{"id":130,"date":"2026-03-05T07:34:03","date_gmt":"2026-03-05T07:34:03","guid":{"rendered":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/"},"modified":"2026-03-05T07:34:03","modified_gmt":"2026-03-05T07:34:03","slug":"ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing","status":"publish","type":"post","link":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/","title":{"rendered":"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing"},"content":{"rendered":"\n<p>Most enterprise AI security conversations still focus on training \u2014 how models are built, what data goes in, how to prevent poisoning. But the greater operational exposure sits elsewhere: in inference, the moment a trained model processes a live query and produces an output. That is where proprietary logic, sensitive prompts, and business strategy become visible to anyone watching the traffic.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/thequantuminsider.com\/2026\/03\/03\/securing-ai-inference-the-overlooked-security-frontier-in-2026\/\">recent panel hosted by The Quantum Insider<\/a>, featuring leaders from BMO, CGI, and 01Quantum, put the point bluntly: inference is AI working, and AI working is where risk accumulates. Nearly half of the audience polled during the session admitted they lack confidence that their AI systems meet anticipated 2026 security standards. That number is consistent with broader industry data: a <a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/state-of-ai-security-and-governance-survey-report\">Cloud Security Alliance survey<\/a> found that only 27 per cent of organisations feel confident they can secure AI used in core business operations.<\/p>\n\n\n\n<p>This is not an abstract concern. It is the practical, operational end of the governance conversation maddaisy has been tracking for weeks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why inference, not training, is the exposure point<\/h2>\n\n\n\n<p>Training happens once (or periodically). Inference happens continuously \u2014 every API call, every chatbot interaction, every agentic workflow execution. As Tyson Macaulay of 01Quantum explained during the panel, inference models often contain the distilled intellectual property of an organisation. In expert systems, the model itself reflects proprietary training data, domain knowledge, and internal logic. Reverse engineering an inference endpoint can reveal insights about what the organisation knows and how it thinks.<\/p>\n\n\n\n<p>But the exposure runs in both directions. Prompts themselves reveal information \u2014 about individuals, strategy, and operational priorities. A medical query reveals personal health data. A corporate query may signal product development direction. The question, in other words, can be as sensitive as the model.<\/p>\n\n\n\n<p>When maddaisy examined CIOs&#8217; non-AI priorities in February, cybersecurity topped the list \u2014 <a href=\"https:\/\/maddaisy.com\/index.php\/2026\/02\/18\/the-non-ai-agenda-what-cios-are-actually-prioritising-beyond-artificial-intelligence-in-2026\/\">precisely because AI adoption was expanding the attack surface<\/a>. Dmitry Nazarevich, CTO at Innowise, described security spending increases as &#8220;directly related to the increase in exposure and risk to data associated with the increased attack surface resulting from the introduction of generative AI.&#8221; Inference security is where that expanding surface is most exposed \u2014 and most neglected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The shadow AI dimension<\/h2>\n\n\n\n<p>The problem is compounded by what organisations cannot see. Research suggests that roughly <a href=\"https:\/\/ukstories.microsoft.com\/features\/rise-in-shadow-ai-tools-raising-security-concerns-for-uk\/\">70 per cent of organisations<\/a> have shadow AI in use \u2014 employees running unauthorised tools outside IT oversight. Every unsanctioned ChatGPT or Claude query involving company data is an unmonitored inference event, pushing proprietary information through systems the organisation does not control.<\/p>\n\n\n\n<p>JetStream Security, a startup founded by veterans of CrowdStrike and SentinelOne, <a href=\"https:\/\/fortune.com\/2026\/03\/03\/ai-governance-crowdstrike-sentinelone-veterans-raise-34m-enterprise-adoption-gap\/\">raised $34 million in seed funding<\/a> last week to address precisely this gap. The company&#8217;s product, AI Blueprints, maps AI activity in real time \u2014 which agents are running, which models they use, what data they access. The premise is straightforward: you cannot secure what you cannot see.