{"id":84069,"date":"2025-08-13T12:04:16","date_gmt":"2025-08-13T12:04:16","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84069"},"modified":"2026-03-12T06:03:25","modified_gmt":"2026-03-12T06:03:25","slug":"balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/","title":{"rendered":"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84069\" class=\"elementor elementor-84069\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b1c90ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b1c90ce\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0978064\" data-id=\"0978064\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28c3752 elementor-widget elementor-widget-video\" data-id=\"28c3752\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/KOuvhY-CIcI?si=x1cMfH6xzXvVMx7R&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-31c8a76 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"31c8a76\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9682bde\" data-id=\"9682bde\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-086d595 elementor-widget elementor-widget-heading\" data-id=\"086d595\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2026<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f60f44d elementor-widget elementor-widget-post-info\" data-id=\"f60f44d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>August 13, 2025<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45d48a4 elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tThe Cybersecurity Podcast\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-adacf87 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"adacf87\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2fac288\" data-id=\"2fac288\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0300710 elementor-widget elementor-widget-text-editor\" data-id=\"0300710\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">At the heart of every digital business today lies an unceasing\u00a0question: How do you drive technological innovation without compromising security?<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The\u00a0question\u00a0took center stage\u00a0at\u00a0RSAC 2025,\u00a0where\u00a0EC-Council Group CEO Jay\u00a0Bavisi\u00a0interviewed Ben Wilcox,\u00a0ProArch\u2019s\u00a0dual\u00a0CISO\u2013CTO. Their candid exchange lays out a roadmap on how to balance organizational security with the relentless pace of technological change.\u00a0The conversation\u00a0maneuvers\u00a0around\u00a0the\u00a0&#8220;dual\u00a0hat&#8221; approach, the critical role of identity as a security foundation, and how AI serves both as a threat and a\u00a0safeguard in today\u2019s cybersecurity\u00a0landscape.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">While navigating the dual roles of CISO and CTO, Wilcox gained perspective on the tension between enabling businesses through technology and protecting them from risk. As he quotes, &#8220;On one hand, you\u2019re the enabler; on the other, the CISO is often seen as the disabler.&#8221; While he focuses on the business-first approach, he also mentions that security must be the foundation for everything we do in a business.\u00a0 <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Wilcox started his career by providing web hosting services, which evolved into running his own internet-focused business and gradually shifted toward delivering services with\u00a0a focus\u00a0on infrastructure, firewalls, and networking. This experience led him\u00a0into\u00a0consulting.\u00a0Ultimately, he\u00a0joined\u00a0ProArch, and has now been with the company for 18 years\u00a0helping\u00a0shape\u00a0its\u00a0security and technology strategy.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96f1137 elementor-widget elementor-widget-heading\" data-id=\"96f1137\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Aligning security and business growth <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8129c7 elementor-widget elementor-widget-text-editor\" data-id=\"a8129c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Holding both titles of CISO and CTO\u00a0places\u00a0Wilcox at the juncture of innovation and security, two\u00a0domains\u00a0that\u00a0are\u00a0often at odds.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">As\u00a0CTO, he\u00a0drives\u00a0technological advancement and delivers\u00a0innovative solutions. As CISO, he\u00a0must\u00a0ensure that security\u00a0remains\u00a0of utmost importance, especially given\u00a0ProArch\u2019s\u00a0role as a managed security service\u00a0provider\u00a0handling sensitive customer information.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Wilcox acknowledges the inherent conflict between these roles, especially with constant pressure to accelerate product development and enhance functionality. To navigate, he adopts a business-first approach,\u00a0drawing on\u00a0lessons from his\u00a0time\u00a0in\u00a0consulting. He emphasizes a consultative approach that balances\u00a0what\u2019s\u00a0best for the business without\u00a0compromising on\u00a0standards for cybersecurity,\u00a0especially\u00a0identity services and data integrity.