{"id":131289,"date":"2025-06-18T16:30:19","date_gmt":"2025-06-18T21:30:19","guid":{"rendered":"https:\/\/www.controleng.com\/?p=131289"},"modified":"2025-06-20T10:42:01","modified_gmt":"2025-06-20T15:42:01","slug":"how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security","status":"publish","type":"post","link":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/","title":{"rendered":"How to protect your business by integrating industrial cybersecurity with security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Cybersecurity and security insights<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Explore tips, tricks and best practices for achieving cybersecurity and site security.<\/li>\n\n\n\n<li>Understand best practices for adapting and integrating site security risk assessments into broader automation cybersecurity strategies.<\/li>\n\n\n\n<li>See the webcast for more advice: Register for the&nbsp;Control Engineering&nbsp;webcast, \u201c<strong><a href=\"https:\/\/event.on24.com\/wcc\/r\/4996630\/C3239D57DE00A0A81D42782D15C2ABC5?partnerref=LI\" target=\"_blank\" rel=\"noreferrer noopener\">Industrial cybersecurity: Integration with security<\/a><\/strong>,\u201d archived until June 26, 2026.<\/li>\n<\/ul>\n\n\n\n<p>Get practical advice on the relationship between site security and cybersecurity risks, and their impact on automation, controls and instrumentation systems from&nbsp;Control Engineering&nbsp;in a June 26 webcast. The instructors are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Leah Dodson, Co-founder, Piqued Solutions<\/strong><\/li>\n\n\n\n<li><strong>Jeremy Dodson, Co-founder, Piqued Solutions<\/strong><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to protect your business by integrating industrial cybersecurity with security\" width=\"500\" height=\"375\" src=\"https:\/\/www.youtube.com\/embed\/kU3XfhglN6s?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Interconnected systems<\/h2>\n\n\n\n<p>Industrial automation, controls and instrumentation systems are increasingly interconnected, making site security a critical component of overall cybersecurity. Site security encompasses the physical and digital measures necessary to protect devices, systems and networks that are accessible or connected to the broader industrial environment. For those designing, implementing, maintaining or managing automation and instrumentation systems, understanding and addressing site security is essential for mitigating cybersecurity risks.<\/p>\n\n\n\n<p>This webcast explores the importance of site security as an integral part of automation cybersecurity. Participants will learn how to incorporate site security into broader risk assessments and foster collaboration across teams, from onsite personnel to supply chain partners, to develop a unified approach to minimizing vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learning objectives<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analyze the relationship between site security and cybersecurity risks, and their impact on automation, controls and instrumentation systems.<\/li>\n\n\n\n<li>Discover methods for adapting and integrating site security risk assessments into broader automation cybersecurity strategies.<\/li>\n\n\n\n<li>Gain insights from real-world examples of successful integration between site security measures and automation cybersecurity to reduce risk effectively.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding cyber risk<\/h2>\n\n\n\n<p>So why is site security now considered essential to industrial cybersecurity, especially in automation and controls?<\/p>\n\n\n\n<p>\u201cThere&#8217;s so much more interconnection. Now, there&#8217;s so much more data that&#8217;s being processed on so many more levels than there have been in the past,\u201d said Leah Dodson. \u201cThere are a lot of gaps where risk sits that are being neglected, are being overlooked. So if someone can walk up to a panel and plug in a device, that&#8217;s cyber risk, too. We want to make sure that we&#8217;re arming our people with the ability to take a look at that risk, understand it and address it.\u201d<\/p>\n\n\n\n<p>Jeremy Dodson\u2019s career has included roles at the National Security Agency (NSA), where he analyzed and mitigated nation-state threats, and leading operations at the U.S. European Command, focusing on critical international security measures. In these roles, he has been tasked with attacking systems to search for vulnerabilities.<\/p>\n\n\n\n<p>\u201cAs an attacker, I have never thought about, \u2018Well, I&#8217;m attacking physical now. Now, I&#8217;m attacking over the wire,\u2019\u201d he said. \u201cIt&#8217;s always how do we get in? What is the least path of resistance, and a lot of time, the gap in between handoffs of someone&#8217;s responsibility over another person&#8217;s responsibility has been where we slip in.\u201d<\/p>\n\n\n\n<p>While organizations often separate physical security and cybersecurity in industrial settings, attackers don&#8217;t work like that. As an attacker, you have to have both skills to be successful. That\u2019s why defenders need to do the same thing.<\/p>\n\n\n\n<p>\u201cA big misconception is that a cybersecurity attack is what you see as the end result \u2014 when you&#8217;re seeing the message from the attackers that your data has been ransomed \u2014 that that is a cybersecurity attack when really it&#8217;s a chain of events,\u201d said Leah Dodson. \u201cIn that chain of events, physical security can play a huge role, especially in environments like these.