{"id":3299,"date":"2024-07-18T14:56:29","date_gmt":"2024-07-18T14:56:29","guid":{"rendered":"https:\/\/www.arthurlawrence.net\/blog\/?p=3299"},"modified":"2024-07-18T14:56:29","modified_gmt":"2024-07-18T14:56:29","slug":"tactics-techniques-and-procedures-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/","title":{"rendered":"Understanding Tactics, Techniques, and Procedures (TTP) in Cybersecurity"},"content":{"rendered":"<p>Cybersecurity defense necessitates an understanding of adversary behavior. For this, cybersecurity professionals employ TTPs (Tactics, Techniques, and Procedures), a framework that enables organizations to stay vigilant in safeguarding their digital assets by adopting an attacker-centric mindset. TTP cybersecurity describes the \u2018whats\u2019 and \u2018hows\u2019 of a cyber-attack.<\/p>\n<p>TTPs are essential for the effective identification and mitigation of cyber intrusions in cybersecurity. TTPs help organizations recognize the types and motives of attacks and assess security vulnerabilities. Using this information, organizations can enhance their security measures and ability to withstand attacks. Continue reading to learn more about TTP cybersecurity.<\/p>\n<h2><strong>TTP Cybersecurity <\/strong><\/h2>\n<p>TTP in cybersecurity stands for Tactics, Techniques, and Procedures. TTP cybersecurity describes the behavior, strategies, and methods that an attacker uses to plan and execute cyberattacks on enterprise networks. Techniques describe the methods by which an attacker achieves the technical objectives. The term tactic describes the attacker\u2019s technical objectives. Procedures are comprehensive descriptions of attacks, which encompass the tools and methods employed by attackers.<\/p>\n<h3><strong>Importance of monitoring TTP<\/strong><\/h3>\n<p>Monitoring and analyzing cybersecurity TTP helps obtain insights into the behavior and execution of specific attacks. It enables you to mitigate and respond to current and future risks more effectively. For instance, certain attackers implement identical techniques of exploitation (TTPs) in each attack. Comprehending the TTPs employed by a particular adversary can facilitate planning for future attacks.<\/p>\n<p>Examining adversary tactics and techniques can reveal a wealth of information. For instance, comprehending the techniques used by cybercriminals can assist in identifying the types of adversary behaviors that your organization is most susceptible to, as well as security vulnerabilities. This information can be used to enhance your defenses against cyber threats by enhancing your threat mitigation and incident response strategies.<\/p>\n<h3><strong>What is TTP in Cyber Security <\/strong><\/h3>\n<h4><strong>Tactics<\/strong><\/h4>\n<p>Tactics define an attacker\u2019s technical objectives (the \u2018why\u2019) for carrying out an action. For instance, the attacker\u2019s objective may be to take sensitive data from your network or install malware on your systems. It encompasses the diverse strategies employed to acquire information for initial exploitation and establish mechanisms for the subsequent attack. For instance, certain threat actors exclusively depend on available information on the Internet, while others may employ social engineering or leverage contacts in intermediary organizations. The threat actors can approach the target organization either individually or in groups once they have obtained information such as the email addresses of the personnel.<\/p>\n<h4><strong>Techniques<\/strong><\/h4>\n<p>Techniques are the means by which the attacker achieves their goals. For instance, if passwords are either encrypted or unknown, an attacker may implement brute force methods to acquire access to accounts. In 2023, <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/security-awareness-training\/2024-state-of-phish-report#:~:text=In%202023%2C%2071%25%20of%20organizations,of%20damage%20to%20their%20reputation.\">71% of firms reported at least one phishing attack<\/a>, which is a common technique used by attackers.<\/p>\n<p>Specific tactics include sub-techniques that provide a more detailed account of how an attacker executes a specific technique. For example, in brute force, an attacker can attempt to predict passwords to gain access to an account or engage in password cracking, which entails using credentials from unrelated accounts to access target accounts.<\/p>\n<h4><strong>Procedures<\/strong><\/h4>\n<p>The procedure means the components of an attack, including the tools and methods that the attacker uses. It is the precise implementation that an attacker employs to accomplish the technical objective. For example, an attacker may employ CrackMapExec, an exploitation tool that can gather information on targeted networks, to execute brute force tactics and sub-techniques.<\/p>\n<h2><strong>Benefits of Leveraging TTPs in Cybersecurity <\/strong><\/h2>\n<p>A comprehensive understanding of TTP cybersecurity is crucial for the organization\u2019s security strategy. Businesses can enhance their data protection measure in a variety of ways by utilizing the insights obtained from TTP analysis.<\/p>\n<p><strong>&#8211; Customized security measures<\/strong><\/p>\n<p>Organizations can establish security controls that are specifically designed to address the most urgent threats they encounter by comprehending particular TTPs. This may involve the implementation of enhanced endpoint detection for recognized malware procedures or the implementation of more stringent access controls to prevent specific attack strategies.