{"id":229151,"date":"2021-10-20T10:30:55","date_gmt":"2021-10-20T14:30:55","guid":{"rendered":"https:\/\/policyoptions.irpp.org\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/"},"modified":"2025-08-26T01:05:06","modified_gmt":"2025-08-26T05:05:06","slug":"canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2","status":"publish","type":"podcast","link":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/","title":{"rendered":"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating"},"content":{"rendered":"<p><iframe src=\"https:\/\/w.soundcloud.com\/player\/?url=https%3A\/\/api.soundcloud.com\/tracks\/1144604830&amp;color=%23ff5500&amp;auto_play=false&amp;hide_related=false&amp;show_comments=true&amp;show_user=true&amp;show_reposts=false&amp;show_teaser=true\" width=\"100%\" height=\"166\" frameborder=\"no\" scrolling=\"no\"><\/iframe><\/p>\n<div style=\"font-size: 10px; color: #cccccc; line-break: anywhere; word-break: normal; overflow: hidden; white-space: nowrap; text-overflow: ellipsis; font-family: Interstate,Lucida Grande,Lucida Sans Unicode,Lucida Sans,Garuda,Verdana,Tahoma,sans-serif; font-weight: 100;\"><a style=\"color: #cccccc; text-decoration: none;\" title=\"Policy Options Podcast\" href=\"https:\/\/soundcloud.com\/irpp\" target=\"_blank\" rel=\"noopener\">Policy Options Podcast<\/a> \u00b7 <a style=\"color: #cccccc; text-decoration: none;\" title=\"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating\" href=\"https:\/\/soundcloud.com\/irpp\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating\" target=\"_blank\" rel=\"noopener\">Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating<\/a><\/div>\n<p>The average cost of a data breach in Canada is\u00a0<a href=\"https:\/\/www.ibm.com\/security\/data-breach\">$6.75 million per incident\u00a0<\/a>in 2021. That\u2019s up almost half a million from 2020. With each new year, hackers become more sophisticated in their attack methods and who and what they target. Businesses across the country are losing higher amounts of money through data recovery, ransom payments and more.<\/p>\n<p>The Canadian government has a realistic opportunity to support businesses big and small with strong cybersecurity leadership. The renewed mandate provided by the September federal election and leadership change at the\u00a0<a href=\"https:\/\/cyber.gc.ca\/en\/\">Canadian Centre for Cyber Security<\/a>\u00a0(CCCS) offers the opportunity to outline new strategic cybersecurity priorities.<\/p>\n<p>In August 2021,\u00a0<a href=\"https:\/\/cyber.gc.ca\/en\/our-executive-team\">Sami Khoury<\/a>\u00a0took over as the head of the CCCS. The centre is a relatively new institution \u2013 it was created three years ago and only had a year or so of development before the start of the COVID-19 pandemic. As such, it has arguably not yet had the opportunity to make a true impact and establish itself amongst government institutions.<\/p>\n<p>As the public face of the <a href=\"https:\/\/www.cse-cst.gc.ca\/en\">Communications Security Establishment<\/a> (CSE), the CCCS provides cybersecurity advice and support for the government, critical infrastructure owners and operators, the private sector and the Canadian public.<\/p>\n<p>Cybersecurity is crucial for all industries, from critical infrastructure sectors like oil and gas, water and energy to companies that affect Canadian\u2019s daily lives like retail and financial services. The CCCS can bring cybersecurity to the forefront of Canadian policy discussions, working with the public, internal government agencies\u00a0and\u00a0private industry experts to provide direction to all Canadian businesses and organizations.<\/p>\n<p>As an organization, the CCCS could take a page out of the playbooks of similarly allied institutions like the United States\u2019\u00a0<a href=\"https:\/\/www.cisa.gov\/\">Cybersecurity and Infrastructure Security Agency<\/a>\u00a0(CISA) and the United Kingdom\u2019s\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/\">National Cyber Security Centre<\/a>\u00a0(NCSC). With Khoury as its new leader and a new year fast approaching, CCCS is in a position to be assertive, innovative in a way that will have the most transparent impact.<\/p>\n<p>But, where to begin?<\/p>\n<p><strong>Start with protecting critical national infrastructure<\/strong><\/p>\n<p>The centre has the most significant opportunity to have a lasting impact on Canadian cybersecurity by engaging directly with critical national infrastructure organizations to improve their cybersecurity practices and foundations. These will support the overall well-being of everyone in sectors like energy, oil and gas and water treatment.<\/p>\n<p>Under new leadership, the CCCS needs to expand outreach, training and public direction to these critical sectors. While nearly\u00a0<a href=\"https:\/\/ipolitics.ca\/2021\/08\/10\/protecting-canadas-critical-infrastructure-the-road-ahead\/\">85 per cent<\/a>\u00a0of Canada\u2019s critical national infrastructure is owned and operated in the private sector, government-supported instruction and leadership will be the driving force behind improving cyber-resilience.<\/p>\n<p>The CCCS should begin with educating critical national infrastructure organizations about the importance of updating systems. Critical national infrastructure tends to depend heavily on operational technology (OT) instead of the informational technology (IT) more commonly associated with cyberattacks.<\/p>\n<p>Operational technology (OT)<a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/operational-technology-ot\"> is defined<\/a> as hardware and software that detects or causes a change by directly monitoring and controlling industrial equipment, assets, processes and events. In many ways, OT is more vulnerable to attack than IT because operational technology typically relies on older, legacy security systems. In addition, most OT systems were never designed with cybersecurity in mind. Attackers can leverage vulnerabilities in outdated OT environments to compromise critical infrastructure.