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Creating shared responsibility for security<\/h2>\n\n\n\n<p>One major problem in industrial settings is the divide between responsibilities \u2014 information technology (IT) versus operational technology (OT), cybersecurity versus site security. Jeremy Dodson said one of the best ways to combat this is by just walking around the site and having a conversation over coffee.<\/p>\n\n\n\n<p>\u201cIt&#8217;s hilarious and awesome to see people&#8217;s light bulbs go off when someone looks at the door and goes, \u2018Oh, I could get in by taking the hinges off because they&#8217;re on the outside. I could do this and that,\u2019\u201d he said. \u201cThen a cyber guy or someone that&#8217;s over the wire could be like, \u2018Oh, I could bypass the cameras by de-offing the Wi-fi, and I could do this to the door to let me open it. Just having a conversation starts so many light bulbs in everyone&#8217;s minds that they then go, \u2018We can fix this.\u2019 It&#8217;s such a great a-ha! moment to watch.\u201d<\/p>\n\n\n\n<p>Ultimately, the goal for the webinar is to provide a better understanding of the risks that are in industrial environments, the ways attackers could take advantage of those risks and the vulnerabilities that exist. It\u2019s essential to know who to involve in those conversations about risk and incident response, and how to how to build a program that shines a light on those areas.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why combining physical and cybersecurity is critical for securing today\u2019s interconnected automation systems. Learn more in a June 26 webinar with Control Engineering. <\/p>\n","protected":false},"author":948,"featured_media":131290,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[104197,104076,109314],"tags":[109736,109340,109730,109809,110340,110339,110277,110341,110338],"tracking-metrics":[],"display-location":[109353],"class_list":{"2":"type-post"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to protect your business by integrating industrial cybersecurity with security - Control Engineering<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect your business by integrating industrial cybersecurity with security - Control Engineering\" \/>\n<meta property=\"og:description\" content=\"Why combining physical and cybersecurity is critical for securing today\u2019s interconnected automation systems. Learn more in a June 26 webinar with Control Engineering.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Control Engineering\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-18T21:30:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T15:42:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1399\" \/>\n\t<meta property=\"og:image:height\" content=\"784\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gary Cohen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:site\" content=\"@controlengtips\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gary Cohen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/\"},\"author\":{\"name\":\"Gary Cohen\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/8678e87bdbd4f972e2fec24d2cf3ed6c\"},\"headline\":\"How to protect your business by integrating industrial cybersecurity with security\",\"datePublished\":\"2025-06-18T21:30:19+00:00\",\"dateModified\":\"2025-06-20T15:42:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/\"},\"wordCount\":838,\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg\",\"keywords\":[\"automation\",\"control engineering\",\"controls\",\"cybersecurity\",\"risk assessment\",\"site security\",\"supply chain\",\"vulnerabilities\",\"webinar\"],\"articleSection\":[\"Automation, Controls\",\"Cybersecurity\",\"Industrial Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/\",\"url\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/\",\"name\":\"How to protect your business by integrating industrial cybersecurity with security - Control Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.controleng.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg\",\"datePublished\":\"2025-06-18T21:30:19+00:00\",\"dateModified\":\"2025-06-20T15:42:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#primaryimage\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg\",\"width\":1399,\"height\":784,\"caption\":\"Industrial Cybersecurity: Integration with Security webinar on June 26, 2025\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.controleng.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your business by integrating industrial cybersecurity with security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.controleng.com\/#website\",\"url\":\"https:\/\/www.controleng.com\/\",\"name\":\"Control Engineering\",\"description\":\"Control Engineering covers and educates about automation, control and instrumentation technologies\",\"publisher\":{\"@id\":\"https:\/\/www.controleng.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.controleng.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.controleng.com\/#organization\",\"name\":\"Control Engineering\",\"url\":\"https:\/\/www.controleng.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"contentUrl\":\"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png\",\"width\":300,\"height\":93,\"caption\":\"Control Engineering\"},\"image\":{\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ControlEngineeringMagazine\",\"https:\/\/x.com\/controlengtips\",\"https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/8678e87bdbd4f972e2fec24d2cf3ed6c\",\"name\":\"Gary Cohen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.controleng.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/322cd0fe9b371e68be7b64adc529b367664050957a8ff0f7dbb0869c10c084ee?