{"id":21036,"date":"2019-07-08T08:33:49","date_gmt":"2019-07-08T13:33:49","guid":{"rendered":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/"},"modified":"2019-07-08T08:33:49","modified_gmt":"2019-07-08T13:33:49","slug":"the-flow-framework-treating-risk-items-as-a-security-cost","status":"publish","type":"post","link":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/","title":{"rendered":"The Flow Framework\u2122 \u2013 Treating risk items as a security cost"},"content":{"rendered":"<figure>\n<div class=\"feature-image\"><img decoding=\"async\" class=\"aligncenter size-full\" src=\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png\" alt=\"The Flow Framework\u2122 \u2013 Treating risk items as a security cost\"><\/div>\n<\/figure>\n<p><span style=\"font-weight: 400;\">In <\/span><a href=\"https:\/\/flowframework.org\/\"><span style=\"font-weight: 400;\">the Flow Framework&#x2122;<\/span><\/a><span style=\"font-weight: 400;\"> there are <\/span><b>four flow items<\/b><span style=\"font-weight: 400;\"> that provide value to the end-user of your product:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Features (new business value)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Defects (quality)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Technical debt (removal of impediments to future delivery)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Risk (security, governance, compliance)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A software organization must devote time to each flow item as they are all crucial to a strong product. To understand this more clearly, it can be useful to compare each item to financial budgetary differences &#x2013; like I did recently when <\/span><a href=\"\/technical-debt-is-just-like-financial-debtexcept-when-it-isnt\"><span style=\"font-weight: 400;\">I compared technical debt to financial debt<\/span><\/a><span style=\"font-weight: 400;\">.&#xA0;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In any organization, it&#x2019;s vital to lay out a budget and understand how your budget affects your bottom line. How do your expenses generate value to your organization? How do your product development efforts generate value to your product? In the world of software, we typically think features are the single thing that provides value, but that&#x2019;s a near-sighted philosophy. In reality, we must take a broader approach to the value we provide through software products.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Considering that companies have been using balance sheets, income, and cash-flow statements for centuries before software was invented, there&#x2019;s value in seeing what commonalities we can find between the act of producing value with our financial capacity and the act of producing value with our software development capacity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, what financial expenses correspond to risk flow items? I posit they match most closely with general security expenses such as the key-fob operated locks on the office doors, the cost of the security guard, and the cost of the bodyguard for key executives. These are the types of company expenses correlated most closely with the engineering work necessary to deliver risk flow items for a software product.<\/span><span style=\"font-weight: 400;\">&#xA0;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#x2019;s unpack this a bit. Risk flow items are those things that may not produce direct value or demand for your product, but without them, can lead to devastating lawsuits, lack of customer trust, and significant business risk. These items are things such as securely managing passwords, ensuring encrypted web traffic, SQL injection protection and preventing clickjacking.<\/span><span style=\"font-weight: 400;\">&#xA0;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just like security for a company, risk items are not something you typically advertise in and of themselves. With a few exceptions (such as &#x201C;we&#x2019;re SOC 2 certified&#x201D;), it&#x2019;s rare to brag about an individual risk item. When they are discussed publicly, it&#x2019;s typically more about messaging around <\/span><i><span style=\"font-weight: 400;\">who we are as a company<\/span><\/i><span style=\"font-weight: 400;\">. They&#x2019;re about defining your organization&#x2019;s identity as a safe and secure place for your customer&#x2019;s data. It&#x2019;s saying &#x201C;security is in our DNA&#x201D;. The first ad in the below compilation by Apple does a good job of illustrating this point:&#xA0;<\/span><\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/qfv6Ah_MVJU\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p><span style=\"font-weight: 400;\">I have no idea <\/span><i><span style=\"font-weight: 400;\">what<\/span><\/i><span style=\"font-weight: 400;\"> Apple did to make their computers secure, but because of this ad, I <\/span><i><span style=\"font-weight: 400;\">feel<\/span><\/i><span style=\"font-weight: 400;\"> that they&#x2019;re a secure company and I&#x2019;ll be safe with them. <\/span><b><i>&#xA0;<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Just like with security expenses, the <\/span><i><span style=\"font-weight: 400;\">very best<\/span><\/i><span style=\"font-weight: 400;\"> you can hope for when handling risk items is to reduce the probability and impact of a bad thing happening. You will never stop everything. Therein lies the rub.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can always spend more on risk. It&#x2019;s especially difficult to weigh the value of risk items against the more tangible and immediate impact of features and defects. Those have much more measurable effects on the bottom line of the business. Even technical debt is easier to measure since it eventually allows you more capacity to work on features and defects. Risks are harder. Risks are black swans. There&#x2019;s only so much you can do to protect yourself, but the impact of not protecting yourself against these risks can be catastrophic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#xA0;<\/span><span style=\"font-weight: 400;\">The other similarity between security and risk is that no matter how much you spend on the items (either in pure dollar terms or in engineering effort), it&#x2019;s still entirely possible to be blindsided by either 1) something you completely missed or 2) something you deemed not important enough to tackle. In both cases, it does little to say, &#x201C;Yes, we failed to protect against the event that hit us, but look at all the <\/span><i><span style=\"font-weight: 400;\">other<\/span><\/i><span style=\"font-weight: 400;\"> things we protected against.