{"id":55621,"date":"2025-02-12T16:33:08","date_gmt":"2025-10-10T12:15:30","guid":{"rendered":"https:\/\/www.elixirr.com\/en-us\/?post_type=case_study&#038;p=55621"},"modified":"2025-11-25T11:18:52","modified_gmt":"2025-11-25T11:18:52","slug":"global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity","status":"publish","type":"case_study","link":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/","title":{"rendered":"Global energy systems supplier: Strategic design and operating model design to enhance cybersecurity"},"content":{"rendered":"<section\n    class=\"wp-block-text-block edwp-block layout--spacing-y bg--none\"\n    >\n    <div class=\"wp-block-text-block__container container fade-in\">\n        <div class=\"wp-block-text-block__content wysiwyg\">\n            <p class=\"meta-right-overview\">A global, market-leading energy and power systems supplier aimed to establish a best-in-class cybersecurity environment. Elixirr designed the strategic roadmap and operational model required to achieve this goal, ensuring alignment with organizational objectives and regulatory compliance.<\/p>\n<div class=\"hero-meta\">\n<ul class=\"meta-list\">\n<li>Outcome 1: Conducted a current-state assessment of the cybersecurity function through stakeholder interviews, workshops and documentation review which provided a clear understanding of existing strengths and weaknesses, enabling targeted improvements and better risk mitigation<\/li>\n<li>Outcome 2: Defined and tested a revised strategy and operating model with key stakeholders. This ensured the new strategy and operating model were practical, aligned with business goals and supported by stakeholder buy-in for seamless implementation<\/li>\n<li>Outcome 3: Created and operationalised a new program management office to oversee and govern strategy delivery, ensuring effective execution of the cybersecurity strategy and sustained resilience over time<\/li>\n<\/ul>\n<\/div>\n        <\/div>\n            <\/div>\n<\/section>\n\n\n<section\n    class=\"wp-block-banner edwp-block layout--spacing-y bg--secondary wp-block-banner--content-right\"\n    >\n    <div class=\"container wp-block-banner__container\">\n        <div class=\"edwp-component edwp-fade-in wp-block-banner__content\">\n            <h2 class=\"wp-component-heading wp-component-content__title text--h1\">\n    The challenge<\/h2>                <div class=\"wp-component-content__content wp-component-content__content--cols-1 wysiwyg\">\n                            <div class=\"wp-component-content__column\">\n                    <p>The client faced increasing operating costs and regulatory scrutiny, requiring a robust cybersecurity strategy to mitigate risks and optimize processes. This initiative aimed to address evolving threats while ensuring compliance and operational efficiency.<\/p>\n<p>The client needed a comprehensive operating model to manage cybersecurity risks effectively while aligning with strategic business goals and regulatory requirements. Identifying and sequencing the capabilities required for success was a critical challenge.<\/p>\n                <\/div>\n                    <\/div>\n                    <\/div>            <\/div>\n<\/section>\n\n\n<section\n    class=\"wp-block-banner edwp-block layout--none bg--secondary wp-block-banner--content-right\"\n    >\n    <div class=\"container wp-block-banner__container\">\n        <div class=\"edwp-component edwp-fade-in wp-block-banner__content\">\n            <h2 class=\"wp-component-heading wp-component-content__title text--h1\">\n    The approach<\/h2>                <div class=\"wp-component-content__content wp-component-content__content--cols-1 wysiwyg\">\n                            <div class=\"wp-component-content__column\">\n                    <p>We leveraged its operating model capabilities, focusing on organization and process design, performance management and talent evaluation. Key actions included:<\/p>\n<ul>\n<li>Conducting a comprehensive process assessment to evaluate the effectiveness of existing security measures<\/li>\n<li>Auditing policy gaps and identifying areas for improvement, including operational cost implications<\/li>\n<li>Designing the future-state operating model and creating a roadmap for implementation<\/li>\n<li>Developing and mobilizing cybersecurity training programs to enhance compliance and understanding across the organization<\/li>\n<\/ul>\n                <\/div>\n                    <\/div>\n                    <\/div>            <\/div>\n<\/section>\n\n\n<section\n    class=\"wp-block-banner edwp-block layout--spacing-y bg--secondary wp-block-banner--content-right\"\n    >\n    <div class=\"container wp-block-banner__container\">\n        <div class=\"edwp-component edwp-fade-in wp-block-banner__content\">\n            <h2 class=\"wp-component-heading wp-component-content__title text--h1\">\n    The value delivered<\/h2>                <div class=\"wp-component-content__content wp-component-content__content--cols-1 wysiwyg\">\n                            <div class=\"wp-component-content__column\">\n                    <p>Our efforts resulted in a structured and actionable operating model, aligned with the client\u2019s strategic goals. The new program management office provided oversight and governance for strategy execution, fostering a culture of resilience and compliance within the organization.<\/p>\n                <\/div>\n                    <\/div>\n                    <\/div>            <\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":55625,"template":"","related_service":[344],"related_industry":[72,82],"class_list":["post-55621","case_study","type-case_study","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Global energy systems supplier: Strategic design and operating model design to enhance cybersecurity - Elixirr<\/title>\n<meta name=\"description\" content=\"A global energy-systems supplier partnered with Elixirr to build a robust cybersecurity strategy and operating model \u2014 from current-state assessment to governance via a new programme-management office.