{"id":884,"date":"2024-03-28T18:02:42","date_gmt":"2024-03-28T12:32:42","guid":{"rendered":"http:\/\/localhost:3002\/?p=884"},"modified":"2025-11-11T15:35:29","modified_gmt":"2025-11-11T10:05:29","slug":"evolving-role-of-ciso-in-the-digital-world","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world","title":{"rendered":"Evolving Role of CISO in the Digital World"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"journey_of_cisos_from_technology_gatekeeper_to_business_enabler\"><\/span>Journey of CISOs from Technology Gatekeeper to Business Enabler<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-3d7b20d5b845a08bbac83e065fa03c3e\">Initially, the role of Chief Information Security Officer (CISO) was limited to gatekeeping the technology and ensuring a secure system and protected data from any potential threat. This position was seen as a barrier to innovations and new ideas, but the business world has changed. Now that digital transformation is at its peak, cyber threats directly influence and affect the business revenue, customer trust, and reputation. Thus, the role of CIOS shifted drastically from technology gatekeeper to business enabler.<\/p>\n\n\n\n<p>Today, Chief Information Security Officers are working as business enablers who ensure security and growth simultaneously. They help businesses to introduce new ideas for long-term growth while keeping it safe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"balancing_security_and_innovation\"><\/span>Balancing Security and Innovation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ff5396da574a1139a9f470fd3a10b8fc\">Balancing security with agility and innovation requires a proactive, integrated approach that sees security as an enabler of business goals rather than a barrier. By embedding security into the DNA of the organization and its innovation processes, businesses can navigate the digital age securely and successfully. Here are some considerations.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Adopting security considerations at the earliest stage possible<\/li>\n\n\n\n<li>Fostering security awareness across the organization and making it a shared responsibility<\/li>\n\n\n\n<li>Adopting flexible, iterative security processes that can adapt to changing requirements and threats in cross-functional environments<\/li>\n\n\n\n<li>Embracing automation and implementing responsible and ethical usage of AI<\/li>\n\n\n\n<li>Encouraging continuous learning and adaptation within the security team and across the organization can help stay ahead of potential risks while embracing new opportunities for innovation.<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"The Evolving Role of CISOs: Challenges, Strategies, and Business Insights\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/t-kGIAv34rs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"cultivating_a_security-conscious_culture\"><\/span>Cultivating a Security-Conscious Culture<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Leadership Commitment:<\/strong> Building a robust security culture begins with the top management. Employees are more likely to follow when the managers and the company approach the issue of security seriously and demonstrate it in their behavior.<\/li>\n\n\n\n<li><strong>Role-Based Training:<\/strong> The routine training ought to be comprehensible and in line with the type of work performed by the employees. It is easy to understand why security is important with the use of real-life examples and role plays.<\/li>\n\n\n\n<li><strong>Collective Responsibility:<\/strong> The IT team is not the only one that is concerned with security. All employees must be made to feel free to report anything that seems suspicious. They should not fear being punished for raising their concerns.<\/li>\n\n\n\n<li><strong>Continuous Awareness:<\/strong> Share basic updates regarding new threats, their treatment, and what lessons can be learnt. This keeps the security fresh in everyone&#8217;s.<\/li>\n\n\n\n<li><strong>Security Champions:<\/strong> Select individuals belonging to other teams as your security buddies. They can remind their teams about the best practices and assist them in integrating security into daily work.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"aligning_cybersecurity_with_business_objectives\"><\/span>Aligning Cybersecurity with Business Objectives<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Work with Leaders:<\/strong> Security heads should team up with company leaders to understand business goals, customers, and how the company earns.<\/li>\n\n\n\n<li><strong>Support Business Growth:<\/strong> Cybersecurity should act as a shield that protects the company without blocking new ideas or progress.<\/li>\n\n\n\n<li><strong>Link with Risk Management:<\/strong> Businesses should check for possible threats and focus on fixing the ones that can hurt goals the most.<\/li>\n\n\n\n<li><strong>Smart Resource Use:<\/strong> Money and effort should go to the areas where security has the biggest impact on success.<\/li>\n\n\n\n<li><strong>Part of ERM:<\/strong> Security should be built into the company\u2019s overall planning and risk checks, not kept separate.<\/li>\n\n\n\n<li><strong>Enabler, Not Barrier:<\/strong> Cybersecurity should be seen as a partner that helps the business grow safely, not as an obstacle.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"navigating_compliance_and_fostering_growth\"><\/span>Navigating Compliance and Fostering Growth<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-0cded2410bfada29c9452d2b49460387\">Living through the mazes of compliance with the increasing regulations is the key to turning possible challenges into competitive strengths. The culture of security-first and the use of advanced technologies will simplify the processes, reduce the risks, and fully integrate compliance into the business strategies from the very beginning. This will create innovation without having to rework regulatory requirements and will better place businesses in a proactive position to address regulatory requirements proactively, making compliance a strategic asset.