{"id":487542,"date":"2022-01-04T06:13:33","date_gmt":"2022-01-04T14:13:33","guid":{"rendered":"https:\/\/www.esri.com\/about\/newsroom\/?post_type=wherenext&#038;p=487542"},"modified":"2024-05-10T06:49:21","modified_gmt":"2024-05-10T13:49:21","slug":"mapping-it-vulnerabilities","status":"publish","type":"wherenext","link":"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities","title":{"rendered":"Patching Cybersecurity Vulnerabilities? Get Out the Map"},"author":501,"featured_media":0,"parent":0,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"sync_status":"","episode_type":"","audio_file":"","castos_file_data":"","podmotor_file_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","_links_to":"","_links_to_target":""},"categories":[381312,285372],"tags":[333782,391472],"department":[488812,488822],"wherenext-category":[],"industry":[],"class_list":["post-487542","wherenext","type-wherenext","status-publish","format-standard","hentry","category-cxo-priorities","category-cybersecurity","tag-business-resilience","tag-cybersecurity","department-emerging-technologies","department-sustainability-risk"],"acf":{"short_description":"Smart business leaders are mapping their IT assets in a way that makes it easier to patch vulnerabilities and head off risk.","pdf":{"host_remotely":false,"file":"","file_url":""},"flexible_content":[{"acf_fc_layout":"content","content":"For any IT manager thinking about putting off an important security patch, here\u2019s a seven-figure prompt: The <a href=\"https:\/\/www.insurancejournal.com\/magazines\/mag-features\/2021\/11\/01\/639581.htm\">average cost of a cyberattack<\/a> more than doubled last year to $1.85 million, according to Allianz Global Corporate &amp; Specialty, which began covering cyber insurance claims in 2013.\r\n\r\nThe protective value of IT patching is well-known, but the practice is too often neglected."},{"acf_fc_layout":"sidebar","layout":"standard","image_reference":null,"image_reference_figure":"","spotlight_image":null,"section_title":"","spotlight_name":"","position":"Left","content":"<strong>Article snapshot:<\/strong>\u00a0Threats to corporate IT networks aren\u2019t abating, but CIOs with an IT map can locate vulnerabilities quickly and deploy security patches to shore up defenses.","snippet":""},{"acf_fc_layout":"content","content":"In November, President Joe Biden ordered\u00a0most federal\u00a0departments to\u00a0<a href=\"https:\/\/www.wsj.com\/articles\/federal-cybersecurity-directive-spotlights-aging-computer-systems-11636068188?mod=hp_minor_pos6\">patch long-lingering vulnerabilities<\/a>\u00a0and update\u00a0outdated\u00a0software systems to\u00a0strengthen them against attacks.\r\n\r\nPreventative patching\u00a0isn\u2019t solely\u00a0a\u00a0government\u00a0concern, though.\r\n\r\nIt took less than a week\u00a0after\u00a0US authorities\u00a0warned\u00a0of a <a href=\"https:\/\/www.itworldcanada.com\/article\/cyber-security-today-nov-10-2021-an-employee-fooled-at-the-robinhood-trading-platform-and-more-firms-hit-by-ignoring-security-updates\/464574\">vulnerability\u00a0in\u00a0a password management application<\/a>\u00a0for\u00a0at least nine companies\u00a0to be compromised, according to IT World Canada,\u00a0a cybersecurity industry publication. The companies\u00a0hadn\u2019t installed a needed patch. The lesson:\u00a0act\u00a0quickly.\r\n\r\nOne way for corporate CIOs and risk officers to start improving their defenses is to map a company\u2019s IT infrastructure, including every connected device, its relationships to other systems, its patch status, and even its physical location.\r\n\r\nWith an IT map, CIOs and IT decision-makers can pinpoint vulnerable servers,\u00a0software, and devices, and bolster the chances of preventing\u00a0an attack.\r\n<h3><strong>Threats\u00a0Persist<\/strong><strong>\u00a0<\/strong><\/h3>\r\nCyberattacks\u00a0are hardly slowing.\u00a0More than one in three organizations reported an increase in cyberattacks in 2020, according to a survey of IT professionals conducted by ISACA. One recent notable victim of corporate ransomware was Colonial Pipeline, which temporarily shut down all of its gasoline pipes after <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password\">hackers infiltrated its system<\/a> and demanded a $4.4 million ransom. <a href=\"https:\/\/www.reuters.com\/technology\/kaseya-ransomware-attack-sets-off-race-hack-service-providers-researchers-2021-08-03\/\">Hackers caused a cascade of headaches for Kaseya<\/a>, a technology management provider, and its customers\u2014ransom demands exceeded $5 million in some cases. In March, <a href=\"https:\/\/gcn.com\/articles\/2021\/03\/15\/dearcry-ransomware.aspx\">Microsoft warned<\/a> that unpatched Microsoft Exchange Servers had been compromised by DearCry ransomware before it could be detected and stopped. More recently, the <a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-attackers-are-making-thousands-of-attempts-to-exploit-this-severe-vulnerability\/\">widespread Log4j vulnerability<\/a> has sent IT leaders scrambling to update systems for email, web applications, cloud computing, and more.