{"id":34623,"date":"2023-07-07T14:18:11","date_gmt":"2023-07-07T13:18:11","guid":{"rendered":"https:\/\/www.innovationnewsnetwork.com\/?p=34623"},"modified":"2023-07-07T14:24:34","modified_gmt":"2023-07-07T13:24:34","slug":"how-to-create-an-effective-ics-ot-incident-response-plan","status":"publish","type":"post","link":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/","title":{"rendered":"How to create an effective ICS\/OT incident response plan"},"content":{"rendered":"

Kai Thomsen, Director of Global Incident Response Services at Dragos<\/a>, outlines the three most important points when formulating an incident response plan for industrial cyber attacks.<\/h2>\n

In a world where successful cyberattacks are an inevitability, incident response plans are more important than ever. This is especially true for industrial networks. The potential consequences of an industrial cyber attack go far beyond the financial or reputational – business continuity, equipment, and even human lives are at risk.<\/p>\n

What\u2019s more, incident response plans for industrial environments are distinct from their enterprise counterparts. Because of the potential kinetic impacts, security teams are forced to prioritise safety over business continuity and damage mitigation. Greater care must be taken to ensure that intervention doesn\u2019t do more harm than good.<\/p>\n

Industrial incident response teams often work in legitimately hazardous environments, meaning their work is in and of itself, hazardous. To complicate matters further, the technologies involved in industrial cyber attacks can differ considerably from other sectors. Often, there are legacy technologies or low-level systems involved, which may have poor documentation, or don\u2019t run typical operating systems.<\/p>\n

The challenges involved with responding to industrial cyber attacks are numerous and the stakes are high. An exhaustive, tried-and-tested incident response plan is the only way to effectively tackle a cyber incident in the ICS or OT sectors.<\/p>\n

1. Get the fundamentals right<\/h3>\n

Before you start drafting your incident response plan, it\u2019s important to get the fundamentals right.<\/p>\n

Ensuring or establishing good working relationships between all your staff is a great place to start.<\/p>\n

Speed is crucial in the event of a cyber attack, and it\u2019s imperative that poor communication doesn\u2019t slow down your response.<\/p>\n

Too often in the industrial sector, industrial and cybersecurity staff are disconnected with different concerns and skill sets. It\u2019s essential both teams not only understand the work one another does but how their roles overlap and how they should work together in the event of an incident.<\/p>\n

Understanding an organisation’s environment and manufacturing processes is crucial to building an incident response plan, and cybersecurity teams can only gain that understanding by working with ground staff.<\/p>\n

Once these relationships have been established, you should ensure you have a comprehensive understanding of your organisation’s environment – both physical and digital. Carrying out network mapping, asset inventories, and architectural deficiency audits are all crucial to truly knowing an environment.<\/p>\n

The working relationships you have established will pay dividends here, as you can bring in staff from across the company to ensure you haven\u2019t missed or misunderstood anything. It\u2019s important that all of this is done in advance – conducting these activities before an incident has occurred costs relatively little, but incident response teams can charge a premium when the situation is urgent and resource intensive, as is most often the case in the wake of a cyber attack.<\/p>\n

Now that you have a much deeper understanding of your environment, you\u2019ll be better positioned to spot abnormalities and react to them before too much damage is done.<\/p>\n

\"incident
\u00a9 shutterstock\/Jack_the_sparow<\/figcaption><\/figure>\n

However, it\u2019s important to remember that not every intrusion has immediately obvious impacts. If you stopped here, bad actors could spend months inside your systems, gaining their own understanding, and eventually leveraging this to wreak havoc on your organisation.<\/p>\n

To prevent this, vulnerability management and passive detection are essential – you\u2019ll be doing everything possible to stop cybercriminals from getting in and will know immediately if they do.<\/p>\n

While the above processes may seem obvious, it\u2019s important to remember that they are often neglected in industrial spaces. Assuming you have already bolstered staff relationships, gained an understanding of your environment, or have passive detection and vulnerability management in place – it\u2019s important to not skip any steps.<\/p>\n

2. Understand primary causes of concern<\/h3>\n

As soon as your house is in order, you\u2019re ready to start thinking about your worst-case scenarios. Interview executive and industrial staff to find out what their worst possible day would be. Make sure you understand and log everything that could possibly go wrong – these are your primary causes of concern.<\/p>\n

