\">AI has become inseparable from cybersecurity, but whether it reduces or amplifies data breach costs depends entirely on governance. Organizations that integrate AI into existing frameworks, shine a light on shadow AI, and set clear guardrails and metrics are positioned to minimize risk while enabling innovation.<\/p>\n<p style=\"font-weight: 400;\"><strong>Now is the time to assess where your organization stands \u2014 because in today\u2019s environment, AI without governance isn\u2019t just a missed opportunity, it\u2019s a growing liability.<\/strong><\/p>\n<p style=\"font-weight: 400;\">If your organization is ready to strengthen its relationship with AI, we can help guide you through each step \u2014 working with you to unlock its potential, reduce data breach costs, and future-proof your operations.<\/p>\n<p style=\"font-weight: 400;\">\n        <div class=\"inline-cta purple\">\n            <div class=\"inline-cta--content\">\n                Cybersecurity for critical infrastructure is vital to everyday life, and it\u2019s up to your organization to help keep it secure. Download our white paper for industry-based tips.\n            <\/div>\n            <div class=\"inline-cta--button\">\n                <a\n                    class=\"button\"\n                    href=\"https:\/\/centricconsulting.com\/resources\/cybersecuritys-critical-importance-in-critical-infrastructure_cyber\/\"\n                    target=\"_blank\"\n                    >\n\n                    Get the White Paper\n                <\/a>\n            <\/div>\n        <\/div>\n<p style=\"text-align: center;\"><em>Data breaches and ransomware attacks threaten financial stability and customer trust that could impact your organization for years to come. Our <a href=\"https:\/\/centricconsulting.com\/technology-solutions\/cybersecurity-consulting-services\/\">Cybersecurity experts<\/a> can help you address your most pressing cybersecurity issues and keep compliance a continuous commitment at your organization.<\/em> <a class=\"button-text\" href=\"https:\/\/centricconsulting.com\/contact-webless\/\">Let\u2019s Talk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn the dual nature of AI in cybersecurity, revealing how organizations with proper AI governance can save in data breach costs.<\/p>\n","protected":false},"author":446,"featured_media":60087,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[23785],"coauthors":[23761,23791],"class_list":["post-60079","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cybersecurity","resource-categories-blogs","orbitmedia_post_topic-artificial-intelligence","orbitmedia_post_topic-cybersecurity"],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2025-12-05 07:14:20","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/60079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/446"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=60079"}],"version-history":[{"count":7,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/60079\/revisions"}],"predecessor-version":[{"id":60090,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/60079\/revisions\/60090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/60087"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=60079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=60079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=60079"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=60079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}