{"id":3489,"date":"2025-09-30T13:39:06","date_gmt":"2025-09-30T13:39:06","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=3489"},"modified":"2025-09-30T13:43:47","modified_gmt":"2025-09-30T13:43:47","slug":"10-outcomes-every-modern-soc-must-deliver-for-the-board","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/","title":{"rendered":"10 Outcomes Every Modern SOC Must Deliver for the Board"},"content":{"rendered":"<p data-start=\"370\" data-end=\"577\">Boards today don\u2019t want to hear about the number of alerts investigated or the size of the SIEM log database. They want outcomes: clear, measurable business value from the Security Operations Center (SOC).<\/p>\n<p data-start=\"579\" data-end=\"874\">A modern SOC isn\u2019t just about monitoring firewalls or triaging phishing attempts &#8211; it\u2019s about <strong data-start=\"671\" data-end=\"743\">protecting the organization\u2019s ability to operate, innovate, and grow<\/strong>. To earn board-level trust and continued investment, here are <strong data-start=\"806\" data-end=\"872\">10 outcomes every SOC should be able to deliver and report on.<\/strong><\/p>\n<hr data-start=\"876\" data-end=\"879\" \/>\n<h2 data-start=\"881\" data-end=\"932\">1. <strong data-start=\"887\" data-end=\"930\">Proactive Threat Detection and Response<\/strong><\/h2>\n<p data-start=\"933\" data-end=\"1129\">Boards expect that cyber threats are spotted <strong data-start=\"978\" data-end=\"1006\">before they cause damage<\/strong>. A SOC must show it can detect anomalous behavior, identify intrusions early, and contain them within minutes &#8211; not weeks.<\/p>\n<p data-start=\"1131\" data-end=\"1226\"><em data-start=\"1131\" data-end=\"1151\">Outcome to report:<\/em> Average detection and response times are improving quarter over quarter.<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3491 alignright\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-200x200.png 200w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-30.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<hr data-start=\"1228\" data-end=\"1231\" \/>\n<h2 data-start=\"1233\" data-end=\"1274\">2. <strong data-start=\"1239\" data-end=\"1272\">Business Continuity Assurance<\/strong><\/h2>\n<p data-start=\"1275\" data-end=\"1470\">Cyber incidents should not grind operations to a halt, as seen in recent high-profile manufacturing and retail attacks. SOCs must be tightly aligned with continuity and disaster recovery teams.<\/p>\n<p data-start=\"1472\" data-end=\"1600\"><em data-start=\"1472\" data-end=\"1492\">Outcome to report:<\/em> Even when incidents occur, core systems remain operational, and recovery objectives are consistently met.<\/p>\n<hr data-start=\"1602\" data-end=\"1605\" \/>\n<h2 data-start=\"1607\" data-end=\"1654\">3. <strong data-start=\"1613\" data-end=\"1652\">Regulatory and Compliance Readiness<\/strong><\/h2>\n<p data-start=\"1655\" data-end=\"1848\">With GDPR, NIS2, HIPAA, and other regulations, boards are liable for compliance failures. The SOC plays a critical role in proving that security controls, logging, and reporting are in place.<\/p>\n<p data-start=\"1850\" data-end=\"1974\"><em data-start=\"1850\" data-end=\"1870\">Outcome to report:<\/em> Compliance audits are passed without major issues; regulators confirm security measures are adequate.<\/p>\n<hr data-start=\"1976\" data-end=\"1979\" \/>\n<h2 data-start=\"1981\" data-end=\"2037\">4. <strong data-start=\"1987\" data-end=\"2035\">Supply Chain and Third-Party Risk Management<\/strong><\/h2>\n<p data-start=\"2038\" data-end=\"2200\">Attacks increasingly enter via vendors or cloud providers. The SOC must extend visibility into supply chain relationships and enforce risk management processes.<\/p>\n<p data-start=\"2202\" data-end=\"2334\"><em data-start=\"2202\" data-end=\"2222\">Outcome to report:<\/em> Third-party risks are identified, scored, and monitored; incident response playbooks are tested with vendors.<\/p>\n<hr data-start=\"2336\" data-end=\"2339\" \/>\n<h2 data-start=\"2341\" data-end=\"2388\">5. <strong data-start=\"2347\" data-end=\"2386\">Reduction in Business Risk Exposure<\/strong><\/h2>\n<p data-start=\"2389\" data-end=\"2590\">The SOC should quantify how its work reduces risk\u2014whether by blocking ransomware, preventing fraud, or ensuring IP is protected. Translating technical metrics into <strong data-start=\"2553\" data-end=\"2580\">business risk reduction<\/strong> is key.<\/p>\n<p data-start=\"2592\" data-end=\"2694\"><em data-start=\"2592\" data-end=\"2612\">Outcome to report:<\/em> Risk exposure metrics (financial, reputational, operational) are trending down.