{"id":17599,"date":"2026-04-23T12:52:12","date_gmt":"2026-04-23T07:22:12","guid":{"rendered":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/"},"modified":"2026-04-23T12:52:12","modified_gmt":"2026-04-23T07:22:12","slug":"security-business-plan-explained-for-it-governance-and-security-teams","status":"publish","type":"post","link":"https:\/\/cataligent.in\/blog\/strategy-planning\/security-business-plan-explained-for-it-governance-and-security-teams\/","title":{"rendered":"Security Business Plan Explained for IT Governance and Security Teams"},"content":{"rendered":"<h1>Security Business Plan Explained for IT Governance and Security Teams<\/h1>\n<p>Most security initiatives fail not because the technology is flawed but because the underlying business plan is a collection of aspirational goals rather than a governed operational strategy. When security teams treat their roadmap as a static document and not a living execution framework, the inevitable result is a disconnect between IT intent and financial reality. A <strong>security business plan<\/strong> is only as effective as the rigour applied to its execution. In complex environments, relying on spreadsheets to track risk mitigation against budget ensures that visibility remains fragmented and accountability stays theoretical.<\/p>\n<h2>The Real Problem<\/h2>\n<p>The primary issue in modern organisations is that leadership confuses reporting with governance. Teams often mistake the production of a monthly status update for actual control. In reality, most organisations do not have an alignment problem; they have a visibility problem disguised as alignment. Leaders believe that because every department has a risk register, they are secure. However, they lack the ability to verify if a security <strong>measure<\/strong> at the project level is actually impacting the portfolio risk posture.<\/p>\n<p>Consider a large retail firm managing a multi-year cloud security migration. They tracked progress through manual updates to a central spreadsheet. The <strong>programme<\/strong> showed green statuses for six months while costs escalated. Because there was no formal decision gate to audit the financial output against the promised risk reduction, the business continued funding a project that was effectively insolvent. By the time they discovered the drift, millions were wasted and the security gap remained open. This failure occurs when accountability is detached from financial precision.<\/p>\n<p><h2>What Good Actually Looks Like<\/h2>\n<p>Effective security execution happens when the security business plan is treated as a core business function rather than an IT sidecar. High-performing teams apply rigid, cross-functional governance where every security objective is defined by its owner, sponsor, and controller. They understand that a <strong>security business plan<\/strong> must mirror the broader organisation hierarchy to function. In this environment, every measure has a clearly defined business unit and legal entity, ensuring that when a security project reports a stage-gate advance, the financial and operational impact is verified, not just guessed.<\/p>\n<h2>How Execution Leaders Do This<\/h2>\n<p>Execution leaders move away from disconnected tools. They manage the hierarchy from <strong>Organization<\/strong> down to <strong>Measure<\/strong>. They employ a governed system where security initiatives cannot move from the &#8216;Defined&#8217; stage to &#8216;Implemented&#8217; without passing through established decision gates. This prevents the common trap of &#8216;project drift&#8217; where teams keep working on tasks that no longer deliver the intended risk mitigation value. By managing dependencies across functions, leaders ensure that security is not a siloed IT effort but a measured, accountable contribution to enterprise health.<\/p>\n<h2>Implementation Reality<\/h2>\n<h3>Key Challenges<\/h3>\n<p>The biggest blocker is the cultural resistance to financial auditing. Security teams often view financial oversight as interference. Successful implementation requires shifting the mindset so that the security team sees the controller as a partner in validating their achievements.<\/p>\n<h3>What Teams Get Wrong<\/h3>\n<p>Teams frequently treat the security business plan as a project phase tracker. They focus on whether a task is &#8216;done&#8217; rather than whether the risk was actually mitigated or the financial impact was realized. This leads to massive gaps in long-term programme viability.<\/p>\n<h3>Governance and Accountability Alignment<\/h3>\n<p>Alignment is achieved only when the people responsible for executing the security work are the same people held accountable for the financial results. Every measure must have an identified sponsor and controller who confirm the impact at every stage of the lifecycle.<\/p>\n<h2>How Cataligent Fits<\/h2>\n<p>Cataligent provides the infrastructure to turn a <strong>security business plan<\/strong> into a verified operational reality. Our platform, CAT4, replaces the fragmented world of spreadsheets and email approvals with a single source of truth that enforces cross-functional accountability. A core advantage is our <strong>Controller-Backed Closure<\/strong>, which ensures that security initiatives cannot be marked as complete until a controller has formally confirmed the achieved result, whether that is a risk reduction milestone or a specific cost saving. By bringing the rigour of <a href='https:\/\/cataligent.in\/'>Cataligent<\/a> into your security programmes, you move from reporting progress to proving performance. Many of our consulting partners, including firms like PwC and Deloitte, utilise this discipline to bring enterprise-grade credibility to their clients.