\r\n\r\nIn these scenarios, bad actors often sneak in through system vulnerabilities before the affected organizations <a href=\"https:\/\/www.esri.com\/en-us\/industries\/corporate-security\/overview\">identify their weak links<\/a> and address them. Setting up\u00a0digital\u00a0guardrails\u00a0in advance,\u00a0by\u00a0protecting a network from\u00a0those intent on\u00a0causing damage,\u00a0can help.\r\n\r\nThat begins with understanding one\u2019s network by inventorying and mapping every device, server, switch, and connection, then\u00a0visualizing them all.\r\n<h3><strong>A Patch of Prevention<\/strong><strong>\u00a0with an IT Map<\/strong><\/h3>\r\nKnowing which IT assets have been patched and which haven\u2019t\u00a0is\u00a0key.\u00a0It can also\u00a0be\u00a0difficult to ascertain, especially\u00a0for IT departments starved for\u00a0<a href=\"https:\/\/www.cnbc.com\/2021\/09\/08\/microsofts-20-billion-and-cybersecuritys-big-spending-problem.html\">cybersecurity professionals that have been in short supply<\/a>.\r\n\r\nAn <a href=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/nexttech-on-it-mapping\/\">IT map<\/a> can help by creating a single source of truth for the organization via a <a href=\"https:\/\/www.esri.com\/en-us\/digital-twin\/overview\">digital twin<\/a> of an organization\u2019s people, processes, and technology. This digital twin shows technology assets and human users across the network, and can be viewed as a simple line chart or a\u00a0solar system showing\u00a0the hubs and spokes connecting\u00a0a company\u2019s digital universe.\r\n\r\nGeography adds another layer of operational awareness to an IT map. If an IT manager locates an unpatched server on the digital twin, the manager can click through to a digital map showing where that hardware resides\u2014down to its precise location in a rack of servers.\r\n\r\nWhen an IT map is paired with service management software,\u00a0IT\u00a0staff can request the installation of a patch from within the map.\u00a0It\u2019s not unlike the technology that <a href=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/nj-utility-on-forefront-with-new-mixed-reality-application\/\">helps utility workers identify and fix buried pipes and wires<\/a>.\u00a0The digital twin visualizes what might otherwise go unseen, helping decision-makers take informed action. Such tools encourage preventive maintenance\u2014on underground pipes or unpatched servers\u2014limiting costly and unnecessary repair work down the road."},{"acf_fc_layout":"quote","image":487552,"text":"One way for corporate CIOs and risk officers to start improving their defenses is to map a company\u2019s IT infrastructure, including every connected device, its relationships to other systems, its patch status, and even its physical location.","author_name":"","author_profession_organization":""},{"acf_fc_layout":"content","content":"<h3><strong>A Watchful Eye on Age, Activity<\/strong><strong>\u00a0<\/strong><\/h3>\r\nMonitoring the age of IT systems is also a critical aspect of cybersecurity. In the government accountability reports\u00a0that prompted\u00a0President Biden\u2019s directive,\u00a0<a href=\"https:\/\/www.wsj.com\/articles\/federal-cybersecurity-directive-spotlights-aging-computer-systems-11636068188?mod=hp_minor_pos6\">some agencies hadn\u2019t\u00a0updated their software\u00a0in decades<\/a><u>. <\/u>That\u00a0included the Department of Transportation, which was operating with 35-year-old software, and the Department of Education, where one application\u00a0stored student loan data\u00a0that was nearly 50 years old.\r\n\r\nInstalling the latest updates\u2014complete with security\u00a0patches\u2014is important for both public and private enterprises. Managers can filter an IT map by device or software age,\u00a0organizing the results in a way that\u00a0makes\u00a0it easier to track older devices and software susceptible to hacking.\r\n\r\nEliminating vulnerabilities and tracing security flaws also involves knowing who has physically accessed sensitive areas or devices. An IT map\u00a0shows the locations as well as the specific employees who may have accessed areas like R&amp;D labs or secure server rooms.