{"id":3610,"date":"2025-10-16T13:51:03","date_gmt":"2025-10-16T11:51:03","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?p=3610"},"modified":"2025-10-16T13:51:03","modified_gmt":"2025-10-16T11:51:03","slug":"why-manufacturing-cant-copy-paste-it-security-policies","status":"publish","type":"post","link":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/","title":{"rendered":"Why Manufacturing Can\u2019t Copy-Paste IT Security Policies"},"content":{"rendered":"<p><strong>Picture the scene: It\u2019s 3AM, and your production line unexpectedly comes to a standstill.\u00a0\u00a0Hours earlier, an automated software patch \u2013 standard under your company\u2019s IT security policy \u2013 rolled out across several critical systems, including a legacy human-machine interface (HMI) controlling part of the line.\u00a0\u00a0<\/strong><\/p>\n<p>Trouble is, the patch wasn\u2019t tested in the OT environment. And now, it\u2019s triggered a tidal wave of cascading failures.<\/p>\n<p>The contractor who knows your equipment inside-out is ready to help but can\u2019t connect remotely because your HMI doesn\u2019t support the mandated VPN.<\/p>\n<p>Scenarios like this unfortunately aren\u2019t rare glitches. They\u2019re everyday occurrences in production environments, where uptime isn\u2019t optional and\u00a0<a href=\"https:\/\/hubs.la\/Q03Md9mR0\">safety always comes first<\/a>.<\/p>\n<p>Yet too often, manufacturers have been handed IT security playbooks and told to simply \u2018make it work.\u2019<\/p>\n<p>Spoiler:\u00a0it doesn\u2019t work.<\/p>\n<p><a href=\"https:\/\/hubs.la\/Q03Md9mS0\">Manufacturers face a distinct set of challenges<\/a>\u00a0that traditional IT policies simply weren\u2019t designed to resolve. Trying to apply IT-style access controls to OT is more than ineffective \u2013 it\u2019s potentially dangerous.<\/p>\n<p>To ensure the security and availability of your manufacturing operations, it\u2019s time to turn to tools that are purpose-built for the realities of the factory floor.<\/p>\n<p>Let\u2019s explore why.<\/p>\n<h3><strong>Securing People and Operations, Not Just Data\u00a0<\/strong><\/h3>\n<p>In IT, security is all about protecting data. In OT, it\u2019s about protecting both people and critical operations \u2013 where physical safety and uptime are every bit as important as securing information.<\/p>\n<p>A cyberattack on a manufacturing facility where\u00a0<a href=\"https:\/\/hubs.la\/Q03Md9fW0\">cyber-physical systems are in operation<\/a>\u00a0isn\u2019t just a compliance headache. It\u2019s a direct threat to workers on the factory floor.<\/p>\n<p>Manufacturing and other critical industries maintain a safety-first culture. Even small disruptions can create ripple effects across plants, supply chains, and lives.<\/p>\n<p>Security solutions must preserve \u2013 not endanger \u2013 operational safety.<\/p>\n<h3><strong>Why IT Security Models Fall Short in OT Production Environments\u00a0<\/strong><\/h3>\n<p>There are some hard-wired assumptions baked into IT security models:<\/p>\n<ul>\n<li>\u201cEveryone has cloud access.\u201d<\/li>\n<li>\u201cEveryone can respond to security prompts 10 times a day without issue.\u201d<\/li>\n<li>\u201cEveryone can reboot whenever necessary.\u201d<\/li>\n<\/ul>\n<p>But none of these assumptions holds true for OT.<\/p>\n<p>First, manufacturing plants often operate with unreliable connectivity, strict air-gapping, or network isolation strategies \u2013 keeping critical systems offline to reduce attack surfaces and safeguard operations from external threats.<\/p>\n<p>Second, when efficiency and systems availability are the top priorities, juggling multi-factor authentication (MFA) tokens is not just an annoyance. Blanket IT policies that add friction and slow down access have the potential to turn a minor fault into a major operational failure \u2013 or worse, a safety incident.<\/p>\n<p>Imagine a production engineer trying to shut down an overheating system, but losing precious minutes to resolve an MFA prompt. In IT, those minutes cost frustration. In OT, they could cost millions.<\/p>\n<p>Another challenge that manufacturing brings to the table is decentralization. While IT environments are typically neat, tidy, and centralized, manufacturing is anything but. Every plant, facility, or production line can have its own unique systems, users, and workflows \u2013 and they don\u2019t always play by the same rules.<\/p>\n<p>Securing OT means working\u00a0with\u00a0these realities, not against them.<\/p>\n<h3><strong>The Catastrophic Cost of Manufacturing Downtime\u00a0\u00a0<\/strong><\/h3>\n<p>In a typical IT environment, a late-night system reboot is an inconvenience. In manufacturing? It has the potential to be a full-blown disaster.