{"id":3605,"date":"2025-10-16T13:48:38","date_gmt":"2025-10-16T11:48:38","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?p=3605"},"modified":"2025-10-16T13:48:38","modified_gmt":"2025-10-16T11:48:38","slug":"how-secure-remote-access-fuels-uptime-in-the-energy-sector","status":"publish","type":"post","link":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/","title":{"rendered":"How Secure Remote Access Fuels Uptime in the Energy Sector"},"content":{"rendered":"<h3><strong>Power Under Pressure: Why Uptime is Everything for Energy Providers<\/strong><\/h3>\n<p>In most industries, a minute or two of downtime will be disruptive. In the energy sector, it can be catastrophic. Because energy doesn\u2019t just keep businesses running \u2013 it keeps people alive.<\/p>\n<p>When homes, hospitals, and even entire cities rely on power from\u00a0your\u00a0facility, uptime goes beyond performance metrics and becomes a public duty.<\/p>\n<p>One minor misstep \u2013 whether caused by a security breach or a configuration error \u2013 can quickly ripple into safety incidents, regulatory fallout, reputational damage, and substantial financial consequences.<\/p>\n<p>So here\u2019s the non-negotiable:\u00a0<strong>Your systems need to stay online. And that means your remote access strategy needs to be rock solid.<\/strong><\/p>\n<p>The good news is that when implemented the right way with the right tools, remote access can do far more than just connect people to resources. Research released earlier this year shows that\u00a0<a href=\"https:\/\/hubs.la\/Q03LtR8Y0\">secure remote access (SRA) helps to maximize uptime<\/a>\u00a0\u2013 improving not only security but also accelerating the time to resolution and facilitating safer, more efficient preventive maintenance.<\/p>\n<h3><strong>\u00a0<\/strong><strong>Outdated Remote Access Tools Jeopardize Energy Uptime\u00a0<\/strong><\/h3>\n<p>Cyberattacks pose a real and significant threat to energy facilities, as evidenced by the\u00a0<a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/cyberattacks-us-utilities-surged-70-this-year-says-check-point-2024-09-11\">70% surge in attacks on U.S. utilities<\/a>\u00a0between 2023 and 2024. However, other more unexpected factors are also leaving you exposed to potential disruptions or downtime.<\/p>\n<p>For instance, the outdated remote access tools many organizations still depend on may be doing as much harm as good.<\/p>\n<ul>\n<li><a href=\"https:\/\/hubs.la\/Q03LtRwJ0\">Legacy VPNs provide risky network-level access<\/a>and can be compromised with relative ease.<\/li>\n<li><a href=\"https:\/\/hubs.la\/Q03LtRCg0\">Jump servers are difficult to manage<\/a>and offer minimal supervisory controls.<\/li>\n<li>Shared credentials exacerbate risk and complicate incident response efforts.<\/li>\n<li>Overly complex security processes lead to workarounds and\u00a0<a href=\"https:\/\/hubs.la\/Q03LtT3N0\">shadow access<\/a>, practices that may actually\u00a0increase\u00a0risk.<\/li>\n<\/ul>\n<p>These are tools that let third-party contractors into your network with no oversight or safeguards. Tools that don\u2019t support real-time troubleshooting or immediate, agentless onboarding for emergency situations. Tools that aren\u2019t built to maximize uptime or operate in near real-time speed. Tools that, in practice, can actually cause delays and, in the worst case, downtime.<\/p>\n<h3><strong>\u00a0<\/strong><strong>Stronger Access Controls, Fewer Outages, Safer Operations\u00a0<\/strong><\/h3>\n<p>The chain of events ultimately leading to downtime often begins with something as minor as a stolen password or an accidental click.<\/p>\n<p>In many cases, the account that gets compromised belongs to a\u00a0<a href=\"https:\/\/hubs.la\/Q03LtRPT0\">privileged user<\/a>. Cybercriminals deliberately target these users (think third-party vendors, OEMs, or remote engineers) because they often have far more access than they really need.<\/p>\n<p>It may seem practical to grant a third-party technician broad access so they can quickly resolve issues wherever they arise. But in reality, this kind of access policy creates significant security risks.<\/p>\n<p>Because ensuring uptime isn\u2019t about leaving the door open for anyone who might need to get in. It\u2019s about guaranteeing the\u00a0right\u00a0person gets in at the\u00a0right\u00a0time \u2013 and sees only what they need to.<\/p>\n<p><strong>That\u2019s why\u00a0the best SRA solutions for critical industries are built around zero-trust access and include connectivity and oversight controls:\u00a0<\/strong><\/p>\n<ul>\n<li>Enforcing identity-based access and continuous authorization\u00a0(even for legacy systems)<\/li>\n<li>Limiting access to necessary resources only, in alignment with the principle of least privilege<\/li>\n<li>Reducing lateral movement through application-level access<\/li>\n<li>Ensuring visibility plus supervision and monitoring capabilities for the duration of each connection, not just at the point of access<\/li>\n<\/ul>\n<p>This approach doesn\u2019t only improve your cybersecurity posture \u2013 it also boosts continuity.