{"id":666697,"date":"2022-03-30T07:47:59","date_gmt":"2022-03-30T07:47:59","guid":{"rendered":"https:\/\/www.capgemini.com\/dk-en\/?page_id=666697"},"modified":"2025-03-18T17:00:08","modified_gmt":"2025-03-18T17:00:08","slug":"cyber-defense-center","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/","title":{"rendered":"Cyber Defense Center"},"content":{"rendered":"\n<div class=\"wp-block-cg-blocks-hero-picture-card undefined  heroPictureCard\"><div class=\"heroPictureCardBgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg\" class=\"desktopImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg\" class=\"mobileImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-8 col-lg-6\"><div class=\"heroPictureCardBox\"><div class=\"heroPictureCardBoxTitle\"><h1 data-maxlength=\"144\">Cyber Defense Center<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"small-device\"><div class=\"brandLogoWrapper\"> <\/div><\/div><\/div>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">Almost all organizations will experience a data security breach this year. It\u2019s how you respond that makes all the difference.<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.capgemini.com\/dk-en\/resources\/soc-security-tailored-to-your-business-needs\/\">CDC: Security Tailored to Your Business Needs<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-our-network-of-connected-24-7-cyber-defense-centers-cdcs-gives-you-the-resources-and-skills-you-need-to-counter-the-threat-fast\">Our network of connected 24\/7 Cyber Defense Centers (CDCs) gives you the resources and skills you need to counter the threat \u2013 fast.<\/h3>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-a-new-generation-of-cybersecurity\">A new generation of cybersecurity<\/h2>\n\n\n\n<p>It takes an average 99 days* for a malicious attack to be identified. In the meantime, data privacy and protection have become core to today\u2019s security strategies: data fuels business success. It\u2019s clear that a new generation of cybersecurity is needed. Even if you are well protected with the right tools and the right processes in place, you still leave yourself open to attack if you are not monitoring systems; detecting potential security incidents; and able to make changes to your operations quickly when a threat is detected.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"SOC: Security that Adapts to your Business Priorities\" width=\"960\" height=\"540\" src=\"https:\/\/www.youtube.com\/embed\/LyirJAsVH0A?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding and assessing your risks<\/h2>\n\n\n\n<p>We recognize that every enterprise has its own unique security requirements based on the market and market segment they operate in. That\u2019s why we always begin by helping our clients understand and quantify their risk profiles, identify critical data assets, and assess their current security strategies and levels of protection. Only then will we tailor the end-to-end services delivered through our proven Cyber defense center (CDC) model to each client\u2019s specific context and business ambitions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Your security; your choice of delivery model<\/h2>\n\n\n\n<p>There is no one-size-fits all approach to cybersecurity. So, our services are offered though different delivery modes based on the information we gather about your security needs \u2013 a Dedicated SOC, a Managed SOC, or our Hybrid model. Our network of global CDCs stretches across the world, with CDCs in India, Europe and North America complemented by satellite CDCs. They collaborate, share expertise and best practices, and communicate success stories in their relentless pursuit of robust cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threat intelligence and regulatory compliance<\/h2>\n\n\n\n<p>We use data to turn our clients from the hunted into the threat hunters. We bring together SIEM, network security monitoring, endpoints monitoring, payload analysis and offline big data analytics in an intelligence-driven approach. This incorporates a broad range of threat intelligence sources, allied with industry-leading analytics capabilities. We then use the data to align a client\u2019s required cybersecurity actions with the specific needs of each market in which they are active.<br>We also help clients comply with regulatory changes relating to security, including Europe\u2019s NIS Directive, the EU\u2019s GDPR, and New York State Department of Financial Services regulations in the US.<\/p>\n\n\n\n<p>*Mandiant (a FireEye company), M-Trends 2017 report<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Podcast: An intelligence-led approach to cybersecurity<\/h2>\n\n\n\n<p>Join&nbsp;<a href=\"https:\/\/www.capgemini.com\/dk-en\/experts\/cybersecurity\/richard-starnes\/\">Richard Starnes<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.capgemini.com\/dk-en\/experts\/cybersecurity\/christer-jansson\/\">Christer Jansson<\/a>&nbsp;as they discuss the advantages of a Security Operations Center, and how an intelligence-led approach can help organizations monitor, detect, and respond to cyber threats.<\/p>\n\n\n\n\n\n<p><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":151,"featured_media":0,"parent":607284,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[8,18,5,30,10,14,17,7,26,6,28,23,29,20,24],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[],"industry":[],"partners":[],"page-type":[],"content-group":[],"class_list":["post-666697","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Defense Center - Capgemini Denmark<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Defense Center\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Denmark\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T17:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\",\"name\":\"Cyber Defense Center - Capgemini Denmark\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg\",\"datePublished\":\"2022-03-30T07:47:59+00:00\",\"dateModified\":\"2025-03-18T17:00:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Solutions\",\"item\":\"https:\/\/www.capgemini.com\/dk-en\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Defense Center\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/\",\"name\":\"Capgemini Denmark\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/dk-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Defense Center - Capgemini Denmark","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Defense Center","og_url":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/","og_site_name":"Capgemini Denmark","article_modified_time":"2025-03-18T17:00:08+00:00","og_image":[{"url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/","url":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/","name":"Cyber Defense Center - Capgemini Denmark","isPartOf":{"@id":"https:\/\/www.capgemini.com\/dk-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg","datePublished":"2022-03-30T07:47:59+00:00","dateModified":"2025-03-18T17:00:08+00:00","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#primaryimage","url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg","contentUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/2022\/03\/Capture-55.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Solutions","item":"https:\/\/www.capgemini.com\/dk-en\/solutions\/"},{"@type":"ListItem","position":2,"name":"Cyber Defense Center"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/dk-en\/#website","url":"https:\/\/www.capgemini.com\/dk-en\/","name":"Capgemini Denmark","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/dk-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/dk-en\/solutions\/cyber-defense-center\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Cyber Defense Center","url":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Denmark","logo":""},"keywords":[],"dateCreated":"2022-03-30T07:47:59Z","datePublished":"2022-03-30T07:47:59Z","dateModified":"2025-03-18T17:00:08Z"},"rendered":"<meta name=\"parsely-title\" content=\"Cyber Defense Center\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/dk-en\/solutions\/cyber-defense-center\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-03-30T07:47:59Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/mockup.png","featured_image_alt":false,"jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Denmark","distributor_original_site_url":"https:\/\/www.capgemini.com\/dk-en","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/666697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/comments?post=666697"}],"version-history":[{"count":20,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/666697\/revisions"}],"predecessor-version":[{"id":859696,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/666697\/revisions\/859696"}],"up":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/607284"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/media?parent=666697"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/brand?post=666697"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/partner_type?post=666697"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/service?post=666697"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/industry?post=666697"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/partners?post=666697"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/page-type?post=666697"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/content-group?post=666697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}