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/322cd0fe9b371e68be7b64adc529b367664050957a8ff0f7dbb0869c10c084ee?s=96&d=mm&r=g\",\"caption\":\"Gary Cohen\"},\"url\":\"https:\/\/www.controleng.com\/author\/gary-cohen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your business by integrating industrial cybersecurity with security - Control Engineering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/","og_locale":"en_US","og_type":"article","og_title":"How to protect your business by integrating industrial cybersecurity with security - Control Engineering","og_description":"Why combining physical and cybersecurity is critical for securing today\u2019s interconnected automation systems. Learn more in a June 26 webinar with Control Engineering.","og_url":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/","og_site_name":"Control Engineering","article_publisher":"https:\/\/www.facebook.com\/ControlEngineeringMagazine","article_published_time":"2025-06-18T21:30:19+00:00","article_modified_time":"2025-06-20T15:42:01+00:00","og_image":[{"width":1399,"height":784,"url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg","type":"image\/jpeg"}],"author":"Gary Cohen","twitter_card":"summary_large_image","twitter_creator":"@controlengtips","twitter_site":"@controlengtips","twitter_misc":{"Written by":"Gary Cohen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#article","isPartOf":{"@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/"},"author":{"name":"Gary Cohen","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/8678e87bdbd4f972e2fec24d2cf3ed6c"},"headline":"How to protect your business by integrating industrial cybersecurity with security","datePublished":"2025-06-18T21:30:19+00:00","dateModified":"2025-06-20T15:42:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/"},"wordCount":838,"publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"image":{"@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg","keywords":["automation","control engineering","controls","cybersecurity","risk assessment","site security","supply chain","vulnerabilities","webinar"],"articleSection":["Automation, Controls","Cybersecurity","Industrial Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/","url":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/","name":"How to protect your business by integrating industrial cybersecurity with security - Control Engineering","isPartOf":{"@id":"https:\/\/www.controleng.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#primaryimage"},"image":{"@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg","datePublished":"2025-06-18T21:30:19+00:00","dateModified":"2025-06-20T15:42:01+00:00","breadcrumb":{"@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#primaryimage","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2025\/06\/Screenshot-2025-06-18-at-11.01.57\u202fAM.jpg","width":1399,"height":784,"caption":"Industrial Cybersecurity: Integration with Security webinar on June 26, 2025"},{"@type":"BreadcrumbList","@id":"https:\/\/www.controleng.com\/how-to-protect-your-business-by-integrating-industrial-cybersecurity-with-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.controleng.com\/"},{"@type":"ListItem","position":2,"name":"How to protect your business by integrating industrial cybersecurity with security"}]},{"@type":"WebSite","@id":"https:\/\/www.controleng.com\/#website","url":"https:\/\/www.controleng.com\/","name":"Control Engineering","description":"Control Engineering covers and educates about automation, control and instrumentation technologies","publisher":{"@id":"https:\/\/www.controleng.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.controleng.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.controleng.com\/#organization","name":"Control Engineering","url":"https:\/\/www.controleng.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","contentUrl":"https:\/\/www.controleng.com\/wp-content\/uploads\/2024\/12\/ce_logo.png","width":300,"height":93,"caption":"Control Engineering"},"image":{"@id":"https:\/\/www.controleng.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ControlEngineeringMagazine","https:\/\/x.com\/controlengtips","https:\/\/www.linkedin.com\/company\/control-engineering-magazine\/"]},{"@type":"Person","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/8678e87bdbd4f972e2fec24d2cf3ed6c","name":"Gary Cohen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.controleng.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/322cd0fe9b371e68be7b64adc529b367664050957a8ff0f7dbb0869c10c084ee?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/322cd0fe9b371e68be7b64adc529b367664050957a8ff0f7dbb0869c10c084ee?s=96&d=mm&r=g","caption":"Gary Cohen"},"url":"https:\/\/www.controleng.com\/author\/gary-cohen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/131289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/users\/948"}],"replies":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/comments?post=131289"}],"version-history":[{"count":0,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/posts\/131289\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media\/131290"}],"wp:attachment":[{"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/media?parent=131289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/categories?post=131289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tags?post=131289"},{"taxonomy":"tracking-metric","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/tracking-metrics?post=131289"},{"taxonomy":"display-location","embeddable":true,"href":"https:\/\/www.controleng.com\/wp-json\/wp\/v2\/display-location?post=131289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}