{"id":50646,"date":"2025-09-18T11:55:57","date_gmt":"2025-09-18T17:55:57","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=50646"},"modified":"2026-03-20T04:40:04","modified_gmt":"2026-03-20T10:40:04","slug":"consejos-para-adaptar-su-estrategia-de-seguridad-en-una-era-de-recortes-federales-en-materia-cibernetica","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/","title":{"rendered":"Cambio de rumbo: Consejos para adaptar su estrategia de seguridad en una era de recortes federales en materia cibern\u00e9tica"},"content":{"rendered":"\n<section class=\"bs-section bs-section-4b500e99ef8cdebaf3ddaa6a36e7fb461e386ddc bs-section---default bs-section--common-header-with-form  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default     \"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column  col-sm-0 col-md-10   bs-column-d4f201cab41f0341a7cbb32888b9ef9b39ce8318 bs-column---default     \"><h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">Shifting Ground: Tips to Adapt Your Security Strategy in an Era of Federal Cyber Cutbacks<\/h1>\n\n\n<p>With federal programs like CISA facing cutbacks and the Cyber Safety Review Board disbanding, the burden of cyber resilience now falls heavily on the private sector. And with 85% of organizations reporting budget and resource strains, redefining resilient security leadership has never been more urgent.<\/p>\n\n\n\n<p>In this expert panel, Swimlane security leaders share how reduced federal funding impacts cyber risk, threat intelligence sharing, and security team operations. You\u2019ll also learn practical strategies to strengthen resilience by building robust internal frameworks.<\/p>\n\n\n\n<script src=\"https:\/\/fast.wistia.com\/player.js\" async><\/script><script src=\"https:\/\/fast.wistia.com\/embed\/l0z156h97i.js\" async type=\"module\"><\/script><style>wistia-player[media-id='l0z156h97i']:not(:defined) { background: center \/ contain no-repeat url('https:\/\/fast.wistia.com\/embed\/medias\/l0z156h97i\/swatch'); display: block; filter: blur(5px); padding-top:56.25%; }<\/style> <wistia-player media-id=\"l0z156h97i\" aspect=\"1.7777777777777777\"><\/wistia-player>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-aa6eb5dfda60c91b965e7c072905992179763573 bs-section---default bs-section--related-items  \"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-12   bs-column-601afe1d46256d3b13b7ac6679644286e4c6669e bs-column---default     \">\n<h2 class=\"wp-block-heading has-deep-color has-text-color\" id=\"h-you-might-also-be-interested-in\">You Might Also Be Interested in<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-12   bs-column-b43fa869b558d43fa93bdd41503b8820f2f54817 bs-column---default     \">\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69df6da6175d1 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resources\/reports\/federal-cyber-priorities-impact-report\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Fab-OG.png' class='img-fluid' alt='Federal cyber priorities impact report ' title='Fab OG'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Report<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Federal Cyber Priorities Reshape Security Strategy<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69df6da623a7d bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/resources\/infographics\/ai-automation-success-guide\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-Master-the-Art-of-AI-vs-Automation.png' class='img-fluid' alt='AI and Automation in Security: Master Success with Both' title='OG Master the Art of AI vs Automation'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Infographic<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Master the Art of AI Automation Success<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69df6da625570 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/es\/blog\/cisas-roadmap-reflects-urgency-for-cybersecurity\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-7-1.jpg' class='img-fluid' alt='CISA\u2019s CVE roadmap marks a shift toward smarter, AI-driven cybersecurity. Discover what it means for the private sector and how to prepare. Read more.' title='Masthead (7)'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__category bs-post-taxonomy_resource-type\">\n        <span>Blog<\/span>    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Quality Era: How CISA\u2019s Roadmap Reflects Urgency for Modern Cybersecurity\u00a0<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":77,"featured_media":55132,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":49688,"learn_more_label":"Watch Now","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[116],"resource-topic":[215,132],"resource-industry":[108,117,99],"blog-category":[75,71,72],"class_list":["post-50646","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-webinars","resource-topic-ai","resource-topic-platform","resource-industry-use-case","resource-industry-phishing","resource-industry-alert-triage","blog-category-security-automation","blog-category-soar","blog-category-tips-tricks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Webinar: Adapt Security Strategy Amidst Federal Cyber Cutbacks | Swimlane<\/title>\n<meta name=\"description\" content=\"Explore how budget cuts and reduced federal support impact cybersecurity and learn expert strategies to build resilient security in your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/es\/recursos\/seminario-web-sobre-los-recortes-ciberneticos-federales\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shifting Ground: Tips to Adapt Your Security Strategy in an Era of Federal Cyber Cutbacks\" \/>\n<meta property=\"og:description\" content=\"Watch this on-demand webinar to learn how to streamline compliance audits, reduce audit risk, and bring clarity to GRC processes with insights from Swimlane experts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/es\/recursos\/seminario-web-sobre-los-recortes-ciberneticos-federales\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-20T10:40:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/BT-AI-Automation-Equation.