{"id":1913,"date":"2021-05-17T18:46:18","date_gmt":"2021-05-17T22:46:18","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1913"},"modified":"2021-05-17T18:46:21","modified_gmt":"2021-05-17T22:46:21","slug":"president-biden-signs-cybersecurity-executive-order","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/","title":{"rendered":"President Biden Signs Cybersecurity Executive Order"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-the-government-mindset-around-cybersecurity-is-changing-from-reaction-to-prevention-the-executive-order-is-a-good-start-but-congress-needs-to-take-further-action\">The government mindset around cybersecurity is changing from reaction to prevention. The executive order is a good start, but Congress needs to take further action.<\/h2>\n\n\n\n<p>The last year saw more <a href=\"https:\/\/www.pwvconsultants.com\/blog\/four-major-cybersecurity-threats-2020\/\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity issues<\/a> than most can remember in recent years. The coronavirus pandemic forced businesses to send their entire workforce home, minus essential employees. The majority of businesses were unprepared for this and lacked the security measures needed to protect sensitive information. Threat actors knew this and, as criminals, pounced on the opportunity to break through those weakened defenses. Attacks rose, the discovery of novel vulnerabilities and configuration problems rose, and businesses struggled to keep up with it all.\u00a0<\/p>\n\n\n\n<p>Last week, President Biden <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/05\/12\/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks\/\" target=\"_blank\" rel=\"noreferrer noopener\">signed an executive order<\/a> around cybersecurity defenses. The order specifically mentions the SolarWinds, Microsoft Exchange server and the Colonial Pipeline breaches as factors in this decision. The order focuses on \u201cimproving the nation\u2019s cybersecurity.\u201d and outlines changes to be made. These changes include:<\/p>\n\n\n\n<ul><li>Removing barriers to threat information sharing between government and the private sector<\/li><li>Modernization and implementation of stronger cybersecurity standards in the federal government<\/li><li>Improving software supply chain security<\/li><li>Establishing a cybersecurity safety review board<\/li><li>Creating a standard playbook for responding to cyber incidents<\/li><li>Improving detection of cybersecurity incidents on federal government networks<\/li><li>Improving investigative and remediation capabilities<\/li><\/ul>\n\n\n\n<p>The standardized playbook will be reviewed by the director of CISA, and NIST has been tasked with developing a labeling program to help consumers and businesses better understand the security capabilities of IoT devices. Think about the Energy Star labels on appliances, the order looks to make a similar type of label for IoT devices based on the security embedded within it.<\/p>\n\n\n\n<p>All of this is fantastic, it\u2019s a good first step to creating standards and regulations around cybersecurity and cyberattacks. The main reason cyberattacks are so prominent, especially today, is because the repercussions aren\u2019t concrete. Plus, with the barriers in information sharing between the private sector and law enforcement, it takes entirely too long to trace an attack. By the time investigators are bounced through several servers in different countries to pinpoint an exact location, the attacker is no longer there.&nbsp;<\/p>\n\n\n\n<p>What we really need is congressional legislation and action around cyber activity. This order gets the ball rolling and shifts the mindset from reaction to prevention, which should always be a top priority for any business. Incident response plans are important, but preventing these attacks is much more cost effective, among other benefits. Senator Mark Warner took to Twitter, saying, &#8220;This executive order is a good first step, but executive orders can only go so far.\u201d His tweet continues:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">This executive order is a good first step, but executive orders can only go so far.\u00a0Congress will have to step up &amp; do more to address our cyber vulnerabilities, &amp; I look forward to working with the administration &amp; my colleagues on both sides of the aisle to close those gaps. <a href=\"https:\/\/t.co\/O8w1Ts9ddg\">https:\/\/t.co\/O8w1Ts9ddg<\/a><\/p>&mdash; Mark Warner (@MarkWarner) <a href=\"https:\/\/twitter.com\/MarkWarner\/status\/1392637540784644096?ref_src=twsrc%5Etfw\">May 13, 2021<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>There are a few takeaways from this. The US government finally seems to be taking notice of cybersecurity problems and adjusting their mindset. This is good, but it remains to be seen how far they actually take it. The creation of the playbook will be for federal and government agencies, but the private sector has to follow suit. Businesses throughout the country should pay close attention to what the government does and ensure they are taking similar action. Removing barriers in information sharing is going to take some time. There will be red tape, there may be new legislation required and creating a streamlined process will take time. Still, this is another step in the right direction.