<\/p>\n<p><strong>Developing incident response<\/strong><\/p>\n<p>Many organizations in the private sector \u2013 regardless of their level of cybersecurity maturity \u2013 may expect or even demand a government response when things go wrong. The CCCS should consider the approach developed by its U.K. equivalent, the NCSC, which guides the public and businesses in cybersecurity matters.<\/p>\n<p>While the CCCS has\u00a0<a href=\"https:\/\/www.cyber.gc.ca\/en\/develop-incident-response-plan\">guidelines<\/a>\u00a0for organizations to create incident response programs, the NCSC\u2019s \u201c<a href=\"https:\/\/www.ncsc.gov.uk\/information\/cir-cyber-incident-response\">Cyber Incident Response<\/a>\u201d program certifies private companies to help critical infrastructure organizations that have suffered a significant cyberattack. After an attack, organizations must take essential steps, also known as cyber incident response. They must determine the extent of the attack, manage its immediate impact, help rectify the compromised system, and work to increase security across the network. In the U.K., a certified company would support all the activities detailed above.<\/p>\n<p>Critical national infrastructure companies often cannot conduct all these steps in the process. Relying on a government-certified private provider can help these organizations and prevent a devastating attack. While the government must continue to play a substantial and guiding role in protecting critical infrastructure from cyberattacks, a more co-operative position with the private sector in incident response will be vital in safeguarding infrastructure organizations.<\/p>\n<p>By collectively unpacking cyberattacks, the private and public sectors can understand what areas and industries need further resources, budget, and people. Instilling a similar incident response program in Canada will promote collaboration and prepare organizations for dealing with future threats.<\/p>\n<p><strong>Further promoting innovation and collaboration<\/strong><\/p>\n<p>The CCCS has an immeasurable opportunity to partner with the private sector to improve education about the improved security tools available to critical national infrastructure organizations.<\/p>\n<p>Cyberattacks are becoming increasingly sophisticated. Workforces are more distributed and internet-connected than ever, giving hackers new avenues to breach organizations. Cyberattacks now use methods like ransomware-as-a-service that allow them to download a hacking application and hold a company\u2019s data for ransom without being an experienced hacker with technical prowess.<\/p>\n<p>Critical national infrastructure organizations need to fight back against malicious actors and utilize advanced technologies to update their systems and better protect their OT\u00a0and\u00a0IT environments.<\/p>\n<p>While public funding and research efforts \u2013 like the recent\u00a0<a href=\"https:\/\/www.newswire.ca\/news-releases\/protecting-canada-s-energy-supply-chains-from-cyber-threats-865127414.html\">$407,000 in new funding<\/a>\u00a0given to the University of Waterloo from the Department of Natural Resources \u2013 can help identify threats, these initiatives cannot help contain them. Canadian organizations need to leverage innovative security tools for total visibility into their networks and increased understanding of their complicated digital infrastructure. Attacks are becoming increasingly automated, and hackers have tools at their disposal that they never had before. It\u2019s apparent: Humans can no longer defend against advanced, machine-speed attacks alone.<\/p>\n<p>Many organizations understand that cyberattacks are a threat yet still rely on firewalls to defend their entire digital infrastructure. COVID-19 has changed the cybergame forever for OT as well as IT. The boundaries of a traditional network have expanded far beyond a data centre and the office. With remote and hybrid work, employees are now everywhere and might be working from unsecured networks and devices. Outmoded defences are not enough especially given the increasing difficulty in clearly defining where the cyber perimeter is.<\/p>\n<p>But solutions like self-learning artificial intelligence can monitor the entire spectrum of an organization&#8217;s activity. It can learn an organization\u2019s entire digital ecosystem, determining what \u201cnormal\u201d behaviour looks like for that enterprise, from who typically sends emails to who typically accesses applications and when. It can then use this evolving understanding to detect abnormal behaviour and disrupt a threat in its earliest stages\u00a0before\u00a0hackers can cause real harm.<\/p>\n<p>However, many critical infrastructure organizations just do not know what tools are available to them. Although the CCCS provides resources, alerts and best cyber practices for businesses and consumers, it does not outline the types of cybersecurity technologies organizations can invest in to protect their digital estates.