{"id":19211,"date":"2024-03-15T09:00:13","date_gmt":"2024-03-15T09:00:13","guid":{"rendered":"https:\/\/rbadvisoryllc.com\/stag\/?p=19211"},"modified":"2025-06-20T19:30:22","modified_gmt":"2025-06-20T19:30:22","slug":"a-call-to-action-following-the-american-express-data-breach","status":"publish","type":"post","link":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/","title":{"rendered":"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19211\" class=\"elementor elementor-19211\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-80e7022 elementor-section-boxed elementor-section-height-default elementor-section-height-default edgtf-elementor-container-no edgtf-section edgtf-parallax-section-holder-touch-disabled edgtf-parallax-section-no\" data-id=\"80e7022\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-521b2b6\" data-id=\"521b2b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-364541c elementor-widget elementor-widget-text-editor\" data-id=\"364541c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #333333;\"><span style=\"font-weight: 400;\">In a digital economy where collaborations and partnerships are indispensable, third-party relationships inevitably become a double-edged sword, particularly from a cybersecurity perspective. The recent data breach involving American Express, where customer details were exposed due to a <\/span><b>third-party service provider&#8217;s<\/b><span style=\"font-weight: 400;\"> security lapse, serves as a stark reminder of the vulnerabilities organizations face in their extended network. This incident not only underscores the importance of vigilant third-party risk management but also highlights the need for robust strategies to protect sensitive information from falling into the wrong hands.<\/span><\/span><\/p><p><span style=\"font-weight: 400; color: #333333;\">At RB Advisory LLC, we specialize in offering comprehensive cyber risk management solutions that extend beyond the immediate boundaries of your organization. Recognizing the intricate web of third-party interactions that define modern business operations, our focus is on securing your data through every touchpoint, ensuring resilience against the ever-evolving threat landscape.<\/span><\/p><h2><span style=\"color: #333333;\"><b>Understanding Third-Party Risk<\/b><\/span><\/h2><p><span style=\"font-weight: 400; color: #333333;\">The American Express incident is not an isolated occurrence but part of a growing trend where data breaches are increasingly originating from third-party vendors and service providers. These entities, essential for various operational capabilities, often have access to or manage sensitive information on behalf of their clients. However, their security practices may not always align with the rigorous standards required to protect against sophisticated cyber threats.<\/span><\/p><h3><span style=\"color: #333333;\"><b>Strategies for Enhanced Third-Party Cybersecurity<\/b><\/span><\/h3><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Comprehensive Risk Assessments:<\/b><span style=\"font-weight: 400;\"> Conducting thorough risk assessments of all third-party providers is crucial to understanding the potential vulnerabilities they may introduce. RB Advisory assists clients in identifying, evaluating, and prioritizing risks associated with each vendor, enabling informed decision-making and mitigation strategies.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Due Diligence and Continuous Monitoring:<\/b><span style=\"font-weight: 400;\"> Initial due diligence followed by continuous monitoring of third-party vendors ensures that their security practices remain aligned with your organization&#8217;s standards. We advocate for regular reviews and audits of third-party security measures to identify and address any gaps promptly.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Contractual Agreements and Compliance:<\/b><span style=\"font-weight: 400;\"> Clearly defined contractual agreements that outline specific security requirements and compliance standards are vital. RB Advisory supports clients in developing contracts that include robust data protection clauses, regular security assessments, and immediate breach notification protocols.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Incident Response Planning:<\/b><span style=\"font-weight: 400;\"> Having a comprehensive incident response plan that includes third-party breaches is essential for minimizing potential damage. Our team works with clients to establish procedures for swift action and communication in the event of a data breach, ensuring that all stakeholders are prepared to respond effectively.<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"color: #333333;\"><b>Employee Awareness and Training:<\/b><span style=\"font-weight: 400;\"> Educating your workforce about the risks associated with third-party interactions and teaching them how to safely manage these relationships can significantly reduce your vulnerability. RB Advisory offers tailored training programs to enhance your team&#8217;s awareness and understanding of third-party risk management.<\/span><\/span><\/li><\/ol><h2><span style=\"color: #333333;\"><b>The Path Forward<\/b><\/span><\/h2><p><span style=\"font-weight: 400; color: #333333;\">The American Express data breach through a third-party provider is a clarion call for organizations to scrutinize and strengthen their third-party risk management practices. In navigating this complex challenge, partnering with cybersecurity experts like RB Advisory can provide the expertise, strategies, and tools needed to safeguard your data and maintain trust with your customers.