{"id":67,"date":"2026-03-08T03:39:42","date_gmt":"2026-03-08T03:39:42","guid":{"rendered":"https:\/\/34.122.222.119\/?page_id=67"},"modified":"2026-03-08T21:31:16","modified_gmt":"2026-03-08T21:31:16","slug":"groundwork","status":"publish","type":"page","link":"https:\/\/informaticscoop.com\/","title":{"rendered":"Groundwork &#8211; Informatics Cooperative"},"content":{"rendered":"<div id=\"sp-page\" class=\"spBgcover sp-content-1\" style=\"background-color: rgb(255, 255, 255); font-family: 'Helvetica Neue', Arial, sans-serif; font-weight: 400;\">\n<section id=\"sp-ks8a8s\" data-mobile-visibility=\"#sp-ks8a8s|false\" data-tablet-visibility=\"#sp-ks8a8s|false\" data-desktop-visibility=\"#sp-ks8a8s|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section \" style=\"width: 100%; max-width: 100%; padding: 10px;\">\n<div id=\"sp-bjykl5\" data-mobile-visibility=\"#sp-bjykl5|false\" data-tablet-visibility=\"#sp-bjykl5|false\" data-desktop-visibility=\"#sp-bjykl5|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sp-w-full  sp-m-auto sm:sp-flex sp-justify-between\">\n<div id=\"sp-bcau2i\" data-mobile-visibility=\"#sp-bcau2i|false\" data-tablet-visibility=\"#sp-bcau2i|false\" data-desktop-visibility=\"#sp-bcau2i|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% + 0px);\">\n<div id=\"sp-izlyd2\" data-mobile-css=\".sp-text-wrapper-izlyd2, #sp-izlyd2, #izlyd2|text-align:left;\" data-tablet-css=\".sp-text-wrapper-izlyd2, #sp-izlyd2, #izlyd2|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-izlyd2|false\" data-tablet-visibility=\".sp-text-wrapper-izlyd2|false\" data-desktop-visibility=\".sp-text-wrapper-izlyd2|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-izlyd2\" style=\"font-size: 18px; margin: 0px; text-align: right;\">\n<p style=\"text-align: right;\">informatics cooperative<\/p>\n<\/div>\n<div id=\"sp-uqbopu\" data-mobile-css=\".sp-text-wrapper-uqbopu, #sp-uqbopu, #uqbopu|text-align:left;\" data-tablet-css=\".sp-text-wrapper-uqbopu, #sp-uqbopu, #uqbopu|text-align:left;\" data-mobile-visibility=\".sp-text-wrapper-uqbopu|false\" data-tablet-visibility=\".sp-text-wrapper-uqbopu|false\" data-desktop-visibility=\".sp-text-wrapper-uqbopu|false\" class=\"sp-css-target sp-text-wrapper sp-el-block sp-text-block-style sp-text-wrapper-uqbopu\" style=\"font-size: 13px; margin: 0px; text-align: left;\">\n<p style=\"text-align: right;\"><a href=\"https:\/\/informaticscoop.com\/?page_id=79\">ABOUT<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-j94e7i\" data-mobile-visibility=\"#sp-j94e7i|false\" data-tablet-visibility=\"#sp-j94e7i|false\" data-desktop-visibility=\"#sp-j94e7i|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section \" style=\"width: 100%; max-width: 100%;\">\n<div id=\"sp-of0jhn\" data-mobile-visibility=\"#sp-of0jhn|false\" data-tablet-visibility=\"#sp-of0jhn|false\" data-desktop-visibility=\"#sp-of0jhn|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sp-w-full  sp-m-auto sm:sp-flex sp-justify-between\">\n<div id=\"sp-c33qmc\" data-mobile-visibility=\"#sp-c33qmc|false\" data-tablet-visibility=\"#sp-c33qmc|false\" data-desktop-visibility=\"#sp-c33qmc|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% + 0px);\">\n<div id=\"sp-voerf6\" data-mobile-css=\"#sp-voerf6|height:3px;\" data-tablet-css=\"#sp-voerf6|height:10px;\" class=\"sp-spacer\" style=\"height: 39px;\"><\/div>\n<p><span href=\"\" target=\"\" rel=\"\" class=\"sp-header-block-link\" style=\"text-decoration: none;\"><\/p>\n<h2 id=\"sp-zel223\" data-mobile-css=\".sp-headline-block-zel223, #sp-zel223, #zel223|font-size:31px;text-align:left;\" data-tablet-css=\".sp-headline-block-zel223, #sp-zel223, #zel223|text-align:center;\" data-mobile-visibility=\".sp-headline-block-zel223|false\" data-tablet-visibility=\".sp-headline-block-zel223|false\" data-desktop-visibility=\".sp-headline-block-zel223|false\" class=\"sp-css-target sp-el-block sp-headline-block-zel223 sp-type-header\" style=\"font-size: 57px; text-align: center; margin: 0px;\"><strong>Protect critical services and maintain public trust<\/strong><\/h2>\n<p><\/span><\/p>\n<div id=\"sp-yugen2\" data-mobile-css=\"#sp-yugen2|height:3px;\" data-tablet-css=\"#sp-yugen2|height:10px;\" class=\"sp-spacer\" style=\"height: 17px;\"><\/div>\n<p><span href=\"\" target=\"\" rel=\"\" class=\"sp-header-block-link\" style=\"text-decoration: none;\"><\/p>\n<h1 id=\"sp-e1wngs\" data-mobile-css=\".sp-headline-block-e1wngs, #sp-e1wngs, #e1wngs|font-size:29px;text-align:left;\" data-tablet-css=\".sp-headline-block-e1wngs, #sp-e1wngs, #e1wngs|text-align:center;\" data-mobile-visibility=\".sp-headline-block-e1wngs|false\" data-tablet-visibility=\".sp-headline-block-e1wngs|false\" data-desktop-visibility=\".sp-headline-block-e1wngs|false\" class=\"sp-css-target sp-el-block sp-headline-block-e1wngs sp-type-header\" style=\"font-size: 37px; font-weight: 