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Watch this on-demand webinar to learn how to streamline compliance audits, reduce audit risk, and bring clarity to GRC processes with insights from Swimlane experts.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/\",\"url\":\"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/\",\"name\":\"Webinar: Adapt Security Strategy Amidst Federal Cyber Cutbacks | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/BT-AI-Automation-Equation.webp\",\"datePublished\":\"2025-09-18T17:55:57+00:00\",\"dateModified\":\"2026-03-20T10:40:04+00:00\",\"description\":\"Explore how budget cuts and reduced federal support impact cybersecurity and learn expert strategies to build resilient security in your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/BT-AI-Automation-Equation.webp\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/BT-AI-Automation-Equation.webp\",\"width\":640,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shifting Ground: Tips to Adapt Your Security Strategy in an Era of Federal Cyber Cutbacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/es\/#website\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/es\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Seminario web: Adaptaci\u00f3n de la estrategia de seguridad ante los recortes federales en materia cibern\u00e9tica | Swimlane","description":"Explore c\u00f3mo los recortes presupuestarios y la reducci\u00f3n del apoyo federal afectan la ciberseguridad y aprenda estrategias expertas para desarrollar una seguridad resiliente en su organizaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/es\/recursos\/seminario-web-sobre-los-recortes-ciberneticos-federales\/","og_locale":"es_ES","og_type":"article","og_title":"Shifting Ground: Tips to Adapt Your Security Strategy in an Era of Federal Cyber Cutbacks","og_description":"Watch this on-demand webinar to learn how to streamline compliance audits, reduce audit risk, and bring clarity to GRC processes with insights from Swimlane experts.","og_url":"https:\/\/swimlane.com\/es\/recursos\/seminario-web-sobre-los-recortes-ciberneticos-federales\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-20T10:40:04+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/BT-AI-Automation-Equation.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_description":"Watch this on-demand webinar to learn how to streamline compliance audits, reduce audit risk, and bring clarity to GRC processes with insights from Swimlane experts.","twitter_site":"@swimlane","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/","url":"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/","name":"Seminario web: Adaptaci\u00f3n de la estrategia de seguridad ante los recortes federales en materia cibern\u00e9tica | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/BT-AI-Automation-Equation.webp","datePublished":"2025-09-18T17:55:57+00:00","dateModified":"2026-03-20T10:40:04+00:00","description":"Explore c\u00f3mo los recortes presupuestarios y la reducci\u00f3n del apoyo federal afectan la ciberseguridad y aprenda estrategias expertas para desarrollar una seguridad resiliente en su organizaci\u00f3n.","breadcrumb":{"@id":"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/BT-AI-Automation-Equation.webp","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/BT-AI-Automation-Equation.webp","width":640,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/es\/resources\/webinar-federal-cyber-cutbacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Shifting Ground: Tips to Adapt Your Security Strategy in an Era of Federal Cyber Cutbacks"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/es\/#website","url":"https:\/\/swimlane.com\/es\/","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","description":"Automatizaci\u00f3n de la inteligencia artificial para todas las funciones de seguridad","publisher":{"@id":"https:\/\/swimlane.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/es\/#organization","name":"Automatizaci\u00f3n de seguridad de c\u00f3digo bajo y plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/50646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/users\/77"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/50646\/revisions"}],"predecessor-version":[{"id":55201,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/sw_resource\/50646\/revisions\/55201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media\/55132"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/media?parent=50646"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/tags?post=50646"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-type?post=50646"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-topic?post=50646"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/resource-industry?post=50646"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/es\/wp-json\/wp\/v2\/blog-category?post=50646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}