{"id":310,"date":"2021-11-18T17:41:12","date_gmt":"2021-11-18T17:41:12","guid":{"rendered":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/?p=310"},"modified":"2021-12-15T20:51:52","modified_gmt":"2021-12-15T20:51:52","slug":"atelier-3-3-qualifier-et-quantifier-la-menace-et-ajuster-la-posture-de-lorganisation-pour-minimiser-le-risque-et-limpact-dun-incident","status":"publish","type":"post","link":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/2021\/11\/18\/atelier-3-3-qualifier-et-quantifier-la-menace-et-ajuster-la-posture-de-lorganisation-pour-minimiser-le-risque-et-limpact-dun-incident\/","title":{"rendered":"Atelier 3-3 Qualifier et quantifier la menace et ajuster la posture de l&rsquo;organisation pour minimiser le risque et l&rsquo;impact d&rsquo;un incident"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; custom_padding_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb admin_label=\u00a0\u00bbHero\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; use_background_color_gradient=\u00a0\u00bbon\u00a0\u00bb background_color_gradient_start=\u00a0\u00bb#ffffff\u00a0\u00bb background_color_gradient_end=\u00a0\u00bb#e7edf9&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb100px||100px|\u00a0\u00bb custom_padding_tablet=\u00a0\u00bb130px||130px|\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb3_4,1_4&Prime; admin_label=\u00a0\u00bbtitle and illustration\u00a0\u00bb _builder_version=\u00a0\u00bb3.25&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb3_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<h1>Atelier 3-3<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=\u00a0\u00bb#4646c4&Prime; divider_position=\u00a0\u00bbcenter\u00a0\u00bb divider_weight=\u00a0\u00bb2px\u00a0\u00bb _builder_version=\u00a0\u00bb3.2&Prime; max_width=\u00a0\u00bb90px\u00a0\u00bb max_width_tablet=\u00a0\u00bb12%\u00a0\u00bb max_width_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb custom_margin=\u00a0\u00bb|||\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_delay=\u00a0\u00bb50ms\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; header_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_font_size=\u00a0\u00bb46px\u00a0\u00bb header_line_height=\u00a0\u00bb1.3em\u00a0\u00bb custom_margin=\u00a0\u00bb||0px|\u00a0\u00bb animation_style=\u00a0\u00bbflip\u00a0\u00bb animation_direction=\u00a0\u00bbtop\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h1 style=\"text-align: left;\">Qualifier et quantifier la menace et ajuster la posture de l&rsquo;organisation pour minimiser le risque et l&rsquo;impact d&rsquo;un incident<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_4&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/Alexandre-Blanc2.jpg\u00a0\u00bb title_text=\u00a0\u00bbAlexandre Blanc2&Prime; disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_text disabled_on=\u00a0\u00bboff|off|off\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3><strong>Alexandre Blanc<\/strong><\/h3>\n<p>vCISO VARS \/ RCGT,\u00a0VARS Corporation (RCGT)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<p>L&rsquo;objectif de cet atelier sera d&rsquo;apporter un \u00e9clairage pragmatique sur la mise en contexte des menaces et risques technologiques. Traduire ces risques en analyse d&rsquo;impact qualitative et quantitative, afin d&rsquo;aider la priorisation du plan d&rsquo;action des gestionnaires.<\/p>\n<p>\u00c9valuer la posture de s\u00e9curit\u00e9 et \u00e9tablir un plan de s\u00e9curit\u00e9 peu sembler complexe. Cependant, on peut approcher cette tache de mani\u00e8re pratique, afin de prendre des d\u00e9cisions concr\u00e8tes plus rapidement, et r\u00e9duire le risque en am\u00e9liorant la posture de l&rsquo;organisation en continu.<\/p>\n<p>Nous passerons \u00e0 travers un rappel des tendances, l&rsquo;\u00e9volution de la menace, puis nous discuterons des approches multiples qui peuvent \u00eatre consid\u00e9r\u00e9es pour g\u00e9rer sa posture.