{
"author": {
"name": "Jano Bermudes Ankura",
"webUrl": "/author/profile/jano-bermudes-ankura/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 1,
"social": [],
"articles": [
{
"uri": "/2019/04/15/the-principles-of-cyber-risk-management-what-does-good-security-look-like-414-152996/",
"title": "The principles of cyber risk management: What does good security look like?",
"byline": "Ankur Sheth and Jano Bermudes, Ankura",
"kicker": "Analysis",
"prettyDate": "April 15, 2019",
"timeToRead": "10 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2019/04/Cybersecurity-Special-Section-Article-201803151731.jpg",
"width": "620",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/ankur-sheth/",
"name": "Ankur Sheth"
},
{
"webUrl": "/author/profile/jano-bermudes-ankura/",
"name": "Jano Bermudes, Ankura"
}
],
"kickerNode": [
{
"uri": "/analysis/",
"sectionName": "Analysis"
}
],
"summary": "Concern has shifted from dealing with data being stolen and sold to handling serious ransomware and destructive attacks.",
"body": null
}
]
}
}