{"id":74736,"date":"2022-03-22T09:00:00","date_gmt":"2022-03-22T16:00:00","guid":{"rendered":""},"modified":"2023-07-25T09:41:51","modified_gmt":"2023-07-25T16:41:51","slug":"the-key-role-that-trust-and-security-plays-within-government-agencies","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/","title":{"rendered":"The key role that trust and security plays within government agencies"},"content":{"rendered":"\n<p>It\u2019s safe to say that hybrid work is the new normal for most governments. But supporting a distributed workforce that operates both in office environments and remotely creates an avenue for cybercriminals to attack government networks and infrastructure. At this point, it\u2019s not a matter of if, but when your government will be a victim of a cyber-attack. That said, combatting cyber-attacks is a priority that is well recognized by governments worldwide\u2014especially since the onset of the pandemic.<\/p>\n\n\n\n<p>As technologies evolve, people expect more from their governments\u2014including secure, innovative, and easily accessible services. This is an area where Microsoft has <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/business\/be-fearless?rtc=1\/?ef_id=:G:s&amp;OCID=AID2200938_SEM_:G:s&amp;msclkid=73d6fe70019b1429d5559c524ea0583a\">strong expertise<\/a> and therefore can support by <a href=\"https:\/\/info.microsoft.com\/ww-landing-Building-Trust-with-Secure-Services.html?lcid=en-us\">building trust with secure services<\/a> while ensuring the integrity of government data and the information shared by citizens and residents alike.<strong> <\/strong>Read further to<strong> <\/strong>discover how to accelerate digital transformation and build trust through empowered people, enhanced governments, and enabled societies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Empowering people and enabling societies<\/h2>\n\n\n\n<p>People are vital to the growth of society. When they are enabled to access a wide variety of government services in a secure manner, society moves forward and businesses flourish. This is because digital identity forms the cornerstone of everything that people do in today\u2019s world. Unlike physical identification, such as driver\u2019s licenses or passports, digital IDs can be authenticated through technologies such as biometrics, passwords, PIN numbers, and so much more. As a result, digital identity can be the foundation of trusted and secure services, assuring people that their privacy is protected while enabling governments to deliver better experiences to constituents.<\/p>\n\n\n\n<p>This is clearly demonstrated by the <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1351115614634143059-flanders-government-of-belgium-government-azure-active-directory\" target=\"_blank\" rel=\"noreferrer noopener\">Flanders Government of Belgium<\/a> where city officials recognized the need for technology that provides users with control over their data while allowing trusted interactions that help people start new businesses and conduct daily operations.&nbsp;In response, the government partnered with Microsoft to ensure trusted data-verification processes while protecting user privacy. \u201cWith this new approach, citizens can easily keep track of what information is shared with whom,\u201d says Raf Buyle, digital architect for the Flanders Government Belgium. \u201cWe are especially excited to see that such an easy-to-use interaction still ensures a high level of verification across regulatory agencies.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enhancing governments<\/h2>\n\n\n\n<p>One of the many roles for government institutions around the world is to provide basic public services to their citizens in a secure manner. In today\u2019s environment, especially given the global pandemic, most governments have approached this need through a digital transformation lens that enables them to support constituents securely and efficiently.<\/p>\n\n\n\n<p>A great example of this is found in <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1436689624484208913-new-zealand-dia-government-azure-active-directory\" target=\"_blank\" rel=\"noreferrer noopener\">New Zealand<\/a>. There, the Department of Internal Affairs&nbsp;(DIA) created a centralized online platform that empowered its 4.9 million residents to affirm their legal identities and easily access desired services. Called <a href=\"https:\/\/www.realme.govt.nz\/\" target=\"_blank\" rel=\"noreferrer noopener\">RealMe<\/a>, this digital service leverages a single username and password to access 163 government services across 56 public agencies while protecting user identities and minimizing downtime. Tim Waldron, Business and Market Development Manager for RealMe Services, New Zealand DIA, says, \u201cwe needed to create authentication and identity verification services that could be used by both our private and public sector agencies and be easily scaled up as needed.\u201d DIA chose to partner with UNIFY Solutions to map its entire RealMe interface to Microsoft\u2019s <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/external-identities\/b2c\/#overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Active Directory B2C<\/a>, launching the new cloud-based system in July 2021.<\/p>\n\n\n\n<p>By using this technology, DIA migrated millions of user authentications in 48 hours, all while reducing the total cost of ownership and delivering a more flexible, feature-rich experience. \u201cMicrosoft issued features and functional enhancements to help us,\u201d says Peter Tiernan, Chief Customer Success Officer at UNIFY Solutions. \u201cOur three teams made up three legs of the stool. Along with building trust with your stakeholders, that kind of partnership and collaboration are vital elements of success.\u201d<\/p>\n\n\n\n<p>Yet another powerful instance of where Microsoft has stepped in to support the security of public data is in the case of the <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1412088603084909961-government-of-nunavut-sentinel-security\">Government of Nunavut<\/a>, Canada\u2019s largest territory. Home to citizens and residents across 25 communities and three different time zones, Nunavut experienced a ransomware attack in late 2019 that resulted in the shutdown of 5,500 computer systems.<\/p>\n\n\n\n<p>By partnering closely with Microsoft, the Government of Nunavut not only recovered from the attack within six weeks, but it also went through a digital transformation that enhanced digital security across the 25 communities they serve. Microsoft solutions, such as <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/microsoft-sentinel\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>, <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/security\/business\/cloud-apps-defender\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Cloud Apps<\/a>, and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/?OCID=AID2200277_SEM_67548312ac761bb3fc99e1384ed70162:G:s&amp;ef_id=67548312ac761bb3fc99e1384ed70162:G:s&amp;msclkid=67548312ac761bb3fc99e1384ed70162\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Active Directory<\/a>, made it easier for the Government of Nunavut security teams to protect IT systems comprised of 800 servers across their&nbsp;2-million-square kilometers of territory. \u201cWith the new Microsoft security tools, we have end-to-end visibility and the data we need to make the best decisions at the right time. It\u2019s been transformative,\u201d says Martin Joy, Director of Information and Communications Technology for the Government of Nunavut.