<\/p>\n<p><strong>&#8211; Enhanced threat intelligence<\/strong><\/p>\n<p>By comprehending the evolving nature of adversary actions, businesses can remain informed about current and actionable threat intelligence. With this information, security teams can anticipate potential attacks and modify their defenses in advance.<\/p>\n<p><strong>&#8211; Incident response plans <\/strong><\/p>\n<p>Detailed scenarios based on actual attacker procedures facilitate incident response exercises. This ensures that the plans are effective, up-to-date, and resilient to real-world cyber occurrences.<\/p>\n<p><strong>&#8211; Proactive defense posture<\/strong><\/p>\n<p>The analysis of TTPs enables the identification of not only imminent vulnerabilities but also developing cyber threat trends, facilitating the transition from reactive firefighting to proactive risk management. Organizations are better equipped to prevent incidents rather than merely responding to them after they have occurred.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>TTP cybersecurity is advantageous for threat analysis and threat actor profiling. An understanding of the attacker\u2019s TTPs is necessary for comprehending and defending against threat actors. By comprehending the methods employed by an attacker, it is possible to anticipate and identify emergent threats at an early stage. Organizations can achieve a more profound level of situational awareness by integrating an understanding of TTP cybersecurity into their broader security framework. It has a significant influence on a variety of aspects, including policy-making, strategic planning, daily operational decisions, and individual user behaviors. Firms may eventually integrate resilience into their organizational ethos to safeguard sensitive data assets.<\/p>\n<p>Arthur Lawrence\u2019s holistic <span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.arthurlawrence.net\/cyber-security\">cybersecurity solution suite<\/a> <\/span>is here for you to improve your security program. Our cybersecurity services, which range from audit and assessment services to fractional CISO and vulnerability management, let you evaluate threats, risks, and compliance requirements, as well as make informed decisions regarding best practices. Reach out to us for the protection of your data and systems.<\/p>\n","protected":false},"excerpt":{"rendered":"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe. ","protected":false},"author":2,"featured_media":3301,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,10,192,2],"tags":[],"class_list":["post-3299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-careers","category-digital-transformation","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TTP Cybersecurity (Tactics, Techniques and Procedures)<\/title>\n<meta name=\"description\" content=\"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TTP Cybersecurity (Tactics, Techniques and Procedures)\" \/>\n<meta property=\"og:description\" content=\"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/arthurlawrenceworldwide\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-18T14:56:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"473\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Arthur Lawrence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"TTP Cybersecurity (Tactics, Techniques and Procedures)\" \/>\n<meta name=\"twitter:description\" content=\"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@arthurlawrence_\" \/>\n<meta name=\"twitter:site\" content=\"@arthurlawrence_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arthur Lawrence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/\"},\"author\":{\"name\":\"Arthur Lawrence\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/40e2e730df4dbdfba82e45c7bfd4d386\"},\"headline\":\"Understanding Tactics, Techniques, and Procedures (TTP) in Cybersecurity\",\"datePublished\":\"2024-07-18T14:56:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/\"},\"wordCount\":936,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp\",\"articleSection\":[\"Blog\",\"Careers\",\"Digital Transformation\",\"Home\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/\",\"name\":\"TTP Cybersecurity (Tactics, Techniques and Procedures)\",\"isPartOf\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp\",\"datePublished\":\"2024-07-18T14:56:29+00:00\",\"description\":\"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp\",\"contentUrl\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp\",\"width\":1200,\"height\":473,\"caption\":\"ttp cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.arthurlawrence.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Tactics, Techniques, and Procedures (TTP) in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#website\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/\",\"name\":\"Arthur Lawrence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#organization\"},\"alternateName\":\"AL\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arthurlawrence.