{"id":115673,"date":"2025-10-29T07:31:30","date_gmt":"2025-10-29T06:31:30","guid":{"rendered":"https:\/\/premium-speakers.com\/?p=115673"},"modified":"2025-10-29T07:31:31","modified_gmt":"2025-10-29T06:31:31","slug":"sensitive-data-and-ai-why-data-security-comes-first","status":"publish","type":"post","link":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/","title":{"rendered":"Sensitive data and AI: Why data security comes first"},"content":{"rendered":"\n<p><strong>Guest article by <a href=\"https:\/\/premium-speakers.com\/en\/speaker-presenter\/livia-schroder\/\" target=\"_blank\" rel=\"noreferrer noopener\">Livia Schr\u00f6der<\/a>:<\/strong><\/p>\n\n\n\n<p>Artificial intelligence has long been part of everyday life in companies and administrations. Chatbots answer customer questions, assistance systems help with texts or documentation, and internal workflows are also increasingly supported by AI. But as helpful as these tools are, they can also be dangerous, especially when sensitive personal data is carelessly entered into external AI systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-risk-data-disclosure-without-control\">The risk: data disclosure without control<\/h2>\n\n\n\n<p>Many AI tools run as cloud services from international providers. Anyone who enters information there automatically places it in the hands of third parties. This entails several risks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Personal data<\/strong> such as names, addresses, medical or financial information could end up in training data or be viewed by third parties.<\/li>\n\n\n\n<li><strong>Legal conflicts<\/strong> arise because data flows to countries that are not subject to the same data protection standards as Switzerland or the EU.<\/li>\n\n\n\n<li><strong>Confidentiality<\/strong> is not guaranteed, especially when it comes to trade secrets, patient records or employee information, where a single mistake can have serious consequences.<\/li>\n<\/ul>\n\n\n\n<p>In short, anyone who enters sensitive data into public AI tools risks losing control over their information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-alternatives-how-to-do-it-right\">Secure alternatives: How to do it right<\/h2>\n\n\n\n<p>Fortunately, there are ways to reap the benefits of modern AI without compromising data security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-rag-retrieval-augmented-generation\">1. RAG (Retrieval-Augmented Generation)<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><\/li>\n<\/ol>\n\n\n\n<p>With RAG, sensitive information is not transferred directly to the AI model, but stored in a protected database. The AI only accesses the relevant excerpts that are necessary for the respective answer.<\/p>\n\n\n\n<p>Example:<br>An employee asks a chatbot about holiday entitlement after a wedding. Instead of transferring the entire personnel file to an external AI, the system retrieves the answer from an internal data source and securely adds it to the response.<\/p>\n\n\n\n<p>This means that the knowledge remains within the company, but the AI still provides a precise and helpful answer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-anonymisation-of-data\">2. Anonymisation of data<\/h3>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><\/li>\n<\/ol>\n\n\n\n<p>Another option is to <strong>anonymise<\/strong> or <strong>pseudonymise<\/strong> data before using it in AI workflows.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Names are replaced with placeholders,<\/li>\n\n\n\n<li>identifiers are removed<\/li>\n\n\n\n<li>sensitive details are obscured.<\/li>\n<\/ul>\n\n\n\n<p>This allows many use cases to be mapped without compromising the privacy of employees or customers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-protected-ai-environments\">3. Protected AI environments<\/h3>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><\/li>\n<\/ol>\n\n\n\n<p>More and more companies are relying on local AI models or sovereign clouds, in which systems are operated within their own infrastructure. This allows organisations to retain full control over which data is processed and stored.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-does-this-mean-for-companies-in-switzerland\">What does this mean for companies in Switzerland?<\/h3>\n\n\n\n<p>For Swiss companies and authorities, the situation is clear: anyone who relies on international standard AI must expect data to end up outside their own sphere of influence. This is not only a data protection issue, but can also entail <strong>compliance risks<\/strong>, particularly with regard to the GDPR and the upcoming EU AI Act.<\/p>\n\n\n\n<p>However, those who rely on <strong>secure AI architectures with RAG, anonymisation and local control <\/strong>can reap the benefits of modern AI without compromising their own data.<\/p>\n\n\n\n<p><strong>Conclusion:<\/strong><\/p>\n\n\n\n<p><strong>AI is a key technology, but it must not be used at the expense of data security. Sensitive personal data does not belong in public AI tools.