<\/p>\n\n\n\n<p>Executive orders can only go so far. But it\u2019s clear that something has to be done to protect the security of our infrastructure, supply chains and any other foundational economic necessities. If you\u2019re a business owner, take note. Pay attention to what happens with this order, what Congress decides to do with legislation and what the government puts into place for its own security. Consult an expert to review what you currently have in place and make recommendations for any gaping holes. Protect your business and your livelihood! Even if nothing else comes of this except Energy Star-like ratings for security in IoT devices, I will count this as success. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>President Biden signed an executive order on cybersecurity. Congress will need to take further action to supplement the order.<\/p>\n","protected":false},"author":1,"featured_media":1929,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,5,14],"tags":[2308,25,1910,31,1962,2307,1855,2306,1819],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>President Biden Signs Cybersecurity Executive Order - PWV Consultants<\/title>\n<meta name=\"description\" content=\"President Biden signed an executive order on cybersecurity. Congress will need to take further action to supplement the order.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"President Biden Signs Cybersecurity Executive Order\" \/>\n<meta property=\"og:description\" content=\"President Biden signed an executive order on cybersecurity. Congress will need to take further action to supplement the order.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-17T22:46:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-17T22:46:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"President Biden Signs Cybersecurity Executive Order\",\"datePublished\":\"2021-05-17T22:46:18+00:00\",\"dateModified\":\"2021-05-17T22:46:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg\",\"keywords\":[\"Congress\",\"cyber attack\",\"CyberSec\",\"Cybersecurity\",\"IoT devices\",\"Joe Biden\",\"POTUS\",\"President Biden\",\"regulations\"],\"articleSection\":[\"Business\",\"Cyber Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/\",\"name\":\"President Biden Signs Cybersecurity Executive Order - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg\",\"datePublished\":\"2021-05-17T22:46:18+00:00\",\"dateModified\":\"2021-05-17T22:46:21+00:00\",\"description\":\"President Biden signed an executive order on cybersecurity. Congress will need to take further action to supplement the order.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg\",\"width\":2560,\"height\":1920,\"caption\":\"Politics of White House and President of USA United states concept. Podium speaker tribune with USA flags and sign of White House. 3d illustration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"President Biden Signs Cybersecurity Executive Order\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"President Biden Signs Cybersecurity Executive Order - PWV Consultants","description":"President Biden signed an executive order on cybersecurity. Congress will need to take further action to supplement the order.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/","og_locale":"en_US","og_type":"article","og_title":"President Biden Signs Cybersecurity Executive Order","og_description":"President Biden signed an executive order on cybersecurity. Congress will need to take further action to supplement the order.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-05-17T22:46:18+00:00","article_modified_time":"2021-05-17T22:46:21+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"President Biden Signs Cybersecurity Executive Order","datePublished":"2021-05-17T22:46:18+00:00","dateModified":"2021-05-17T22:46:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/"},"wordCount":677,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg","keywords":["Congress","cyber attack","CyberSec","Cybersecurity","IoT devices","Joe Biden","POTUS","President Biden","regulations"],"articleSection":["Business","Cyber Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/","url":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/","name":"President Biden Signs Cybersecurity Executive Order - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg","datePublished":"2021-05-17T22:46:18+00:00","dateModified":"2021-05-17T22:46:21+00:00","description":"President Biden signed an executive order on cybersecurity. Congress will need to take further action to supplement the order.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/05\/Biden-Executive-Order-Cybersecurity-scaled.jpeg","width":2560,"height":1920,"caption":"Politics of White House and President of USA United states concept. Podium speaker tribune with USA flags and sign of White House. 3d illustration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/president-biden-signs-cybersecurity-executive-order\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"President Biden Signs Cybersecurity Executive Order"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1913"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1913"}],"version-history":[{"count":6,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1913\/revisions"}],"predecessor-version":[{"id":2199,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1913\/revisions\/2199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1929"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}