{"id":246,"date":"2020-12-01T14:27:29","date_gmt":"2020-12-01T20:27:29","guid":{"rendered":"https:\/\/idsinc.com\/?p=246"},"modified":"2023-04-17T10:22:33","modified_gmt":"2023-04-17T16:22:33","slug":"the-virtual-cio","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/the-virtual-cio\/","title":{"rendered":"The Virtual CIO: How Does It Work?"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\">By Mark Gianturco, CIO on 12\/1\/20 8:00 AM<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When it comes to ensuring continuity across your IT initiative, many organizations don\u2019t realize just how little they know until they are faced with the departure of a chief information officer (CIO) or chief information security officer (CISO). Between understanding your ongoing technology investments and accurately gauging workers\u2019 morale, these moments can be a wake-up call for organizations not prepared to adapt.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p class=\"wp-block-paragraph\">While filling the role left by your CIO will be a priority for many businesses, a virtual CIO (vCIO) can help you bridge the gap between the departure and making a permanent hire.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In our <a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/what-to-do-when-your-cio-leaves\" target=\"_blank\" rel=\"noreferrer noopener\">most recent blog post<\/a>, we discussed the many factors that organizations must be aware of to ensure continuity and minimize risk at such crucial junctures. In this post, we\u2019ll break down some of the more concrete ways that a vCIO helps businesses get a handle on their people, processes, and technology to refocus on growth.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-management-of-people\">Management of People<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">A vCIO\u2019s primary goal when it comes to managing people involves minimizing single points of failure, as well as understanding and maintaining worker morale.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To get a handle on these factors, vCIOs will develop resources like organization charts and questionnaires. These artifacts should be standardized yet also tailored to different areas, such as IT and security. Applying these resources typically involves a combination of meetings, interviews, and informal observations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Over time, a vCIO will often identify a core group of key personnel who can help them understand risks at a granular level. For instance, are the main risks project-based or team-based? What are the expectations around individual projects, and what could throw the team off schedule? Are there key benchmarks that need to be met?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-management-of-processes\">Management of Processes<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Some organizations rely on rigid, formal processes; others thrive when their teams are given more freedom. A vCIO\u2019s job is to understand the processes that do and don\u2019t work for your business.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For example, one common risk around processes emerges when a software development team is tasked with getting to market quickly. The right way to minimize ambiguity in the software development lifecycle (SDLC) involves wireframes, storyboards, and more. However, certain circumstances may call for such procedures to be carried out in a more ad hoc manner.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To determine the level and type of process your organization needs, vCIOs must look carefully at why tasks are being carried out in a specific way. If the process is light, are there good reasons for this? Or are there holes where more robust guidelines would help? A vCIO will always be on the lookout for the risk of scope creep, as well as places where different processes overlap.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security\">Security<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">When it comes to security, what an organization claims it does and what it actually does are often very different. This can present a challenge to gathering reliable information.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To reduce risk and improve efficiency in this area, a vCIO starts by talking to people who understand security awareness. Informal conversations are especially helpful in determining adherence to your internal processes, as well larger issues such as compliance with federal regulations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">From there, a vCIO will turn to specific artifacts. While physical, logical, and administrative security are all important, administrative security will present the most opportunities for gathering concrete information. For instance, checking audit logs will enable the vCIO to see if users are following procedures for logging in, signing out, and rotating their passwords.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-application-development\">Application Development<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">One of a vCIO\u2019s main goals is determining whether your organization\u2019s technology investment is aligned with its larger vision. Ensuring that your current tools are efficiently meeting users\u2019 needs involves eliminating risk as well as eliminating waste.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To get started, a vCIO will conduct a technology audit and have informal conversations with users who fill a variety of roles. Relevant questions include: What are the pain points in your SDLC? Do you have any redundancies or viable backups in your toolset? Finally, what support is available for these products?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In thinking about both your SDLC as a whole and individual tools, vCIOs will be especially on the lookout for instances of data lock-in. If your company finds that it\u2019s dependent on particular software to freely access its data, you\u2019ll need to react quickly to keep control over your information and avoid further technology expenses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-strategic-projects\">Strategic Projects<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">When it comes to ensuring continuity in strategic initiatives, the vCIO\u2019s goal is to determine what information the departed CIO had that others didn\u2019t.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Even if the vCIO has come in right when a project is about to launch, understanding how these initiatives fit into longer-term goals is crucial. Often, for example, there may be a small set of strategic projects that cannot fail in order for a larger initiative to move forward. Additionally, leadership may have important reasons for not wanting to unveil a project until a certain time.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Understanding the factors at stake in a given project also requires carefully sketching out a project\u2019s champions and stakeholders. Who is impacted, and how? When determining stakeholder sentiment, a vCIO will need to know whether they\u2019re speaking to someone with a particular interest in or issue with a given project.