<\/p>\n<p>Manufacturing depends on a vast web of OT systems running around the clock. Even a few minutes of downtime can mean:<\/p>\n<ul>\n<li>Spoiled ingredients on a food processing line<\/li>\n<li>Days of catch-up work in an automotive plant<\/li>\n<li>Massive revenue loss in pharmaceutical production<\/li>\n<\/ul>\n<p>The average cost of unplanned downtime in manufacturing is estimated at\u00a0<a href=\"https:\/\/www.iiot-world.com\/predictive-analytics\/predictive-maintenance\/the-actual-cost-of-downtime-in-the-manufacturing-industry\/\">$260,000 per hour<\/a>, rising to over\u00a0<a href=\"https:\/\/blog.siemens.com\/2024\/07\/the-true-cost-of-an-hours-downtime-an-industry-analysis\/\">$2.3 million per hour<\/a>\u00a0in the automotive industry. That\u2019s a staggering $600\u00a0per\u00a0second.<\/p>\n<p>Forced updates and reboots \u2013 both accepted IT practices \u2013 can create catastrophes in OT. Even short maintenance windows can have cascading effects, causing lost production and significant disruptions throughout the supply chain.<\/p>\n<p>Simply put, operators can\u2019t afford delays when uptime \u2013 meaning revenue\u00a0and\u00a0safety \u2013 is at stake.<\/p>\n<h3><strong>Why Agentless Access Matters in Manufacturing\u00a0<\/strong><\/h3>\n<p><a href=\"https:\/\/hubs.la\/Q03Md9f-0\">Manufacturing environments are full of legacy devices<\/a>, bespoke systems, and hardware from dozens of vendors. Some programmable logic controllers (PLCs) or HMIs might be decades old \u2013 and, critically, can\u2019t support agents.<\/p>\n<p>Similarly, installing third-party software is often a contractual no-go with OEMs or else a major operational risk.<\/p>\n<p>Manufacturers also rely heavily on\u00a0<a href=\"https:\/\/hubs.la\/Q03Md9mY0\">third-party contractors<\/a>\u00a0for remote diagnostics, maintenance, and other key tasks. Requiring every vendor to install an agent, configure a VPN, and jump through IT security hoops is both impractical and risky. Every extra hurdle slows response times and increases room for error.<\/p>\n<p>A secure access solution needs to fit manufacturing&#8217;s reality: fast and simple. So third parties can get in, do what they need to do, and get out \u2013\u00a0without\u00a0exposing your network to added risk.<\/p>\n<p>And it\u2019s not only about speed \u2013 it\u2019s about choosing the right tool for the job. Many OEM contracts still rely on insecure methods like basic video conferencing or remote desktop sharing solutions like TeamViewer. These tools often lack granular access controls or auditability, making them a weak link in your security chain.<\/p>\n<p>Choosing a dedicated, secure, and agentless remote access solution significantly reduces these risks, making third-party collaboration much safer.<\/p>\n<h3><strong>What Manufacturing Needs: Uptime-First Access Control\u00a0<\/strong><\/h3>\n<p>The future of secure remote access for the manufacturing industry isn\u2019t about squeezing OT systems into an IT-shaped box.<\/p>\n<p>It\u2019s about delivering access controls that:<\/p>\n<ul>\n<li>Offer always-on, agentless access that doesn\u2019t compromise safety or uptime<\/li>\n<li>Work natively and non-intrusively, without forcing end users to change how they operate<\/li>\n<li>Adapt to decentralized, offline, on-prem, and legacy systems without ripping and replacing infrastructure<\/li>\n<\/ul>\n<p>Securing factory floors and other OT environments demands a different approach:\u00a0<a href=\"https:\/\/hubs.la\/Q03Md9g00\">one built for uptime, safety, and simplicity<\/a>.<\/p>\n<p>The right secure remote access (SRA) solution won\u2019t need overnight patching marathons,\u00a0<a href=\"https:\/\/hubs.la\/Q03Md9nb0\">\u201cjust trust us with your data\u201d handwaving<\/a>, or cobbled-together fixes. Instead, it will provide secure, seamless remote access \u2013 tailored for manufacturing\u2019s unique realities and priorities.<\/p>\n<h3><strong>The Bigger Picture: Writing a Secure Access Playbook\u00a0for Manufacturing<\/strong><\/h3>\n<p>Copying IT policies into manufacturing is like using superglue on a jet engine. It might stick \u2013 for a while. But eventually, something will give. And the fallout could be disastrous.<\/p>\n<p>Manufacturers shouldn\u2019t have to compromise between security and uptime. And with solutions like the\u00a0<a href=\"https:\/\/hubs.la\/Q03LthmV0\">Cyolo PRO (Privileged Remote Operations) access solution<\/a>, they don\u2019t have to.<\/p>\n<p>Because comprehensive OT security isn\u2019t achieved by copying what works for someone else. It\u2019s accomplished only by understanding, adapting, and protecting what matters most to you.<\/p>\n<p>To learn more about how to choose the best SRA solution for your organization, download <a href=\"https:\/\/hubs.la\/Q03Md9pD0\">The Manufacturers\u2019 Guide to Secure Remote Access for OT<\/a>.<\/p>\n<p><em>This blog was originally published at <\/em><a href=\"https:\/\/cyolo.io\/blog\/why-manufacturing-cant-copy-paste-it-security-policies\"><em>https:\/\/cyolo.io\/blog\/why-manufacturing-cant-copy-paste-it-security-policies<\/em><\/a><em>. <\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Picture the scene: It\u2019s 3AM, and your production line unexpectedly comes to a standstill.