{"id":652,"date":"2020-08-14T14:05:00","date_gmt":"2020-08-14T18:05:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=652"},"modified":"2020-08-13T18:35:16","modified_gmt":"2020-08-13T22:35:16","slug":"capital-one-from-cloud-luminary-to-data-breach","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/","title":{"rendered":"Capital One: From Cloud Luminary to Data Breach"},"content":{"rendered":"\n<p>The other day, we discussed how <a href=\"https:\/\/www.pwvconsultants.com\/blog\/what-corporations-should-learn-from-capital-one\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Capital One\u2019s 2019 data breach<\/a> of over 100 million customers could have been completely avoided if executives had allowed security teams to fix a known problem. What we didn\u2019t discuss is how Capital One open-sourced their Cloud Custodian, designed specifically for them but shared on GitHub for other companies, and they still got breached.<\/p>\n\n\n\n<p>Let\u2019s back up a little. In 2016, Capital One was a darling luminary of cloud security and compliance. They began developing what would become Cloud Custodian in July 2015. The product takes advantage of AWS\u2019s CloudWatch Events and Lambda. CWE allows for event monitoring in a more efficient manner than before the service was available. Lambda can, based on the event trigger in CWE, launch a set of resources for a given set of rules for a set period of time.<\/p>\n\n\n\n<p>\u201cCloud Custodian is a rules engine that lets us define policies to be well-managed in AWS. You can [determine]&nbsp;a number infrastructure resources and every organization has a set of policies to be achieved around those resources,\u201d&nbsp;Kapil Thangavelu, technical fellow and&nbsp;primary developer of the Cloud Custodian project&nbsp;told <a href=\"https:\/\/techcrunch.com\/2016\/04\/19\/capital-one-open-sources-cloud-custodian-aws-resource-management-tool\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">TechCrunch<\/a>.<\/p>\n\n\n\n<p>The TechCrunch article goes on to say that the ability to define policies in this way resulted in a 25% reduction in use of AWS resources. For Capital One and other companies that size, that\u2019s a nice chunk of change. Prior to Cloud Custodian, the financial institution created scripts for each requirement with no central oversight. Cloud Custodian centralizes creation, monitoring and management of policies that previously required multiple tools.<\/p>\n\n\n\n<p>Cloud Custodian can pinpoint the exact resources it needs at the exact time it needs them and shut those resources down when the event is over. It is also supposed to give administrators more visibility and control over their cloud infrastructure so that compliance is assured and all resources are being used.<\/p>\n\n\n\n<p>Capital One open-sourced Cloud Custodian on a public GitHub page on 2016 to fanfare, so that other companies could benefit from the tool. It also meant that other people would help with maintenance and improvements because more devs would have their eyes on it.<\/p>\n\n\n\n<p>While some might say that this product should have been able to detect the breach and send resources to stop it, it&#8217;s not actually a failure of the product. The product may have very well been able to stop the breach, but because the attack used a known weakness, the set rule may not have applied. Or it was circumvented. Either way, hackers&#8217; ability to get past security measures are becoming increasingly sophisticated.<\/p>\n\n\n\n<p>Capital One now has to pay $80 million in fines. But they also must establish a compliance committee by the end of the month. The committee will meet quarterly, beginning in October, and will be required to provide regular updates. Capital One is also ordered to create an action plan detailing steps it is taking to improve security.<\/p>\n\n\n\n<p>In an email to <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.theverge.com\/2020\/8\/8\/21359761\/capital-one-80-million-fine-2019-data-breach?fbclid=IwAR1oVmF0OVDgUNpm_kTJ75-_SpQp7nSUvnAv4iWQIxkgUnanh9PqTPWzl68\" target=\"_blank\" rel=\"noreferrer noopener\">The Verge<\/a>, a Capital One spokesperson said in an email&nbsp;that controls the company put in place before last year\u2019s incident \u201cenabled us to secure our data before any customer information could be used or disseminated and helped authorities quickly arrest the hacker.\u201d&nbsp;Since the incident, the spokesperson added, the company has&nbsp;<em>\u201c<\/em>invested significant additional resources into further strengthening our cyber defenses, and have made substantial progress in addressing the requirements of these orders.