<\/strong><\/p>\n\n\n\n<p>The solution lies in protected architectures, anonymised data and sovereign infrastructures. Companies that rely on these secure approaches today not only protect their customers and employees, but also secure long-term trust and freedom of action.<\/p>\n\n\n\n<p><strong>Learn more about AI and data in the presentation with Livia Schr\u00f6der. Contact us for a booking enquiry: <a href=\"tel:17048041054\"><i class=\"far fa-phone-alt fa-fw me-1\"><\/i> 1 (704) 804 1054<\/a> or <a href=\"mailto:livia.schroeder@premium-speakers.com\" target=\"_blank\" rel=\"noreferrer noopener\">livia.schroeder@premium-speakers.com<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guest article by Livia Schr\u00f6der: Artificial intelligence has long been part of everyday life in companies and administrations. Chatbots answer [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":115669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"footnotes":""},"categories":[16563,16565],"tags":[],"class_list":["post-115673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-topics","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Sensitive data and AI: Why data security comes first &#8211; Premium Speakers<\/title>\n<meta name=\"description\" content=\"Livia Schr\u00f6der in her blog on sensitive data and AI: Why data security comes first. Risks and alternatives. How to do it right.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sensitive data and AI: Why data security comes first\" \/>\n<meta property=\"og:description\" content=\"Livia Schr\u00f6der in her blog on sensitive data and AI: Why data security comes first. Risks and alternatives. How to do it right.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/\" \/>\n<meta property=\"og:site_name\" content=\"Premium Speakers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PremiumSpeakers\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-29T06:31:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T06:31:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mandy Weinand\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PremiumSpeakers\" \/>\n<meta name=\"twitter:site\" content=\"@PremiumSpeakers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mandy Weinand\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/\"},\"author\":{\"name\":\"Mandy Weinand\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/f1d68aee6461592e706c9487b493b146\"},\"headline\":\"Sensitive data and AI: Why data security comes first\",\"datePublished\":\"2025-10-29T06:31:30+00:00\",\"dateModified\":\"2025-10-29T06:31:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/\"},\"wordCount\":568,\"publisher\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg\",\"articleSection\":[\"Blog about Categories \/ Topics\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/\",\"url\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/\",\"name\":\"Sensitive data and AI: Why data security comes first &#8211; Premium Speakers\",\"isPartOf\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg\",\"datePublished\":\"2025-10-29T06:31:30+00:00\",\"dateModified\":\"2025-10-29T06:31:31+00:00\",\"description\":\"Livia Schr\u00f6der in her blog on sensitive data and AI: Why data security comes first. Risks and alternatives. How to do it right.\",\"breadcrumb\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#primaryimage\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg\",\"width\":2048,\"height\":1152,\"caption\":\"KI und Daten - Blogbeitrag Livia Schroeder - Premium Speakers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/premium-speakers.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sensitive data and AI: Why data security comes first\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#website\",\"url\":\"https:\/\/premium-speakers.com\/en\/\",\"name\":\"Premium Speakers\",\"description\":\"Agentur f\u00fcr Referenten Vermittlung\",\"publisher\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/premium-speakers.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#organization\",\"name\":\"Premium Speakers\",\"url\":\"https:\/\/premium-speakers.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png\",\"width\":1534,\"height\":722,\"caption\":\"Premium Speakers\"},\"image\":{\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PremiumSpeakers\",\"https:\/\/x.com\/PremiumSpeakers\",\"https:\/\/www.instagram.com\/premium_speakers\/\",\"https:\/\/www.linkedin.com\/company\/premium-speakers\",\"https:\/\/www.youtube.com\/channel\/UCrb9-cJEYUpbyi6KMAmZlCQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/f1d68aee6461592e706c9487b493b146\",\"name\":\"Mandy Weinand\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/0dd\/0dd8d60975308d2c72a43b48f7a98b02x96.jpg\",\"contentUrl\":\"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/0dd\/0dd8d60975308d2c72a43b48f7a98b02x96.jpg\",\"caption\":\"Mandy Weinand\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Sensitive data and AI: Why data security comes first &#8211; Premium Speakers","description":"Livia Schr\u00f6der in her blog on sensitive data and AI: Why data security comes first. Risks and alternatives. How to do it right.