{"id":611140,"date":"2022-04-06T14:09:00","date_gmt":"2022-04-06T14:09:00","guid":{"rendered":"https:\/\/www.capgemini.com\/us-en\/?post_type=research-and-insight&#038;p=611140"},"modified":"2025-03-06T05:41:57","modified_gmt":"2025-03-06T10:41:57","slug":"cybersecurity-and-data-protection","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/","title":{"rendered":"Cybersecurity and data protection"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Cybersecurity and data protection<\/h1><\/div><h2 class=\"reasearchInsightTitle\">Protecting our company, our employees, and our clients.<\/h2><div class=\"inner-row-insight download-btn\"><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-tw\"><a href=\"https:\/\/twitter.com\/intent\/tweet?url=https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/&amp;text=Cybersecurity and data protection\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-tw\"><\/i><span class=\"sr-only\">Twitter<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/&amp;text=Cybersecurity and data protection\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><h2 class=\"intro-para-title\">As a leader in the digital industry, we take seriously our responsibility to create a trusted environment across our entire ecosystem. We believe that a comprehensive and constantly improving cybersecurity and data protection model will foster an increasingly valuable, yet elusive, asset: digital trust.<\/h2><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-11 col-lg-10 offset-md-1 offset-lg-1\"><div class=\"article-text article-quote-text\">\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/4\/2021\/11\/cert-figures.jpg?w=960\" alt=\"\" class=\"wp-image-539836\"\/><\/figure>\n\n\n\n<p>We are committed to protecting all data entrusted to us and defending our business against cyberattacks. Our cybersecurity and data protection teams enforce data breach and security incident management policies and ensure effective implementation of data, infrastructure, and identity protection obligations. This includes mandatory training programs for colleagues on how to prevent and respond to data breaches and incidents.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-our-cert-services\">Our CERT services<\/h2>\n\n\n\n<p>Our Computer Emergency Response Team (CERT) collaborates with our Security Operations Center (SOC) teams to establish detection rules and coordinate responses in line with an established framework:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/4\/2021\/11\/CERT-diagram.jpg?w=650\" alt=\"\" class=\"wp-image-539837\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-computer-emergency-response-team\">Computer emergency response team<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/4\/2021\/11\/cert-4.jpg?w=300\" alt=\"\" class=\"wp-image-539841\"\/><\/figure>\n\n\n\n<p>The Computer Emergency Response Team (CERT) is responsible for preventing threats and intervening in security incidents impacting Capgemini.<\/p>\n\n\n\n<p>If you have any concerns or want to report an issue, please get in touch using the details below:<\/p>\n\n\n\n<p>\u2013 PGP key: 0x973d58b0c454b4ee<br>\u2013 Phone number: +33 (0)7 64 54 24 53<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"mailto:cert.global@capgemini.com\">Send us an email<\/a><\/td><td><a href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2022\/03\/CERT_CAPGEMINI_RFC2350.pdf\">Download RFC2350<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-we-operate\">How we operate<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-data-protection\">Data protection<\/h3>\n\n\n\n<figure class=\"wp-block-image alignleft\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/4\/2021\/11\/cert-1.jpg?w=300\" alt=\"\" class=\"wp-image-539838\"\/><\/figure>\n\n\n\n<p>Our Binding Corporate Rules (BCRs) are the foundation of our data protection program, setting out our commitment to securing personal data and complying with data protection laws.<\/p>\n\n\n\n<p>First approved by the European Data Protection Authorities in March 2016, and updated in 2019 to meet the requirements of GDPR, they ensure continuous improvement in data protection processes across our entire organization.<\/p>\n\n\n\n<p>Furthermore, our approach to \u2018privacy by design\u2019 means that data privacy measures are embedded throughout all data processing phases to ensure compliant and secure data collection, transmission, and storage<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cybersecurity\">Cybersecurity<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/4\/2021\/11\/cert-2.jpg?w=300\" alt=\"\" class=\"wp-image-539839\"\/><\/figure>\n\n\n\n<p>Our board-sponsored cybersecurity strategy, in place since 2014, is focused on: managing internal and external threats; establishing trust mechanisms within our ecosystem and across our organization; and complying with legal requirements and security standards (with ISO 27001 as a baseline). Each month, we produce incident dashboards and a cyber risk scorecard covering 16 items on technology, human factors, external risks, suppliers, compliance, and policy enforcement.<\/p>\n\n\n\n<p>Our corporate cybersecurity governance ensures a consistent approach built on architecture, and policies aligned with international standards, client practices, and market trends. It helps to develop supply chain security across all stakeholders, including employees, business units, clients, suppliers and partners.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-our-communities\">Our communities<\/h3>\n\n\n\n<p>Internal cybersecurity and data protection communities are a critical component of our operating model that work together on protecting our company, employees, and clients.<\/p>\n\n\n\n<p>The cybersecurity community includes the Group Cybersecurity Officer and team, and Chief Information Security Officers in all global business lines, business units and countries.<\/p>\n\n\n\n<p>The data protection community includes the Group, Regional, and Local Data Protection Officers. In addition, Data Protection Champions are appointed to represent each Group function and global business line.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-protecting-our-clients\">Protecting our clients<\/h3>\n\n\n\n<p>We bring together a business-focused approach, sector-specific expertise, advanced technology, and thousands of skilled professionals to deliver an end-to-end portfolio of cybersecurity services to our clients.