{"id":24762,"date":"2019-04-07T01:15:08","date_gmt":"2019-04-07T01:15:08","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24762"},"modified":"2023-06-05T07:27:32","modified_gmt":"2023-06-05T07:27:32","slug":"data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/","title":{"rendered":"Data Breaches are Inevitable. Are you prepared for it? How a Zero Trust Security Posture Can Help."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24762\" class=\"elementor elementor-24762\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-524f4ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"524f4ad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6792aea1\" data-id=\"6792aea1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-342e5334 elementor-widget elementor-widget-text-editor\" data-id=\"342e5334\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Tina-Gravel.jpg.webp\" alt=\"Tina Gravel\" width=\"200\"><\/p>\n<p><strong>Name:<\/strong> Tina Gravel<br><strong>Designation:<\/strong> : Senior Vice President,<br><strong>Organization:<\/strong> Cyxtera Technologies Inc.<br><strong>Topic:<\/strong> Data Breaches are inevitable, are you prepared for it? How a Zero Trust Security Posture can help.<br><strong>Date of Webinar:<\/strong> 30<sup>th<\/sup> Oct, 2019<br><strong>Time and Location:<\/strong> 10am CDT\/ 8;30pm IST\/ 3pm GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><br><strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong>Media Partner:<\/strong><br><img decoding=\"async\" class=\"alignleft size-full wp-image-24792\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/cisomag-web-logo-01.png.webp\" alt=\"\" width=\"80\"><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>Speaker Bio:<\/strong> An award-winning executive, board member, public speaker and media\/analyst source with 26+ years of IT outsourcing, cloud, security and SaaS industry experience, Tina Gravel is sought after for her ability to take complex cyber security topics and make them accessible to those that are not cybersecurity experts.<\/p>\n<p>As SVP of Global Channels and Alliances for Cyxtera, Tina is one of Cyber Security Ventures\u2019 \u201cWomen to Follow in Cybersecurity on Twittter\u201d and Tina earned the WoM2M award for achievement in the field of IoT from Connected World Magazine in 2018. &nbsp;Tina serves on numerous boards, including: Illinois Technology Association, Channel Partners, Cloud Girls, Alliance of Women in the Channel, and is the Founder and Board Chairperson for the Women of Cyxtera (a mentorship program that helps women advance in skill and position, while fostering inclusion of everyone in the workplace).<\/p>\n<p><strong>Topic Abstract:<\/strong> In today\u2019s digital world, IT is distributed, hybrid, and on-demand, broadening the scope of organizations\u2019 attack surfaces. The workforce, like today\u2019s data, is mobile, and requests to access sensitive networks can come from anywhere.&nbsp;<a href=\"https:\/\/ww2.cyxtera.com\/l\/436732\/2019-04-15\/mgdhr7\">Complexity is rampant<\/a>, putting security teams under immense pressure to protect data wherever it is: on premise, in the cloud, or elsewhere. Threats are pervasive and constantly evolving \u2013 defenses need to evolve as well.<\/p>\n<p>Security strategies must involve the Zero Trust, something many analysts believe is the only way to implement people, processes and technology in our world of the software defined perimeter.<\/p>\n<p><strong>In this webinar, the participants will learn <\/strong><\/p>\n<ol>\n<li>The present real world solutions<\/li>\n<li>How to bring the idea of zero trust to your own organizations?<\/li>\n<\/ol>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br><iframe src=\"https:\/\/www.youtube.com\/embed\/ZpxzMm0KgVU\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Tina GravelDesignation: : Senior Vice President,Organization: Cyxtera Technologies Inc.Topic: Data Breaches are inevitable, are you prepared for it? How a Zero Trust Security Posture can help.Date of Webinar: 30th Oct, 2019Time and Location: 10am CDT\/ 8;30pm IST\/ 3pm GMT Watch Now Media Partner: Speaker Bio: An award-winning executive, board member, public speaker and media\/analyst&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79510,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24762","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zero Trust Security Posture to Combat Data Breaches | Tina Gravel<\/title>\n<meta name=\"description\" content=\"Zero Trust Security Posture to Combat Data Breaches explained by the Tina Gravel through EC-Council University.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Breaches are Inevitable. Are you prepared for it? How a Zero Trust Security Posture Can Help.\" \/>\n<meta property=\"og:description\" content=\"Zero Trust Security Posture to Combat Data Breaches explained by the Tina Gravel through EC-Council University.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-07T01:15:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:27:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Tina-Gravel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Data Breaches are Inevitable. Are you prepared for it? How a Zero Trust Security Posture Can Help.\",\"datePublished\":\"2019-04-07T01:15:08+00:00\",\"dateModified\":\"2023-06-05T07:27:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/\"},\"wordCount\":353,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Tina-Gravel.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/\",\"name\":\"Zero Trust Security Posture to Combat Data Breaches | Tina Gravel\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Tina-Gravel.jpg\",\"datePublished\":\"2019-04-07T01:15:08+00:00\",\"dateModified\":\"2023-06-05T07:27:32+00:00\",\"description\":\"Zero Trust Security Posture to Combat Data Breaches explained by the Tina Gravel through EC-Council University.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Tina-Gravel.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Tina-Gravel.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Data Breaches are Inevitable. Are you prepared for it? How a Zero Trust Security Posture Can Help.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust Security Posture to Combat Data Breaches | Tina Gravel","description":"Zero Trust Security Posture to Combat Data Breaches explained by the Tina Gravel through EC-Council University.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/","og_locale":"en_US","og_type":"article","og_title":"Data Breaches are Inevitable. Are you prepared for it? How a Zero Trust Security Posture Can Help.","og_description":"Zero Trust Security Posture to Combat Data Breaches explained by the Tina Gravel through EC-Council University.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-04-07T01:15:08+00:00","article_modified_time":"2023-06-05T07:27:32+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Tina-Gravel.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Data Breaches are Inevitable. Are you prepared for it? How a Zero Trust Security Posture Can Help.","datePublished":"2019-04-07T01:15:08+00:00","dateModified":"2023-06-05T07:27:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/"},"wordCount":353,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Tina-Gravel.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/","name":"Zero Trust Security Posture to Combat Data Breaches | Tina Gravel","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Tina-Gravel.jpg","datePublished":"2019-04-07T01:15:08+00:00","dateModified":"2023-06-05T07:27:32+00:00","description":"Zero Trust Security Posture to Combat Data Breaches explained by the Tina Gravel through EC-Council University.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Tina-Gravel.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Tina-Gravel.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/data-breaches-are-inevitable-are-you-prepared-for-it-how-a-zero-trust-security-posture-can-help\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Data Breaches are Inevitable. Are you prepared for it? How a Zero Trust Security Posture Can Help."}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24762"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79510"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}