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/","og_locale":"en_US","og_type":"article","og_title":"Sensitive data and AI: Why data security comes first","og_description":"Livia Schr\u00f6der in her blog on sensitive data and AI: Why data security comes first. Risks and alternatives. How to do it right.","og_url":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/","og_site_name":"Premium Speakers","article_publisher":"https:\/\/www.facebook.com\/PremiumSpeakers","article_published_time":"2025-10-29T06:31:30+00:00","article_modified_time":"2025-10-29T06:31:31+00:00","og_image":[{"width":2048,"height":1152,"url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg","type":"image\/jpeg"}],"author":"Mandy Weinand","twitter_card":"summary_large_image","twitter_creator":"@PremiumSpeakers","twitter_site":"@PremiumSpeakers","twitter_misc":{"Written by":"Mandy Weinand","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#article","isPartOf":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/"},"author":{"name":"Mandy Weinand","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/f1d68aee6461592e706c9487b493b146"},"headline":"Sensitive data and AI: Why data security comes first","datePublished":"2025-10-29T06:31:30+00:00","dateModified":"2025-10-29T06:31:31+00:00","mainEntityOfPage":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/"},"wordCount":568,"publisher":{"@id":"https:\/\/premium-speakers.com\/en\/#organization"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#primaryimage"},"thumbnailUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg","articleSection":["Blog about Categories \/ Topics","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/","url":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/","name":"Sensitive data and AI: Why data security comes first &#8211; Premium Speakers","isPartOf":{"@id":"https:\/\/premium-speakers.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#primaryimage"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#primaryimage"},"thumbnailUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg","datePublished":"2025-10-29T06:31:30+00:00","dateModified":"2025-10-29T06:31:31+00:00","description":"Livia Schr\u00f6der in her blog on sensitive data and AI: Why data security comes first. Risks and alternatives. How to do it right.","breadcrumb":{"@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#primaryimage","url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2025\/10\/ki-und-daten-premium-speakers.jpg","width":2048,"height":1152,"caption":"KI und Daten - Blogbeitrag Livia Schroeder - Premium Speakers"},{"@type":"BreadcrumbList","@id":"https:\/\/premium-speakers.com\/en\/magazin\/sensitive-data-and-ai-why-data-security-comes-first\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/premium-speakers.com\/en\/"},{"@type":"ListItem","position":2,"name":"Sensitive data and AI: Why data security comes first"}]},{"@type":"WebSite","@id":"https:\/\/premium-speakers.com\/en\/#website","url":"https:\/\/premium-speakers.com\/en\/","name":"Premium Speakers","description":"Agentur f\u00fcr Referenten Vermittlung","publisher":{"@id":"https:\/\/premium-speakers.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/premium-speakers.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/premium-speakers.com\/en\/#organization","name":"Premium Speakers","url":"https:\/\/premium-speakers.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/uploads\/2018\/03\/logo.png","width":1534,"height":722,"caption":"Premium Speakers"},"image":{"@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PremiumSpeakers","https:\/\/x.com\/PremiumSpeakers","https:\/\/www.instagram.com\/premium_speakers\/","https:\/\/www.linkedin.com\/company\/premium-speakers","https:\/\/www.youtube.com\/channel\/UCrb9-cJEYUpbyi6KMAmZlCQ"]},{"@type":"Person","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/f1d68aee6461592e706c9487b493b146","name":"Mandy Weinand","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/premium-speakers.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/0dd\/0dd8d60975308d2c72a43b48f7a98b02x96.jpg","contentUrl":"https:\/\/premium-speakers.com\/wp-content\/wphb-cache\/gravatar\/0dd\/0dd8d60975308d2c72a43b48f7a98b02x96.jpg","caption":"Mandy Weinand"}}]}},"_links":{"self":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts\/115673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/comments?post=115673"}],"version-history":[{"count":0,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/posts\/115673\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/media\/115669"}],"wp:attachment":[{"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/media?parent=115673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/categories?post=115673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/premium-speakers.com\/en\/wp-json\/wp\/v2\/tags?post=115673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}