{"id":1274,"date":"2025-08-11T11:25:00","date_gmt":"2025-08-11T11:25:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=1274"},"modified":"2025-08-11T11:25:00","modified_gmt":"2025-08-11T11:25:00","slug":"6-lessons-learned-focusing-security-where-business-value-lives","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=1274","title":{"rendered":"6 Lessons Learned: Focusing Security Where Business Value Lives"},"content":{"rendered":"<p>The Evolution of Exposure Management<br \/>\nMost security teams have a good sense of what\u2019s critical in their environment. What\u2019s harder to pin down is what\u2019s business-critical. These are the assets that support the processes the business can\u2019t function without. They\u2019re not always the loudest or most exposed. They\u2019re the ones tied to revenue, operations, and delivery. If one goes down, it\u2019s more than a<\/p>","protected":false},"excerpt":{"rendered":"<p>The Evolution of Exposure Management Most security teams have a good sense of what\u2019s critical in their environment. What\u2019s harder to pin down is what\u2019s business-critical. These are the assets&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1275,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-1274","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1274"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1274\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/1275"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}