{"id":24565,"date":"2019-02-25T13:34:46","date_gmt":"2019-02-25T13:34:46","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24565"},"modified":"2023-06-05T07:28:48","modified_gmt":"2023-06-05T07:28:48","slug":"exploiting-and-augmenting-threat-intel-in-soc-operations","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/","title":{"rendered":"Exploiting and Augmenting Threat Intel in SOC Operations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24565\" class=\"elementor elementor-24565\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74bcc3d9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74bcc3d9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-16873d5\" data-id=\"16873d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31f49b1a elementor-widget elementor-widget-text-editor\" data-id=\"31f49b1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Vijay_Jio.jpg.webp\" alt=\"Vijay Verma\" width=\"200\"><\/p>\n<p><strong>Name:<\/strong> Vijay Verma<br>\n<strong>Designation:<\/strong> VP &amp; Head, Cyber Security Operations Center (CSOC)<br>\n<strong>Organization:<\/strong> Reliance Jio<br>\n<strong>Topic:<\/strong> Exploiting and Augmenting Threat Intel in SOC Operations<br>\n<strong>Date of Webinar:<\/strong> 30<sup>th<\/sup> July, 2019<br>\n<strong>Time and Location:<\/strong> 2:30 pm IST\/ 5:00 pm SGT\/ 9:00 am GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><strong>Speaker Bio:<\/strong> He is a dynamic professional leader having more than 24+ years of cross-functional experience in the Indian Army and Corporate Sector in Information Security and Telecom domains.<\/p>\n<p>Presently Vijay is leading and managing Cyber Security Operation Centres (CSOC) for Reliance Jio and Jio Financial Services (Jio Payments Bank and Reliance Payment Solutions Limited). In addition he is steering Digital Forensics and Compromise assessment teams involving incident response, forensics as well as implementing cyber-attack detection controls and cyber drills at Reliance Jio.<\/p>\n<p>In previous assignments, he was instrumental in planning SOC architecture for Indian Army and various Govt organizations in India like NCIIPC, ONGC and NIC. He has been an instructor for B.Tech. (IT) students at Military College of Telecommunication Engineering, Mhow, Indore, teaching Operating Systems, Computer Networking and Java fundamentals.<\/p>\n<p>Professionally Mr. Vijay holds gold medals both in in B.Tech (Computer Science &amp; Engineering) from NIT Hamirpur and M.Tech. (IT) from IIT Roorkee. His academic knowledge is enhanced by having been qualified as a PMP, CISSP, CEH, CHFI and ITIL certifications.<\/p>\n<p><strong>Topic abstract:<\/strong><br>\nMonitoring Controls are the final line of defense in Information Security of any Enterprise. The information security strategy, policies , compliance and preventative controls are put to acid test by security operation center monitoring entire threat landscape of organization and efficacy of controls. In view of volume, variety and velocity of logs thrown at SIEM, the fine tuning of attack detection rules and SOC analyst\u2019s skills play a major role in attack\/breach detection. Incorporating threat intel in SIEM and its effective usage increases breach detection as well as attempts to breach manifolds. In this session, we will learn how to make effective use of threat intel in SOC operations.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/pgeTNCh8S4g\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Vijay Verma Designation: VP &amp; Head, Cyber Security Operations Center (CSOC) Organization: Reliance Jio Topic: Exploiting and Augmenting Threat Intel in SOC Operations Date of Webinar: 30th July, 2019 Time and Location: 2:30 pm IST\/ 5:00 pm SGT\/ 9:00 am GMT Watch Now &nbsp; Speaker Bio: He is a dynamic professional leader having more&hellip;<\/p>\n","protected":false},"author":33,"featured_media":79269,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24565","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Effective Utilization of Threat Intelligence in SOC Operations | ECCU<\/title>\n<meta name=\"description\" content=\"Effective Utilization of Threat Intelligence in SOC Operations explained by the Vijay Verma VP &amp; Head, Cyber Security Operations Center (CSOC).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploiting and Augmenting Threat Intel in SOC Operations\" \/>\n<meta property=\"og:description\" content=\"Effective Utilization of Threat Intelligence in SOC Operations explained by the Vijay Verma VP &amp; Head, Cyber Security Operations Center (CSOC).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-25T13:34:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:28:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Vijay-Verma.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"Exploiting and Augmenting Threat Intel in SOC Operations\",\"datePublished\":\"2019-02-25T13:34:46+00:00\",\"dateModified\":\"2023-06-05T07:28:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/\"},\"wordCount\":357,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Vijay-Verma.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/\",\"name\":\"Effective Utilization of Threat Intelligence in SOC Operations | ECCU\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Vijay-Verma.jpg\",\"datePublished\":\"2019-02-25T13:34:46+00:00\",\"dateModified\":\"2023-06-05T07:28:48+00:00\",\"description\":\"Effective Utilization of Threat Intelligence in SOC Operations explained by the Vijay Verma VP & Head, Cyber Security Operations Center (CSOC).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Vijay-Verma.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Vijay-Verma.jpg\",\"width\":465,\"height\":310,\"caption\":\"Vijay-Verma\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploiting-and-augmenting-threat-intel-in-soc-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Exploiting and Augmenting Threat Intel in SOC Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Effective Utilization of Threat Intelligence in SOC Operations | ECCU","description":"Effective Utilization of Threat Intelligence in SOC Operations explained by the Vijay Verma VP & Head, Cyber Security Operations Center (CSOC).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/","og_locale":"en_US","og_type":"article","og_title":"Exploiting and Augmenting Threat Intel in SOC Operations","og_description":"Effective Utilization of Threat Intelligence in SOC Operations explained by the Vijay Verma VP & Head, Cyber Security Operations Center (CSOC).","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-02-25T13:34:46+00:00","article_modified_time":"2023-06-05T07:28:48+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Vijay-Verma.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"Exploiting and Augmenting Threat Intel in SOC Operations","datePublished":"2019-02-25T13:34:46+00:00","dateModified":"2023-06-05T07:28:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/"},"wordCount":357,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Vijay-Verma.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/","name":"Effective Utilization of Threat Intelligence in SOC Operations | ECCU","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Vijay-Verma.jpg","datePublished":"2019-02-25T13:34:46+00:00","dateModified":"2023-06-05T07:28:48+00:00","description":"Effective Utilization of Threat Intelligence in SOC Operations explained by the Vijay Verma VP & Head, Cyber Security Operations Center (CSOC).","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Vijay-Verma.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Vijay-Verma.jpg","width":465,"height":310,"caption":"Vijay-Verma"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploiting-and-augmenting-threat-intel-in-soc-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Exploiting and Augmenting Threat Intel in SOC Operations"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24565"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24565\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79269"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}