<\/p>\n<hr data-start=\"2696\" data-end=\"2699\" \/>\n<h2 data-start=\"2701\" data-end=\"2750\">6. <strong data-start=\"2707\" data-end=\"2748\">Effective Use of Security Investments<\/strong><\/h2>\n<p data-start=\"2751\" data-end=\"2936\">Boards want to know if money spent on SIEM, EDR, or XDR is actually paying off. SOCs must measure tool effectiveness and avoid alert fatigue by consolidating platforms where possible.<\/p>\n<p data-start=\"2938\" data-end=\"3057\"><em data-start=\"2938\" data-end=\"2958\">Outcome to report:<\/em> Investment in tools directly correlates with reduced incident costs and faster resolution times.<\/p>\n<hr data-start=\"3059\" data-end=\"3062\" \/>\n<h2 data-start=\"3064\" data-end=\"3118\">7. <strong data-start=\"3070\" data-end=\"3116\">Executive-Level Reporting and Transparency<\/strong><\/h2>\n<p data-start=\"3119\" data-end=\"3306\">The SOC should communicate in <strong data-start=\"3149\" data-end=\"3170\">business language<\/strong>: what happened, what impact was avoided, and what\u2019s being done next. No acronyms, no jargon, just clear risk-to-business translation.<\/p>\n<p data-start=\"3308\" data-end=\"3433\"><em data-start=\"3308\" data-end=\"3328\">Outcome to report:<\/em> Regular board reports show clear progress against KPIs tied to business outcomes, not just IT metrics.<\/p>\n<hr data-start=\"3435\" data-end=\"3438\" \/>\n<h2 data-start=\"3440\" data-end=\"3483\">8. <strong data-start=\"3446\" data-end=\"3481\">Automation and Efficiency Gains<\/strong><\/h2>\n<p data-start=\"3484\" data-end=\"3621\">Modern SOCs cannot rely on human analysts alone. Automation in triage, incident response, and threat intelligence integration is vital.<\/p>\n<p data-start=\"3623\" data-end=\"3756\"><em data-start=\"3623\" data-end=\"3643\">Outcome to report:<\/em> Automated processes handle X% of low-level alerts, freeing analysts for higher-value tasks and reducing costs.<img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3493 alignleft\" src=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-300x300.png\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-300x300.png 300w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-1024x1024.png 1024w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-150x150.png 150w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-768x768.png 768w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-12x12.png 12w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-200x200.png 200w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-500x500.png 500w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31-800x800.png 800w, https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-31.png 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<hr data-start=\"3758\" data-end=\"3761\" \/>\n<h2 data-start=\"3763\" data-end=\"3839\">9. <strong data-start=\"3769\" data-end=\"3837\">Resilience Against Emerging Threats (AI, Zero-Day, Nation-State)<\/strong><\/h2>\n<p data-start=\"3840\" data-end=\"4022\">Boards want assurance that the SOC is not just fighting yesterday\u2019s battles. This means active participation in threat intelligence sharing, red-teaming, and continuous adaptation.<\/p>\n<p data-start=\"4024\" data-end=\"4175\"><em data-start=\"4024\" data-end=\"4044\">Outcome to report:<\/em> The organization has tested and proven defenses against the latest attack vectors, from AI-driven phishing to zero-day exploits.<\/p>\n<hr data-start=\"4177\" data-end=\"4180\" \/>\n<h2 data-start=\"4182\" data-end=\"4229\">10. <strong data-start=\"4189\" data-end=\"4227\">Cultural and Organizational Impact<\/strong><\/h2>\n<p data-start=\"4230\" data-end=\"4399\">Cybersecurity is not just a SOC issue &#8211; it\u2019s a company-wide discipline. The SOC must contribute to <strong data-start=\"4327\" data-end=\"4396\">awareness training, phishing simulations, and incident rehearsals<\/strong>.<\/p>\n<p data-start=\"4401\" data-end=\"4558\"><em data-start=\"4401\" data-end=\"4421\">Outcome to report:<\/em> Company-wide security awareness metrics are improving, and simulations show employees and executives respond appropriately to threats.<\/p>\n<hr data-start=\"4560\" data-end=\"4563\" \/>\n<h2 data-start=\"4565\" data-end=\"4583\">Final Thought<\/h2>\n<p data-start=\"4585\" data-end=\"4836\">A SOC that reports only on how many alerts it investigated is doing a disservice to itself and the board. Modern security leaders must shift to <strong data-start=\"4729\" data-end=\"4760\">outcome-based communication &#8211; <\/strong>demonstrating resilience, compliance, risk reduction, and value creation.<\/p>\n<p data-start=\"4838\" data-end=\"4906\">Boards don\u2019t just want to know \u201cAre we secure?\u201d They want to know:<\/p>\n<p data-start=\"4909\" data-end=\"4932\"><strong data-start=\"4909\" data-end=\"4930\">Are we resilient?<\/strong><\/p>\n<p data-start=\"4935\" data-end=\"4958\"><strong data-start=\"4935\" data-end=\"4956\">Are we compliant?