{"id":52453,"date":"2017-07-20t05:00:36","date_gmt":"2017-07-20t09:00:36","guid":{"rendered":"https:\/\/48e130086c.nxcli.net\/?p=52453"},"modified":"2017-10-01t09:51:31","modified_gmt":"2017-10-01t13:51:31","slug":"focus-cyber-risk-not-just-security","status":"publish","type":"post","link":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/","title":{"rendered":"focus on cyber risk, not just security"},"content":{"rendered":"

\"infosec<\/a>take a comprehensive and holistic approach that includes your business strategy.
\n<\/strong><\/p>\n

by donny c. shimamoto<\/em><\/p>\n

cybersecurity is a huge buzzword right now. businesses are worried about it, people are worried about it and vendors are trying to sell you cyber protection solutions.<\/p>\n

more:<\/strong> making it matter to accountants<\/a> | <\/i>it nerds need budget help<\/a> | <\/i>8 ways to wrestle software subscriptions into submission<\/a> | it hardware gets even more complex (great!)<\/a> | <\/i>how accounting geeks and techie nerds can play nicely together<\/a>
\n\"goprocpa.com\"exclusively for pro members. <\/span><\/strong>
log in here<\/a> or 2022世界杯足球排名 today<\/a>.<\/span><\/p><\/blockquote>\n

attending a cybersecurity webinar or seminar is also not for the faint at heart. even i, an it specialist in the cpa profession, often leave those events scared to put any of my personal data anywhere online.
\n
\nyet in today\u2019s interconnected world, we don\u2019t really have a choice anymore. and that\u2019s why you need to pay attention to cyber risk management, not just cybersecurity.<\/p>\n

what\u2019s the difference? cybersecurity draws its roots from information security (infosec) and is primarily focused on confidentiality, availability and data integrity. confidentiality and privacy are what people are usually worried about when they think about cyber risks \u2013 whether information they want to keep secret is protected from unauthorized disclosure or a data breach.<\/p>\n

ransomware attacks have also brought availability to top of mind \u2013 that systems are available when they need to be used. previously the distributed denial of service (ddos) attacks that brought down many websites, even amazon and ebay, in 2008 were the prime example of an availability threat.<\/p>\n

and last, but not least, data integrity is focused on ensuring that data is not destroyed, corrupted or lost, and that it can be recovered if such an adverse event were to occur.<\/p>\n

because many of the threats and preventive measures in these areas are technology-based, cybersecurity tends to be primarily technical\/automated controls-focused with some attention to the accompanying administrative and monitoring controls.<\/p><\/blockquote>\n

cyber risk management involves a much more comprehensive and holistic approach than cybersecurity. drawing from overall corporate governance and risk management disciplines, cyber risk management takes a much broader approach and requires a much broader skillset to perform effectively.<\/p>\n

the diagram below shows the relationship between it governance, it risk management (synonymous with cyber-risk management) and the \u201cit department.\u201d we have the it department in quotes, recognizing that in smaller organizations this is probably an it service provider rather than a unit internal to the organization.<\/p>\n

\"diagram<\/a>as you can see from the diagram, it governance and it risk management actually sit outside of the it department. this is because to be performed effectively, these functions require integration with the business strategy, compliance management and overall organization operations. it governance is a part of corporate governance and helps to ensure alignment of the it strategy (which may include cybersecurity projects and information security infrastructure) with the overall business strategy.<\/p>\n

it risk management is driven by it governance and compliance requirements, and it interacts with the it department \u2013 ensuring that the appropriate controls are built into new systems and that controls are operating effectively in the it infrastructure. it risk management is also a part of enterprise risk management (erm), which looks at an organization\u2019s overall control environment and the interrelation of all elements for good enterprise internal controls. this also ties into an organization\u2019s risk appetite \u2013 or how much risk it is willing to undertake to achieve its business objectives \u2013 compared to information security, which is often focused on minimizing risk. it risk management also looks not just at technical\/automated controls, but also compensating controls and monitoring controls, and compares all of these to the inherent risk and the impact of possible negative outcomes should the risk materialize.<\/p>\n