<\/p>\n\n\n\n<p>When maddaisy <a href=\"https:\/\/maddaisy.com\/index.php\/2026\/02\/19\/shadow-ai-and-the-year-two-governance-challenge\/\">covered shadow AI in February<\/a>, the focus was on governance and policy. Inference security adds a harder technical dimension. It is not enough to write policies about acceptable AI use if the organisation has no visibility into what models are being queried, by whom, and with what data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-world vulnerabilities are already surfacing<\/h2>\n\n\n\n<p>The risks are not hypothetical. In February, LayerX Security published a report describing <a href=\"https:\/\/www.csoonline.com\/article\/4129820\/anthropics-dxt-poses-critical-rce-vulnerability-by-running-with-full-system-privileges.html\">a critical vulnerability in Anthropic&#8217;s Claude Desktop Extensions<\/a> \u2014 a malicious calendar invite could silently execute arbitrary code with full system privileges. The issue stemmed from an architectural choice: extensions ran unsandboxed with direct file system access, enabling tools to chain actions autonomously without user consent.<\/p>\n\n\n\n<p>The debate that followed was instructive. Anthropic argued the onus was on users to configure permissions properly. Security researchers countered that competitors like OpenAI and Microsoft restricted similar capabilities through sandboxing and permission gates. The real lesson for enterprises is that inference-layer vulnerabilities are architectural, not incidental \u2014 and they require controls before deployment, not after.<\/p>\n\n\n\n<p>As Rock Lambros of RockCyber put it: &#8220;Every enterprise deploying agents right now needs to answer \u2014 did we restrict tool chaining privileges before activation, or did we hand the intern the master key and go to lunch?&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The governance gap has a security-shaped hole<\/h2>\n\n\n\n<p>Maddaisy has covered the <a href=\"https:\/\/maddaisy.com\/index.php\/2026\/03\/04\/the-agentic-ai-governance-playbook-is-taking-shape-most-enterprises-are-not-ready-for-it\/\">emerging agentic AI governance playbook<\/a> extensively \u2014 the frameworks from regulators, the principles converging around least-privilege access and real-time monitoring. But frameworks are policy instruments. Inference security is the engineering layer that makes those policies enforceable.<\/p>\n\n\n\n<p>The numbers illustrate the disconnect. According to the <a href=\"https:\/\/mcpmanager.ai\/blog\/ai-governance-statistics\/\">latest governance statistics compiled from major 2025-26 surveys<\/a>, 75 per cent of organisations report having a dedicated AI governance process \u2014 but only 26 per cent have comprehensive AI security policies. Fewer than one in 10 UK enterprises integrate AI risk reviews directly into development pipelines. Governance without security controls is aspiration without implementation.<\/p>\n\n\n\n<p>The financial services sector offers a partial model. Kristin Milchanowski, Chief AI and Data Officer at BMO, described her bank&#8217;s approach during the Quantum Insider panel: bringing large language models in-house where possible, ensuring that additional training on proprietary data remains contained, and treating responsible AI as a board-level cultural priority rather than a compliance exercise. But BMO operates under some of the strictest regulatory regimes globally. Most enterprises do not face equivalent pressure \u2014 yet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What practitioners should be doing now<\/h2>\n\n\n\n<p>The practical agenda emerging from this convergence of research is specific and actionable:<\/p>\n\n\n\n<p><strong>Audit inference endpoints.<\/strong> Map every production AI system, including shadow deployments. The JetStream model \u2014 real-time visibility into which models are running, what data they touch, and who is responsible \u2014 is becoming table stakes.<\/p>\n\n\n\n<p><strong>Apply least-privilege to AI agents.<\/strong> The agentic governance frameworks maddaisy covered last week prescribe this. At the inference layer, it means restricting tool chaining, sandboxing execution environments, and requiring explicit permission gates for cross-system actions.<\/p>\n\n\n\n<p><strong>Build cryptographic agility into procurement.<\/strong> The Quantum Insider panel raised a forward-looking point: &#8220;harvest now, decrypt later&#8221; attacks \u2014 where encrypted inference traffic is collected today for decryption once quantum computing matures \u2014 are overtaking model drift as the top digital trust concern among infrastructure leaders. Embedding post-quantum cryptography expectations into vendor contracts now is practical and low-cost.<\/p>\n\n\n\n<p><strong>Treat inference security as infrastructure.<\/strong> Not as a feature, not as an add-on. As the panel concluded: critical infrastructure must be secured before it is tested by failure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The operational layer matters most<\/h2>\n\n\n\n<p>The governance conversation has matured rapidly. Frameworks exist. Principles are converging. Regulation is arriving. But between the policy layer and the production environment sits inference \u2014 the operational layer where AI actually works, where data flows through models, where prompts reveal strategy, and where the absence of controls creates the exposure that governance documents are supposed to prevent.