<\/strong><\/p>\n<p data-start=\"4935\" data-end=\"4958\"><strong data-start=\"4961\" data-end=\"5001\">Are we protecting shareholder value?<\/strong><\/p>\n<p data-start=\"5005\" data-end=\"5162\">A SOC that delivers and communicates these ten outcomes will not only secure the business but also earn the board\u2019s confidence as a true enabler of growth.<\/p>","protected":false},"excerpt":{"rendered":"<p>Boards today don\u2019t want to hear about the number of alerts investigated or the size of the SIEM log database&#8230;.<\/p>","protected":false},"author":26,"featured_media":3490,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36],"tags":[],"class_list":["post-3489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Outcomes Every Modern SOC Must Deliver for the Board - Techknowledge<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Outcomes Every Modern SOC Must Deliver for the Board - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"Boards today don\u2019t want to hear about the number of alerts investigated or the size of the SIEM log database....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-30T13:39:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T13:43:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-29-1024x1024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"John Gallacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Gallacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/\",\"url\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/\",\"name\":\"10 Outcomes Every Modern SOC Must Deliver for the Board - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-29.png\",\"datePublished\":\"2025-09-30T13:39:06+00:00\",\"dateModified\":\"2025-09-30T13:43:47+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\"},\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-29.png\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-29.png\",\"width\":1200,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest news\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"10 Outcomes Every Modern SOC Must Deliver for the Board\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46\",\"name\":\"John Gallacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g\",\"caption\":\"John Gallacher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Outcomes Every Modern SOC Must Deliver for the Board - Techknowledge","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/","og_locale":"fr_FR","og_type":"article","og_title":"10 Outcomes Every Modern SOC Must Deliver for the Board - Techknowledge","og_description":"Boards today don\u2019t want to hear about the number of alerts investigated or the size of the SIEM log database....","og_url":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/","og_site_name":"Techknowledge","article_published_time":"2025-09-30T13:39:06+00:00","article_modified_time":"2025-09-30T13:43:47+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-29-1024x1024.png","type":"image\/png"}],"author":"John Gallacher","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"John Gallacher","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/","url":"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/","name":"10 Outcomes Every Modern SOC Must Deliver for the Board - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-29.png","datePublished":"2025-09-30T13:39:06+00:00","dateModified":"2025-09-30T13:43:47+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46"},"breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-29.png","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/Copy-of-ad1-29.png","width":1200,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/10-outcomes-every-modern-soc-must-deliver-for-the-board\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Latest news","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/"},{"@type":"ListItem","position":4,"name":"10 Outcomes Every Modern SOC Must Deliver for the Board"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/795e55f73078d141f89edbfb53001f46","name":"John Gallacher","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d97354f543c08de203997d94a70af1dbc898306b47f7c0f95d635e3e248f846c?s=96&d=mm&r=g","caption":"John Gallacher"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/3489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/comments?post=3489"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/3489\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media\/3490"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media?parent=3489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/categories?post=3489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/tags?post=3489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}