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Strengthening trust and security within government agencies<\/h2>\n\n\n\n<p>As demonstrated by the real-world examples above, the provision of secure government services is imperative to the digital health and safety of the societies we live in. Register today to learn more about cyber security and how to safeguard <a href=\"https:\/\/microsoftedu.eventbuilder.com\/event\/47134?source=PubSecSkillsPage\">your agencies from common threats<\/a>.<\/p>\n\n\n\n<p>You are also welcome to listen to our recent on-demand webinar where <a href=\"https:\/\/info.microsoft.com\/ww-landing-building-trust-and-security-in-government.html?LCID=EN-US&amp;ocid=lp_pg306160_gdc_gov_dt\">trusted and secure government<\/a> practices across various applicable segments, including public safety and justice, public finance, public health and social services, and critical infrastructure are discussed in detail.<\/p>\n\n\n\n<p>Stay up to date on Microsoft&#8217;s global approach to Government by visiting our website at <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/government\">Microsoft for Government<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s safe to say that hybrid work is the new normal for most governments. But supporting a distributed workforce that operates both in office environments and remotely creates an avenue for cybercriminals to attack government networks and infrastructure.<\/p>\n","protected":false},"author":624,"featured_media":74748,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1515,4282],"post_tag":[],"content-type":[1483],"coauthors":[3758],"class_list":["post-74736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government","category-government-operations-and-infrastructure","content-type-thought-leadership","review-flag-2-1593580438-395","review-flag-4-1593580449-167","review-flag-5-1593580454-255","review-flag-9-1593580474-31","review-flag-new-1593580249-279","review-flag-partn-1593580285-60","review-flag-partn-1593580280-23"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The key role that trust and security plays within government agencies - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The key role that trust and security plays within government agencies - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"It\u2019s safe to say that hybrid work is the new normal for most governments. But supporting a distributed workforce that operates both in office environments and remotely creates an avenue for cybercriminals to attack government networks and infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-22T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-25T16:41:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ngozi Nwoko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604_.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ngozi Nwoko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/ngozi-nwoko\/\",\"@type\":\"Person\",\"@name\":\"Ngozi Nwoko\"}],\"headline\":\"The key role that trust and security plays within government agencies\",\"datePublished\":\"2022-03-22T16:00:00+00:00\",\"dateModified\":\"2023-07-25T16:41:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/\"},\"wordCount\":921,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604.webp\",\"articleSection\":[\"Government\",\"Government operations and infrastructure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/\",\"name\":\"The key role that trust and security plays within government agencies - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604.webp\",\"datePublished\":\"2022-03-22T16:00:00+00:00\",\"dateModified\":\"2023-07-25T16:41:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#primaryimage\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604.webp\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604.webp\",\"width\":2000,\"height\":1143,\"caption\":\"A lock.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The key role that trust and security plays within government agencies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The key role that trust and security plays within government agencies - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/","og_locale":"en_US","og_type":"article","og_title":"The key role that trust and security plays within government agencies - Microsoft Industry Blogs","og_description":"It\u2019s safe to say that hybrid work is the new normal for most governments. But supporting a distributed workforce that operates both in office environments and remotely creates an avenue for cybercriminals to attack government networks and infrastructure.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2022-03-22T16:00:00+00:00","article_modified_time":"2023-07-25T16:41:51+00:00","og_image":[{"width":1100,"height":629,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604_.jpg","type":"image\/jpeg"}],"author":"Ngozi Nwoko","twitter_card":"summary_large_image","twitter_image":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604_.jpg","twitter_misc":{"Written by":"Ngozi Nwoko","Est. reading time":"4 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/author\/ngozi-nwoko\/","@type":"Person","@name":"Ngozi Nwoko"}],"headline":"The key role that trust and security plays within government agencies","datePublished":"2022-03-22T16:00:00+00:00","dateModified":"2023-07-25T16:41:51+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/"},"wordCount":921,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604.webp","articleSection":["Government","Government operations and infrastructure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/","name":"The key role that trust and security plays within government agencies - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#primaryimage"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#primaryimage"},"thumbnailUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604.webp","datePublished":"2022-03-22T16:00:00+00:00","dateModified":"2023-07-25T16:41:51+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#primaryimage","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604.webp","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2022\/03\/GettyImages-1289956604.webp","width":2000,"height":1143,"caption":"A lock."},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/government\/2022\/03\/22\/the-key-role-that-trust-and-security-plays-within-government-agencies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"The key role that trust and security plays within government agencies"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/74736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/users\/624"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=74736"}],"version-history":[{"count":0,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/74736\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/74748"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=74736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=74736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=74736"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=74736"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=74736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}