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":103,"featured_media":611142,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"154cfe66-5c5e-4777-9110-2b17a120685c\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":0,"primary_term":"","featured_focal_points":""},"tags":[],"research-and-insight-type":[],"theme":[],"brand":[],"service":[],"industry":[],"partners":[],"content-group":[],"class_list":["post-611140","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity and data protection - Capgemini USA<\/title>\n<meta name=\"description\" content=\"Insights on Capgemini cybersecurity and data protection, covering data protection models, CERT services, and cybersecurity strategy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and data protection\" \/>\n<meta property=\"og:description\" content=\"Insights on Capgemini cybersecurity and data protection, covering data protection models, CERT services, and cybersecurity strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini USA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-06T10:41:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2880\" \/>\n\t<meta property=\"og:image:height\" content=\"1880\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/\",\"name\":\"Cybersecurity and data protection - Capgemini USA\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg\",\"datePublished\":\"2022-04-06T14:09:00+00:00\",\"dateModified\":\"2025-03-06T10:41:57+00:00\",\"description\":\"Insights on Capgemini cybersecurity and data protection, covering data protection models, CERT services, and cybersecurity strategy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg\",\"width\":2880,\"height\":1880},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/us-en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/us-en\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity and data protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/\",\"name\":\"Capgemini USA\",\"description\":\"Just another www.capgemini.com site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/e18c469582cc4e2dd2649041406912d2\",\"name\":\"Sai Kiran\",\"url\":\"https:\/\/www.capgemini.com\/us-en\/author\/saikiranb\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity and data protection - Capgemini USA","description":"Insights on Capgemini cybersecurity and data protection, covering data protection models, CERT services, and cybersecurity strategy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity and data protection","og_description":"Insights on Capgemini cybersecurity and data protection, covering data protection models, CERT services, and cybersecurity strategy.","og_url":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/","og_site_name":"Capgemini USA","article_modified_time":"2025-03-06T10:41:57+00:00","og_image":[{"width":2880,"height":1880,"url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/","url":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/","name":"Cybersecurity and data protection - Capgemini USA","isPartOf":{"@id":"https:\/\/www.capgemini.com\/us-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg","datePublished":"2022-04-06T14:09:00+00:00","dateModified":"2025-03-06T10:41:57+00:00","description":"Insights on Capgemini cybersecurity and data protection, covering data protection models, CERT services, and cybersecurity strategy.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#primaryimage","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg","contentUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg","width":2880,"height":1880},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/us-en\/"},{"@type":"ListItem","position":2,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/us-en\/research-and-insight\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity and data protection"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/us-en\/#website","url":"https:\/\/www.capgemini.com\/us-en\/","name":"Capgemini USA","description":"Just another www.capgemini.com site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/us-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/us-en\/#\/schema\/person\/e18c469582cc4e2dd2649041406912d2","name":"Sai Kiran","url":"https:\/\/www.capgemini.com\/us-en\/author\/saikiranb\/"}]}},"theme_term_info":[],"industry_term_info":[],"services_term_info":[],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Cybersecurity and data protection","url":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini USA","logo":""},"keywords":[],"dateCreated":"2022-04-06T14:09:00Z","datePublished":"2022-04-06T14:09:00Z","dateModified":"2025-03-06T10:41:57Z"},"rendered":"<meta name=\"parsely-title\" content=\"Cybersecurity and data protection\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/us-en\/insights\/research-library\/cybersecurity-and-data-protection\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2022-04-06T14:09:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini USA","distributor_original_site_url":"https:\/\/www.capgemini.com\/us-en","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/us-en\/wp-content\/uploads\/sites\/30\/2022\/07\/Capgemini_About-US_DataProtection-1-1.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/research-and-insight\/611140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/users\/103"}],"version-history":[{"count":5,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/research-and-insight\/611140\/revisions"}],"predecessor-version":[{"id":742267,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/research-and-insight\/611140\/revisions\/742267"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media\/611142"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/media?parent=611140"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/tags?post=611140"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/research-and-insight-type?post=611140"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/theme?post=611140"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/brand?post=611140"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/service?post=611140"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/industry?post=611140"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/partners?post=611140"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/us-en\/wp-json\/wp\/v2\/content-group?post=611140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}