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ffa3e8 elementor-widget elementor-widget-heading\" data-id=\"7ffa3e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What keeps a CISO awake at night: Protecting data in a 24\/7 threat environment <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f851905 elementor-widget elementor-widget-text-editor\" data-id=\"f851905\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">True data protection requires a multilayered approach starting from robust data governance tools that manage both structured and unstructured data. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">ProArch operates 24\/7, relying on multiple threat intelligence vendors and early warning systems to stay ahead of potential breaches and detect early warning signs. A critical part of this strategy is what Ben calls \u201chypercritical vulnerability management,\u201d where a cybersecurity team wants to prioritize and remediate the most urgent vulnerabilities that are being actively targeted by threat actors. This allows the IT and security teams to prioritize patching and reducing risk in real time. <\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00a0250 elementor-widget elementor-widget-heading\" data-id=\"00a0250\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Artificial intelligence: An opportunity as well as a risk to cybersecurity  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b327969 elementor-widget elementor-widget-text-editor\" data-id=\"b327969\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Wilcox\u00a0opines\u00a0that AI should be seen as an opportunity\u00a0as well as\u00a0a challenge for an organization. As\u00a0ProArch\u00a0develops AI-based\u00a0applications\u00a0it also\u00a0encounters\u00a0new risks,\u00a0such as\u00a0AI-driven attacks and prompt injection threats. To address these, the team\u00a0uses\u00a0advanced cloud detection and attack surface reduction tools\u00a0to\u00a0identify\u00a0the threats and\u00a0stop\u00a0malicious activity before it escalates.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">As AI-related risks\u00a0emerge, security operations centers (SOCs) must modernize and adapt to new business strategies to protect sensitive business data within AI-powered applications, ensuring that security keeps pace with technological advancement.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f218128 elementor-widget elementor-widget-heading\" data-id=\"f218128\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rethinking penetration testing in the age of automation  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fd36c5 elementor-widget elementor-widget-text-editor\" data-id=\"6fd36c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">AI\u00a0has been changing the face of\u00a0penetration testing. Traditionally, organizations\u00a0had\u00a0annual or quarterly pen testing\u00a0schedules.\u00a0This was posing a problem with the advancement of AI, as\u00a0an AI attack is usually continuous and relentless.\u00a0Rather than viewing this as a crisis, Wilcox sees this as an opportunity for innovation in the cybersecurity industry.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Leaders\u00a0are encouraged to\u00a0consider this an opportunity to rethink security strategies, adopt dynamic approaches, and\u00a0put\u00a0in place\u00a0continuous testing methods. For CISOs\u00a0today, meeting the challenge means moving beyond compliance checkboxes\u00a0to\u00a0embrace\u00a0a proactive, always-on approach to security validation.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56d5e59 elementor-widget elementor-widget-heading\" data-id=\"56d5e59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The need for certification and continuous learning  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3c1e3f elementor-widget elementor-widget-text-editor\" data-id=\"c3c1e3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW57446198 BCX8\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW57446198 BCX8\">&#8220;Managing a global security team of 50 professionals is not an easy job, especially in an industry that is constantly evolving,&#8221; says Wilcox. <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW57446198 BCX8\">ProArch<\/span><span class=\"NormalTextRun SCXW57446198 BCX8\">\u00a0looks for candidates who have an inherent urge to learn, particularly those who have pursued certifications such as EC-Council\u2019s Certified Ethical Hacker (CEH) or relevant Microsoft credentials. These certifications are strong indicators of foundational knowledge and a proactive, self-driven attitude.