{"id":6672,"date":"2020-01-14T09:46:20","date_gmt":"2020-01-14T09:46:20","guid":{"rendered":"https:\/\/ee.yelkdev.site\/?p=6672"},"modified":"2024-03-28T13:25:48","modified_gmt":"2024-03-28T13:25:48","slug":"cybersecurity-strategy-and-the-secure-delivery-playbook","status":"publish","type":"post","link":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/","title":{"rendered":"Cybersecurity Strategy and the Secure Delivery Playbook"},"content":{"rendered":"<p><b><i>Security teams are under increasing strain due to a disconnect between the traditional operating models and those of agile delivery teams. It\u2019s very useful having <a href=\"https:\/\/playbooks.equalexperts.com\/secure-delivery-playbook\">a playbook that engineering and security teams can use in day-to-day delivery<\/a>, but how does it fit into your wider security strategy? Is this just a resource for security and delivery teams, or does it have a place on the CISO\u2019s desk?<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">In producing our <\/span><a href=\"https:\/\/playbooks.equalexperts.com\/secure-delivery-playbook\"><span style=\"font-weight: 400;\">Secure Delivery Playbook<\/span><\/a><span style=\"font-weight: 400;\"> (SDP), we focused on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery. In the few short months since its publication, we\u2019ve received a lot of very positive feedback from both the DevSecOps community and a number of our clients. Our approach resonates with people responsible for delivering secure outcomes for their teams and organisations. This comes as no surprise, as we\u2019ve seen that many organisations are facing this challenge as they embark on large-scale digital transformation programmes and undergo substantial changes to their ways of working.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But how does it fit into the wider cybersecurity strategy?<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Translating strategy into action<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cybersecurity strategy is undoubtedly the driving force that directs all security efforts across the organisation. A strong, forward-thinking strategy channels everyone\u2019s efforts towards positive outcomes. The SDP complements this strategy by providing a translation for engineering teams, helping them understand how to practically apply security within their context while aligning to the strategy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A popular framework for managing cybersecurity risk is the <\/span><a href=\"https:\/\/www.nist.gov\/cyberframework\"><span style=\"font-weight: 400;\">NIST Cybersecurity Framework<\/span><\/a><span style=\"font-weight: 400;\"> (CSF). While this provides an excellent high-level structure for organising and responding to risk, it doesn\u2019t specifically address how a software delivery team might achieve those outcomes. You wouldn\u2019t be able to give delivery teams a copy of the CSF and expect them to know how that influences their day to day work.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, the SDP is an effective way to map and translate high-level frameworks, like the NIST CSF, into actionable practices that teams can adopt.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Scaling to meet demand<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Providing practical guidance to teams is critical to success, but the SDP goes even further than this. It also addresses one of the constant challenges in cybersecurity: how to meet the demand for high quality security expertise across a large organisation, while operating with limited capacity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The structure of the SDP reflects an operating model we\u2019ve found to be successful in addressing this challenge: <\/span><a href=\"https:\/\/playbooks.equalexperts.com\/secure-delivery-playbook\/practices\"><span style=\"font-weight: 400;\">Organise, Build &amp; Operate<\/span><\/a><span style=\"font-weight: 400;\">. This is particularly well aligned to the <\/span><a href=\"https:\/\/queue.acm.org\/detail.cfm?id=1142065\"><span style=\"font-weight: 400;\">You Build It, You Run It<\/span><\/a><span style=\"font-weight: 400;\"> approach popularised by Amazon, and scales by fanning out as larger delivery programmes require greater and more specialised support.<\/span><\/p>\n<p><img decoding=\"async\" class=\" wp-image-6673 aligncenter\" src=\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png\" alt=\"\" width=\"719\" height=\"393\" \/><br \/>\n<span style=\"font-weight: 400;\">The fan-out model sees multiple <\/span><i><span style=\"font-weight: 400;\">Organise<\/span><\/i><span style=\"font-weight: 400;\"> teams operating at different levels in the organisation. Centrally, the <\/span><i><span style=\"font-weight: 400;\">Organise<\/span><\/i><span style=\"font-weight: 400;\"> team continues to provide the same services across the business, but larger delivery programmes also provide their own \u2018in-house\u2019 <\/span><i><span style=\"font-weight: 400;\">Organise<\/span><\/i><span style=\"font-weight: 400;\"> team as a local enabler team.