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-culture-and-environment\">Culture and Environment<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">While establishing relationships with leadership is essential for keeping strategic initiatives on schedule, assessing an organization\u2019s culture often hinges on lower-level relationships.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Keep in mind that understanding relevant influencers often means looking beyond just roles and job titles. Because a company\u2019s vision statement doesn\u2019t necessarily translate all the way down, informal conversations and observations are key. Expect vCIOs to be as involved in everyday tactical meetings as they are in high-level strategy sessions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The departure of a CIO will inevitably leave your organization with questions, but enlisting the help of a vCIO service can help keep your projects and your people on track. By providing an objective look at your business\u2019 IT practices, the right vCIO can help your team work more efficiently and at a higher level of quality.<\/p>","protected":false},"excerpt":{"rendered":"<p>By Mark Gianturco, CIO on 12\/1\/20 8:00 AM When it comes to ensuring continuity across your IT initiative, many organizations don\u2019t realize just how little they know until they are faced with the departure of a chief information officer (CIO) or chief information security officer (CISO). Between understanding your ongoing technology investments and accurately gauging [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":247,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-246","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Virtual CIO: How Does It Work? - iDiscovery Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/the-virtual-cio\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Virtual CIO: How Does It Work?\" \/>\n<meta property=\"og:description\" content=\"By Mark Gianturco, CIO on 12\/1\/20 8:00 AM When it comes to ensuring continuity across your IT initiative, many organizations don\u2019t realize just how little they know until they are faced with the departure of a chief information officer (CIO) or chief information security officer (CISO). Between understanding your ongoing technology investments and accurately gauging [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/the-virtual-cio\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-01T20:27:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-17T16:22:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mark Gianturco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Gianturco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/\"},\"author\":{\"name\":\"Mark Gianturco\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/7d7dfc75b463fbf766dce55f11984c05\"},\"headline\":\"The Virtual CIO: How Does It Work?\",\"datePublished\":\"2020-12-01T20:27:29+00:00\",\"dateModified\":\"2023-04-17T16:22:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/\"},\"wordCount\":1015,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/\",\"name\":\"The Virtual CIO: How Does It Work? - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png\",\"datePublished\":\"2020-12-01T20:27:29+00:00\",\"dateModified\":\"2023-04-17T16:22:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png\",\"width\":770,\"height\":334,\"caption\":\"The Virtual CIO: How Does It Work?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/the-virtual-cio\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Virtual CIO: How Does It Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/7d7dfc75b463fbf766dce55f11984c05\",\"name\":\"Mark Gianturco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/328c3af95bd13a1f7b9afac35218d2bc056e86cc5403be9c4ff2e938e22e81f8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/328c3af95bd13a1f7b9afac35218d2bc056e86cc5403be9c4ff2e938e22e81f8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/328c3af95bd13a1f7b9afac35218d2bc056e86cc5403be9c4ff2e938e22e81f8?s=96&d=mm&r=g\",\"caption\":\"Mark Gianturco\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/mark\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Virtual CIO: How Does It Work? - iDiscovery Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/the-virtual-cio\/","og_locale":"en_GB","og_type":"article","og_title":"The Virtual CIO: How Does It Work?","og_description":"By Mark Gianturco, CIO on 12\/1\/20 8:00 AM When it comes to ensuring continuity across your IT initiative, many organizations don\u2019t realize just how little they know until they are faced with the departure of a chief information officer (CIO) or chief information security officer (CISO). Between understanding your ongoing technology investments and accurately gauging [&hellip;]","og_url":"https:\/\/idsinc.com\/en_gb\/the-virtual-cio\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2020-12-01T20:27:29+00:00","article_modified_time":"2023-04-17T16:22:33+00:00","og_image":[{"width":770,"height":334,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png","type":"image\/png"}],"author":"Mark Gianturco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mark Gianturco","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/the-virtual-cio\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/the-virtual-cio\/"},"author":{"name":"Mark Gianturco","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/7d7dfc75b463fbf766dce55f11984c05"},"headline":"The Virtual CIO: How Does It Work?","datePublished":"2020-12-01T20:27:29+00:00","dateModified":"2023-04-17T16:22:33+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/the-virtual-cio\/"},"wordCount":1015,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/the-virtual-cio\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/the-virtual-cio\/","url":"https:\/\/idsinc.com\/the-virtual-cio\/","name":"The Virtual CIO: How Does It Work? - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/the-virtual-cio\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/the-virtual-cio\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png","datePublished":"2020-12-01T20:27:29+00:00","dateModified":"2023-04-17T16:22:33+00:00","breadcrumb":{"@id":"https:\/\/idsinc.com\/the-virtual-cio\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/the-virtual-cio\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/the-virtual-cio\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/Screen-Shot-2021-01-26-at-4.50.52-PM-2.png","width":770,"height":334,"caption":"The Virtual CIO: How Does It Work?"},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/the-virtual-cio\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"The Virtual CIO: How Does It Work?"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/7d7dfc75b463fbf766dce55f11984c05","name":"Mark Gianturco","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/328c3af95bd13a1f7b9afac35218d2bc056e86cc5403be9c4ff2e938e22e81f8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/328c3af95bd13a1f7b9afac35218d2bc056e86cc5403be9c4ff2e938e22e81f8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/328c3af95bd13a1f7b9afac35218d2bc056e86cc5403be9c4ff2e938e22e81f8?s=96&d=mm&r=g","caption":"Mark Gianturco"},"url":"https:\/\/idsinc.com\/en_gb\/author\/mark\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/246\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/247"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=246"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=246"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}