{"id":78935,"date":"2023-05-18T06:06:28","date_gmt":"2023-05-18T06:06:28","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?page_id=78935"},"modified":"2026-03-31T13:53:15","modified_gmt":"2026-03-31T13:53:15","slug":"cyber-talks","status":"publish","type":"page","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/","title":{"rendered":"Cyber Talks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"78935\" class=\"elementor elementor-78935\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5354b7cb elementor-section-full_width elementor-section-height-min-height elementor-section-stretched elementor-section-height-default elementor-section-items-middle\" data-id=\"5354b7cb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e0a69ed\" data-id=\"6e0a69ed\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d9724a0 elementor-widget__width-auto elementor-widget elementor-widget-heading\" data-id=\"7d9724a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Talks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2aab2ec5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2aab2ec5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6189bab\" data-id=\"6189bab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-596bcc3c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"596bcc3c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65c77703\" data-id=\"65c77703\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51b7d370 elementor-widget elementor-widget-image\" data-id=\"51b7d370\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"376\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/eccu-cyber.jpg\" class=\"attachment-full size-full wp-image-78850\" alt=\"\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/eccu-cyber.jpg 500w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/eccu-cyber-300x226.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-57b88257\" data-id=\"57b88257\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51dfdd50 elementor-widget elementor-widget-heading\" data-id=\"51dfdd50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Talks: Gateway to Cyber Awareness<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17e66cce elementor-widget elementor-widget-text-editor\" data-id=\"17e66cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u200bIf you wish to broaden your horizons and perspectives in the cyber security space, we recommend you attend our webinar, Cyber Talks, which is held regularly.<\/p><p>Cyber Talks bring together the best of the industry on a common platform to share knowledge about the current global scenario in this field and provide thousands of cyber security professionals an opportunity to interact with top leaders to discuss the science behind cyber security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-52cccfab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52cccfab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-756c635d\" data-id=\"756c635d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71dcf0eb elementor-widget elementor-widget-text-editor\" data-id=\"71dcf0eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our cyber security Influencers not only update participants on various innovations but also highlight the lack of focus in making organizations less vulnerable to cyber-attacks around the world.<\/p><p>The word of the day is to save the Cyber Kingdom from the Wolves of Dark, and EC-Council University, along with its alumni, continues to offer cyber security professionals the arsenal needed to raise awareness about the latest threats and developments in the world of cyber security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4c251fad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c251fad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-25900159\" data-id=\"25900159\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-297f0b24 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"297f0b24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/www.eccu.edu\/apply-to-be-a-cyber-talks-speaker\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Apply to be a Cyber Talks Speaker<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-510a622e\" data-id=\"510a622e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49eb933e elementor-align-center elementor-widget elementor-widget-button\" data-id=\"49eb933e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"#upcomingcybertalks\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Register for the Latest Cyber Talk<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-411cd0d5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"411cd0d5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34063fa8\" data-id=\"34063fa8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45bbe8c0 elementor-widget elementor-widget-heading\" data-id=\"45bbe8c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Talks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35d07eba elementor-widget elementor-widget-heading\" data-id=\"35d07eba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Addressing the REAL, ON-THE-GROUND Cybersecurity Issues<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f9bca2e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f9bca2e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3120b54c\" data-id=\"3120b54c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-127c3906 the7-e-tabs-nav-justify-center the7-e-tabs-view-horizontal elementor-widget elementor-widget-the7-tabs\" data-id=\"127c3906\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"upcomingcybertalks\" data-settings=\"{&quot;accordion_breakpoint&quot;:&quot;mobile&quot;}\" data-widget_type=\"the7-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t<div class=\"the7-e-tabs-wrapper\">\n\t\t<div class=\"the7-e-tabs-nav-wrapper\">\n\t\t\t<div class=\"the7-e-tabs-nav-scroll-wrapper\">\n\t\t\t\t<div class=\"the7-e-tabs-nav\" role=\"tablist\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"item-divider\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<div id=\"the7-e-tab-title-3101\" class=\"the7-e-tab-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"the7-e-tab-content-3101\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"the7-e-tab-title-text\">\n\t\t\t\t\t\t\tUpcoming