{"id":23968,"date":"2025-05-19T16:43:57","date_gmt":"2025-05-19T14:43:57","guid":{"rendered":"https:\/\/www.advens.com\/?p=23968"},"modified":"2025-08-22T14:37:13","modified_gmt":"2025-08-22T12:37:13","slug":"advens-cesin-study-on-the-role-of-cybersecurity-director","status":"publish","type":"post","link":"https:\/\/www.advens.com\/en\/media\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/","title":{"rendered":"Advens &amp; CESIN study on the role of Cybersecurity Director"},"content":{"rendered":"\n<p>In partnership with CESIN, Advens carried out a study on the role of Cybersecurity Director, the origin of this role, his job description and his challenges.<\/p>\n\n\n\n<p>Find the result of this survey conducted among Cybersecurity directors of several large French companies.<\/p>\n\n\n\n\n<div id=\"block-uploads-1225307413\" class=\"acf-block-uploads commun-liste -liste bg-grey-white p-3 p-xl-5 rounded text-grey-carbon \">\n  <div class=\"text-uppercase small mb-3\">\n          Related document\n      <\/div>\n  <div class=\"liste d-flex flex-column justify-content-start align-items-start gap-3\">\n          <div class=\"content d-flex flex-wrap justify-content-between align-items-center gap-3 w-100\">\n        <div class=\"content__details\">\n  <a href=\"https:\/\/www.advens.com\/app\/uploads\/2022\/06\/advens-cesin-etudedirecteurcybersecurite.pdf\" class=\"link-extend\" target=\"_blank\" rel=\"noopener\" aria-label=\"Download the document\" download=\"download\">\n    Advens &#038; CESIN study on the role of Cybersecurity Director\n  <\/a>\n  <p class=\"small m-0 link-details\">(PDF\n    4.7 MB)\n  <\/p>\n<\/div>\n<div class=\"content__aside\">\n  <a class=\"btn btn-primary d-flex justify-content-start align-items-center gap-2\" href=\"https:\/\/www.advens.com\/app\/uploads\/2022\/06\/advens-cesin-etudedirecteurcybersecurite.pdf\" target=\"_blank\" rel=\"noopener\" aria-label=\"Download the document\" download=\"download\">\n    <span>Download<\/span>\n    <svg width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n      <g clip-path=\"url(#clip0_33_13)\">\n      <path d=\"M13.7663 7.77569C13.8828 7.65367 14.0222 7.55656 14.1762 7.4901C14.3303 7.42363 14.4958 7.38915 14.6631 7.38867C14.8304 7.3882 14.9962 7.42174 15.1505 7.48732C15.3049 7.55291 15.4448 7.64922 15.5621 7.77058C15.6793 7.89194 15.7715 8.0359 15.8331 8.194C15.8948 8.3521 15.9248 8.52115 15.9212 8.69118C15.9177 8.86122 15.8807 9.02883 15.8125 9.18413C15.7443 9.33944 15.6463 9.47932 15.5241 9.59553L10.7568 14.3734C10.5219 14.608 10.2057 14.7395 9.8763 14.7395C9.54693 14.7395 9.23073 14.608 8.99577 14.3734L4.29688 9.65674C4.05946 9.41959 3.92445 9.09628 3.92155 8.75794C3.91865 8.4196 4.0481 8.09395 4.28141 7.85262C4.51473 7.6113 4.8328 7.47407 5.16566 7.47112C5.49852 7.46817 5.8189 7.59975 6.05632 7.83691L8.64258 10.4426L8.66862 1.26564C8.68275 0.934958 8.82264 0.622766 9.05879 0.394862C9.29494 0.166957 9.60891 0.0411411 9.93453 0.0439297C10.2602 0.0467183 10.572 0.177894 10.8043 0.40981C11.0367 0.641727 11.1714 0.95627 11.18 1.28715L11.1556 10.3863L13.7663 7.77569ZM0 18.7741L0.016276 13.7812C0.0119314 13.6097 0.0415874 13.4392 0.103476 13.2797C0.165365 13.1202 0.258218 12.975 0.376501 12.8527C0.494784 12.7305 0.636075 12.6337 0.791948 12.5681C0.947821 12.5025 1.11509 12.4696 1.28377 12.4711C1.45245 12.4727 1.6191 12.5087 1.77378 12.5772C1.92846 12.6456 2.068 12.745 2.18408 12.8694C2.30016 12.9938 2.3904 13.1407 2.44944 13.3013C2.50847 13.4619 2.53507 13.633 2.52767 13.8043L2.51628 17.444C7.5076 17.4539 12.494 17.4539 17.4756 17.444L17.487 13.7845C17.49 13.4457 17.6253 13.1221 17.8631 12.8847C18.1008 12.6474 18.4216 12.5158 18.7549 12.5188C19.0881 12.5219 19.4065 12.6594 19.64 12.9011C19.8735 13.1428 20.003 13.4689 20 13.8076L19.9837 18.7708H19.9691C19.9545 19.097 19.8174 19.405 19.5861 19.6316C19.3548 19.8581 19.0468 19.9858 18.7256 19.9884C12.8955 19.9995 7.06977 19.9995 1.24837 19.9884C0.92674 19.9875 0.617765 19.861 0.385392 19.6349C0.153019 19.4089 0.0150362 19.1007 0 18.7741Z\" fill=\"white\"\/>\n      <\/g>\n      <defs>\n      <clipPath id=\"clip0_33_13\">\n      <rect width=\"20\" height=\"20\" fill=\"white\"\/>\n      <\/clipPath>\n      <\/defs>\n    <\/svg>\n  <\/a>\n<\/div>\n      <\/div>\n      <\/div>\n<\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In partnership with CESIN, Advens carried out a study on the role of Cybersecurity Director, the origin of this role, his job description and his challenges. Find the result of this survey conducted among Cybersecurity directors of several large French companies.<\/p>\n","protected":false},"author":43,"featured_media":23969,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[469],"tags":[],"custom_format":[481],"class_list":["post-23968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciso-insights"],"acf":[],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Advens &amp; CESIN study on the role of Cybersecurity Director - Advens<\/title>\n<meta name=\"description\" content=\"In partnership with CESIN, Advens carried out a study on the role of Cybersecurity Director, the origin of this role, his job description and his\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Advens &amp; CESIN study on the role of Cybersecurity Director - Advens\" \/>\n<meta property=\"og:description\" content=\"In partnership with CESIN, Advens carried out a study on the role of Cybersecurity Director, the origin of this role, his job description and his\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-19T14:43:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-22T12:37:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1240\" \/>\n\t<meta property=\"og:image:height\" content=\"830\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"madina.ehsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/\"},\"author\":{\"name\":\"madina.ehsan\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b\"},\"headline\":\"Advens &amp; CESIN study on the role of Cybersecurity Director\",\"datePublished\":\"2025-05-19T14:43:57+00:00\",\"dateModified\":\"2025-08-22T12:37:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/\"},\"wordCount\":51,\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp\",\"articleSection\":[\"CISO Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/\",\"url\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/\",\"name\":\"Advens &amp; CESIN study on the role of Cybersecurity Director - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp\",\"datePublished\":\"2025-05-19T14:43:57+00:00\",\"dateModified\":\"2025-08-22T12:37:13+00:00\",\"description\":\"In partnership with CESIN, Advens carried out a study on the role of Cybersecurity Director, the origin of this role, his job description and his\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#primaryimage\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp\",\"width\":1240,\"height\":830},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO Insights\",\"item\":\"https:\/\/www.advens.com\/en\/ciso-insights\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Advens &amp; CESIN study on the role of Cybersecurity Director\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.com\/#website\",\"url\":\"https:\/\/www.advens.com\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.com\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b\",\"name\":\"madina.ehsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g\",\"caption\":\"madina.ehsan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Advens &amp; CESIN study on the role of Cybersecurity Director - Advens","description":"In partnership with CESIN, Advens carried out a study on the role of Cybersecurity Director, the origin of this role, his job description and his","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/","og_locale":"en_US","og_type":"article","og_title":"Advens &amp; CESIN study on the role of Cybersecurity Director - Advens","og_description":"In partnership with CESIN, Advens carried out a study on the role of Cybersecurity Director, the origin of this role, his job description and his","og_url":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/","og_site_name":"Advens","article_published_time":"2025-05-19T14:43:57+00:00","article_modified_time":"2025-08-22T12:37:13+00:00","og_image":[{"width":1240,"height":830,"url":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp","type":"image\/webp"}],"author":"madina.ehsan","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#article","isPartOf":{"@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/"},"author":{"name":"madina.ehsan","@id":"https:\/\/www.advens.com\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b"},"headline":"Advens &amp; CESIN study on the role of Cybersecurity Director","datePublished":"2025-05-19T14:43:57+00:00","dateModified":"2025-08-22T12:37:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/"},"wordCount":51,"publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"image":{"@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp","articleSection":["CISO Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/","url":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/","name":"Advens &amp; CESIN study on the role of Cybersecurity Director - Advens","isPartOf":{"@id":"https:\/\/www.advens.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#primaryimage"},"thumbnailUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp","datePublished":"2025-05-19T14:43:57+00:00","dateModified":"2025-08-22T12:37:13+00:00","description":"In partnership with CESIN, Advens carried out a study on the role of Cybersecurity Director, the origin of this role, his job description and his","breadcrumb":{"@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#primaryimage","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp","width":1240,"height":830},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.com\/en\/ciso-insights\/advens-cesin-study-on-the-role-of-cybersecurity-director\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.com\/en\/"},{"@type":"ListItem","position":2,"name":"CISO Insights","item":"https:\/\/www.advens.com\/en\/ciso-insights\/"},{"@type":"ListItem","position":3,"name":"Advens &amp; CESIN study on the role of Cybersecurity Director"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.com\/#website","url":"https:\/\/www.advens.com\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.com\/#organization","name":"Advens","url":"https:\/\/www.advens.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.advens.com\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.com\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b","name":"madina.ehsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g","caption":"madina.ehsan"}}]}},"featured_url":"https:\/\/www.advens.com\/app\/uploads\/2025\/05\/Advens-CESIN-study-on-the-role-of-Cybersecurity-Director-Advens.webp","_links":{"self":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/23968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/comments?post=23968"}],"version-history":[{"count":3,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/23968\/revisions"}],"predecessor-version":[{"id":23977,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/posts\/23968\/revisions\/23977"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/media\/23969"}],"wp:attachment":[{"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/media?parent=23968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/categories?post=23968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/tags?post=23968"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.advens.com\/en\/wp-json\/wp\/v2\/custom_format?post=23968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}