{"id":24739,"date":"2019-04-06T09:47:13","date_gmt":"2019-04-06T09:47:13","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24739"},"modified":"2023-06-05T07:27:36","modified_gmt":"2023-06-05T07:27:36","slug":"improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/","title":{"rendered":"Improving Cybersecurity Interoperability Leads to Reduced Costs and Better Outcomes. How Do We Achieve It?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24739\" class=\"elementor elementor-24739\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73f0e326 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"73f0e326\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-517fa817\" data-id=\"517fa817\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c59df75 elementor-widget elementor-widget-text-editor\" data-id=\"6c59df75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Jason-Keirstead.jpg.webp\" alt=\"Jason Keirstead\" width=\"200\"><\/p>\n<p><strong>Name:<\/strong> Jason Keirstead<br>\n<strong>Designation:<\/strong> : Chief Architect,<br>\n<strong>Organization:<\/strong> IBM Security Threat Management<br>\n<strong>Topic:<\/strong> Improving cybersecurity interoperability leads to reduced costs and better outcomes &#8211; but how do we achieve it?<br>\n<strong>Date of Webinar:<\/strong> 24<sup>th<\/sup> Oct, 2019<br>\n<strong>Time and Location:<\/strong> 10:30am EST\/ 8pm IST\/ 3:30pm GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><br>\n<strong>Media Partner:<\/strong><br>\n<a href=\"https:\/\/www.cisomag.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"alignleft size-full wp-image-24792\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/cisomag-web-logo-01.png.webp\" alt=\"\" width=\"80\"><\/a><br><br><br><br>\n<strong>Speaker Bio: <\/strong>Jason Keirstead is IBM&#8217;s Chief Architect for Threat Management. His role includes the complete threat life cycle, from Threat Insight, through Prevention, Detection, Response and Recovery. Jason works with architects across IBM&#8217;s Cloud, Hardware and Research business units &#8211; and those in external organizations &#8211; to evolve IBM&#8217;s Threat Management offerings into a unified, open, standards-based solution. Jason sits on the OASIS Board of Directors and also serves as a co-chair of the OASIS Cyber Threat Intelligence Interoperability Subcommittee, where he enjoys helping to define the future of evolving cybersecurity standards.<\/p>\n<p><strong>Topic Abstract: <\/strong>The cybersecurity industry has an ever-growing number of vendors and products, each of which generate an explosion of data &amp; insights. While these tools routinely have integrations amongst one another, there is a lack of industry-wide vendor cooperation on protocols and standards surrounding sharing cybersecurity insight and findings data. As a result, these integrations are often one-off, vendor-specific, expensive to maintain and often lacking the ability to share all available data related to the findings, insights, or incidents. Users are therefore often unable to break down their data silos and extract peak value from their investments, and vendors find themselves torn on where to invest their finite resources when it comes to integrating with partners. The result is incomplete options regarding which technologies can interoperate within their environment. In this talk we will discuss areas in which the industry is actively developing and promoting sets of common code, tooling, patterns, and practices for sharing data among cybersecurity tools, and how this will improve outcomes for all.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/Hoouu5czRFc\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Jason Keirstead Designation: : Chief Architect, Organization: IBM Security Threat Management Topic: Improving cybersecurity interoperability leads to reduced costs and better outcomes &#8211; but how do we achieve it? Date of Webinar: 24th Oct, 2019 Time and Location: 10:30am EST\/ 8pm IST\/ 3:30pm GMT Watch Now Media Partner: Speaker Bio: Jason Keirstead is IBM&#8217;s&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79512,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24739","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Improving Cybersecurity Interportability for Better Outcomes<\/title>\n<meta name=\"description\" content=\"Improving Cybersecurity Interportability for Better Outcomes explained by the Jason Keirstead, Chief Architect.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Improving Cybersecurity Interoperability Leads to Reduced Costs and Better Outcomes. How Do We Achieve It?\" \/>\n<meta property=\"og:description\" content=\"Improving Cybersecurity Interportability for Better Outcomes explained by the Jason Keirstead, Chief Architect.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-06T09:47:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:27:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Jason-Keirstead.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Improving Cybersecurity Interoperability Leads to Reduced Costs and Better Outcomes. How Do We Achieve It?\",\"datePublished\":\"2019-04-06T09:47:13+00:00\",\"dateModified\":\"2023-06-05T07:27:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/\"},\"wordCount\":347,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Jason-Keirstead.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/\",\"name\":\"Improving Cybersecurity Interportability for Better Outcomes\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Jason-Keirstead.jpg\",\"datePublished\":\"2019-04-06T09:47:13+00:00\",\"dateModified\":\"2023-06-05T07:27:36+00:00\",\"description\":\"Improving Cybersecurity Interportability for Better Outcomes explained by the Jason Keirstead, Chief Architect.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Jason-Keirstead.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Jason-Keirstead.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Improving Cybersecurity Interoperability Leads to Reduced Costs and Better Outcomes. How Do We Achieve It?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Improving Cybersecurity Interportability for Better Outcomes","description":"Improving Cybersecurity Interportability for Better Outcomes explained by the Jason Keirstead, Chief Architect.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/","og_locale":"en_US","og_type":"article","og_title":"Improving Cybersecurity Interoperability Leads to Reduced Costs and Better Outcomes. How Do We Achieve It?","og_description":"Improving Cybersecurity Interportability for Better Outcomes explained by the Jason Keirstead, Chief Architect.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-04-06T09:47:13+00:00","article_modified_time":"2023-06-05T07:27:36+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Jason-Keirstead.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Improving Cybersecurity Interoperability Leads to Reduced Costs and Better Outcomes. How Do We Achieve It?","datePublished":"2019-04-06T09:47:13+00:00","dateModified":"2023-06-05T07:27:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/"},"wordCount":347,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Jason-Keirstead.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/","name":"Improving Cybersecurity Interportability for Better Outcomes","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Jason-Keirstead.jpg","datePublished":"2019-04-06T09:47:13+00:00","dateModified":"2023-06-05T07:27:36+00:00","description":"Improving Cybersecurity Interportability for Better Outcomes explained by the Jason Keirstead, Chief Architect.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Jason-Keirstead.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Jason-Keirstead.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/improving-cybersecurity-interoperability-leads-to-reduced-costs-and-better-outcomes-but-how-do-we-achieve-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Improving Cybersecurity Interoperability Leads to Reduced Costs and Better Outcomes. How Do We Achieve It?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24739"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24739\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79512"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}