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Embedding compliance as a fundamental part of operations and values.<\/li>\n\n\n\n<li>Using advanced tools to enhance compliance efficiency and risk management.<\/li>\n\n\n\n<li>Incorporating compliance early in business planning for seamless innovation.<\/li>\n\n\n\n<li>Engaging with regulators to navigate the compliance landscape effectively.<\/li>\n\n\n\n<li>Viewing compliance as a means to differentiate and unlock new market opportunities.<\/li>\n<\/ol>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ab20759bfdb3a5a85fbac153613be990\">Adopting this integrated strategy simplifies regulatory navigation and harnesses compliance as a lever for growth and market differentiation. By viewing compliance as an intrinsic element of strategic planning, organizations can unlock new opportunities, enhance their reputation, and confidently advance their business objectives in a complex regulatory environment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"envisioning_the_future_of_the_ciso_role\"><\/span>Envisioning the Future of the CISO Role<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ab64e7bbeae55884070b7c59aadb6c28\">It is motivated by the high rate of digital transformation, the emerging technologies, and the constantly evolving cyber threat environment. The role of CISOs is expected to shift from their traditional business strategy-focused approach of technical cybersecurity controls to a wider scope of data privacy, digital ethics, and cyber risk management.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ef1e82ddadff76b22d83cc7d762c8293\">With the growing appreciation of the strategic role of cybersecurity by organizations as a way to facilitate the creation of digital business models and innovation, CISOs will establish themselves as strategic advisor to the C-suite and board of directors. <\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-20a2ca74abb1e01d20f87427a6b1dcff\">Their task will be increased with a stronger focus on the concentration of cybersecurity on business goals. In this case, the security strategies will secure the organization and enable growth and competitive advantage.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-link-color wp-elements-8e938aa053b492f9c97116c67522aa73\">Personally, I see CISOs directly or indirectly contributing to the growth and revenue for the organization with clean ROI metrics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-9823787c9a2717c0fdf9715e1ca34f2a\"><span class=\"ez-toc-section\" id=\"faqsbr\"><\/span>FAQs<br><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/blockquote>\n\n\n<div class=\"saswp-faq-block-section\"><ol style=\"list-style-type:none\"><li style=\"list-style-type: none\"><h4 class=\"\">Will AI replace accountants by 2030?<\/h4><p class=\"saswp-faq-answer-text\">While AI is making its place in almost every industry, it has fewer chances to replace accountants. With its automation, accountants can make their tasks easier and faster. But replacing humans till 2030 is a tough task for AI.<\/p><li style=\"list-style-type: none\"><h4 class=\"\">How can AI be applied to finance?<\/h4><p class=\"saswp-faq-answer-text\">AI can be used in automating various processes such as analyzing data, resolving customer queries with chatbots, credit scoring, generating automated reports, loan management and more.<\/p><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Journey of CISOs from Technology Gatekeeper to Business Enabler Initially, the role of Chief Information Security Officer (CISO) was limited to gatekeeping the technology and ensuring a secure system and protected data from any potential threat. This position was seen as a barrier to innovations and new ideas, but the business world has changed. Now [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":1238,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"gallery","meta":{"_acf_changed":false,"footnotes":""},"categories":[170,146],"tags":[173,172,168],"class_list":["post-884","post","type-post","status-publish","format-gallery","has-post-thumbnail","hentry","category-cloud-native-application-protection-platform-cnapp","category-cloud-security-services","tag-cxo-insights","tag-leaders-voice","tag-opinion-editorials","post_format-post-format-gallery"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Evolving Role of CISO in the Digital World<\/title>\n<meta name=\"description\" content=\"Role of the CISOs has evolved from often perceived as technical expertise to becoming a key enabler of business growth and innovation.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evolving Role of CISO in the Digital World\" \/>\n<meta property=\"og:description\" content=\"Role of the CISOs has evolved from often perceived as technical expertise to becoming a key enabler of business growth and innovation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world\" \/>\n<meta property=\"og:site_name\" content=\"Techjockey US Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Techjockey\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-28T12:32:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-11T10:05:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/03\/21181340\/ai-chatbots-for-ecommerce.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Techjockey Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:site\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Techjockey Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evolving Role of CISO in the Digital World","description":"Role of the CISOs has evolved from often perceived as technical expertise to becoming a key enabler of business growth and innovation.