\u00a0<a href=\"https:\/\/hubs.la\/Q03LtTN00\">Less exposure, less risk, fewer curveballs<\/a>.<\/p>\n<p>Plus, convenient, secure remote access supports preventive maintenance, allowing you to find, diagnose, and fix potential issues\u00a0before\u00a0they escalate.<\/p>\n<p>And if something\u00a0does\u00a0go sideways? You\u2019ve got full visibility to act fast.<\/p>\n<h3><strong>When Every Second Counts, Your SRA Strategy Can\u2019t Fall Short\u00a0<\/strong><\/h3>\n<p>When a substation falters or an industrial control system (ICS) alert flags an anomaly, there\u2019s no time to spare. You \u2013 and the public relying on you \u2013 can\u2019t afford to wait hours for access.<\/p>\n<p>Your remote operator or OEM vendor needs to diagnose the issue\u00a0<em>now<\/em>. Not three hours from now, after wrestling with outdated tools, chasing approvals, or catching a flight to the site.<\/p>\n<p>But while everyone agrees that delays kill uptime, the thought of changing your SRA strategy may still feel too overwhelming to seriously consider. Not to mention that most energy companies don\u2019t have the time, appetite, or budget for a full infrastructure overhaul.<\/p>\n<p>But what if you could upgrade your security without network changes, without downtime, and without making the Director of Grid Operations want to tear his hair out?<\/p>\n<p>This is exactly what\u00a0<a href=\"https:\/\/hubs.la\/Q03LthmV0\">Cyolo PRO (Privileged Remote Operations)<\/a>\u00a0offers organizations in energy and other critical industries. A modernized SRA solution with dedicated controls for securing instances of privileged access, Cyolo PRO improves productivity and operational efficiency by\u00a0giving the right people instant, streamlined access to the systems they\u2019re responsible for \u2013 and nothing more.<\/p>\n<p>Granular access policies (including Just-in-Time access), actions controls (such as restricting file sharing or copy\/paste permissions), and supervisory measures (including real-time monitoring and session recording) give you visibility and control over every connection to your critical systems. Even third-party vendor and contractor connections.<\/p>\n<p>And because network changes and system overhauls are simply too risky, Cyolo PRO wraps around your existing infrastructure \u2013\u00a0<a href=\"https:\/\/hubs.la\/Q03LtVz90\">yes, your legacy OT systems too<\/a>\u00a0\u2013 for speed, simplicity, and seamless secure access.<\/p>\n<h3><strong>\u00a0<\/strong><strong>Uptime is the Real Test of Your Cyber Resilience\u00a0<\/strong><\/h3>\n<p>Uptime isn\u2019t just a metric in the energy sector \u2014 it\u2019s a mission-critical mandate. When your operations are depended on by businesses, medical centers, and national infrastructure, every minute of disruption carries weighty consequences.<\/p>\n<p>That\u2019s why a strong secure remote access strategy is non-negotiable. It&#8217;s what enables field engineers, OEM partners, and remote operators to respond to issues quickly, perform maintenance tasks safely, and support resilience at scale.<\/p>\n<p>Cyolo PRO is designed specifically for high-stakes environments like yours. It provides remote access without compromising security, wraps around legacy infrastructure without requiring updates, and empowers your teams to act fast.<\/p>\n<p>And as regional and industry-specific compliance standards like\u00a0<a href=\"https:\/\/hubs.la\/Q03LvqfC0\">ISA\/IEC 62443, NIS2 and NERC CIP\u00a0<\/a>continue to tighten, demonstrating strong cyber hygiene is no longer about checking boxes. It\u2019s about proving \u2014 day in and day out \u2014 that your systems are secure, auditable, and resilient.<\/p>\n<p>If you&#8217;ve been\u00a0<a href=\"https:\/\/hubs.la\/Q03Lvrn70\">putting off a change to your remote access strategy<\/a>, now is the time to act. And as your first step, check out\u00a0<a href=\"https:\/\/hubs.la\/Q03LvsJj0\">The SRA Buyers&#8217; Guide for Energy &amp; Utilities<\/a>\u00a0to help cut through the noise of a crowded market and make the best possible decision for your organization.