{
"author": {
"name": "Gaurav Kumar Jeff Schaeffer",
"webUrl": "/author/profile/gaurav-kumar-jeff-schaeffer/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 2,
"social": [],
"articles": [
{
"uri": "/2017/07/18/a-proactive-and-pragmatic-approach-to-cyber-risk-m/",
"title": "A Proactive and Pragmatic Approach to Cyber Risk Management",
"byline": " Gaurav Kumar, Jeff Schaeffer ",
"kicker": "Best Practices",
"prettyDate": "July 18, 2017",
"timeToRead": "7 minute",
"image": {
"uri": "https://images.treasuryandrisk.com/contrib/content/uploads/sites/411/2017/07/2016-10-03_Fingerprint-security_616x372.png",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/gaurav-kumar-jeff-schaeffer/",
"name": "Gaurav Kumar, Jeff Schaeffer"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "How to use the new AICPA cybersecurity attestation reporting framework.",
"body": null
},
{
"uri": "/2017/07/18/a-proactive-and-pragmatic-approach-to-cyber-risk-m/",
"title": "A Proactive and Pragmatic Approach to Cyber Risk Management",
"byline": "Gaurav Kumar, Jeff Schaeffer",
"kicker": "Best Practices",
"prettyDate": "July 18, 2017",
"timeToRead": "8 minute",
"image": {
"uri": "https://images.treasuryandrisk.com/contrib/content/uploads/sites/411/2017/07/2016-10-03_Fingerprint-security_616x372.png",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/gaurav-kumar-jeff-schaeffer/",
"name": "Gaurav Kumar, Jeff Schaeffer"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "How to use the new AICPA cybersecurity attestation reporting framework.",
"body": null
}
]
}
}