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Case Studies\" \/>\n<meta property=\"og:description\" content=\"A global energy-systems supplier partnered with Elixirr to build a robust cybersecurity strategy and operating model \u2014 from current-state assessment to governance via a new programme-management office.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Elixirr - USA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T11:18:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"820\" \/>\n\t<meta property=\"og:image:height\" content=\"492\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/\",\"name\":\"Global energy systems supplier: Strategic design and operating model design to enhance cybersecurity - Elixirr\",\"isPartOf\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg\",\"datePublished\":\"2025-10-10T12:15:30+00:00\",\"dateModified\":\"2025-11-25T11:18:52+00:00\",\"description\":\"A global energy-systems supplier partnered with Elixirr to build a robust cybersecurity strategy and operating model \u2014 from current-state assessment to governance via a new programme-management office.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg\",\"contentUrl\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg\",\"width\":820,\"height\":492},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.elixirr.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\/\/www.elixirr.com\/en-us\/case-studies\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Global energy systems supplier: Strategic design and operating model design to enhance cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#website\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/\",\"name\":\"Elixirr - USA\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.elixirr.com\/en-us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#organization\",\"name\":\"Elixirr\",\"alternateName\":\"Elixirr International PLC\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/11\/elixirr-logo.png\",\"contentUrl\":\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/11\/elixirr-logo.png\",\"width\":200,\"height\":200,\"caption\":\"Elixirr\"},\"image\":{\"@id\":\"https:\/\/www.elixirr.com\/en-us\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Global energy systems supplier: Strategic design and operating model design to enhance cybersecurity - Elixirr","description":"A global energy-systems supplier partnered with Elixirr to build a robust cybersecurity strategy and operating model \u2014 from current-state assessment to governance via a new programme-management office.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Case Studies","og_description":"A global energy-systems supplier partnered with Elixirr to build a robust cybersecurity strategy and operating model \u2014 from current-state assessment to governance via a new programme-management office.","og_url":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/","og_site_name":"Elixirr - USA","article_modified_time":"2025-11-25T11:18:52+00:00","og_image":[{"width":820,"height":492,"url":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/","url":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/","name":"Global energy systems supplier: Strategic design and operating model design to enhance cybersecurity - Elixirr","isPartOf":{"@id":"https:\/\/www.elixirr.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg","datePublished":"2025-10-10T12:15:30+00:00","dateModified":"2025-11-25T11:18:52+00:00","description":"A global energy-systems supplier partnered with Elixirr to build a robust cybersecurity strategy and operating model \u2014 from current-state assessment to governance via a new programme-management office.","breadcrumb":{"@id":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#primaryimage","url":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg","contentUrl":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg","width":820,"height":492},{"@type":"BreadcrumbList","@id":"https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.elixirr.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/www.elixirr.com\/en-us\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Global energy systems supplier: Strategic design and operating model design to enhance cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.elixirr.com\/en-us\/#website","url":"https:\/\/www.elixirr.com\/en-us\/","name":"Elixirr - USA","description":"","publisher":{"@id":"https:\/\/www.elixirr.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.elixirr.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.elixirr.com\/en-us\/#organization","name":"Elixirr","alternateName":"Elixirr International PLC","url":"https:\/\/www.elixirr.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.elixirr.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/11\/elixirr-logo.png","contentUrl":"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/11\/elixirr-logo.png","width":200,"height":200,"caption":"Elixirr"},"image":{"@id":"https:\/\/www.elixirr.com\/en-us\/#\/schema\/logo\/image\/"}}]}},"card":"<article class=\"wp-component-card edwp-component wp-component-card--case_study            wp-component-card--link js-card-link\n        edwp-fade-in\">\n            <figure class=\"wp-component-card__image-wrapper\">\n                            <img width=\"820\" height=\"492\" src=\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg\" class=\"wp-component-card__image\" alt=\"\" decoding=\"async\" srcset=\"https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440.jpg 820w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440-300x180.jpg 300w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440-768x461.jpg 768w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440-87x52.jpg 