<\/p>\n\n\n\n<p>Gartner projects spending on AI governance platforms will reach $492 million this year and surpass $1 billion by 2030. That money will be wasted if it funds policies without the engineering to enforce them. The organisations pulling ahead will be those that treat inference security not as a technical detail for the security team, but as the operational foundation on which their entire AI strategy depends.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most enterprise AI security conversations still focus on training \u2014 how models are built, what data goes in, how to prevent poisoning. But the greater operational exposure sits elsewhere: in inference, the moment a trained model processes a live query and produces an output. That is where proprietary logic, sensitive prompts, and business strategy become [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[15,60,9,41,11],"class_list":["post-130","post","type-post","status-publish","format-standard","hentry","category-technology","tag-ai-governance","tag-ai-security","tag-ai-strategy","tag-cybersecurity","tag-enterprise-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing - maddaisy - cultivating innovation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing - maddaisy - cultivating innovation\" \/>\n<meta property=\"og:description\" content=\"Most enterprise AI security conversations still focus on training \u2014 how models are built, what data goes in, how to prevent poisoning. But the greater operational exposure sits elsewhere: in inference, the moment a trained model processes a live query and produces an output. That is where proprietary logic, sensitive prompts, and business strategy become [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/\" \/>\n<meta property=\"og:site_name\" content=\"maddaisy - cultivating innovation\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-05T07:34:03+00:00\" \/>\n<meta name=\"author\" content=\"Connie Botelli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Connie Botelli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/2026\\\/03\\\/05\\\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/2026\\\/03\\\/05\\\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\\\/\"},\"author\":{\"name\":\"Connie Botelli\",\"@id\":\"https:\\\/\\\/maddaisy.com\\\/#\\\/schema\\\/person\\\/d17a7f02608bf0d58e7f09e59925d10f\"},\"headline\":\"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing\",\"datePublished\":\"2026-03-05T07:34:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/2026\\\/03\\\/05\\\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\\\/\"},\"wordCount\":1163,\"publisher\":{\"@id\":\"https:\\\/\\\/maddaisy.com\\\/#\\\/schema\\\/person\\\/8691fbb633741892cd9ffe5f347ac60b\"},\"keywords\":[\"ai-governance\",\"ai-security\",\"ai-strategy\",\"cybersecurity\",\"enterprise-ai\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/2026\\\/03\\\/05\\\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\\\/\",\"url\":\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/2026\\\/03\\\/05\\\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\\\/\",\"name\":\"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing - maddaisy - cultivating innovation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/maddaisy.com\\\/#website\"},\"datePublished\":\"2026-03-05T07:34:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/2026\\\/03\\\/05\\\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/2026\\\/03\\\/05\\\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/2026\\\/03\\\/05\\\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/maddaisy.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/maddaisy.com\\\/#website\",\"url\":\"https:\\\/\\\/maddaisy.com\\\/\",\"name\":\"maddaisy - cultivating innovation\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/maddaisy.com\\\/#\\\/schema\\\/person\\\/8691fbb633741892cd9ffe5f347ac60b\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/maddaisy.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/maddaisy.com\\\/#\\\/schema\\\/person\\\/8691fbb633741892cd9ffe5f347ac60b\",\"name\":\"Andy Copland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e67c825f5d8c93e8ecd7a82ac2ec149f3c74acc6b0f3e2ddb3fb07ba0f7fb5fd?