{"id":24826,"date":"2019-04-12T09:10:44","date_gmt":"2019-04-12T09:10:44","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24826"},"modified":"2026-01-27T09:03:30","modified_gmt":"2026-01-27T09:03:30","slug":"making-threat-intelligence-actionable","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/","title":{"rendered":"Making Threat Intelligence Actionable"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24826\" class=\"elementor elementor-24826\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-81f7211 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"81f7211\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-37b2ed2d\" data-id=\"37b2ed2d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6349421e elementor-widget elementor-widget-text-editor\" data-id=\"6349421e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Puneet-Mehta.jpg-2.webp\" alt=\"Puneet Mehta\" width=\"200\" \/><\/p><p><strong>Name:<\/strong> Puneet Mehta,<br \/><strong>Designation:<\/strong> Chief Technologist &amp; Principal Advisor,<br \/><strong>Organization:<\/strong> Global Advisory Services @ SDG Corporation,<br \/><strong>Topic:<\/strong> Making Threat Intelligence Actionable<br \/><strong>Date of Webinar:<\/strong> 10<sup>th<\/sup> Dec, 2019<br \/><strong>Time and Location:<\/strong> 2:30 pm IST\/ 5:00 pm SGT\/ 1:00 pm GST<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><br \/><strong><br \/><\/strong><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>Media Partner:<\/strong><br \/><a href=\"https:\/\/www.cisomag.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"alignleft size-full wp-image-24792\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/cisomag-web-logo-01.png.webp\" alt=\"\" width=\"80\" \/><\/a><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>Speaker Bio:<\/strong> Puneet is a Researcher, Author, Speaker and Cybersecurity Evangelist. He has over 22 years of experience in diverse technical, leadership, advisory and product development positions focusing around Cyber Security &amp; Risk for Global Fortune 500 clients. He is a trusted advisor in Cyber Defense Strategy, designing, building and operating large scale and cutting-edge security platforms in complex and fast paced environments. He is an expert in establishing and directing security and technology operations, projects, programs, and initiatives. His area of expertise include: Cyber Defense strategy, Red Teaming \/ Penetration testing, Threat hunting &amp; Intelligence, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\">Cyber Incident handling &amp; Response<\/a>, Digital Forensics, Cyber Risk management and any more.<\/p><p><strong>Topic Abstract:<\/strong> Today, cyber threats are increasingly becoming more sophisticated and innovative, often bypassing multiple detection controls by even the most mature &amp; strong cyber security defense programs. In fact, almost 75% of cyber-attacks are going undetected and its always too late to defend and respond.<\/p><p>Digital transformation has effectively extended the enterprise, and this has led to increase in the threat landscape which is increasingly confusing. So, enterprises need to understand the big picture of this threat lifecycle including range of actors, emerging attack surface and attack philosophies. Organizations need to get proactive with <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/\">cyber threat intelligence<\/a> and build a strong defense posture.<\/p><p>This session will cover the following key areas and provide a critical learning path for participants on how to make threat intelligence, actionable.<\/p><ul><li>Introduction to Threat Intelligence<\/li><li>Reality Check \u2013 today\u2019s threat intelligence program and are they effective?<\/li><li>What\u2019s not working with today\u2019s threat intelligence?<\/li><li>Strategy to build a cutting-edge actionable threat intelligence<\/li><li>Feedback and Q &amp; A<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"register\"><\/a><br \/><iframe src=\"https:\/\/www.youtube.com\/embed\/GZowDxVRrAU\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Puneet Mehta,Designation: Chief Technologist &amp; Principal Advisor,Organization: Global Advisory Services @ SDG Corporation,Topic: Making Threat Intelligence ActionableDate of Webinar: 10th Dec, 2019Time and Location: 2:30 pm IST\/ 5:00 pm SGT\/ 1:00 pm GST Watch Now \u00a0 Media Partner: \u00a0 \u00a0 Speaker Bio: Puneet is a Researcher, Author, Speaker and Cybersecurity Evangelist. He has over&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79500,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24826","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Crafting Actionable Threat Intelligence Strategies | Puneet Mehta<\/title>\n<meta name=\"description\" content=\"Crafting Actionable Threat Intelligence Strategies explained by the Puneet Mehta, Chief Technologist &amp; Principal Advisor.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making Threat Intelligence Actionable\" \/>\n<meta property=\"og:description\" content=\"Crafting Actionable Threat Intelligence Strategies explained by the Puneet Mehta, Chief Technologist &amp; Principal Advisor.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-12T09:10:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T09:03:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Puneet-Mehta-2019.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Making Threat Intelligence Actionable\",\"datePublished\":\"2019-04-12T09:10:44+00:00\",\"dateModified\":\"2026-01-27T09:03:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/\"},\"wordCount\":332,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Puneet-Mehta-2019.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/\",\"name\":\"Crafting Actionable Threat Intelligence Strategies | Puneet Mehta\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Puneet-Mehta-2019.jpg\",\"datePublished\":\"2019-04-12T09:10:44+00:00\",\"dateModified\":\"2026-01-27T09:03:30+00:00\",\"description\":\"Crafting Actionable Threat Intelligence Strategies explained by the Puneet Mehta, Chief Technologist & Principal Advisor.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Puneet-Mehta-2019.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Puneet-Mehta-2019.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/making-threat-intelligence-actionable\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Making Threat Intelligence Actionable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Crafting Actionable Threat Intelligence Strategies | Puneet Mehta","description":"Crafting Actionable Threat Intelligence Strategies explained by the Puneet Mehta, Chief Technologist & Principal Advisor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/","og_locale":"en_US","og_type":"article","og_title":"Making Threat Intelligence Actionable","og_description":"Crafting Actionable Threat Intelligence Strategies explained by the Puneet Mehta, Chief Technologist & Principal Advisor.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-04-12T09:10:44+00:00","article_modified_time":"2026-01-27T09:03:30+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Puneet-Mehta-2019.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Making Threat Intelligence Actionable","datePublished":"2019-04-12T09:10:44+00:00","dateModified":"2026-01-27T09:03:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/"},"wordCount":332,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Puneet-Mehta-2019.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/","name":"Crafting Actionable Threat Intelligence Strategies | Puneet Mehta","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Puneet-Mehta-2019.jpg","datePublished":"2019-04-12T09:10:44+00:00","dateModified":"2026-01-27T09:03:30+00:00","description":"Crafting Actionable Threat Intelligence Strategies explained by the Puneet Mehta, Chief Technologist & Principal Advisor.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Puneet-Mehta-2019.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Puneet-Mehta-2019.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/making-threat-intelligence-actionable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Making Threat Intelligence Actionable"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24826"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79500"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}