it is important to include business strategy and it value (via it governance), and enterprise risk and compliance (via it risk management), considerations because the evaluation of these areas is often unique to each organization and they are often drivers of competitive advantage. part of the objectives of it governance and it risk management are to ensure that cybersecurity directives and initiatives are in accord with the organization\u2019s overall risk posture, desired return on investment, and position in its industry.<\/p>\n

lastly, it risk management also looks at the adequacy of incident response from both administrative and technical perspectives. this is particularly important for privacy breaches in which much of the required response is driven by administrative processes (e.g., notification to affected parties, working with authorities and providing support for those affected) in additional to technical remediation.<\/p>\n

the aicpa\u2019s recently published cybersecurity risk management framework<\/a> affirms this by incorporating both terms into its name, and stating that its purpose is to enable an organization to \u201ccommunicate relevant and useful information about the effectiveness of their cybersecurity risk management programs.\u201d note that it doesn\u2019t say \u201cto ensure the security of its systems and networks.\u201d<\/p>\n

as you can see, it\u2019s important to ensure that you have a comprehensive cyber risk management function in place, and not just focus on cybersecurity measures. be sure that you are looking beyond just your it department and cybersecurity, and aligning your it governance and it risk management with your overall business strategy. the security and resilience of your systems and network is a foundational aspect for continued success, but it’s really cyber risk management that balances cybersecurity\u00a0with driving competitive advantage through innovation and embracing emerging technologies.<\/p>\n","protected":false},"excerpt":{"rendered":"