<\/p>\n<p>Un focus rapide sur les \u00e9l\u00e9ments de base \u00e0 couvrir, puis sur la dur\u00e9e, un processus plus formel, accompagnant le d\u00e9veloppement de politiques, de plan de r\u00e9ponse aux incidents, et l&rsquo;importance de pr\u00e9parer ses \u00e9l\u00e9ments en amont d&rsquo;un incident.<\/p>\n<p>Nous soul\u00e8verons le point de la gouvernance, et nous expliquerons pourquoi c&rsquo;est devenu un \u00e9l\u00e9ment critique avec l&rsquo;arriv\u00e9e de la loi 64 au Qu\u00e9bec.<\/p>\n<p>Finalement, nous parlerons des solutions pratiques que nous mettons en place, et qui permettent de faire la diff\u00e9rence tout en consid\u00e9rant la r\u00e9alit\u00e9 du march\u00e9, avec son manque de ressources, et des besoins op\u00e9rationnels grandissants.<\/p>\n<p>Dans un contexte de transformation num\u00e9rique active, et de mouvement massif vers l&rsquo;infonuagique, les consid\u00e9rations d&rsquo;inventaire technologique (donn\u00e9es et p\u00e9riph\u00e9riques) sont un point critique pour assurer le succ\u00e8s des projets futurs.<\/p>\n<p>Nous rappellerons l&rsquo;importance de mettre les processus en ordre, d&rsquo;appliquer les meilleures pratiques en s&rsquo;appuyant sur un cadre de r\u00e9f\u00e9rence tel que ISO27001 ou NIST, avant d&rsquo;entamer de grands changements.<\/p>\n<p>Lors de la r\u00e9ponse \u00e0 un incident en cybers\u00e9curit\u00e9, nous recherchons en premier lieu \u00e0 conna\u00eetre l&rsquo;environnement, les ressources, et la documentation de r\u00e9f\u00e9rence pour acc\u00e9l\u00e9rer la reprise des activit\u00e9s. Quand les processus sont document\u00e9s et communiqu\u00e9s, toutes les op\u00e9rations sont rendues plus efficaces, et les impacts sont bien moindres, car les \u00e9l\u00e9ments \u00e0 haut risque sont rapidement identifi\u00e9s.<\/p>\n<p>Nous mettrons l&#8217;emphase sur le fait qu&rsquo;une strat\u00e9gie organisationnelle globale est n\u00e9cessaire pour avoir des contr\u00f4les effectifs. Le d\u00e9veloppement d&rsquo;une culture de s\u00e9curit\u00e9 est un point critique, alors que les techniques des acteurs malicieux \u00e9voluent tr\u00e8s rapidement, les simples contr\u00f4les technologiques ne suffisent plus.<\/p>\n<p>Nous apporterons \u00e9galement notre exp\u00e9rience en r\u00e9ponse aux incidents, les \u00e9l\u00e9ments les plus courants que nous avons identifi\u00e9s lors de nos interventions, et comment nous adaptons notre strat\u00e9gie en fonction de l&rsquo;\u00e9volution de la menace.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_3,1_3,1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/08\/cyber-security-icon-29.png\u00a0\u00bb title_text=\u00a0\u00bbcyber-security-icon-29&Prime; align=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb width=\u00a0\u00bb50%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_button button_url=\u00a0\u00bbhttps:\/\/www.evenementlepointensante.com\/colloque\/colloque-cybersecurite-secteur-municipal\/\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb button_text=\u00a0\u00bbINSCRIPTION\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb custom_button=\u00a0\u00bbon\u00a0\u00bb button_text_size=\u00a0\u00bb17px\u00a0\u00bb button_text_color=\u00a0\u00bb#FFFFFF\u00a0\u00bb button_bg_color=\u00a0\u00bb#5bd8dd\u00a0\u00bb button_border_width=\u00a0\u00bb0px\u00a0\u00bb button_border_radius=\u00a0\u00bb100px\u00a0\u00bb button_font=\u00a0\u00bbOverpass|900||on|||||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb4.11.1&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbSpeakers\u00a0\u00bb _builder_version=\u00a0\u00bb3.22&Prime; custom_padding=\u00a0\u00bb90px||90px|\u00a0\u00bb animation_style=\u00a0\u00bbzoom\u00a0\u00bb animation_intensity_zoom=\u00a0\u00bb10%\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_row column_structure=\u00a0\u00bb1_3,2_3&Prime; disabled_on=\u00a0\u00bbon|on|on\u00a0\u00bb _builder_version=\u00a0\u00bb4.11.1&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_padding=\u00a0\u00bb40px|0px|40px|0px\u00a0\u00bb