<\/p>\n<h2>Conclusion<\/h2>\n<p>True security governance requires moving beyond slide decks and into hard, auditable outcomes. A well-executed security business plan is the difference between an organisation that manages its risks and one that simply manages its reporting. When you tether execution to financial precision and clear accountability, you eliminate the uncertainty that plagues modern IT programmes. The goal is not just to secure the enterprise, but to prove the value of every effort spent doing so. Governance is not a constraint; it is the prerequisite for sustainable security performance.<\/p>\n<h5>Q: How does this approach differ from standard project management software?<\/h5>\n<p>A: Standard tools focus on task completion and timelines, whereas our governance framework focuses on verified business outcomes. We require controller-backed confirmation before a measure can be closed, ensuring that reported progress aligns with actual financial or risk-based value.<\/p>\n<h5>Q: As a consultant, how do I justify the cost of an execution platform to a sceptical CFO?<\/h5>\n<p>A: Focus on the audit trail. CFOs are typically concerned with capital leakage in large programmes; our platform provides the specific evidence that the investment in security is delivering the expected return, removing the &#8216;black box&#8217; nature of IT spending.<\/p>\n<h5>Q: Can this platform handle the complexity of global, multi-entity security programmes?<\/h5>\n<p>A: Yes. CAT4 was designed for large enterprises managing thousands of projects. It maps directly to your existing organizational hierarchy, allowing for governance that respects local business unit requirements while providing global visibility to executive leadership.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Business Plan Explained for IT Governance and Security Teams Most security initiatives fail not because the technology is flawed but because the underlying business plan is a collection of aspirational goals rather than a governed operational strategy. When security teams treat their roadmap as a static document and not a living execution framework, the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2104],"tags":[2033,568,632,1739,2107,1967,2106,2105],"class_list":["post-17599","post","type-post","status-publish","format-standard","hentry","category-strategy-planning","tag-business-strategy","tag-cost-reduction-strategies","tag-cost-reduction-strategy","tag-digital-strategy","tag-planning","tag-strategic-decision-making","tag-strategic-planning","tag-strategy-planning"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Business Plan Explained for IT Governance and Security Teams - Cataligent<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Business Plan Explained for IT Governance and Security Teams - Cataligent\" \/>\n<meta property=\"og:description\" content=\"Security Business Plan Explained for IT Governance and Security Teams Most security initiatives fail not because the technology is flawed but because the underlying business plan is a collection of aspirational goals rather than a governed operational strategy. When security teams treat their roadmap as a static document and not a living execution framework, the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/\" \/>\n<meta property=\"og:site_name\" content=\"Cataligent\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cataligentstrategyimplementation\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-23T07:22:12+00:00\" \/>\n<meta name=\"author\" content=\"cat_admin_usr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cataligentindia\" \/>\n<meta name=\"twitter:site\" content=\"@cataligentindia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"cat_admin_usr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/\"},\"author\":{\"name\":\"cat_admin_usr\",\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#\\\/schema\\\/person\\\/649c37d6027e076e1e76bd18bac05756\"},\"headline\":\"Security Business Plan Explained for IT Governance and Security Teams\",\"datePublished\":\"2026-04-23T07:22:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/\"},\"wordCount\":958,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#organization\"},\"keywords\":[\"Business Strategy\",\"Cost Reduction Strategies\",\"Cost Reduction Strategy\",\"Digital Strategy\",\"Planning\",\"Strategic Decision-Making\",\"Strategic Planning\",\"Strategy Planning\"],\"articleSection\":[\"Strategy Planning\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/\",\"url\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/\",\"name\":\"Security Business Plan Explained for IT Governance and Security Teams - Cataligent\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#website\"},\"datePublished\":\"2026-04-23T07:22:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/uncategorized\\\/security-business-plan-explained-for-it-governance-and-security-teams\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Business Plan Explained for IT Governance and Security Teams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/\",\"name\":\"https:\\\/\\\/cataligent.in\\\/\",\"description\":\"Strategy Execution Tool for Cost Saving Program\",\"publisher\":{\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#organization\",\"name\":\"Cataligent Project Pvt. Ltd.