\u201d <\/p>\n\n\n\n<p>It appears that Capital One is learning from their mistake and will do their due diligence going forward. As stated in our original article, it is imperative that executives listen to their security teams. It is imperative that every single business has cybersecurity protocols in place. And, just as important as being proactive in preventing attacks, having the appropriate <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.pwvconsultants.com\/blog\/components-of-successful-incident-response-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">incident response plan<\/a> in place is also essential. Don\u2019t be the next victim. Be proactive. Prepare. Monitor. Know what is normal. Set alerts. Keep your business afloat by protecting every piece of sensitive and\/or private information you have on hand. And then remember, the second you have everything secured hackers are finding new ways to breach, so you have to: Be proactive. Prepare. Monitor. Know what is normal. Set alerts&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Capital One was once considered a darling luminary of cloud security, developing CloudCustodian in 2015. But in 2019, they were still breached.<\/p>\n","protected":false},"author":1,"featured_media":666,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[3,5,959],"tags":[1061,1481,1517,1518,1516,1520,31,926,1521,1519],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Capital One: From Cloud Luminary to Data Breach - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Capital One was once considered a darling luminary of cloud security, developing CloudCustodian in 2015. But in 2019, they were still breached.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Capital One: From Cloud Luminary to Data Breach\" \/>\n<meta property=\"og:description\" content=\"Capital One was once considered a darling luminary of cloud security, developing CloudCustodian in 2015. But in 2019, they were still breached.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-14T18:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-13T22:35:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Capital One: From Cloud Luminary to Data Breach\",\"datePublished\":\"2020-08-14T18:05:00+00:00\",\"dateModified\":\"2020-08-13T22:35:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/\"},\"wordCount\":712,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg\",\"keywords\":[\"AWS\",\"Capital one\",\"CloudCustodian\",\"CloudWatch Events\",\"Coud\",\"CWE\",\"Cybersecurity\",\"data breach\",\"GitHub\",\"Lambda\"],\"articleSection\":[\"Cloud\",\"Cyber Security\",\"Data Breaches\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/\",\"name\":\"Capital One: From Cloud Luminary to Data Breach - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg\",\"datePublished\":\"2020-08-14T18:05:00+00:00\",\"dateModified\":\"2020-08-13T22:35:16+00:00\",\"description\":\"Capital One was once considered a darling luminary of cloud security, developing CloudCustodian in 2015. But in 2019, they were still breached.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg\",\"width\":1920,\"height\":1600,\"caption\":\"Image by ambercoin from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Capital One: From Cloud Luminary to Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Capital One: From Cloud Luminary to Data Breach - PWV Consultants","description":"Capital One was once considered a darling luminary of cloud security, developing CloudCustodian in 2015. But in 2019, they were still breached.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"Capital One: From Cloud Luminary to Data Breach","og_description":"Capital One was once considered a darling luminary of cloud security, developing CloudCustodian in 2015. But in 2019, they were still breached.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-08-14T18:05:00+00:00","article_modified_time":"2020-08-13T22:35:16+00:00","og_image":[{"width":1920,"height":1600,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Capital One: From Cloud Luminary to Data Breach","datePublished":"2020-08-14T18:05:00+00:00","dateModified":"2020-08-13T22:35:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/"},"wordCount":712,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg","keywords":["AWS","Capital one","CloudCustodian","CloudWatch Events","Coud","CWE","Cybersecurity","data breach","GitHub","Lambda"],"articleSection":["Cloud","Cyber Security","Data Breaches"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/","url":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/","name":"Capital One: From Cloud Luminary to Data Breach - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg","datePublished":"2020-08-14T18:05:00+00:00","dateModified":"2020-08-13T22:35:16+00:00","description":"Capital One was once considered a darling luminary of cloud security, developing CloudCustodian in 2015. But in 2019, they were still breached.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/08\/Capital-One-from-Cloud-Luminary-to-Data-Breach.jpg","width":1920,"height":1600,"caption":"Image by ambercoin from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/capital-one-from-cloud-luminary-to-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Capital One: From Cloud Luminary to Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/652"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=652"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/652\/revisions"}],"predecessor-version":[{"id":668,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/652\/revisions\/668"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/666"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}