<\/span><\/p><p><span style=\"color: #333333;\"><span style=\"font-weight: 400;\">In an interconnected business environment, ensuring the security of third-party relationships is not just an option but a necessity. Let RB Advisory guide you through establishing a resilient third-party risk management framework that protects your organization&#8217;s most valuable assets. <\/span><span style=\"font-weight: 400;\">Contact us<\/span><span style=\"font-weight: 400;\"> to learn how we can support your cybersecurity and compliance needs in an ever-changing digital landscape.<\/span><\/span><\/p><p><br \/><span style=\"color: #333333;\"><b>Source:<\/b><\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.msn.com\/en-us\/money\/companies\/american-express-card-data-exposed-in-third-party-breach\/ar-BB1jrBe6\"><span style=\"font-weight: 400;\">https:\/\/www.msn.com\/en-us\/money\/companies\/american-express-card-data-exposed-in-third-party-breach\/ar-BB1jrBe6<\/span><\/a><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c59c873 elementor-section-boxed elementor-section-height-default elementor-section-height-default edgtf-elementor-container-no edgtf-section edgtf-parallax-section-holder-touch-disabled edgtf-parallax-section-no\" data-id=\"c59c873\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be240cd\" data-id=\"be240cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In a digital economy where collaborations and partnerships are indispensable, third-party relationships inevitably become a double-edged sword, particularly from a cybersecurity perspective. The recent data breach involving American Express, where customer details were exposed due to a third-party service provider\u2019s security lapse, serves as a stark reminder of the vulnerabilities organizations face in their extended network.<\/p>\n","protected":false},"author":7,"featured_media":19214,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"give_campaign_id":0,"footnotes":""},"categories":[86,20],"tags":[31],"class_list":["post-19211","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-prevention","tag-prevention"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach - RB Advisory LLC<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach - RB Advisory LLC\" \/>\n<meta property=\"og:description\" content=\"In a digital economy where collaborations and partnerships are indispensable, third-party relationships inevitably become a double-edged sword, particularly from a cybersecurity perspective. The recent data breach involving American Express, where customer details were exposed due to a third-party service provider\u2019s security lapse, serves as a stark reminder of the vulnerabilities organizations face in their extended network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"RB Advisory LLC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/rbadvisory\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-15T09:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T19:30:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/03\/AmEx.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1300\" \/>\n\t<meta property=\"og:image:height\" content=\"845\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"RB Advisory\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RB Advisory\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/\"},\"author\":{\"name\":\"RB Advisory\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#\\\/schema\\\/person\\\/c05edbb1b82bfafce72cc3e03fca14ea\"},\"headline\":\"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach\",\"datePublished\":\"2024-03-15T09:00:13+00:00\",\"dateModified\":\"2025-06-20T19:30:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/\"},\"wordCount\":570,\"publisher\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/AmEx.jpg\",\"keywords\":[\"Prevention\"],\"articleSection\":[\"Cyber Security\",\"Prevention\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/\",\"name\":\"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach - RB Advisory LLC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/AmEx.jpg\",\"datePublished\":\"2024-03-15T09:00:13+00:00\",\"dateModified\":\"2025-06-20T19:30:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/AmEx.jpg\",\"contentUrl\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/AmEx.jpg\",\"width\":1300,\"height\":845,\"caption\":\"Image of Credit Cards\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/a-call-to-action-following-the-american-express-data-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#website\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/\",\"name\":\"RB Advisory LLC\",\"description\":\"Security Compliance | Cyber Risk Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#organization\",\"name\":\"RB Advisory LLC\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/RBA-Logo-712-x-712.webp\",\"contentUrl\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/RBA-Logo-712-x-712.webp\",\"width\":712,\"height\":712,\"caption\":\"RB Advisory LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/rbadvisory\\\/\",\"https:\\\/\\\/x.com\\\/rb_advisoryllc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rb-advisory-llc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCO00f-z_bXxpQ3DcXzgvmNQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/#\\\/schema\\\/person\\\/c05edbb1b82bfafce72cc3e03fca14ea\",\"name\":\"RB Advisory\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g\",\"caption\":\"RB Advisory\"},\"url\":\"https:\\\/\\\/rbadvisoryllc.com\\\/stag\\\/author\\\/rb-advisory\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach - RB Advisory LLC","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach - RB Advisory LLC","og_description":"In a digital economy where collaborations and partnerships are indispensable, third-party relationships inevitably become a double-edged sword, particularly from a cybersecurity perspective. The recent data breach involving American Express, where customer details were exposed due to a third-party service provider\u2019s security lapse, serves as a stark reminder of the vulnerabilities organizations face in their extended network.","og_url":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/","og_site_name":"RB Advisory LLC","article_publisher":"https:\/\/www.facebook.com\/rbadvisory\/","article_published_time":"2024-03-15T09:00:13+00:00","article_modified_time":"2025-06-20T19:30:22+00:00","og_image":[{"width":1300,"height":845,"url":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/03\/AmEx.jpg","type":"image\/jpeg"}],"author":"RB Advisory","twitter_card":"summary_large_image","twitter_misc":{"Written by":"RB Advisory","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/#article","isPartOf":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/"},"author":{"name":"RB Advisory","@id":"https:\/\/rbadvisoryllc.com\/stag\/#\/schema\/person\/c05edbb1b82bfafce72cc3e03fca14ea"},"headline":"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach","datePublished":"2024-03-15T09:00:13+00:00","dateModified":"2025-06-20T19:30:22+00:00","mainEntityOfPage":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/"},"wordCount":570,"publisher":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/#organization"},"image":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/03\/AmEx.jpg","keywords":["Prevention"],"articleSection":["Cyber Security","Prevention"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/","url":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/","name":"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach - RB Advisory LLC","isPartOf":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/03\/AmEx.jpg","datePublished":"2024-03-15T09:00:13+00:00","dateModified":"2025-06-20T19:30:22+00:00","breadcrumb":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/#primaryimage","url":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/03\/AmEx.jpg","contentUrl":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/03\/AmEx.jpg","width":1300,"height":845,"caption":"Image of Credit Cards"},{"@type":"BreadcrumbList","@id":"https:\/\/rbadvisoryllc.com\/stag\/a-call-to-action-following-the-american-express-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rbadvisoryllc.com\/stag\/"},{"@type":"ListItem","position":2,"name":"Mitigating Third-Party Risks: A Call to Action Following the American Express Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/rbadvisoryllc.com\/stag\/#website","url":"https:\/\/rbadvisoryllc.com\/stag\/","name":"RB Advisory LLC","description":"Security Compliance | Cyber Risk Management","publisher":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rbadvisoryllc.com\/stag\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/rbadvisoryllc.com\/stag\/#organization","name":"RB Advisory LLC","url":"https:\/\/rbadvisoryllc.com\/stag\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rbadvisoryllc.com\/stag\/#\/schema\/logo\/image\/","url":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/07\/RBA-Logo-712-x-712.webp","contentUrl":"https:\/\/rbadvisoryllc.com\/stag\/wp-content\/uploads\/2024\/07\/RBA-Logo-712-x-712.webp","width":712,"height":712,"caption":"RB Advisory LLC"},"image":{"@id":"https:\/\/rbadvisoryllc.com\/stag\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/rbadvisory\/","https:\/\/x.com\/rb_advisoryllc","https:\/\/www.linkedin.com\/company\/rb-advisory-llc\/","https:\/\/www.youtube.com\/channel\/UCO00f-z_bXxpQ3DcXzgvmNQ"]},{"@type":"Person","@id":"https:\/\/rbadvisoryllc.com\/stag\/#\/schema\/person\/c05edbb1b82bfafce72cc3e03fca14ea","name":"RB Advisory","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cecdcca49c7a243c7bb5573b47a9f0cc9e79382b4ff36c27d555d4bed44f9700?s=96&d=mm&r=g","caption":"RB Advisory"},"url":"https:\/\/rbadvisoryllc.com\/stag\/author\/rb-advisory\/"}]}},"_links":{"self":[{"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/posts\/19211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/comments?post=19211"}],"version-history":[{"count":5,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/posts\/19211\/revisions"}],"predecessor-version":[{"id":19236,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/posts\/19211\/revisions\/19236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/media\/19214"}],"wp:attachment":[{"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/media?parent=19211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/categories?post=19211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbadvisoryllc.com\/stag\/wp-json\/wp\/v2\/tags?post=19211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}