\",\"url\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/logoColored-1.png\",\"contentUrl\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/logoColored-1.png\",\"width\":296,\"height\":75,\"caption\":\"Cataligent Project Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Cataligentstrategyimplementation\\\/\",\"https:\\\/\\\/x.com\\\/cataligentindia\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cataligentstrategy\\\/\",\"https:\\\/\\\/www.instagram.com\\\/cataligentindia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/#\\\/schema\\\/person\\\/649c37d6027e076e1e76bd18bac05756\",\"name\":\"cat_admin_usr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5a61f472589fc237202ca132bc60e152f3e6a99196f2e24dcf2a5f01626f1b4a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5a61f472589fc237202ca132bc60e152f3e6a99196f2e24dcf2a5f01626f1b4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5a61f472589fc237202ca132bc60e152f3e6a99196f2e24dcf2a5f01626f1b4a?s=96&d=mm&r=g\",\"caption\":\"cat_admin_usr\"},\"sameAs\":[\"https:\\\/\\\/cataligent.in\\\/blog\"],\"url\":\"https:\\\/\\\/cataligent.in\\\/blog\\\/author\\\/cat_admin_usr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Business Plan Explained for IT Governance and Security Teams - Cataligent","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/","og_locale":"en_US","og_type":"article","og_title":"Security Business Plan Explained for IT Governance and Security Teams - Cataligent","og_description":"Security Business Plan Explained for IT Governance and Security Teams Most security initiatives fail not because the technology is flawed but because the underlying business plan is a collection of aspirational goals rather than a governed operational strategy. When security teams treat their roadmap as a static document and not a living execution framework, the [&hellip;]","og_url":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/","og_site_name":"Cataligent","article_publisher":"https:\/\/www.facebook.com\/Cataligentstrategyimplementation\/","article_published_time":"2026-04-23T07:22:12+00:00","author":"cat_admin_usr","twitter_card":"summary_large_image","twitter_creator":"@cataligentindia","twitter_site":"@cataligentindia","twitter_misc":{"Written by":"cat_admin_usr","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/#article","isPartOf":{"@id":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/"},"author":{"name":"cat_admin_usr","@id":"https:\/\/cataligent.in\/blog\/#\/schema\/person\/649c37d6027e076e1e76bd18bac05756"},"headline":"Security Business Plan Explained for IT Governance and Security Teams","datePublished":"2026-04-23T07:22:12+00:00","mainEntityOfPage":{"@id":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/"},"wordCount":958,"commentCount":0,"publisher":{"@id":"https:\/\/cataligent.in\/blog\/#organization"},"keywords":["Business Strategy","Cost Reduction Strategies","Cost Reduction Strategy","Digital Strategy","Planning","Strategic Decision-Making","Strategic Planning","Strategy Planning"],"articleSection":["Strategy Planning"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/","url":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/","name":"Security Business Plan Explained for IT Governance and Security Teams - Cataligent","isPartOf":{"@id":"https:\/\/cataligent.in\/blog\/#website"},"datePublished":"2026-04-23T07:22:12+00:00","breadcrumb":{"@id":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cataligent.in\/blog\/uncategorized\/security-business-plan-explained-for-it-governance-and-security-teams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cataligent.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Business Plan Explained for IT Governance and Security Teams"}]},{"@type":"WebSite","@id":"https:\/\/cataligent.in\/blog\/#website","url":"https:\/\/cataligent.in\/blog\/","name":"https:\/\/cataligent.in\/","description":"Strategy Execution Tool for Cost Saving Program","publisher":{"@id":"https:\/\/cataligent.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cataligent.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cataligent.in\/blog\/#organization","name":"Cataligent Project Pvt. Ltd.","url":"https:\/\/cataligent.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cataligent.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cataligent.in\/blog\/wp-content\/uploads\/2025\/01\/logoColored-1.png","contentUrl":"https:\/\/cataligent.in\/blog\/wp-content\/uploads\/2025\/01\/logoColored-1.png","width":296,"height":75,"caption":"Cataligent Project Pvt. Ltd."},"image":{"@id":"https:\/\/cataligent.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Cataligentstrategyimplementation\/","https:\/\/x.com\/cataligentindia","https:\/\/www.linkedin.com\/company\/cataligentstrategy\/","https:\/\/www.instagram.com\/cataligentindia\/"]},{"@type":"Person","@id":"https:\/\/cataligent.in\/blog\/#\/schema\/person\/649c37d6027e076e1e76bd18bac05756","name":"cat_admin_usr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5a61f472589fc237202ca132bc60e152f3e6a99196f2e24dcf2a5f01626f1b4a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5a61f472589fc237202ca132bc60e152f3e6a99196f2e24dcf2a5f01626f1b4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5a61f472589fc237202ca132bc60e152f3e6a99196f2e24dcf2a5f01626f1b4a?s=96&d=mm&r=g","caption":"cat_admin_usr"},"sameAs":["https:\/\/cataligent.in\/blog"],"url":"https:\/\/cataligent.in\/blog\/author\/cat_admin_usr\/"}]}},"_links":{"self":[{"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/posts\/17599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/comments?post=17599"}],"version-history":[{"count":0,"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/posts\/17599\/revisions"}],"wp:attachment":[{"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/media?parent=17599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/categories?post=17599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cataligent.in\/blog\/wp-json\/wp\/v2\/tags?post=17599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}