\u00a0\u00a0Hours earlier, an automated software patch \u2013 standard under your company\u2019s IT security policy \u2013 rolled out across several critical systems, including a legacy human-machine interface (HMI) controlling part of the line.\u00a0\u00a0 Trouble is, the patch wasn\u2019t tested in the OT environment. [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":3608,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Manufacturing Can\u2019t Copy-Paste IT Security Policies - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Manufacturing Can\u2019t Copy-Paste IT Security Policies - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Picture the scene: It\u2019s 3AM, and your production line unexpectedly comes to a standstill.\u00a0\u00a0Hours earlier, an automated software patch \u2013 standard under your company\u2019s IT security policy \u2013 rolled out across several critical systems, including a legacy human-machine interface (HMI) controlling part of the line.\u00a0\u00a0 Trouble is, the patch wasn\u2019t tested in the OT environment. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-16T11:51:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134708.192.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Line\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Line\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/\",\"name\":\"Why Manufacturing Can\u2019t Copy-Paste IT Security Policies - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134708.192.png\",\"datePublished\":\"2025-10-16T11:51:03+00:00\",\"dateModified\":\"2025-10-16T11:51:03+00:00\",\"author\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c\"},\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#primaryimage\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134708.192.png\",\"contentUrl\":\"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134708.192.png\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Manufacturing Can\u2019t Copy-Paste IT Security Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c\",\"name\":\"Line\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g\",\"caption\":\"Line\"},\"url\":\"https:\/\/insightevents.dk\/isc-cph\/author\/line\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Manufacturing Can\u2019t Copy-Paste IT Security Policies - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/","og_locale":"en_GB","og_type":"article","og_title":"Why Manufacturing Can\u2019t Copy-Paste IT Security Policies - Industrial Security Conference Copenhagen","og_description":"Picture the scene: It\u2019s 3AM, and your production line unexpectedly comes to a standstill.\u00a0\u00a0Hours earlier, an automated software patch \u2013 standard under your company\u2019s IT security policy \u2013 rolled out across several critical systems, including a legacy human-machine interface (HMI) controlling part of the line.\u00a0\u00a0 Trouble is, the patch wasn\u2019t tested in the OT environment. [&hellip;]","og_url":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/","og_site_name":"Industrial Security Conference Copenhagen","article_published_time":"2025-10-16T11:51:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134708.192.png","type":"image\/png"}],"author":"Line","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Line","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/","url":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/","name":"Why Manufacturing Can\u2019t Copy-Paste IT Security Policies - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#primaryimage"},"image":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134708.192.png","datePublished":"2025-10-16T11:51:03+00:00","dateModified":"2025-10-16T11:51:03+00:00","author":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c"},"breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#primaryimage","url":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134708.192.png","contentUrl":"https:\/\/insightevents.dk\/isc-cph\/wp-content\/uploads\/sites\/4\/2025\/10\/Design-uden-navn-2025-10-16T134708.192.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/2025\/10\/16\/why-manufacturing-cant-copy-paste-it-security-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Why Manufacturing Can\u2019t Copy-Paste IT Security Policies"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/e1b949cdb7e6339b6ba34b36365c444c","name":"Line","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/insightevents.dk\/isc-cph\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7b77f339adf5c930d53d064e7fb88017?s=96&d=mm&r=g","caption":"Line"},"url":"https:\/\/insightevents.dk\/isc-cph\/author\/line\/"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts\/3610"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/comments?post=3610"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/posts\/3610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media\/3608"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/categories?post=3610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/tags?post=3610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}