take a comprehensive and holistic approach that includes your business strategy.<\/strong>
\nby donny c. shimamoto<\/em><\/p>\n","protected":false},"author":1382,"featured_media":40308,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1363,3120,2306],"tags":[120,629],"class_list":["post-52453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured","category-pro-member-exclusive","category-tech-and-fintech","tag-tech","tag-technology"],"acf":[],"yoast_head":"\nfocus on cyber risk, not just security - 卡塔尔世界杯常规比赛时间<\/title>\n<meta name=\"description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_us\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"focus on cyber risk, not just security - 卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"og:description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta property=\"og:url\" content=\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/\" \/>\n<meta property=\"og:site_name\" content=\"卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cpatrendlines\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/donnyitk\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-20t09:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-01t13:51:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"232\" \/>\n\t<meta property=\"og:image:height\" content=\"232\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"donny shimamoto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:site\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:label1\" content=\"written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"donny shimamoto\" \/>\n\t<meta name=\"twitter:label2\" content=\"est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"article\",\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#article\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/\"},\"author\":{\"name\":\"donny shimamoto\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff\"},\"headline\":\"focus on cyber risk, not just security\",\"datepublished\":\"2017-07-20t09:00:36+00:00\",\"datemodified\":\"2017-10-01t13:51:31+00:00\",\"mainentityofpage\":{\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/\"},\"wordcount\":913,\"commentcount\":0,\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#primaryimage\"},\"thumbnailurl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg\",\"keywords\":[\"tech\",\"technology\"],\"articlesection\":[\"featured\",\"pro member exclusive\",\"tech and fintech\"],\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"commentaction\",\"name\":\"comment\",\"target\":[\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#respond\"]}]},{\"@type\":\"webpage\",\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/\",\"url\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/\",\"name\":\"focus on cyber risk, not just security - 卡塔尔世界杯常规比赛时间\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/#website\"},\"primaryimageofpage\":{\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#primaryimage\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#primaryimage\"},\"thumbnailurl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg\",\"datepublished\":\"2017-07-20t09:00:36+00:00\",\"datemodified\":\"2017-10-01t13:51:31+00:00\",\"description\":\"actionable intelligence for tax, accounting, and financial professionals\",\"breadcrumb\":{\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#breadcrumb\"},\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"readaction\",\"target\":[\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/\"]}]},{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#primaryimage\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg\",\"width\":232,\"height\":232,\"caption\":\"donny c shimamoto, cpa citp intraprisetechknowlogies\"},{\"@type\":\"breadcrumblist\",\"@id\":\"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#breadcrumb\",\"itemlistelement\":[{\"@type\":\"listitem\",\"position\":1,\"name\":\"home\",\"item\":\"\/\/www.g005e.com\/\"},{\"@type\":\"listitem\",\"position\":2,\"name\":\"tech and fintech\",\"item\":\"\/\/www.g005e.com\/category\/tech-and-fintech\/\"},{\"@type\":\"listitem\",\"position\":3,\"name\":\"focus on cyber risk, not just security\"}]},{\"@type\":\"website\",\"@id\":\"\/\/www.g005e.com\/#website\",\"url\":\"\/\/www.g005e.com\/\",\"name\":\"卡塔尔世界杯常规比赛时间\",\"description\":\"actionable intelligence for the tax, accounting and finance community\",\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"potentialaction\":[{\"@type\":\"searchaction\",\"target\":{\"@type\":\"entrypoint\",\"urltemplate\":\"\/\/www.g005e.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"propertyvaluespecification\",\"valuerequired\":true,\"valuename\":\"search_term_string\"}}],\"inlanguage\":\"en-us\"},{\"@type\":\"organization\",\"@id\":\"\/\/www.g005e.com\/#organization\",\"name\":\"卡塔尔世界杯常规比赛时间 research\",\"alternatename\":\"cpatrendlines\",\"url\":\"\/\/www.g005e.com\/\",\"logo\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"width\":1600,\"height\":350,\"caption\":\"卡塔尔世界杯常规比赛时间 research\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\"},\"sameas\":[\"https:\/\/www.facebook.com\/cpatrendlines\",\"https:\/\/x.com\/cpa_trendlines\",\"https:\/\/www.linkedin.com\/groups\/115382\/\",\"https:\/\/www.youtube.com\/cpatrendlines\"]},{\"@type\":\"person\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff\",\"name\":\"donny shimamoto\",\"image\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png\",\"caption\":\"donny shimamoto\"},\"description\":\"donny c. shimamoto, cpa.citp, cgma, is the founder and managing director of intraprisetechknowlogies llc, a specialized cpa firm dedicated to helping small businesses and middle market organizations leverage strategic technologies, proactively manage their business and technical risks, and enable balanced organizational growth and development.\",\"sameas\":[\"http:\/\/intraprisetechknowlogies.com\",\"https:\/\/www.facebook.com\/donnyitk\/\",\"https:\/\/www.linkedin.com\/in\/donnyitk\/\"],\"url\":\"\/\/www.g005e.com\/author\/donny-shimamoto\/\"}]}<\/script>\n<!