700; font-style: normal; font-family: Tahoma, Geneva, sans-serif; letter-spacing: 3px; text-align: center; margin: 0px;\"><span style=\"color: #980000;\"><strong>Groundwork<\/strong><\/span><\/h1>\n<p><\/span><\/p>\n<div id=\"sp-dxzgjp\" data-mobile-css=\"#sp-dxzgjp|height:3px;\" data-tablet-css=\"#sp-dxzgjp|height:10px;\" class=\"sp-spacer\" style=\"height: 17px;\"><\/div>\n<p><span href=\"\" target=\"\" rel=\"\" class=\"sp-header-block-link\" style=\"text-decoration: none;\"><\/p>\n<h1 id=\"sp-yv1wel\" data-mobile-css=\".sp-headline-block-yv1wel, #sp-yv1wel, #yv1wel|font-size:17px;text-align:left;\" data-tablet-css=\".sp-headline-block-yv1wel, #sp-yv1wel, #yv1wel|text-align:center;\" data-mobile-visibility=\".sp-headline-block-yv1wel|false\" data-tablet-visibility=\".sp-headline-block-yv1wel|false\" data-desktop-visibility=\".sp-headline-block-yv1wel|false\" class=\"sp-css-target sp-el-block sp-headline-block-yv1wel sp-type-header\" style=\"font-size: 25px; text-align: center; margin: 0px;\">OT\/IT asset intelligence melds organizational context with asset inventory to enable vulnerability management, business continuity planning, incident response, and other risk-based decision making processes.<\/h1>\n<p><\/span><\/div>\n<\/div>\n<div id=\"sp-w19y8t\" data-mobile-visibility=\"#sp-w19y8t|false\" data-tablet-visibility=\"#sp-w19y8t|false\" data-desktop-visibility=\"#sp-w19y8t|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sp-w-full  sp-m-auto sm:sp-flex sp-justify-between\">\n<div id=\"sp-z1qsdv\" data-mobile-visibility=\"#sp-z1qsdv|false\" data-tablet-visibility=\"#sp-z1qsdv|false\" data-desktop-visibility=\"#sp-z1qsdv|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% + 0px);\">\n<div id=\"sp-ktexwg\" data-mobile-css=\"#sp-ktexwg|height:5px;\" data-tablet-css=\"#sp-ktexwg|height:10px;\" class=\"sp-spacer\" style=\"height: 42px;\"><\/div>\n<div id=\"sp-button-parent-atol48\" data-mobile-css=\"#sp-button-parent-atol48|text-align:center;\" data-tablet-css=\"#sp-button-parent-atol48|text-align:center;\" class=\"sp-button-wrapper sp-el-block\" style=\"margin: 0px; text-align: center;\"><a href=\"https:\/\/informaticscoop.com\/?page_id=103\" id=\"sp-atol48\" data-mobile-css=\"\" data-tablet-css=\"\" data-mobile-visibility=\".sp-button-atol48|false\" data-tablet-visibility=\".sp-button-atol48|false\" data-desktop-visibility=\".sp-button-atol48|false\" target=\"\" rel=\"\" class=\"sp-button sp-css-target sp-text-center sp-inline-block sp-leading-none sp-button-atol48\" style=\"font-size: 22px; background: rgb(0, 0, 0); color: rgb(255, 255, 255); width: auto; padding: 16px 20px;\"><span id=\"atol48\" class=\"mce-content-body html4-captions\"  style=\"position: relative;\" >Lay the Groundwork<\/span><\/a><\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"sp-dzeekc\" data-mobile-visibility=\"#sp-dzeekc|false\" data-tablet-visibility=\"#sp-dzeekc|false\" data-desktop-visibility=\"#sp-dzeekc|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-section \" style=\"width: 100%; max-width: 100%;\">\n<div id=\"sp-w5ti9l\" data-mobile-visibility=\"#sp-w5ti9l|false\" data-tablet-visibility=\"#sp-w5ti9l|false\" data-desktop-visibility=\"#sp-w5ti9l|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-row sp-w-full  sp-m-auto sm:sp-flex sp-justify-between\">\n<div id=\"sp-w5c3x6\" data-mobile-visibility=\"#sp-w5c3x6|false\" data-tablet-visibility=\"#sp-w5c3x6|false\" data-desktop-visibility=\"#sp-w5c3x6|false\" data-mobile-css=\"\" data-tablet-css=\"\" class=\"sp-el-col  sp-w-full\" style=\"width: calc(100% + 0px);\"><\/div>\n<\/div>\n<\/section>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>informatics cooperative ABOUT Protect critical services and maintain public trust Groundwork OT\/IT asset intelligence melds organizational context with asset inventory to enable vulnerability management, business continuity planning, incident response, and other risk-based decision making processes. Lay the Groundwork<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-67","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/informaticscoop.com\/index.php?rest_route=\/wp\/v2\/pages\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/informaticscoop.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/informaticscoop.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/informaticscoop.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/informaticscoop.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67"}],"version-history":[{"count":17,"href":"https:\/\/informaticscoop.com\/index.php?rest_route=\/wp\/v2\/pages\/67\/revisions"}],"predecessor-version":[{"id":111,"href":"https:\/\/informaticscoop.com\/index.php?rest_route=\/wp\/v2\/pages\/67\/revisions\/111"}],"wp:attachment":[{"href":"https:\/\/informaticscoop.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}