<\/p>\n<p>The CCCS needs to elevate its role as a bridge between the public and private sectors. Establishing its presence as a support system will be especially crucial in the successful protection of critical national infrastructure. Being open and increasingly visible within the Canadian cybersecurity environment and co-operating with the private sector will be invaluable for Canada\u2019s future cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Policy Options Podcast \u00b7 Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating The average cost of a data breach in Canada is\u00a0$6.75 million per incident\u00a0in 2021. That\u2019s up almost half a million from 2020. With each new year, hackers become more sophisticated in their attack methods and who and what they target. Businesses [&hellip;]<\/p>\n","protected":false},"featured_media":229145,"template":"","meta":{"_acf_changed":false,"content-type":"","ep_exclude_from_search":false},"categories":[9368,9360,9372,9383],"tags":[8547,8771],"irpp-category":[4217,4337],"section":[],"irpp-tag":[7102],"class_list":["post-229151","podcast","type-podcast","status-publish","has-post-thumbnail","hentry","category-podcasts-fr","category-international","category-recent-stories-fr","category-sciences-et-technologies","tag-cybersecurite-fr","tag-in-their-words-fr","irpp-category-affaires-internationales","irpp-category-science-et-technologie","irpp-tag-cybersecurite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating - Policy Options<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating - Policy Options\" \/>\n<meta property=\"og:description\" content=\"Policy Options Podcast \u00b7 Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating The average cost of a data breach in Canada is\u00a0$6.75 million per incident\u00a0in 2021. That\u2019s up almost half a million from 2020. With each new year, hackers become more sophisticated in their attack methods and who and what they target. Businesses [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Policy Options\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IRPP.org\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T05:05:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-Canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@irpp\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/\",\"url\":\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/\",\"name\":\"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating - Policy Options\",\"isPartOf\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-Canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating.jpg\",\"datePublished\":\"2021-10-20T14:30:55+00:00\",\"dateModified\":\"2025-08-26T05:05:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#primaryimage\",\"url\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-Canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating.jpg\",\"contentUrl\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-Canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/policyoptions.irpp.org\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/#website\",\"url\":\"https:\/\/policyoptions.irpp.org\/fr\/\",\"name\":\"Policy Options\",\"description\":\"Institute for Research on Public Policy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating - Policy Options","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating - Policy Options","og_description":"Policy Options Podcast \u00b7 Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating The average cost of a data breach in Canada is\u00a0$6.75 million per incident\u00a0in 2021. That\u2019s up almost half a million from 2020. With each new year, hackers become more sophisticated in their attack methods and who and what they target. Businesses [&hellip;]","og_url":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/","og_site_name":"Policy Options","article_publisher":"https:\/\/www.facebook.com\/IRPP.org","article_modified_time":"2025-08-26T05:05:06+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-Canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@irpp","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/","url":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/","name":"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating - Policy Options","isPartOf":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#primaryimage"},"image":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#primaryimage"},"thumbnailUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-Canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating.jpg","datePublished":"2021-10-20T14:30:55+00:00","dateModified":"2025-08-26T05:05:06+00:00","breadcrumb":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#primaryimage","url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-Canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating.jpg","contentUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-Canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/policyoptions.irpp.org\/fr\/podcast\/canadas-fledgling-cybersecurity-centre-must-do-more-collaborating-and-educating-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/policyoptions.irpp.org\/fr\/"},{"@type":"ListItem","position":2,"name":"Canada\u2019s fledgling cybersecurity centre must do more collaborating and educating"}]},{"@type":"WebSite","@id":"https:\/\/policyoptions.irpp.org\/fr\/#website","url":"https:\/\/policyoptions.irpp.org\/fr\/","name":"Policy Options","description":"Institute for Research on Public Policy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/podcast\/229151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media\/229145"}],"wp:attachment":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media?parent=229151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/categories?post=229151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/tags?post=229151"},{"taxonomy":"irpp-category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-category?post=229151"},{"taxonomy":"section","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/section?post=229151"},{"taxonomy":"irpp-tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-tag?post=229151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}