87w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440-319x191.jpg 319w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440-479x287.jpg 479w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440-567x340.jpg 567w, https:\/\/www.elixirr.com\/en-us\/wp-content\/uploads\/sites\/2\/2025\/10\/Strategic-design-and-operating-model-design-to-enhance-cybersecurity2400x1440-767x460.jpg 767w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/>            <div class=\"wp-component-card__preview-icon\">\n                <span class='edwp-svg '><svg width=\"47\" height=\"47\" viewBox=\"0 0 47 47\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g>\n<path d=\"M23.4141 0.539062C36.1232 0.539183 46.4258 10.8416 46.4258 23.5508C46.4257 36.2599 36.1231 46.5624 23.4141 46.5625C10.7049 46.5625 0.402465 36.2599 0.402344 23.5508C0.402344 10.8415 10.7048 0.539062 23.4141 0.539062ZM23.4141 1.68945C11.3606 1.68945 1.55273 11.4974 1.55273 23.5508C1.55286 35.6041 11.3607 45.4111 23.4141 45.4111C35.4673 45.411 45.2743 35.604 45.2744 23.5508C45.2744 11.4974 35.4674 1.68957 23.4141 1.68945Z\" fill=\"currentColor\"\/>\n<path d=\"M19.2841 33.6992C18.9579 33.6986 18.6374 33.6111 18.3543 33.4454C17.7167 33.0759 17.3203 32.3585 17.3203 31.5797V15.8189C17.3203 15.0379 17.7167 14.3227 18.3543 13.9531C18.6442 13.7827 18.9735 13.6951 19.3078 13.6994C19.6421 13.7037 19.9692 13.7998 20.2548 13.9776L33.4237 22.0406C33.6981 22.2166 33.9244 22.461 34.0812 22.751C34.238 23.0409 34.3203 23.3668 34.3203 23.6982C34.3203 24.0295 34.238 24.3555 34.0812 24.6454C33.9244 24.9353 33.6981 25.1798 33.4237 25.3558L20.2527 33.421C19.9604 33.6017 19.6256 33.6979 19.2841 33.6992Z\" fill=\"currentColor\"\/>\n<\/g>\n<\/svg>\n<\/span>            <\/div>\n                        <\/figure>\n        <div class=\"wp-component-card__content edwp-row-load\">\n                                    <p class=\"wp-component-card__eyebrow\">\n                Cybersecurity            <\/p>\n                <a href='https:\/\/www.elixirr.com\/en-us\/case-studies\/global-energy-systems-supplier-strategic-design-and-operating-model-design-to-enhance-cybersecurity\/' class='wp-component-card__title'>\n            <h2>\n                Global energy systems supplier: Strategic design and operating model design to enhance cybersecurity\n            <\/h2>\n        <\/a>                                                            <div class=\"wp-component-card__meta\">\n                                            <p class=\"wp-component-card__date\">\n                            12 February 2025                        <\/p>\n                                                                <div class=\"wp-component-card__terms\">\n                                                                                                                                                                                                                <div class=\"wp-component-tags edwp-component\">\n                        <div class=\"wp-component-tags__tag\">\n                Energy            <\/div>\n                                <div class=\"wp-component-tags__tag\">\n                Power &amp; Utilities            <\/div>\n                                <div class=\"wp-component-tags__tag\">\n                Cybersecurity            <\/div>\n                <\/div>\n                        <\/div>\n                                    <\/div>\n                                                    <div class=\"wp-component-card__button-wrapper\">\n                    <button class=\"btn btn--link arrow wp-component-card__button\">\n                                                                            Read more                                                                            <span class='edwp-svg '><svg width=\"20\" height=\"20\" viewBox=\"0 0 20 20\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Lg\">\n<path id=\"Vector\" d=\"M1.12509 9.50162H15.8648L9.43259 3.06941C9.374 3.0113 9.3275 2.94216 9.29576 2.86599C9.26403 2.78981 9.24769 2.70811 9.24769 2.62559C9.24769 2.54307 9.26403 2.46137 9.29576 2.38519C9.3275 2.30902 9.374 2.23988 9.43259 2.18177C9.54971 2.06535 9.70814 2 9.87328 2C10.0384 2 10.1969 2.06535 10.314 2.18177L17.8151 9.6829C17.8737 9.74101 17.9202 9.81014 17.9519 9.88632C17.9837 9.96249 18 10.0442 18 10.1267C18 10.2092 17.9837 10.2909 17.9519 10.3671C17.9202 10.4433 17.8737 10.5124 17.8151 10.5705L10.314 18.0717C10.1975 18.1871 10.0404 18.2522 9.87641 18.2529C9.79414 18.2534 9.71259 18.2376 9.63643 18.2065C9.56027 18.1754 9.491 18.1296 9.43259 18.0717C9.374 18.0135 9.3275 17.9444 9.29576 17.8682C9.26403 17.7921 9.24769 17.7104 9.24769 17.6278C9.24769 17.5453 9.26403 17.4636 9.29576 17.3874C9.3275 17.3113 9.374 17.2421 9.43259 17.184L15.8711 10.7518H1.12509C0.959309 10.7518 0.800312 10.686 0.683084 10.5687C0.565857 10.4515 0.5 10.2925 0.5 10.1267C0.5 9.96093 0.565857 9.80193 0.683084 9.68471C0.800312 9.56748 0.959309 9.50162 1.12509 9.50162Z\" fill=\"#1D0F25\"\/>\n<\/g>\n<\/svg>\n<\/span>                                            <\/button>\n                <\/div>\n                                            <\/div>\n<\/article>\n","_links":{"self":[{"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/case_study\/55621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/case_study"}],"about":[{"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/types\/case_study"}],"author":[{"embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/users\/1"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/media\/55625"}],"wp:attachment":[{"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/media?parent=55621"}],"wp:term":[{"taxonomy":"related_service","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/related_service?post=55621"},{"taxonomy":"related_industry","embeddable":true,"href":"https:\/\/www.elixirr.com\/en-us\/wp-json\/wp\/v2\/related_industry?post=55621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}