{"id":38695,"date":"2020-12-14T17:00:30","date_gmt":"2020-12-14T17:00:30","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92373"},"modified":"2020-12-14T17:00:30","modified_gmt":"2020-12-14T17:00:30","slug":"siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/","title":{"rendered":"Siemens USA CISO: 3 essentials to look for in a cloud provider"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/12\/SEC20_Security_011-scaled.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>In the latest episode of my series, <a href=\"https:\/\/www.youtube.com\/watch?v=E7xxFKm_Dg4&amp;feature=emb_logo\" target=\"_blank\" rel=\"noopener noreferrer\">The Shiproom<\/a>, I spoke with <a href=\"https:\/\/www.linkedin.com\/in\/kurtmjohn\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kurt John<\/a>, Chief Cybersecurity Officer (CISO) at <a href=\"https:\/\/new.siemens.com\/us\/en.html\" target=\"_blank\" rel=\"noopener noreferrer\">Siemens USA<\/a>. Kurt is listed in <a href=\"https:\/\/www.securitymagazine.com\/authors\/2902-kurt-john\" target=\"_blank\" rel=\"noopener noreferrer\">Security Magazine\u2019s Top 10<\/a> most influential cybersecurity leaders, and he also serves on a special cybersecurity committee organized by the Under-Secretary-General of the United Nations.<\/p>\n<p>As CISO for Siemens USA, Kurt describes his job as \u201cleveraging cybersecurity through our value chain to protect the trust society has in us to solve the world\u2019s most complex problems.\u201d Siemens has embraced <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fourth_Industrial_Revolution\" target=\"_blank\" rel=\"noopener noreferrer\">industry 4.0<\/a> and IoT, leading the way in automation for operational technology (OT). The company has been operating in the United States for 160 years and today has 50,000 employees. The responsibility to protect all the people, devices, and intellectual property (IP) rests on Kurt\u2019s shoulders.<\/p>\n<p>\u201cI think movement to the cloud is inevitable,\u201d Kurt tells me in our discussion. \u201cIt\u2019s just way too cost-effective. You can scale quickly. But not all cloud providers are created equal.\u201d According to Kurt, a good cloud provider should deliver three things: flexibility, control, and visibility. \u201cYou need to have your eyes on everything happening in the cloud. Whether it\u2019s changing business conditions or a threat from an adversary; you need to be able to adjust.\u201d<\/p>\n<p>At one point, a scientist from the future interrupts our conversation (you had to be there) to ask Kurt about the challenges of balancing on-premises data vs. cloud storage: \u201cYou want the relationship between the cloud and the enterprise to be as seamless as possible,\u201d Kurt replies. \u201cWhat\u2019s most important\u2014how well does the cloud provider deploy security controls? I need to be able to wrap my hands around any incident through good protection and detective mechanisms, and good reporting.\u201d<\/p>\n<p>We also touched on how a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/08\/31\/microsoft-security-cultivate-diverse-cybersecurity-team\/\" target=\"_blank\" rel=\"noopener noreferrer\">diverse security team offers<\/a> better protection against today\u2019s diverse cyber threats. \u201cDiversity in the team immediately skyrockets creativity. With a team that\u2019s physically and cognitively diverse. It\u2019s a wonder what we can accomplish together.\u201d<\/p>\n<p>Talking about building a strong security team lead to how mentorship can play a role, Kurt himself mentors college students who are considering a career in tech. \u201cThere\u2019s a myth that working in cybersecurity requires you to be incredibly technical. That\u2019s just not the case. Cybersecurity is as big as you make it.\u201d<\/p>\n<p>Watch the whole discussion on <a href=\"https:\/\/www.youtube.com\/watch?v=E7xxFKm_Dg4&amp;feature=emb_logo\" target=\"_blank\" rel=\"noopener noreferrer\">The Shiproom: Siemens USA<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>. Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/12\/14\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn why Kurt John of Siemens USA sees continued migration to the cloud as inevitable across industries.<br \/>\nThe post Siemens USA CISO: 3 essentials to look for in a cloud provider appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38696,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[7835,6579,1253,347,1064],"class_list":["post-38695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-ciso","tag-ciso-series-page","tag-cloud-computing","tag-cybersecurity","tag-security-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Siemens USA CISO: 3 essentials to look for in a cloud provider 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Siemens USA CISO: 3 essentials to look for in a cloud provider 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-14T17:00:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Siemens USA CISO: 3 essentials to look for in a cloud provider\",\"datePublished\":\"2020-12-14T17:00:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/\"},\"wordCount\":450,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg\",\"keywords\":[\"CISO\",\"Ciso series page\",\"cloud computing\",\"Cybersecurity\",\"Security Intelligence\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/\",\"name\":\"Siemens USA CISO: 3 essentials to look for in a cloud provider 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg\",\"datePublished\":\"2020-12-14T17:00:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/ciso\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Siemens USA CISO: 3 essentials to look for in a cloud provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Siemens USA CISO: 3 essentials to look for in a cloud provider 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/","og_locale":"en_US","og_type":"article","og_title":"Siemens USA CISO: 3 essentials to look for in a cloud provider 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-14T17:00:30+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Siemens USA CISO: 3 essentials to look for in a cloud provider","datePublished":"2020-12-14T17:00:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/"},"wordCount":450,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg","keywords":["CISO","Ciso series page","cloud computing","Cybersecurity","Security Intelligence"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/","url":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/","name":"Siemens USA CISO: 3 essentials to look for in a cloud provider 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg","datePublished":"2020-12-14T17:00:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/siemens-usa-ciso-3-essentials-to-look-for-in-a-cloud-provider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CISO","item":"https:\/\/www.threatshub.org\/blog\/tag\/ciso\/"},{"@type":"ListItem","position":3,"name":"Siemens USA CISO: 3 essentials to look for in a cloud provider"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38695"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38695\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38696"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}