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is commonly observed in digital transformation programmes, where a large number of teams are invested in a single platform, often built upon one of the major cloud providers. Having their own <\/span><i><span style=\"font-weight: 400;\">Organise<\/span><\/i><span style=\"font-weight: 400;\"> capability within the boundaries of their delivery programme helps increase the speed of delivery through native security solutions tailored to their context. It also provides a feedback mechanism into the central <\/span><i><span style=\"font-weight: 400;\">Organise<\/span><\/i><span style=\"font-weight: 400;\"> capability, allowing the all-important view of cybersecurity risk across the entire organisation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These programmes often create \u2018shadow IT\u2019, and we should expect \u2018shadow security\u2019 to follow closely behind if we don\u2019t provide a better alternative. The way to address this is not to tighten the grip of central security, but to provide a new operating model that explicitly acknowledges and supports this new world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In my next blog post, I\u2019ll provide a more detailed explanation showing how this scalability can be achieved within the structures of the SDP.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Leveraging the SDP at all levels<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Hopefully you\u2019ve seen how the SDP is designed to address needs at many levels. For security and product engineering teams, it provides practical guidance on how to apply to security in their day to day work. For senior leadership, it provides an operating model that directly addresses the scalability and accountability structures necessary to support large organisations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We hope you find the playbook to be a valuable addition to your toolkit. Need help applying these practices in your organisation? <\/span><a href=\"https:\/\/www.equalexperts.com\/contact-us\/\"><span style=\"font-weight: 400;\">Get in touch!<\/span><\/a><\/p>\n<blockquote><p>&nbsp;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.<\/p>\n","protected":false},"author":76,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"location":[397],"class_list":["post-6672","post","type-post","status-publish","format-standard","hentry","category-our-thinking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Strategy and the Secure Delivery Playbook | Equal Experts<\/title>\n<meta name=\"description\" content=\"Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Strategy and the Secure Delivery Playbook\" \/>\n<meta property=\"og:description\" content=\"Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/\" \/>\n<meta property=\"og:site_name\" content=\"Equal Experts\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-14T09:46:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-28T13:25:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/For-StuartGunter-Blog-Jan-2020-Thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1171\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stuart Gunter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cybersecurity Strategy and the Secure Delivery Playbook\" \/>\n<meta name=\"twitter:description\" content=\"Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/For-StuartGunter-Blog-Jan-2020-Thumbnail.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@EqualExperts\" \/>\n<meta name=\"twitter:site\" content=\"@EqualExperts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stuart Gunter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/\"},\"author\":{\"name\":\"Stuart Gunter\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/5a21b96defd660dd42e1692ce9f7ff88\"},\"headline\":\"Cybersecurity Strategy and the Secure Delivery Playbook\",\"datePublished\":\"2020-01-14T09:46:20+00:00\",\"dateModified\":\"2024-03-28T13:25:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/\"},\"wordCount\":729,\"publisher\":{\"@id\":\"https:\/\/www.equalexperts.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png\",\"articleSection\":[\"Our Thinking\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/\",\"url\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/\",\"name\":\"Cybersecurity Strategy and the Secure Delivery Playbook | Equal Experts\",\"isPartOf\":{\"@id\":\"https:\/\/www.equalexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png\",\"datePublished\":\"2020-01-14T09:46:20+00:00\",\"dateModified\":\"2024-03-28T13:25:48+00:00\",\"description\":\"Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#primaryimage\",\"url\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png\",\"contentUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.equalexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Strategy and the Secure Delivery Playbook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.equalexperts.com\/#website\",\"url\":\"https:\/\/www.equalexperts.com\/\",\"name\":\"Equal Experts\",\"description\":\"Making Software. Better.\",\"publisher\":{\"@id\":\"https:\/\/www.equalexperts.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.equalexperts.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.equalexperts.com\/#organization\",\"name\":\"Equal Experts\",\"url\":\"https:\/\/www.equalexperts.