\r\n\r\nThe IT map is useful beyond cybersecurity planning and response. An IT professional might track weather-related events like flooding or <a href=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/wildfire-risk-for-business\/\">wildfires<\/a> to understand their potential impact on the infrastructure underpinning a company\u2019s network, and shift assets proactively.\r\n\r\nIn the unwelcome case of a successful cyberattack, having a detailed IT map allows network security professionals to trace\u00a0the problem to its root,\u00a0respond more quickly, and revive operations.\r\n\r\nMapping has long been a competitive differentiator in business, guiding leaders to <a href=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/dicks-sporting-goods-strengthens-omnichannel-through-brick-and-mortar-planning\/\">choose the best storefront<\/a>, teach <a href=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/sustainability-and-location-intelligence\/\">suppliers sustainable practices<\/a>, and manage <a href=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/healthcare-delivery-optimization\/\">fleets of employees and vehicles<\/a>. Now, an organization\u2019s IT infrastructure can be\u00a0<a href=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/nexttech-on-it-mapping\/\">mapped, tracked, and better\u00a0understood<\/a> to prevent costly\u00a0cyberattacks\u00a0and speed recovery if they do occur."}],"references":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Maps Emerge as Cyberattacks Rise<\/title>\n<meta name=\"description\" content=\"IT maps bring attention and context to cyber vulnerabilities, giving CIOs a blueprint to strengthen defenses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patching Cybersecurity Vulnerabilities? Get Out the Map\" \/>\n<meta property=\"og:description\" content=\"IT maps bring attention and context to cyber vulnerabilities, giving CIOs a blueprint to strengthen defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities\" \/>\n<meta property=\"og:site_name\" content=\"Esri\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/esrigis\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-10T13:49:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esri.com\/about\/newsroom\/app\/uploads\/2022\/01\/looking-to-fix-cyber-security-vulnerabilities-wherenext-card-826x465-1.jpg\" \/><meta property=\"og:image\" content=\"https:\/\/www.esri.com\/about\/newsroom\/app\/uploads\/2022\/01\/looking-to-fix-cyber-security-vulnerabilities-wherenext-card-826x465-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Esri\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities\",\n\t            \"url\": \"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities\",\n\t            \"name\": \"IT Maps Emerge as Cyberattacks Rise\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/www.esri.com\/about\/newsroom\/#website\"\n\t            },\n\t            \"datePublished\": \"2022-01-04T14:13:33+00:00\",\n\t            \"dateModified\": \"2024-05-10T13:49:21+00:00\",\n\t            \"description\": \"IT maps bring attention and context to cyber vulnerabilities, giving CIOs a blueprint to strengthen defenses.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/www.esri.com\/about\/newsroom\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Patching Cybersecurity Vulnerabilities? Get Out the Map\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/www.esri.com\/about\/newsroom\/#website\",\n\t            \"url\": \"https:\/\/www.esri.com\/about\/newsroom\/\",\n\t            \"name\": \"Esri\",\n\t            \"description\": \"Esri Newsroom\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/www.esri.com\/about\/newsroom\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\/\/www.esri.com\/about\/newsroom\/#\/schema\/person\/b890389919572d29641d24fc67eaf376\",\n\t            \"name\": \"Chris Chiappinelli\",\n\t            \"image\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\/\/www.esri.com\/about\/newsroom\/#\/schema\/person\/image\/\",\n\t                \"url\": \"https:\/\/www.esri.com\/about\/newsroom\/app\/uploads\/2017\/04\/Esri-Chris_Chiappinelli_540x540.jpg\",\n\t                \"contentUrl\": \"https:\/\/www.esri.com\/about\/newsroom\/app\/uploads\/2017\/04\/Esri-Chris_Chiappinelli_540x540.jpg\",\n\t                \"caption\": \"Chris Chiappinelli\"\n\t            },\n\t            \"description\": \"Chris Chiappinelli is the editor of Esri\u2019s WhereNext magazine. Through his writing, he explores the intersection of business strategy and location intelligence\u2014and strategic challenges like sustainability, growth, and risk. Prior to joining Esri, Chris managed internal content for PTC, a pioneer in IoT technology, smart products, and augmented reality. Earlier in his career, Chris spent a decade as a journalist covering business and technology news.