<\/span><\/span><span class=\"EOP SCXW57446198 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-654565e elementor-widget elementor-widget-heading\" data-id=\"654565e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Practicing the \u201cdogfooding\u201d philosophy <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55c475e elementor-widget elementor-widget-text-editor\" data-id=\"55c475e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">ProArch\u00a0doesn\u2019t\u00a0just\u00a0deliver solutions to customers;\u00a0it\u00a0uses\u00a0them internally,\u00a0embodying the\u00a0\u201cdogfooding\u201d\u00a0mindset. For example, when\u00a0it\u00a0develops an AI protection tool,\u00a0it\u00a0deploys\u00a0it internally first\u00a0to ensure that the technology is battle-tested and effective.\u00a0\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Senior engineers build secure foundations using infrastructure as code\u00a0(IaC). These foundations are rigorously tested and improved through security assessments and penetration testing, allowing the\u00a0team\u00a0to\u00a0identify\u00a0and remediate weaknesses in no time. Once\u00a0done, these\u00a0micro-skills gaps are\u00a0addressed\u00a0by\u00a0establishing\u00a0a secure base and promoting targeted skill development\u00a0across the\u00a0team.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f56e5b8 elementor-widget elementor-widget-heading\" data-id=\"f56e5b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Securing investments and bridging the cybersecurity knowledge gap  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05ab074 elementor-widget elementor-widget-text-editor\" data-id=\"05ab074\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Sometimes the\u00a0board or management team members\u00a0fail to\u00a0understand the importance and\u00a0criticality of\u00a0cybersecurity and the cyber risks associated with their\u00a0services or products. This creates\u00a0hurdles\u00a0for CISOs or the cybersecurity team when trying to secure funds and\u00a0budget for\u00a0important security initiatives\u00a0for\u00a0an\u00a0organization.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Wilcox shares his own experience\u00a0where he\u00a0has delivered several presentations to boards over the past\u00a0few\u00a0years on AI-associated risks, building foundational awareness, highlighting the possible risks it could bring to the business, including worst-case financial scenarios, but also the potential business benefits. Striking this balance is essential. This knowledge gap between the board and CISOs can make it difficult to justify budgets and explain the importance of\u00a0the proposed\u00a0security measures,\u00a0perhaps\u00a0until a breach occurs. After an incident of cybercrime, urgency and budget are no\u00a0longer\u00a0constraints, but by then the damage is already done.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da77465 elementor-widget elementor-widget-heading\" data-id=\"da77465\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">There are no real quick fixes   <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8d06c4 elementor-widget elementor-widget-text-editor\" data-id=\"f8d06c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Listen in to\u00a0Jay\u00a0Bavisi\u00a0and\u00a0Ben Wilcox\u2019s\u00a0<\/span><a href=\"https:\/\/www.youtube.com\/watch?v=KOuvhY-CIcI&amp;t=383s\"><span data-contrast=\"none\">CISO &amp; CTO on the Frontline: AI, Identity &amp; The Invisible Cyber War<\/span><\/a><span data-contrast=\"auto\">\u00a0podcast to hear\u00a0some insightful takeaways\u00a0such as\u00a0the joy of\u00a0embracing new challenges without fear, learning\u00a0from\u00a0not only our\u00a0mistakes\u00a0but also our\u00a0successes,\u00a0and\u00a0there are no\u00a0real quick\u00a0fixes\u00a0in the real world.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">For more conversations shaping the future of cybersecurity,\u00a0<\/span><span data-contrast=\"auto\">subscribe<\/span><span data-contrast=\"auto\"> to the Cybersecurity Podcast by EC-Council.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2026 At the heart of every digital business today lies an unceasing\u00a0question: How do you drive technological innovation without compromising security?\u00a0 The\u00a0question\u00a0took center stage\u00a0at\u00a0RSAC 2025,\u00a0where\u00a0EC-Council Group CEO Jay\u00a0Bavisi\u00a0interviewed Ben Wilcox,\u00a0ProArch\u2019s\u00a0dual\u00a0CISO\u2013CTO. Their candid exchange lays out a roadmap on how to balance&hellip;<\/p>\n","protected":false},"author":104,"featured_media":84129,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[13062],"tags":[],"class_list":{"0":"post-84069","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity-podcast"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Balancing Security &amp; Innovation: Insights from RSAC 2025<\/title>\n<meta name=\"description\" content=\"Gain insights from ProArch\u2019s CISO and CTO at RSAC balancing innovation with security while managing evolving cyber risks and business priorities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025\" \/>\n<meta property=\"og:description\" content=\"Gain insights from ProArch\u2019s CISO and CTO at RSAC balancing innovation with security while managing evolving cyber risks and business priorities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-13T12:04:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T06:03:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/AI-Identify-feature-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"415\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laxmi.Yadav@eccouncil.org\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/AI-Identify-feature-image.