<\/p>\n<p><em>This blog was originally published at <\/em><a href=\"https:\/\/cyolo.io\/blog\/power-under-pressure-how-secure-remote-access-fuels-uptime-in-the-energy-sector\"><em>https:\/\/cyolo.io\/blog\/power-under-pressure-how-secure-remote-access-fuels-uptime-in-the-energy-sector<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Power Under Pressure: Why Uptime is Everything for Energy Providers In most industries, a minute or two of downtime will be disruptive. In the energy sector, it can be catastrophic. Because energy doesn\u2019t just keep businesses running \u2013 it keeps people alive. When homes, hospitals, and even entire cities rely on power from\u00a0your\u00a0facility, uptime goes [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":3609,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Secure Remote Access Fuels Uptime in the Energy Sector - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure Remote Access Fuels Uptime in the Energy Sector - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Power Under Pressure: Why Uptime is Everything for Energy Providers In most industries, a minute or two of downtime will be disruptive. In the energy sector, it can be catastrophic. Because energy doesn\u2019t just keep businesses running \u2013 it keeps people alive. When homes, hospitals, and even entire cities rely on power from\u00a0your\u00a0facility, uptime goes [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-16T11:48:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134658.645.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Line\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Line\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/\",\"name\":\"How Secure Remote Access Fuels Uptime in the Energy Sector - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134658.645.png\",\"datePublished\":\"2025-10-16T11:48:38+00:00\",\"dateModified\":\"2025-10-16T11:48:38+00:00\",\"author\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c\"},\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#primaryimage\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134658.645.png\",\"contentUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134658.645.png\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Secure Remote Access Fuels Uptime in the Energy Sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c\",\"name\":\"Line\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g\",\"caption\":\"Line\"},\"url\":\"https:\/\/insightevents.dk\/isc-cph\/author\/line\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Secure Remote Access Fuels Uptime in the Energy Sector - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/","og_locale":"en_GB","og_type":"article","og_title":"How Secure Remote Access Fuels Uptime in the Energy Sector - Industrial Security Conference Copenhagen","og_description":"Power Under Pressure: Why Uptime is Everything for Energy Providers In most industries, a minute or two of downtime will be disruptive. In the energy sector, it can be catastrophic. Because energy doesn\u2019t just keep businesses running \u2013 it keeps people alive. When homes, hospitals, and even entire cities rely on power from\u00a0your\u00a0facility, uptime goes [&hellip;]","og_url":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/","og_site_name":"Industrial Security Conference Copenhagen","article_published_time":"2025-10-16T11:48:38+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134658.645.png","type":"image\/png"}],"author":"Line","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Line","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/","url":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/","name":"How Secure Remote Access Fuels Uptime in the Energy Sector - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#primaryimage"},"image":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134658.645.png","datePublished":"2025-10-16T11:48:38+00:00","dateModified":"2025-10-16T11:48:38+00:00","author":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c"},"breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#primaryimage","url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134658.645.png","contentUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134658.645.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/how-secure-remote-access-fuels-uptime-in-the-energy-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"How Secure Remote Access Fuels Uptime in the Energy Sector"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c","name":"Line","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g","caption":"Line"},"url":"https:\/\/insightevents.dk\/isc-cph\/author\/line\/"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts\/3605"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/comments?post=3605"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts\/3605\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media\/3609"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/categories?post=3605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/tags?post=3605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}