Cybertalks\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"item-divider\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"the7-e-tab-title-3102\" class=\"the7-e-tab-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"the7-e-tab-content-3102\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"the7-e-tab-title-text\">\n\t\t\t\t\t\t\tRecent Cybertalks\t\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"item-divider\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"the7-e-tab-nav-button left-button\"><\/div>\n\t\t\t<div class=\"the7-e-tab-nav-button right-button\"><\/div>\n\t\t<\/div>\n\t\t<div class=\"the7-e-tabs-content\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t<span class=\"item-divider\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t\t\t<div class=\"the7-e-tab-item-wrapper\" data-tab=\"1\">\n\t\t\t\t\t<div class=\"the7-e-tab-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-3101\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"the7-e-tab-title-text\">\n\t\t\t\t\t\t\tUpcoming Cybertalks\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"the7-e-tab-content-3101\" class=\"the7-e-tab-content\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"the7-e-tab-title-3101\" tabindex=\"0\" hidden=\"false\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<span class=\"item-divider\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t\t\t<div class=\"the7-e-tab-item-wrapper\" data-tab=\"2\">\n\t\t\t\t\t<div class=\"the7-e-tab-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-3102\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<h5 class=\"the7-e-tab-title-text\">\n\t\t\t\t\t\t\tRecent Cybertalks\t\t\t\t\t\t<\/h5>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"the7-e-tab-content-3102\" class=\"the7-e-tab-content\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"the7-e-tab-title-3102\" tabindex=\"0\" hidden=\"hidden\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<span class=\"item-divider\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber Talks Cyber Talks: Gateway to Cyber Awareness \u200bIf you wish to broaden your horizons and perspectives in the cyber security space, we recommend you attend our webinar, Cyber Talks, which is held regularly. Cyber Talks bring together the best of the industry on a common platform to share knowledge about the current global scenario&hellip;<\/p>\n","protected":false},"author":35,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"class_list":["post-78935","page","type-page","status-publish"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Talks - Cyber Security Webinar Videos | Cybersecurity Exchange<\/title>\n<meta name=\"description\" content=\"Explore the world of cybersecurity with Cyber Talks, a series of webinar videos designed to increase cyber awareness and knowledge. Join us for valuable insights and discussions!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Talks - Cyber Security Webinar Videos | Cybersecurity Exchange\" \/>\n<meta property=\"og:description\" content=\"Explore the world of cybersecurity with Cyber Talks, a series of webinar videos designed to increase cyber awareness and knowledge. Join us for valuable insights and discussions!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T13:53:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/eccu-cyber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"376\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Talks - Cyber Security Webinar Videos | Cybersecurity Exchange\" \/>\n<meta name=\"twitter:description\" content=\"Explore the world of cybersecurity with Cyber Talks, a series of webinar videos designed to increase cyber awareness and knowledge. Join us for valuable insights and discussions!\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/\",\"name\":\"Cyber Talks - Cyber Security Webinar Videos | Cybersecurity Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/eccu-cyber.jpg\",\"datePublished\":\"2023-05-18T06:06:28+00:00\",\"dateModified\":\"2026-03-31T13:53:15+00:00\",\"description\":\"Explore the world of cybersecurity with Cyber Talks, a series of webinar videos designed to increase cyber awareness and knowledge. Join us for valuable insights and discussions!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/eccu-cyber.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/eccu-cyber.jpg\",\"width\":500,\"height\":376},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Talks - Cyber Security Webinar Videos | Cybersecurity Exchange","description":"Explore the world of cybersecurity with Cyber Talks, a series of webinar videos designed to increase cyber awareness and knowledge. Join us for valuable insights and discussions!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Talks - Cyber Security Webinar Videos | Cybersecurity Exchange","og_description":"Explore the world of cybersecurity with Cyber Talks, a series of webinar videos designed to increase cyber awareness and knowledge. Join us for valuable insights and discussions!","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/","og_site_name":"Cybersecurity Exchange","article_modified_time":"2026-03-31T13:53:15+00:00","og_image":[{"width":500,"height":376,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/eccu-cyber.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Cyber Talks - Cyber Security Webinar Videos | Cybersecurity Exchange","twitter_description":"Explore the world of cybersecurity with Cyber Talks, a series of webinar videos designed to increase cyber awareness and knowledge. Join us for valuable insights and discussions!","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/","name":"Cyber Talks - Cyber Security Webinar Videos | Cybersecurity Exchange","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/eccu-cyber.jpg","datePublished":"2023-05-18T06:06:28+00:00","dateModified":"2026-03-31T13:53:15+00:00","description":"Explore the world of cybersecurity with Cyber Talks, a series of webinar videos designed to increase cyber awareness and knowledge. Join us for valuable insights and discussions!","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/eccu-cyber.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/eccu-cyber.jpg","width":500,"height":376},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages\/78935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=78935"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/pages\/78935\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=78935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}