Once you have your worst-case scenarios, start thinking about what could cause them. Many of the causes won\u2019t be cyber related, but it\u2019s important that you map them anyway. Start at the top with more rudimentary, physical issues such as equipment failures or human error, and eventually you\u2019ll reach computer issues.<\/p>\n

This can include vulnerable digital devices in industrial networks that could cause issues throughout an organisation\u2019s environment.<\/p>\n

These causes and devices should be at the centre of your incident response plan. They are your crown jewels and must be protected. Run tabletop exercises, disaster recovery, network monitoring, and threat hunting on everything that could cause an issue in your environment.<\/p>\n

This will help you understand what and how something could go wrong, as well as how to remediate the issue once it has occurred.<\/p>\n

It\u2019s important to remember that your crown jewels aren\u2019t always immediately obvious. Assuming you know all of your primary causes of concern can result in disaster – should problems arise in an area of your organisation you hadn\u2019t considered; you\u2019ll be left unprepared.<\/p>\n

It\u2019s essential that you don\u2019t neglect any of these stages.<\/p>\n

\"\"
\u00a9 shutterstock\/Rawpixel.com<\/figcaption><\/figure>\n

3. The incident response plan must be fully tested<\/h3>\n

You need to run through your incident response plan frequently. Cyber attacks can often occur late at night, on public holidays, or both, and you need to know you can respond even when it\u2019s not convenient. Someone must be prepared to spring into action at any moment, or all your work will be for nothing.<\/p>\n

It\u2019s also important that every single member of the staff understands their role in the event of a cyber attack. Run through your phone trees and ensure that they\u2019re effective and up to date. If you keep an incident response team on retainer, make sure everyone in your company knows how to contact them, and run drills as you would for a fire or other disasters.<\/p>\n

Avoid basic mistakes<\/h3>\n

\u00a0<\/strong>Now that you know what it takes to build an effective ICS\/OT incident response plan, it\u2019s worth pointing out a few common mistakes people make, so you can avoid them.<\/p>\n

Perhaps the most common mistake organisations make when it comes to cyber incidents is a lack of preparedness. Not having an incident response plan in place can result in huge, unnecessary expenses in the wake of an attack. Hiring incident response teams post-incident is simply not good practice – they may have to tend to their existing customers first and they\u2019ll have to spend time coming up to speed on your networks and technology stack, when time is of the essence.<\/p>\n

Finally, it\u2019s important that you don\u2019t panic. Incident response is inherently stressful, but you must keep a cool head. It\u2019s inevitable that you will make mistakes, but a well exercised incident response plan will minimise their impact.<\/p>\n","protected":false},"excerpt":{"rendered":"

