{"id":830965,"date":"2022-11-03T06:31:00","date_gmt":"2022-11-03T06:31:00","guid":{"rendered":"https:\/\/www.capgemini.com\/dk-en\/?post_type=research-and-insight&#038;p=830965"},"modified":"2025-03-19T05:21:44","modified_gmt":"2025-03-19T05:21:44","slug":"cybersecurity-resilience-rebuilding","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/","title":{"rendered":"Cybersecurity Resilience Rebuilding"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable is-style-blue-line header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:56.00000000000001% 68%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybersecurity<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Cybersecurity Resilience Rebuilding<\/h1><\/div><h2 class=\"reasearchInsightTitle\">Rebuilding IT operations to emerge stronger post-crisis<\/h2><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/12\/Cybersecurity-Resilience-Rebuilding-Final.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><span>Download PDF<\/span><span class=\"type\">154 KB  pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/dk-en\/?post_type=research-and-insight&amp;p=830965\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/dk-en\/?post_type=research-and-insight&amp;p=830965&amp;text=Cybersecurity%20Resilience%20Rebuilding\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/dk-en\/?post_type=research-and-insight&amp;p=830965&amp;text=Cybersecurity%20Resilience%20Rebuilding\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<p>The outbreak of COVID-19 has upended nearly every aspect of life, from the personal aspects of how people live and work to changes in the professional world. The changes in the business world encompass changes to how companies interact with their customers, how customers choose and purchase products and services, and how supply chains deliver them. Numerous studies and surveys suggest that we will see a fundamental change in the way people do business over the next five years, with many asserting that the crisis will have a permanent lasting impact on both their own operations and customers needs. Common to most of the presented visions for future business dynamics is an increased focus on digitalization and IT investment.<\/p>\n\n\n\n<p>This in turn poses an unparalleled cybersecurity challenge, the rapid adoption of new IT-based technologies has historically led to rapid accumulation of technical debt and designs which have proven to embed server cybersecurity risks. However, the crisis also offers the chance for a new beginning \u2013 a chance for businesses to rebuild their IT operations and emerge post-crisis with a strong and resilient cybersecurity foundation.<\/p>\n\n\n\n<p>Here\u2019s Capgemini\u2019s take on three ways to position your organization\u2019s cybersecurity efforts to emerge stronger in the post-crisis world:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Ensure security investments result in relevant capabilities<\/li>\n\n\n\n<li>Evolve faster than the attacker<\/li>\n\n\n\n<li>Think long-term and exploit emerging security technologies<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-conclusion\"><strong>Conclusion<\/strong><\/h4>\n\n\n\n<p>While the long-term implications of COVID-19 remain unknown, companies should focus on building a flexible and resilient cybersecurity foundation that will allow them to emerge stronger, smarter and ready to exploit new technologies post-crisis. In particular, investments that enables security teams to be more agile and which allow for security by design will provide sustained long-term returns.<\/p>\n\n\n\n<p>Find out how Capgemini can help you, visit us at: <a href=\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/<\/a><\/p>\n\n\n\n<p>Subscribe to receive an advance copy of new reports from the Capgemini Research Institute.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/capgemini-research-institute\/subscribe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Subscribe<\/a><\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":324,"featured_media":832028,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"0a0766a4-f62e-433b-a591-14b4cd71d4ef\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":77,"primary_term":"Cybersecurity","featured_focal_points":""},"tags":[],"research-and-insight-type":[68],"theme":[77],"brand":[],"service":[74],"industry":[],"partners":[],"content-group":[],"class_list":["post-830965","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","research-and-insight-type-report","theme-cybersecurity","service-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Resilience Rebuilding - Capgemini Denmark<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Resilience Rebuilding\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Denmark\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-19T05:21:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2880\" \/>\n\t<meta property=\"og:image:height\" content=\"1800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/\",\"name\":\"Cybersecurity Resilience Rebuilding - Capgemini Denmark\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg\",\"datePublished\":\"2022-11-03T06:31:00+00:00\",\"dateModified\":\"2025-03-19T05:21:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/dk-en\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Resilience Rebuilding\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/\",\"name\":\"Capgemini Denmark\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/dk-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Resilience Rebuilding - Capgemini Denmark","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Resilience Rebuilding","og_url":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/","og_site_name":"Capgemini Denmark","article_modified_time":"2025-03-19T05:21:44+00:00","og_image":[{"width":2880,"height":1800,"url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/","url":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/","name":"Cybersecurity Resilience Rebuilding - Capgemini Denmark","isPartOf":{"@id":"https:\/\/www.capgemini.com\/dk-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg","datePublished":"2022-11-03T06:31:00+00:00","dateModified":"2025-03-19T05:21:44+00:00","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#primaryimage","url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg","contentUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/dk-en\/research-and-insight\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Resilience Rebuilding"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/dk-en\/#website","url":"https:\/\/www.capgemini.com\/dk-en\/","name":"Capgemini Denmark","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/dk-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"theme_term_info":[{"id":77,"name":"Cybersecurity"}],"industry_term_info":[],"services_term_info":[{"id":74,"name":"Cybersecurity"}],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Cybersecurity Resilience Rebuilding","url":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Denmark","logo":""},"keywords":[],"dateCreated":"2022-11-03T06:31:00Z","datePublished":"2022-11-03T06:31:00Z","dateModified":"2025-03-19T05:21:44Z"},"rendered":"<meta name=\"parsely-title\" content=\"Cybersecurity Resilience Rebuilding\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/cybersecurity-resilience-rebuilding\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-11-03T06:31:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Denmark","distributor_original_site_url":"https:\/\/www.capgemini.com\/dk-en","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2022\/11\/Cybersecurity-Resilience-Rebuilding.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/research-and-insight\/830965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/users\/324"}],"version-history":[{"count":7,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/research-and-insight\/830965\/revisions"}],"predecessor-version":[{"id":861022,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/research-and-insight\/830965\/revisions\/861022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/media\/832028"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/media?parent=830965"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/tags?post=830965"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/research-and-insight-type?post=830965"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/theme?post=830965"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/brand?post=830965"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/service?post=830965"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/industry?post=830965"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/partners?post=830965"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/content-group?post=830965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}