\",\n\t            \"sameAs\": [\n\t                \"https:\/\/www.linkedin.com\/in\/chris-chiappinelli-ba56814\",\n\t                \"https:\/\/x.com\/chrischip\"\n\t            ],\n\t            \"url\": \"https:\/\/www.esri.com\/about\/newsroom\/author\/cchiappinelli\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Maps Emerge as Cyberattacks Rise","description":"IT maps bring attention and context to cyber vulnerabilities, giving CIOs a blueprint to strengthen defenses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities","og_locale":"en_US","og_type":"article","og_title":"Patching Cybersecurity Vulnerabilities? Get Out the Map","og_description":"IT maps bring attention and context to cyber vulnerabilities, giving CIOs a blueprint to strengthen defenses.","og_url":"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities","og_site_name":"Esri","article_publisher":"https:\/\/www.facebook.com\/esrigis\/","article_modified_time":"2024-05-10T13:49:21+00:00","og_image":[{"url":"https:\/\/www.esri.com\/about\/newsroom\/app\/uploads\/2022\/01\/looking-to-fix-cyber-security-vulnerabilities-wherenext-card-826x465-1.jpg","type":"","width":"","height":""},{"width":1200,"height":630,"url":"https:\/\/www.esri.com\/about\/newsroom\/app\/uploads\/2022\/01\/looking-to-fix-cyber-security-vulnerabilities-wherenext-card-826x465-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@Esri","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities","url":"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities","name":"IT Maps Emerge as Cyberattacks Rise","isPartOf":{"@id":"https:\/\/www.esri.com\/about\/newsroom\/#website"},"datePublished":"2022-01-04T14:13:33+00:00","dateModified":"2024-05-10T13:49:21+00:00","description":"IT maps bring attention and context to cyber vulnerabilities, giving CIOs a blueprint to strengthen defenses.","breadcrumb":{"@id":"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esri.com\/about\/newsroom\/publications\/wherenext\/mapping-it-vulnerabilities#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esri.com\/about\/newsroom"},{"@type":"ListItem","position":2,"name":"Patching Cybersecurity Vulnerabilities? Get Out the Map"}]},{"@type":"WebSite","@id":"https:\/\/www.esri.com\/about\/newsroom\/#website","url":"https:\/\/www.esri.com\/about\/newsroom\/","name":"Esri","description":"Esri Newsroom","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esri.com\/about\/newsroom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.esri.com\/about\/newsroom\/#\/schema\/person\/b890389919572d29641d24fc67eaf376","name":"Chris Chiappinelli","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esri.com\/about\/newsroom\/#\/schema\/person\/image\/","url":"https:\/\/www.esri.com\/about\/newsroom\/app\/uploads\/2017\/04\/Esri-Chris_Chiappinelli_540x540.jpg","contentUrl":"https:\/\/www.esri.com\/about\/newsroom\/app\/uploads\/2017\/04\/Esri-Chris_Chiappinelli_540x540.jpg","caption":"Chris Chiappinelli"},"description":"Chris Chiappinelli is the editor of Esri\u2019s WhereNext magazine. Through his writing, he explores the intersection of business strategy and location intelligence\u2014and strategic challenges like sustainability, growth, and risk. Prior to joining Esri, Chris managed internal content for PTC, a pioneer in IoT technology, smart products, and augmented reality. Earlier in his career, Chris spent a decade as a journalist covering business and technology news.","sameAs":["https:\/\/www.linkedin.com\/in\/chris-chiappinelli-ba56814","https:\/\/x.com\/chrischip"],"url":"https:\/\/www.esri.com\/about\/newsroom\/author\/cchiappinelli"}]}},"_links":{"self":[{"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/wherenext\/487542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/wherenext"}],"about":[{"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/types\/wherenext"}],"author":[{"embeddable":true,"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/users\/501"}],"version-history":[{"count":0,"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/wherenext\/487542\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/media?parent=487542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/categories?post=487542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/tags?post=487542"},{"taxonomy":"department","embeddable":true,"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/department?post=487542"},{"taxonomy":"wherenext-category","embeddable":true,"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/wherenext-category?post=487542"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.esri.com\/about\/newsroom\/wp-json\/wp\/v2\/industry?post=487542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}