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laxmi.Yadav@eccouncil.org\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/\"},\"author\":{\"name\":\"Laxmi.Yadav@eccouncil.org\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/73b16d6854043e94f4e0e75086069102\"},\"headline\":\"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025\",\"datePublished\":\"2025-08-13T12:04:16+00:00\",\"dateModified\":\"2026-03-12T06:03:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/\"},\"wordCount\":1104,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Ep-1.jpg\",\"articleSection\":[\"Cybersecurity Podcast\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/\",\"name\":\"Balancing Security & Innovation: Insights from RSAC 2025\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Ep-1.jpg\",\"datePublished\":\"2025-08-13T12:04:16+00:00\",\"dateModified\":\"2026-03-12T06:03:25+00:00\",\"description\":\"Gain insights from ProArch\u2019s CISO and CTO at RSAC balancing innovation with security while managing evolving cyber risks and business priorities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Ep-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Ep-1.jpg\",\"width\":600,\"height\":312},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cybersecurity-podcast\\\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Podcast\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cybersecurity-podcast\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/73b16d6854043e94f4e0e75086069102\",\"name\":\"Laxmi.Yadav@eccouncil.org\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Balancing Security & Innovation: Insights from RSAC 2025","description":"Gain insights from ProArch\u2019s CISO and CTO at RSAC balancing innovation with security while managing evolving cyber risks and business priorities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/","og_locale":"en_US","og_type":"article","og_title":"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025","og_description":"Gain insights from ProArch\u2019s CISO and CTO at RSAC balancing innovation with security while managing evolving cyber risks and business priorities.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-08-13T12:04:16+00:00","article_modified_time":"2026-03-12T06:03:25+00:00","og_image":[{"width":800,"height":415,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/AI-Identify-feature-image.jpg","type":"image\/jpeg"}],"author":"Laxmi.Yadav@eccouncil.org","twitter_card":"summary_large_image","twitter_title":"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/AI-Identify-feature-image.jpg","twitter_misc":{"Written by":"Laxmi.Yadav@eccouncil.org","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/"},"author":{"name":"Laxmi.Yadav@eccouncil.org","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/73b16d6854043e94f4e0e75086069102"},"headline":"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025","datePublished":"2025-08-13T12:04:16+00:00","dateModified":"2026-03-12T06:03:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/"},"wordCount":1104,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/Ep-1.jpg","articleSection":["Cybersecurity Podcast"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/","name":"Balancing Security & Innovation: Insights from RSAC 2025","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/Ep-1.jpg","datePublished":"2025-08-13T12:04:16+00:00","dateModified":"2026-03-12T06:03:25+00:00","description":"Gain insights from ProArch\u2019s CISO and CTO at RSAC balancing innovation with security while managing evolving cyber risks and business priorities.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/Ep-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/Ep-1.jpg","width":600,"height":312},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cybersecurity-podcast\/balancing-security-and-innovation-through-the-right-means-insights-from-proarchs-ciso-cto-at-rsac-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Podcast","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cybersecurity-podcast\/"},{"@type":"ListItem","position":4,"name":"Balancing Security and Innovation through the Right Means: Insights from ProArch\u2019s CISO\u2013CTO at RSAC 2025"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/73b16d6854043e94f4e0e75086069102","name":"Laxmi.Yadav@eccouncil.org"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/104"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84069"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84069\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84129"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}