-- \/ yoast seo plugin. -->","yoast_head_json":{"title":"focus on cyber risk, not just security - 卡塔尔世界杯常规比赛时间","description":"actionable intelligence for tax, accounting, and financial professionals","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/","og_locale":"en_us","og_type":"article","og_title":"focus on cyber risk, not just security - 卡塔尔世界杯常规比赛时间","og_description":"actionable intelligence for tax, accounting, and financial professionals","og_url":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/","og_site_name":"卡塔尔世界杯常规比赛时间","article_publisher":"https:\/\/www.facebook.com\/cpatrendlines","article_author":"https:\/\/www.facebook.com\/donnyitk\/","article_published_time":"2017-07-20t09:00:36+00:00","article_modified_time":"2017-10-01t13:51:31+00:00","og_image":[{"width":232,"height":232,"url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg","type":"image\/jpeg"}],"author":"donny shimamoto","twitter_card":"summary_large_image","twitter_creator":"@cpa_trendlines","twitter_site":"@cpa_trendlines","twitter_misc":{"written by":"donny shimamoto","est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"article","@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#article","ispartof":{"@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/"},"author":{"name":"donny shimamoto","@id":"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff"},"headline":"focus on cyber risk, not just security","datepublished":"2017-07-20t09:00:36+00:00","datemodified":"2017-10-01t13:51:31+00:00","mainentityofpage":{"@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/"},"wordcount":913,"commentcount":0,"publisher":{"@id":"\/\/www.g005e.com\/#organization"},"image":{"@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#primaryimage"},"thumbnailurl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg","keywords":["tech","technology"],"articlesection":["featured","pro member exclusive","tech and fintech"],"inlanguage":"en-us","potentialaction":[{"@type":"commentaction","name":"comment","target":["\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#respond"]}]},{"@type":"webpage","@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/","url":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/","name":"focus on cyber risk, not just security - 卡塔尔世界杯常规比赛时间","ispartof":{"@id":"\/\/www.g005e.com\/#website"},"primaryimageofpage":{"@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#primaryimage"},"image":{"@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#primaryimage"},"thumbnailurl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg","datepublished":"2017-07-20t09:00:36+00:00","datemodified":"2017-10-01t13:51:31+00:00","description":"actionable intelligence for tax, accounting, and financial professionals","breadcrumb":{"@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#breadcrumb"},"inlanguage":"en-us","potentialaction":[{"@type":"readaction","target":["\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/"]}]},{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#primaryimage","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2015\/04\/donny-c-shimamoto-cpa-citp-intraprisetechknowlogies.jpg","width":232,"height":232,"caption":"donny c shimamoto, cpa citp intraprisetechknowlogies"},{"@type":"breadcrumblist","@id":"\/\/www.g005e.com\/2017\/07\/20\/focus-cyber-risk-not-just-security\/#breadcrumb","itemlistelement":[{"@type":"listitem","position":1,"name":"home","item":"\/\/www.g005e.com\/"},{"@type":"listitem","position":2,"name":"tech and fintech","item":"\/\/www.g005e.com\/category\/tech-and-fintech\/"},{"@type":"listitem","position":3,"name":"focus on cyber risk, not just security"}]},{"@type":"website","@id":"\/\/www.g005e.com\/#website","url":"\/\/www.g005e.com\/","name":"卡塔尔世界杯常规比赛时间","description":"actionable intelligence for the tax, accounting and finance community","publisher":{"@id":"\/\/www.g005e.com\/#organization"},"potentialaction":[{"@type":"searchaction","target":{"@type":"entrypoint","urltemplate":"\/\/www.g005e.com\/?s={search_term_string}"},"query-input":{"@type":"propertyvaluespecification","valuerequired":true,"valuename":"search_term_string"}}],"inlanguage":"en-us"},{"@type":"organization","@id":"\/\/www.g005e.com\/#organization","name":"卡塔尔世界杯常规比赛时间 research","alternatename":"cpatrendlines","url":"\/\/www.g005e.com\/","logo":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","width":1600,"height":350,"caption":"卡塔尔世界杯常规比赛时间 research"},"image":{"@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/"},"sameas":["https:\/\/www.facebook.com\/cpatrendlines","https:\/\/x.com\/cpa_trendlines","https:\/\/www.linkedin.com\/groups\/115382\/","https:\/\/www.youtube.com\/cpatrendlines"]},{"@type":"person","@id":"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff","name":"donny shimamoto","image":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/person\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png","caption":"donny shimamoto"},"description":"donny c. shimamoto, cpa.citp, cgma, is the founder and managing director of intraprisetechknowlogies llc, a specialized cpa firm dedicated to helping small businesses and middle market organizations leverage strategic technologies, proactively manage their business and technical risks, and enable balanced organizational growth and development.","sameas":["http:\/\/intraprisetechknowlogies.com","https:\/\/www.facebook.com\/donnyitk\/","https:\/\/www.linkedin.com\/in\/donnyitk\/"],"url":"\/\/www.g005e.com\/author\/donny-shimamoto\/"}]}},"_links":{"self":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/52453","targethints":{"allow":["get"]}}],"collection":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/users\/1382"}],"replies":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/comments?post=52453"}],"version-history":[{"count":0,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/52453\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media\/40308"}],"wp:attachment":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media?parent=52453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/categories?post=52453"},{"taxonomy":"post_tag","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/tags?post=52453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}