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#organization\",\"name\":\"Arthur Lawrence\",\"alternateName\":\"AL\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2020\/08\/Arthur-Lawrence-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2020\/08\/Arthur-Lawrence-Blog-Logo.png\",\"width\":81,\"height\":89,\"caption\":\"Arthur Lawrence\"},\"image\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/arthurlawrenceworldwide\",\"https:\/\/x.com\/arthurlawrence_\",\"https:\/\/www.linkedin.com\/company\/arthur-lawrence\/\",\"https:\/\/www.youtube.com\/user\/arthurlawrenceus\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/40e2e730df4dbdfba82e45c7bfd4d386\",\"name\":\"Arthur Lawrence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f181090f9b1ab21acc79d48f0b9ad2ac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f181090f9b1ab21acc79d48f0b9ad2ac?s=96&d=mm&r=g\",\"caption\":\"Arthur Lawrence\"},\"sameAs\":[\"http:\/\/www.arthurlawrence.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TTP Cybersecurity (Tactics, Techniques and Procedures)","description":"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"TTP Cybersecurity (Tactics, Techniques and Procedures)","og_description":"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe.","og_url":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/arthurlawrenceworldwide","article_published_time":"2024-07-18T14:56:29+00:00","og_image":[{"width":1200,"height":473,"url":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp","type":"image\/webp"}],"author":"Arthur Lawrence","twitter_card":"summary_large_image","twitter_title":"TTP Cybersecurity (Tactics, Techniques and Procedures)","twitter_description":"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe.","twitter_image":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp","twitter_creator":"@arthurlawrence_","twitter_site":"@arthurlawrence_","twitter_misc":{"Written by":"Arthur Lawrence","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/"},"author":{"name":"Arthur Lawrence","@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/40e2e730df4dbdfba82e45c7bfd4d386"},"headline":"Understanding Tactics, Techniques, and Procedures (TTP) in Cybersecurity","datePublished":"2024-07-18T14:56:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/"},"wordCount":936,"commentCount":0,"publisher":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp","articleSection":["Blog","Careers","Digital Transformation","Home"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/","url":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/","name":"TTP Cybersecurity (Tactics, Techniques and Procedures)","isPartOf":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp","datePublished":"2024-07-18T14:56:29+00:00","description":"TTP cybersecurity (tactics, techniques, and procedures) is vital for the identification and mitigation of cyber-attacks, enabling companies to stay safe.","breadcrumb":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#primaryimage","url":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp","contentUrl":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2024\/07\/ttp-cybersecurity.webp","width":1200,"height":473,"caption":"ttp cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arthurlawrence.net\/blog\/tactics-techniques-and-procedures-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.arthurlawrence.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding Tactics, Techniques, and Procedures (TTP) in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.arthurlawrence.net\/blog\/#website","url":"https:\/\/www.arthurlawrence.net\/blog\/","name":"Arthur Lawrence","description":"","publisher":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/#organization"},"alternateName":"AL","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arthurlawrence.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arthurlawrence.net\/blog\/#organization","name":"Arthur Lawrence","alternateName":"AL","url":"https:\/\/www.arthurlawrence.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2020\/08\/Arthur-Lawrence-Blog-Logo.png","contentUrl":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2020\/08\/Arthur-Lawrence-Blog-Logo.png","width":81,"height":89,"caption":"Arthur Lawrence"},"image":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/arthurlawrenceworldwide","https:\/\/x.com\/arthurlawrence_","https:\/\/www.linkedin.com\/company\/arthur-lawrence\/","https:\/\/www.youtube.com\/user\/arthurlawrenceus"]},{"@type":"Person","@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/40e2e730df4dbdfba82e45c7bfd4d386","name":"Arthur Lawrence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f181090f9b1ab21acc79d48f0b9ad2ac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f181090f9b1ab21acc79d48f0b9ad2ac?s=96&d=mm&r=g","caption":"Arthur Lawrence"},"sameAs":["http:\/\/www.arthurlawrence.net"]}]}},"_links":{"self":[{"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/posts\/3299"}],"collection":[{"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/comments?post=3299"}],"version-history":[{"count":0,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/posts\/3299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/media\/3301"}],"wp:attachment":[{"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/media?parent=3299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/categories?post=3299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/tags?post=3299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}