{"id":24329,"date":"2018-11-29T06:56:18","date_gmt":"2018-11-29T06:56:18","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24329"},"modified":"2023-06-05T07:30:16","modified_gmt":"2023-06-05T07:30:16","slug":"a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/","title":{"rendered":"A Challenge to Business Leaders: Rethinking Your Defense Strategy to Counter Ever-evolving Threats"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24329\" class=\"elementor elementor-24329\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33b8c17f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33b8c17f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e02eeea\" data-id=\"4e02eeea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6167d576 elementor-widget elementor-widget-text-editor\" data-id=\"6167d576\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-2265 size-full\" title=\"Quan Heng Lim\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/ECCU-Quan-Heng-Lim.png.webp\" alt=\"Quan Heng Lim\" width=\"200\" height=\"267\"><\/p>\n<p><strong>Name:<\/strong> Quan Heng Lim,<br>\n<strong>Designation:<\/strong> Chief of Staff to the CTO, Horangi<br>\n<strong>Topic:<\/strong> A challenge to business leaders- Rethinking your defense strategy to counter ever evolving threats<br>\n<strong>Date of Webinar:<\/strong> 12<sup>th<\/sup> April, 2019<br>\n<strong>Time and Location:<\/strong> 5:30pm SGT\/3:00pm IST\/ 10:30am GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Speaker Bio: <\/strong>Q works with the technology teams and other business units in Horangi to ensure Horangi continues to be driven towards her mission. He found his passion in making, breaking things and is driven to solve hard problems. He is an entrepreneur and is active in the field of cybersecurity, tinkering with electronics and writing code whenever he is able to. He loves talking to people about the need for cybersecurity, and how it can be aligned to their business strategies.<\/p>\n<p><strong>Topic Abstract: <\/strong>Cybersecurity across the board is in a bad state- reports of breaches and exploits are now commonplace, and those are just the tip of the iceberg. Attacks are often under-reported or undiscovered, with hints of state-sponsored attacks and advanced persistent threats rearing their ugly head now and then.<\/p>\n<p>Despite all this, cybersecurity tends to the least prioritized among other issues, only coming to prominence at the news of a recent attack. How do we drive cyber strategy to be a core part of businesses, and ensure we are ready to deal with an inevitable attack?<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br>\n<iframe src=\"https:\/\/attendee.gotowebinar.com\/register\/1180304140188436237\" width=\"100%\" height=\"1100px\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Quan Heng Lim, Designation: Chief of Staff to the CTO, Horangi Topic: A challenge to business leaders- Rethinking your defense strategy to counter ever evolving threats Date of Webinar: 12th April, 2019 Time and Location: 5:30pm SGT\/3:00pm IST\/ 10:30am GMT Watch Now &nbsp; Speaker Bio: Q works with the technology teams and other business&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24329","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat<\/title>\n<meta name=\"description\" content=\"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat explained by the Quan Heng Lim through EC-Council University.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Challenge to Business Leaders: Rethinking Your Defense Strategy to Counter Ever-evolving Threats\" \/>\n<meta property=\"og:description\" content=\"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat explained by the Quan Heng Lim through EC-Council University.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-29T06:56:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:30:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Quan-Heng-Lim.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"A Challenge to Business Leaders: Rethinking Your Defense Strategy to Counter Ever-evolving Threats\",\"datePublished\":\"2018-11-29T06:56:18+00:00\",\"dateModified\":\"2023-06-05T07:30:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/\"},\"wordCount\":257,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Quan-Heng-Lim.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/\",\"name\":\"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Quan-Heng-Lim.jpg\",\"datePublished\":\"2018-11-29T06:56:18+00:00\",\"dateModified\":\"2023-06-05T07:30:16+00:00\",\"description\":\"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat explained by the Quan Heng Lim through EC-Council University.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Quan-Heng-Lim.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Quan-Heng-Lim.jpg\",\"width\":465,\"height\":310,\"caption\":\"A CHALLENGE TO BUSINESS LEADERS: RETHINKING YOUR DEFENSE STRATEGY TO COUNTER EVER-EVOLVING THREATS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"A Challenge to Business Leaders: Rethinking Your Defense Strategy to Counter Ever-evolving Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat","description":"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat explained by the Quan Heng Lim through EC-Council University.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/","og_locale":"en_US","og_type":"article","og_title":"A Challenge to Business Leaders: Rethinking Your Defense Strategy to Counter Ever-evolving Threats","og_description":"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat explained by the Quan Heng Lim through EC-Council University.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2018-11-29T06:56:18+00:00","article_modified_time":"2023-06-05T07:30:16+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Quan-Heng-Lim.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"A Challenge to Business Leaders: Rethinking Your Defense Strategy to Counter Ever-evolving Threats","datePublished":"2018-11-29T06:56:18+00:00","dateModified":"2023-06-05T07:30:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/"},"wordCount":257,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Quan-Heng-Lim.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/","name":"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Quan-Heng-Lim.jpg","datePublished":"2018-11-29T06:56:18+00:00","dateModified":"2023-06-05T07:30:16+00:00","description":"Evolving Defense Strategy as Business Leaders to Combat Dynamic Threat explained by the Quan Heng Lim through EC-Council University.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Quan-Heng-Lim.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Quan-Heng-Lim.jpg","width":465,"height":310,"caption":"A CHALLENGE TO BUSINESS LEADERS: RETHINKING YOUR DEFENSE STRATEGY TO COUNTER EVER-EVOLVING THREATS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-challenge-to-business-leaders-rethinking-your-defense-strategy-to-counter-ever-evolving-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"A Challenge to Business Leaders: Rethinking Your Defense Strategy to Counter Ever-evolving Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24329"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24329\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79550"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}