{
"author": {
"name": "Randy Sadler",
"webUrl": "/author/profile/randy-sadler/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 2,
"social": [],
"articles": [
{
"uri": "/2022/03/23/risk-management-in-the-digital-age/",
"title": "Risk Management in the Digital Age",
"byline": "Randy Sadler",
"kicker": "Best Practices",
"prettyDate": "March 23, 2022",
"timeToRead": "7 minute",
"image": {
"uri": "https://images.treasuryandrisk.com/contrib/content/uploads/sites/411/2022/03/2016-12-14-Risk-umbrella-storm_616x372.png",
"width": "1200",
"height": "724"
},
"authors": [
{
"webUrl": "/author/profile/randy-sadler/",
"name": "Randy Sadler"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "Technology is changing rapidly. Here's how to address impending risks.",
"body": null
},
{
"uri": "/2021/02/04/mitigating-losses-from-intellectual-property-theft/",
"title": "Mitigating Losses from Intellectual Property Theft",
"byline": "Randy Sadler",
"kicker": "Best Practices",
"prettyDate": "February 04, 2021",
"timeToRead": "11 minute",
"image": {
"uri": "https://images.treasuryandrisk.com/contrib/content/uploads/sites/411/2021/02/2021-02-04_IP-theft.png",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/randy-sadler/",
"name": "Randy Sadler"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "IP threats are on the rise. Here's how to protect your company's \"golden goose.\"",
"body": null
}
]
}
}