{"id":152,"date":"2024-11-18T08:36:49","date_gmt":"2024-11-18T08:36:49","guid":{"rendered":"https:\/\/cyberriskpartners.net\/?page_id=152"},"modified":"2024-12-04T06:42:56","modified_gmt":"2024-12-04T06:42:56","slug":"blogs","status":"publish","type":"page","link":"https:\/\/cyberriskpartners.net\/en_gb\/blogs\/","title":{"rendered":"Blogs"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">DORA series<\/h2>\n\n\n\n<p class=\"\"><a href=\"https:\/\/cyberriskpartners.net\/dora-blog-1\/\" data-type=\"post\" data-id=\"147\">#1 Another European cyber regulation \u2026 not quite<\/a><\/p>\n\n\n\n<p class=\"\"><a href=\"https:\/\/cyberriskpartners.net\/dora-blog-2\/\" data-type=\"post\" data-id=\"153\">#2 Are you DORA or NIS2 ?<\/a><\/p>\n\n\n\n<p class=\"\"><a href=\"https:\/\/cyberriskpartners.net\/dora-blog-3\/\" data-type=\"post\" data-id=\"156\">#3 Incident response<\/a><\/p>\n\n\n\n<p class=\"\"><a href=\"https:\/\/cyberriskpartners.net\/en_gb\/%F0%9D%97%97%F0%9D%97%A2%F0%9D%97%A5%F0%9D%97%94-b%F0%9D%97%B9%F0%9D%97%BC%F0%9D%97%B4-%F0%9D%98%80%F0%9D%97%B2%F0%9D%97%BF%F0%9D%97%B6%F0%9D%97%B2%F0%9D%98%80-4\/\">#4 Critical or important functions<\/a><\/p>\n\n\n\n<p class=\"\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DORA series #1 Another European cyber regulation \u2026 not quite #2 Are you DORA or NIS2 ? #3 Incident response #4 Critical or important functions<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-152","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/comments?post=152"}],"version-history":[{"count":2,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/152\/revisions"}],"predecessor-version":[{"id":169,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/152\/revisions\/169"}],"wp:attachment":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/media?parent=152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}