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Evolving Role of CISO in the Digital World","og_description":"Role of the CISOs has evolved from often perceived as technical expertise to becoming a key enabler of business growth and innovation.","og_url":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world","og_site_name":"Techjockey US Blog","article_publisher":"https:\/\/www.facebook.com\/Techjockey\/","article_published_time":"2024-03-28T12:32:42+00:00","article_modified_time":"2025-11-11T10:05:29+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/03\/21181340\/ai-chatbots-for-ecommerce.png","type":"image\/png"}],"author":"Techjockey Team","twitter_card":"summary_large_image","twitter_creator":"@TechJockeys","twitter_site":"@TechJockeys","twitter_misc":{"Written by":"Techjockey Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world#article","isPartOf":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world"},"author":{"name":"Techjockey Team","@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/person\/e6bf4b3d1ec98bcf933f05c5a935a510"},"headline":"Evolving Role of CISO in the Digital World","datePublished":"2024-03-28T12:32:42+00:00","dateModified":"2025-11-11T10:05:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world"},"wordCount":885,"publisher":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/#organization"},"image":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/03\/21181340\/ai-chatbots-for-ecommerce.png","keywords":["CXO Insights","Leaders Voice","Opinion Editorials"],"articleSection":["Cloud Native Application Protection Platform (CNAPP)","Cloud Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world","url":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world","name":"Evolving Role of CISO in the Digital World","isPartOf":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world#primaryimage"},"image":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/03\/21181340\/ai-chatbots-for-ecommerce.png","datePublished":"2024-03-28T12:32:42+00:00","dateModified":"2025-11-11T10:05:29+00:00","description":"Role of the CISOs has evolved from often perceived as technical expertise to becoming a key enabler of business growth and innovation.","breadcrumb":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world#primaryimage","url":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/03\/21181340\/ai-chatbots-for-ecommerce.png","contentUrl":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/03\/21181340\/ai-chatbots-for-ecommerce.png","width":1200,"height":628,"caption":"CISO"},{"@type":"BreadcrumbList","@id":"https:\/\/www.techjockey.com\/us\/blog\/evolving-role-of-ciso-in-the-digital-world#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techjockey.com\/us\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Security","item":"https:\/\/www.techjockey.com\/us\/blog\/category\/cloud-security-services"},{"@type":"ListItem","position":3,"name":"Cloud Native Application Protection Platform (CNAPP)","item":"https:\/\/www.techjockey.com\/us\/blog\/category\/cloud-native-application-protection-platform-cnapp"},{"@type":"ListItem","position":4,"name":"Evolving Role of CISO in the Digital World"}]},{"@type":"WebSite","@id":"https:\/\/www.techjockey.com\/us\/blog\/#website","url":"https:\/\/www.techjockey.com\/us\/blog\/","name":"Techjockey US Blog","description":"","publisher":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techjockey.com\/us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techjockey.com\/us\/blog\/#organization","name":"Techjockey Infotech Private Limited","url":"https:\/\/www.techjockey.com\/us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.techjockey.com\/us\/blog\/wp-content\/uploads\/2025\/07\/cropped-favicon.png","contentUrl":"https:\/\/www.techjockey.com\/us\/blog\/wp-content\/uploads\/2025\/07\/cropped-favicon.png","width":512,"height":512,"caption":"Techjockey Infotech Private Limited"},"image":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Techjockey\/","https:\/\/x.com\/TechJockeys","https:\/\/www.linkedin.com\/company\/techjockey","https:\/\/www.youtube.com\/@techjockeydotcom"]},{"@type":"Person","@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/person\/e6bf4b3d1ec98bcf933f05c5a935a510","name":"Techjockey Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d99bf8b8ad1f3d1b7ba47db54ea2d83c178f67c0e1a8a6db4a62e71bd027a48?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d99bf8b8ad1f3d1b7ba47db54ea2d83c178f67c0e1a8a6db4a62e71bd027a48?s=96&d=mm&r=g","caption":"Techjockey Team"},"description":"The Techjockey content team is a passionate group of writers and editors dedicated to helping businesses make informed software buying decisions. We have a deep understanding of the US software market and the challenges that businesses face when choosing the right software for their needs. || We are committed to providing our readers with high-quality, unbiased content that is both informative and engaging. We believe that every business deserves to have access to the information they need to make smart software choices. Our team consists of experienced writers and editors with expertise in a wide range of industries. We are constantly researching the latest software trends and developments, and are always up-to-date on the latest industry news. || We are passionate about helping businesses succeed and make informed software-buying decisions based on clear, unbiased comparisons and reviews. Our dedication to accuracy, objectivity, and value ensures that you receive concise, relevant content.","sameAs":["https:\/\/www.techjockey.com\/us\/","https:\/\/www.linkedin.com\/company\/techjockey\/"],"url":"https:\/\/www.techjockey.com\/us\/blog\/author\/techjockey-team"}]}},"_links":{"self":[{"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/posts\/884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/comments?post=884"}],"version-history":[{"count":29,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/posts\/884\/revisions"}],"predecessor-version":[{"id":1524,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/posts\/884\/revisions\/1524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/media\/1238"}],"wp:attachment":[{"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/media?parent=884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/categories?post=884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/tags?post=884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}