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg\",\"contentUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg\",\"width\":719,\"height\":340,\"caption\":\"Equal Experts\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/EqualExperts\",\"https:\/\/www.linkedin.com\/company\/equal-experts\/?viewAsMember=true\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/5a21b96defd660dd42e1692ce9f7ff88\",\"name\":\"Stuart Gunter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d595653748eebaf4ac1bf9e2abf7ddb48ce96f3bb5f6d30790d80149119dfe5e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d595653748eebaf4ac1bf9e2abf7ddb48ce96f3bb5f6d30790d80149119dfe5e?s=96&d=mm&r=g\",\"caption\":\"Stuart Gunter\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Strategy and the Secure Delivery Playbook | Equal Experts","description":"Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity Strategy and the Secure Delivery Playbook","og_description":"Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.","og_url":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/","og_site_name":"Equal Experts","article_published_time":"2020-01-14T09:46:20+00:00","article_modified_time":"2024-03-28T13:25:48+00:00","og_image":[{"width":1171,"height":720,"url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/For-StuartGunter-Blog-Jan-2020-Thumbnail.jpg","type":"image\/jpeg"}],"author":"Stuart Gunter","twitter_card":"summary_large_image","twitter_title":"Cybersecurity Strategy and the Secure Delivery Playbook","twitter_description":"Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.","twitter_image":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/For-StuartGunter-Blog-Jan-2020-Thumbnail.jpg","twitter_creator":"@EqualExperts","twitter_site":"@EqualExperts","twitter_misc":{"Written by":"Stuart Gunter","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#article","isPartOf":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/"},"author":{"name":"Stuart Gunter","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/5a21b96defd660dd42e1692ce9f7ff88"},"headline":"Cybersecurity Strategy and the Secure Delivery Playbook","datePublished":"2020-01-14T09:46:20+00:00","dateModified":"2024-03-28T13:25:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/"},"wordCount":729,"publisher":{"@id":"https:\/\/www.equalexperts.com\/#organization"},"image":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png","articleSection":["Our Thinking"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/","url":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/","name":"Cybersecurity Strategy and the Secure Delivery Playbook | Equal Experts","isPartOf":{"@id":"https:\/\/www.equalexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#primaryimage"},"image":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png","datePublished":"2020-01-14T09:46:20+00:00","dateModified":"2024-03-28T13:25:48+00:00","description":"Our Secure Delivery Playbook (SDP) focuses on core principles and practices that ensure cybersecurity is efficiently and effectively addressed within continuous delivery.","breadcrumb":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#primaryimage","url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png","contentUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2020\/01\/Secure-Delivery-Playbook-300x164.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/cybersecurity-strategy-and-the-secure-delivery-playbook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.equalexperts.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Strategy and the Secure Delivery Playbook"}]},{"@type":"WebSite","@id":"https:\/\/www.equalexperts.com\/#website","url":"https:\/\/www.equalexperts.com\/","name":"Equal Experts","description":"Making Software. Better.","publisher":{"@id":"https:\/\/www.equalexperts.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.equalexperts.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.equalexperts.com\/#organization","name":"Equal Experts","url":"https:\/\/www.equalexperts.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg","contentUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg","width":719,"height":340,"caption":"Equal Experts"},"image":{"@id":"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/EqualExperts","https:\/\/www.linkedin.com\/company\/equal-experts\/?viewAsMember=true"]},{"@type":"Person","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/5a21b96defd660dd42e1692ce9f7ff88","name":"Stuart Gunter","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d595653748eebaf4ac1bf9e2abf7ddb48ce96f3bb5f6d30790d80149119dfe5e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d595653748eebaf4ac1bf9e2abf7ddb48ce96f3bb5f6d30790d80149119dfe5e?s=96&d=mm&r=g","caption":"Stuart Gunter"}}]}},"_links":{"self":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts\/6672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/comments?post=6672"}],"version-history":[{"count":0,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts\/6672\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/media?parent=6672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/categories?post=6672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/tags?post=6672"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/location?post=6672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}