&#x201D;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So when it comes to budgeting for your engineering efforts, be sure to include capacity for risk items. While delivering risk items won&#x2019;t directly bring in more customers, they are incredibly important for the survival of your product. Risk Items do two things for you:&#xA0;<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">They signal to the market what you value in your product<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">They offer protection against threats to your company<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The hardest part is knowing how much to invest in this area. No matter how much time, money and effort you put into risk items, you will always have vulnerabilities. But just because you can protect yourself from everything, doesn&#x2019;t mean you can&#x2019;t (or shouldn&#x2019;t) protect yourself from most things.&#xA0;<\/span><\/p>\n<h2><strong>Learn more about managing risk items in your value stream<\/strong><\/h2>\n<p>Grab a copy of&#xA0;<em><a href=\"http:\/\/projecttoproduct.org\/\">Project to Product<\/a>&#xA0;<\/em>to see how the Flow Framework&#x2122; can help you better manage how business value flows across your software delivery value stream:<\/p>\n<figure id=\"attachment_9890\" aria-describedby=\"caption-attachment-9890\" style=\"width: 271px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.amazon.com\/Project-Product-Survive-Disruption-Framework\/dp\/1942788398\"><img class=\"lazyload\" alt height=\"386\" data-src=\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2018\/10\/p2p-1st-ed-cover-hr.jpg\"><\/a><figcaption id=\"caption-attachment-9890\" class=\"wp-caption-text\">Click image to order a copy of the book.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>In the Flow Framework&#x2122; there are four flow items that provide value to the end-user of your product: Features (new business value) Defects (quality) Technical debt (removal of impediments to future delivery) Risk (security, governance, compliance) A software organization must devote time to each flow item as they are all crucial to a strong product&#8230;.<\/p>\n","protected":false},"author":228,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","footnotes":""},"categories":[9544,9543],"tags":[],"class_list":["post-21036","post","type-post","status-publish","format-standard","hentry","category-project-to-product-shift","category-value-stream-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Flow Framework\u2122 - Treating risk items as a security cost | Tasktop Blog<\/title>\n<meta name=\"description\" content=\"Risk flow items may not produce direct value or demand for your software products, but overlooking them can have have severe ramifications for your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Flow Framework\u2122 \u2013 Treating risk items as a security cost\" \/>\n<meta property=\"og:description\" content=\"Risk flow items may not produce direct value or demand for your software products, but overlooking them can have have severe ramifications for your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/\" \/>\n<meta property=\"og:site_name\" content=\"Planview Blog\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/pages\/Planview-Inc\/89422974772\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-08T13:33:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png\" \/>\n<meta name=\"author\" content=\"Trevor Bruner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Planview\" \/>\n<meta name=\"twitter:site\" content=\"@Planview\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Trevor Bruner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/\"},\"author\":{\"name\":\"Trevor Bruner\",\"@id\":\"https:\/\/blog.planview.com\/#\/schema\/person\/3369430e6c83599e46fe909d3eb1e3dd\"},\"headline\":\"The Flow Framework\u2122 \u2013 Treating risk items as a security cost\",\"datePublished\":\"2019-07-08T13:33:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/\"},\"wordCount\":899,\"publisher\":{\"@id\":\"https:\/\/blog.planview.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png\",\"articleSection\":[\"Project to Product Shift\",\"Value Stream Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/\",\"url\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/\",\"name\":\"The Flow Framework\u2122 - Treating risk items as a security cost | Tasktop Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.planview.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png\",\"datePublished\":\"2019-07-08T13:33:49+00:00\",\"description\":\"Risk flow items may not produce direct value or demand for your software products, but overlooking them can have have severe ramifications for your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#primaryimage\",\"url\":\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png\",\"contentUrl\":\"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.planview.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Flow Framework\u2122 \u2013 Treating risk items as a security cost\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.planview.com\/#website\",\"url\":\"https:\/\/blog.planview.com\/\",\"name\":\"Planview Blog\",\"description\":\"Leading the conversation on digital connected work\",\"publisher\":{\"@id\":\"https:\/\/blog.planview.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.planview.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.planview.com\/#organization\",\"name\":\"Planview\",\"url\":\"https:\/\/blog.planview.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.planview.