disabled=\u00a0\u00bbon\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_image src=\u00a0\u00bbhttp:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-content\/uploads\/sites\/24\/2021\/11\/portrait-square-05.jpg\u00a0\u00bb _builder_version=\u00a0\u00bb3.23&Prime; custom_margin=\u00a0\u00bb|||\u00a0\u00bb custom_margin_tablet=\u00a0\u00bb90px|||\u00a0\u00bb custom_margin_last_edited=\u00a0\u00bboff|desktop\u00a0\u00bb always_center_on_mobile=\u00a0\u00bboff\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_image][et_pb_social_media_follow _builder_version=\u00a0\u00bb3.0.105&Prime; text_orientation=\u00a0\u00bbcenter\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_social_media_follow_network social_network=\u00a0\u00bbfacebook\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]facebook[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bbtwitter\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]twitter[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bblinkedin\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]linkedin[\/et_pb_social_media_follow_network][et_pb_social_media_follow_network social_network=\u00a0\u00bbgoogle-plus\u00a0\u00bb _builder_version=\u00a0\u00bb3.0.101&Prime; background_color=\u00a0\u00bb#181819&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb follow_button=\u00a0\u00bboff\u00a0\u00bb url_new_window=\u00a0\u00bbon\u00a0\u00bb]google-plus[\/et_pb_social_media_follow_network][\/et_pb_social_media_follow][\/et_pb_column][et_pb_column type=\u00a0\u00bb2_3&Prime; _builder_version=\u00a0\u00bb3.25&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb3.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_text_color=\u00a0\u00bb#7e7f93&Prime; text_font_size=\u00a0\u00bb18px\u00a0\u00bb header_font=\u00a0\u00bb||||||||\u00a0\u00bb header_3_font=\u00a0\u00bbMerriweather|700|||||||\u00a0\u00bb header_3_text_color=\u00a0\u00bb#4646c4&Prime; header_3_font_size=\u00a0\u00bb36px\u00a0\u00bb header_3_line_height=\u00a0\u00bb1.4em\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<h3>Ionut Zamfir<\/h3>\n<p>Front End Developer, Elegant Themes<br \/>\n[\/et_pb_text][et_pb_text _builder_version=\u00a0\u00bb3.27.4&Prime; text_font=\u00a0\u00bb||||||||\u00a0\u00bb text_font_size=\u00a0\u00bb18px\u00a0\u00bb text_line_height=\u00a0\u00bb1.8em\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]Curabitur arcu erat, accumsan id imperdiet et, porttitor at sem. Proin eget tortor risus. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Donec velit neque, auctor sit amet aliquam vel ullamcorper.<\/p>\n<p><strong>Rapid Prototyping Tools:<\/strong> Saturday @ 1:00pm<\/p>\n<p><strong style=\"font-size: 18px;\">Intro to jQuery Workshop:<\/strong><span style=\"font-size: 18px;\"> Sunday @ 9:00am<\/span><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atelier 3-3Qualifier et quantifier la menace et ajuster la posture de l&rsquo;organisation pour minimiser le risque et l&rsquo;impact d&rsquo;un incidentAlexandre Blanc vCISO VARS \/ RCGT,\u00a0VARS Corporation (RCGT)L&rsquo;objectif de cet atelier sera d&rsquo;apporter un \u00e9clairage pragmatique sur la mise en contexte des menaces et risques technologiques. Traduire ces risques en analyse d&rsquo;impact qualitative et quantitative, afin [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[22,21],"tags":[],"class_list":["post-310","post","type-post","status-publish","format-standard","hentry","category-ateliers-programmation","category-programmation"],"_links":{"self":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":7,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"predecessor-version":[{"id":425,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/posts\/310\/revisions\/425"}],"wp:attachment":[{"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lepointensante.com\/cybersecurite-municipalites\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}