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e67c825f5d8c93e8ecd7a82ac2ec149f3c74acc6b0f3e2ddb3fb07ba0f7fb5fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e67c825f5d8c93e8ecd7a82ac2ec149f3c74acc6b0f3e2ddb3fb07ba0f7fb5fd?s=96&d=mm&r=g\",\"caption\":\"Andy Copland\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e67c825f5d8c93e8ecd7a82ac2ec149f3c74acc6b0f3e2ddb3fb07ba0f7fb5fd?s=96&d=mm&r=g\"},\"sameAs\":[\"http:\\\/\\\/maddaisy.com\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/andycopland\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/maddaisy.com\\\/#\\\/schema\\\/person\\\/d17a7f02608bf0d58e7f09e59925d10f\",\"name\":\"Connie Botelli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d9351a326bd94776805e6b10f1290a21d3652da2ad3e373a7f50a36ff7c0367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d9351a326bd94776805e6b10f1290a21d3652da2ad3e373a7f50a36ff7c0367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7d9351a326bd94776805e6b10f1290a21d3652da2ad3e373a7f50a36ff7c0367?s=96&d=mm&r=g\",\"caption\":\"Connie Botelli\"},\"sameAs\":[\"https:\\\/\\\/maddaisy.com\"],\"url\":\"https:\\\/\\\/maddaisy.com\\\/index.php\\\/author\\\/connie92374\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing - maddaisy - cultivating innovation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/","og_locale":"en_GB","og_type":"article","og_title":"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing - maddaisy - cultivating innovation","og_description":"Most enterprise AI security conversations still focus on training \u2014 how models are built, what data goes in, how to prevent poisoning. But the greater operational exposure sits elsewhere: in inference, the moment a trained model processes a live query and produces an output. That is where proprietary logic, sensitive prompts, and business strategy become [&hellip;]","og_url":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/","og_site_name":"maddaisy - cultivating innovation","article_published_time":"2026-03-05T07:34:03+00:00","author":"Connie Botelli","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Connie Botelli","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/#article","isPartOf":{"@id":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/"},"author":{"name":"Connie Botelli","@id":"https:\/\/maddaisy.com\/#\/schema\/person\/d17a7f02608bf0d58e7f09e59925d10f"},"headline":"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing","datePublished":"2026-03-05T07:34:03+00:00","mainEntityOfPage":{"@id":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/"},"wordCount":1163,"publisher":{"@id":"https:\/\/maddaisy.com\/#\/schema\/person\/8691fbb633741892cd9ffe5f347ac60b"},"keywords":["ai-governance","ai-security","ai-strategy","cybersecurity","enterprise-ai"],"articleSection":["Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/","url":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/","name":"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing - maddaisy - cultivating innovation","isPartOf":{"@id":"https:\/\/maddaisy.com\/#website"},"datePublished":"2026-03-05T07:34:03+00:00","breadcrumb":{"@id":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/maddaisy.com\/index.php\/2026\/03\/05\/ai-inference-is-the-enterprise-security-risk-most-organisations-are-not-addressing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/maddaisy.com\/"},{"@type":"ListItem","position":2,"name":"AI Inference Is the Enterprise Security Risk Most Organisations Are Not Addressing"}]},{"@type":"WebSite","@id":"https:\/\/maddaisy.com\/#website","url":"https:\/\/maddaisy.com\/","name":"maddaisy - cultivating innovation","description":"","publisher":{"@id":"https:\/\/maddaisy.com\/#\/schema\/person\/8691fbb633741892cd9ffe5f347ac60b"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/maddaisy.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/maddaisy.com\/#\/schema\/person\/8691fbb633741892cd9ffe5f347ac60b","name":"Andy Copland","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/e67c825f5d8c93e8ecd7a82ac2ec149f3c74acc6b0f3e2ddb3fb07ba0f7fb5fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e67c825f5d8c93e8ecd7a82ac2ec149f3c74acc6b0f3e2ddb3fb07ba0f7fb5fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e67c825f5d8c93e8ecd7a82ac2ec149f3c74acc6b0f3e2ddb3fb07ba0f7fb5fd?s=96&d=mm&r=g","caption":"Andy Copland"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/e67c825f5d8c93e8ecd7a82ac2ec149f3c74acc6b0f3e2ddb3fb07ba0f7fb5fd?s=96&d=mm&r=g"},"sameAs":["http:\/\/maddaisy.com","https:\/\/www.linkedin.com\/in\/andycopland\/"]},{"@type":"Person","@id":"https:\/\/maddaisy.com\/#\/schema\/person\/d17a7f02608bf0d58e7f09e59925d10f","name":"Connie Botelli","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/7d9351a326bd94776805e6b10f1290a21d3652da2ad3e373a7f50a36ff7c0367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7d9351a326bd94776805e6b10f1290a21d3652da2ad3e373a7f50a36ff7c0367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d9351a326bd94776805e6b10f1290a21d3652da2ad3e373a7f50a36ff7c0367?s=96&d=mm&r=g","caption":"Connie Botelli"},"sameAs":["https:\/\/maddaisy.com"],"url":"https:\/\/maddaisy.com\/index.php\/author\/connie92374\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/posts\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":0,"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"wp:attachment":[{"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/maddaisy.com\/index.php\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}