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.planview.com\/wp-content\/uploads\/2015\/06\/planview-logo-black.png\",\"contentUrl\":\"https:\/\/blog.planview.com\/wp-content\/uploads\/2015\/06\/planview-logo-black.png\",\"width\":280,\"height\":66,\"caption\":\"Planview\"},\"image\":{\"@id\":\"https:\/\/blog.planview.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/pages\/Planview-Inc\/89422974772\",\"https:\/\/x.com\/Planview\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.planview.com\/#\/schema\/person\/3369430e6c83599e46fe909d3eb1e3dd\",\"name\":\"Trevor Bruner\",\"description\":\"Trevor Bruner is the Product Value Stream Lead for Tasktop Viz\u2122. His varied background ranging from financial services, oil and gas, to Navy submarine officer has helped him manage all the responsibilities inherent in building a valuable product. At Tasktop, he's enjoyed the opportunity to teach customers about the vast capabilities of Tasktop's products.\",\"url\":\"https:\/\/blog.planview.com\/author\/trevor-bruner\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Flow Framework\u2122 - Treating risk items as a security cost | Tasktop Blog","description":"Risk flow items may not produce direct value or demand for your software products, but overlooking them can have have severe ramifications for your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/","og_locale":"en_US","og_type":"article","og_title":"The Flow Framework\u2122 \u2013 Treating risk items as a security cost","og_description":"Risk flow items may not produce direct value or demand for your software products, but overlooking them can have have severe ramifications for your business.","og_url":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/","og_site_name":"Planview Blog","article_publisher":"http:\/\/www.facebook.com\/pages\/Planview-Inc\/89422974772","article_published_time":"2019-07-08T13:33:49+00:00","og_image":[{"url":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png","type":"","width":"","height":""}],"author":"Trevor Bruner","twitter_card":"summary_large_image","twitter_creator":"@Planview","twitter_site":"@Planview","twitter_misc":{"Written by":"Trevor Bruner","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#article","isPartOf":{"@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/"},"author":{"name":"Trevor Bruner","@id":"https:\/\/blog.planview.com\/#\/schema\/person\/3369430e6c83599e46fe909d3eb1e3dd"},"headline":"The Flow Framework\u2122 \u2013 Treating risk items as a security cost","datePublished":"2019-07-08T13:33:49+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/"},"wordCount":899,"publisher":{"@id":"https:\/\/blog.planview.com\/#organization"},"image":{"@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#primaryimage"},"thumbnailUrl":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png","articleSection":["Project to Product Shift","Value Stream Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/","url":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/","name":"The Flow Framework\u2122 - Treating risk items as a security cost | Tasktop Blog","isPartOf":{"@id":"https:\/\/blog.planview.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#primaryimage"},"image":{"@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#primaryimage"},"thumbnailUrl":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png","datePublished":"2019-07-08T13:33:49+00:00","description":"Risk flow items may not produce direct value or demand for your software products, but overlooking them can have have severe ramifications for your business.","breadcrumb":{"@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#primaryimage","url":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png","contentUrl":"https:\/\/media.planview.com\/tasktop_blog\/wp-content\/uploads\/2019\/07\/tasktop_flow-framework_security--850x550.png"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.planview.com\/the-flow-framework-treating-risk-items-as-a-security-cost\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.planview.com\/"},{"@type":"ListItem","position":2,"name":"The Flow Framework\u2122 \u2013 Treating risk items as a security cost"}]},{"@type":"WebSite","@id":"https:\/\/blog.planview.com\/#website","url":"https:\/\/blog.planview.com\/","name":"Planview Blog","description":"Leading the conversation on digital connected work","publisher":{"@id":"https:\/\/blog.planview.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.planview.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.planview.com\/#organization","name":"Planview","url":"https:\/\/blog.planview.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.planview.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.planview.com\/wp-content\/uploads\/2015\/06\/planview-logo-black.png","contentUrl":"https:\/\/blog.planview.com\/wp-content\/uploads\/2015\/06\/planview-logo-black.png","width":280,"height":66,"caption":"Planview"},"image":{"@id":"https:\/\/blog.planview.com\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/pages\/Planview-Inc\/89422974772","https:\/\/x.com\/Planview"]},{"@type":"Person","@id":"https:\/\/blog.planview.com\/#\/schema\/person\/3369430e6c83599e46fe909d3eb1e3dd","name":"Trevor Bruner","description":"Trevor Bruner is the Product Value Stream Lead for Tasktop Viz\u2122. His varied background ranging from financial services, oil and gas, to Navy submarine officer has helped him manage all the responsibilities inherent in building a valuable product. At Tasktop, he's enjoyed the opportunity to teach customers about the vast capabilities of Tasktop's products.","url":"https:\/\/blog.planview.com\/author\/trevor-bruner\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/posts\/21036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/users\/228"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/comments?post=21036"}],"version-history":[{"count":0,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/posts\/21036\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/media?parent=21036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/categories?post=21036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.planview.com\/wp-json\/wp\/v2\/tags?post=21036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}