Discover the three most important points when formulating an incident response plan for industrial cyber attacks.\u00a0<\/p>\n","protected":false},"author":18,"featured_media":34634,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[830],"tags":[530],"acf":[],"yoast_head":"\nHow to create an effective ICS\/OT incident response plan<\/title>\n<meta name=\"description\" content=\"Discover the three most important points when formulating an incident response plan for industrial cyber attacks.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to create an effective ICS\/OT incident response plan\" \/>\n<meta property=\"og:description\" content=\"Discover the three most important points when formulating an incident response plan for industrial cyber attacks.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation News Network\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InnoNewsNetwork\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-07T13:18:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-07T13:24:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Potts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:site\" content=\"@InnoNewsNetwork\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Potts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/\"},\"author\":{\"name\":\"Emily Potts\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\"},\"headline\":\"How to create an effective ICS\/OT incident response plan\",\"datePublished\":\"2023-07-07T13:18:11+00:00\",\"dateModified\":\"2023-07-07T13:24:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/\"},\"wordCount\":1204,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#respond\"]}],\"copyrightYear\":\"2023\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/\",\"name\":\"How to create an effective ICS\/OT incident response plan\",\"isPartOf\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg\",\"datePublished\":\"2023-07-07T13:18:11+00:00\",\"dateModified\":\"2023-07-07T13:24:34+00:00\",\"description\":\"Discover the three most important points when formulating an incident response plan for industrial cyber attacks.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#primaryimage\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"\u00a9 shutterstock\/husjur02\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.innovationnewsnetwork.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to create an effective ICS\/OT incident response plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#website\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"name\":\"Innovation News Network\",\"description\":\"Science, Research & Innovation News\",\"publisher\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#organization\",\"name\":\"Innovation News Network\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"contentUrl\":\"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Innovation News Network\"},\"image\":{\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InnoNewsNetwork\",\"https:\/\/x.com\/InnoNewsNetwork\",\"https:\/\/www.linkedin.com\/company\/innovation-news-network\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef\",\"name\":\"Emily Potts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g\",\"caption\":\"Emily Potts\"},\"sameAs\":[\"https:\/\/www.innovationnewsnetwork.com\"],\"url\":\"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/\"}]}<\/script>\n","yoast_head_json":{"title":"How to create an effective ICS\/OT incident response plan","description":"Discover the three most important points when formulating an incident response plan for industrial cyber attacks.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/","og_locale":"en_GB","og_type":"article","og_title":"How to create an effective ICS\/OT incident response plan","og_description":"Discover the three most important points when formulating an incident response plan for industrial cyber attacks.\u00a0","og_url":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/","og_site_name":"Innovation News Network","article_publisher":"https:\/\/www.facebook.com\/InnoNewsNetwork","article_published_time":"2023-07-07T13:18:11+00:00","article_modified_time":"2023-07-07T13:24:34+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg","type":"image\/jpeg"}],"author":"Emily Potts","twitter_card":"summary_large_image","twitter_creator":"@InnoNewsNetwork","twitter_site":"@InnoNewsNetwork","twitter_misc":{"Written by":"Emily Potts","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#article","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/"},"author":{"name":"Emily Potts","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef"},"headline":"How to create an effective ICS\/OT incident response plan","datePublished":"2023-07-07T13:18:11+00:00","dateModified":"2023-07-07T13:24:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/"},"wordCount":1204,"commentCount":0,"publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg","keywords":["Cybersecurity"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#respond"]}],"copyrightYear":"2023","copyrightHolder":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/","url":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/","name":"How to create an effective ICS\/OT incident response plan","isPartOf":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#primaryimage"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#primaryimage"},"thumbnailUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg","datePublished":"2023-07-07T13:18:11+00:00","dateModified":"2023-07-07T13:24:34+00:00","description":"Discover the three most important points when formulating an incident response plan for industrial cyber attacks.\u00a0","breadcrumb":{"@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#primaryimage","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2023\/07\/\u00a9-shutterstockhusjur02_1678284103.jpg","width":1920,"height":1080,"caption":"\u00a9 shutterstock\/husjur02"},{"@type":"BreadcrumbList","@id":"https:\/\/www.innovationnewsnetwork.com\/how-to-create-an-effective-ics-ot-incident-response-plan\/34623\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.innovationnewsnetwork.com\/"},{"@type":"ListItem","position":2,"name":"How to create an effective ICS\/OT incident response plan"}]},{"@type":"WebSite","@id":"https:\/\/www.innovationnewsnetwork.com\/#website","url":"https:\/\/www.innovationnewsnetwork.com\/","name":"Innovation News Network","description":"Science, Research & Innovation News","publisher":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.innovationnewsnetwork.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.innovationnewsnetwork.com\/#organization","name":"Innovation News Network","url":"https:\/\/www.innovationnewsnetwork.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","contentUrl":"https:\/\/www.innovationnewsnetwork.com\/wp-content\/uploads\/2022\/01\/inn-logo-yoast-seo-organisation-1920-1080-001.jpg","width":1920,"height":1080,"caption":"Innovation News Network"},"image":{"@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InnoNewsNetwork","https:\/\/x.com\/InnoNewsNetwork","https:\/\/www.linkedin.com\/company\/innovation-news-network\/"]},{"@type":"Person","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/84a0b50d0f626c0da3350bbfb327a2ef","name":"Emily Potts","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.innovationnewsnetwork.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34f484a11138db76e25aeae0453bc2a9?s=96&d=mm&r=g","caption":"Emily Potts"},"sameAs":["https:\/\/www.innovationnewsnetwork.com"],"url":"https:\/\/www.innovationnewsnetwork.com\/author\/emilypotts\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2025-02-07 21:06:09","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/34623"}],"collection":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/comments?post=34623"}],"version-history":[{"count":3,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/34623\/revisions"}],"predecessor-version":[{"id":34641,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/posts\/34623\/revisions\/34641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media\/34634"}],"wp:attachment":[{"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/media?parent=34623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/categories?post=34623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.innovationnewsnetwork.com\/wp-json\/wp\/v2\/tags?post=34623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}