{"id":24913,"date":"2019-04-18T13:50:40","date_gmt":"2019-04-18T13:50:40","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24913"},"modified":"2025-11-20T07:20:57","modified_gmt":"2025-11-20T07:20:57","slug":"deep-learning-for-endpoint-security","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/","title":{"rendered":"Deep Learning for Endpoint Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24913\" class=\"elementor elementor-24913\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ae0965b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ae0965b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-58585f7c\" data-id=\"58585f7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22c005a6 elementor-widget elementor-widget-text-editor\" data-id=\"22c005a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ken-Muir.jpg.webp\" alt=\"Ken Muir\" width=\"200\" \/><\/p><p><strong>Name<\/strong> Ken Muir,<br \/><strong>Designation:<\/strong> Chief Security Officer, LCM Security Inc<br \/><strong>Topic:<\/strong> Deep Learning for <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/network-security\/what-is-endpoint-security\/\" target=\"_blank\" rel=\"noopener\">Endpoint Security<\/a><br \/><strong>Date of Webinar:<\/strong> 20<sup>th<\/sup> Feb, 2020<br \/><strong>Time and Location:<\/strong> 10 am EST\/ 8:30 pm IST\/ 3 pm GMT<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><\/p><h4>\u00a0<\/h4><h4>Speaker Bio:<\/h4><p>Ken Muir is an entrepreneurial Information Technology leader with over 25 years of I.T. experience, of which, 20 years have been exclusively in cybersecurity. His business knowledge was developed while originally working in the auto industry, serving businesses and the government with their fleet and financing requirements.<\/p><p>He has hands-on experience building SOC operations, building cybersecurity strategies, consulting, drawing experiences as a security integrator, trainer, consultant, senior threat analyst, red team consultant, security architect, manager of security teams, and many others. These skills have been used in hundreds of organizations across different industries, such as energy, retail, aerospace, US and Canadian Governments, municipalities, and the education sector. Ken has been a principal security consultant in many multi-billion-dollar global enterprises for over 20 years, architecting, implementing, managing, analyzing and consulting on a wide array of security initiatives at both the operations level, as well the executive and board level. Ken has obtained globally recognized security industry certifications as well as a variety of technology and industry-specific certifications. Ken is also globally recognized for his experience.<\/p><p><strong>Topic Abstract: <\/strong><\/p><p>The challenge of protecting the end-user has never been more important than it is now. User awareness training is of vital importance to help defend organizations &#8211; but that is not enough.<\/p><p>Just Google statistics for user awareness training, and you will find that most companies either don\u2019t offer it or the ones that do offer training find that the attendance diminishes over time. And there are still gaps in the success rate for phishing tests.\u00a0 Those are the gaps that ultimately lead to what you read in the news.<\/p><p>Traditional anti-virus is no longer keeping up with the industrialization of malware development. There needs to be a new strategy to match this. The costs to businesses are enormous and often fatal.<\/p><p>What is needed is a technical control that will help organizations protect the end-user and by extension, the organization. This is no different from web filtering technologies that are used to enforce the policy. As an example, policies are often written to let employees know what the organization considers to be inappropriate web browsing as far as content, but employees still break these rules, hence the need for technical enforcement.<\/p><p>Organizations are not patching and have a million excuses as to why they don\u2019t.\u00a0 The traditional signature-based malware defenses are not working anymore and haven\u2019t been for a long time.\u00a0 It would be an accurate assumption to say that all the organizations that are being breached have firewalls and anti-virus, so what is the problem. A significant amount of organization-level of cybersecurity maturity is often very low and is part of the problem, which leaves the endpoint and the user as the last line of defense.<\/p><p>Enter Deep Learning. This technology is not new but it is new in the world of cybersecurity. Malware variants are being created on an industrial scale, so what is needed is something that can protect endpoint computers designed to deal with what is now a substantial issue.<\/p><p>This talk is designed to walk through the current state of our cyber world, introduce Deep Learning, and how it will help in the fight against malware, including ransomware.<\/p><p><strong>Attendee Takeaways:<\/strong><\/p><ol><li>The cost of a data breach<\/li><li>The value of traditional anti-virus<\/li><li>Deep learning in cybersecurity<\/li><li>Driverless vehicles and cybersecurity<\/li><\/ol><p>NOTE: Participating Candidates will receive a Certificate of Attendance<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"register\"><\/a><br \/><iframe src=\"https:\/\/www.youtube.com\/embed\/agqN_JwceKQ\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name Ken Muir,Designation: Chief Security Officer, LCM Security IncTopic: Deep Learning for Endpoint SecurityDate of Webinar: 20th Feb, 2020Time and Location: 10 am EST\/ 8:30 pm IST\/ 3 pm GMT Watch Now \u00a0 Speaker Bio: Ken Muir is an entrepreneurial Information Technology leader with over 25 years of I.T. experience, of which, 20 years have&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79481,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24913","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Deep Learning for Ensure End-to-End Security | Ken Muir<\/title>\n<meta name=\"description\" content=\"Deep Learning for Ensure End-to-End Security explained by the Ken Muir Chief Security Officer, LCM Security Inc through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deep Learning for Endpoint Security\" \/>\n<meta property=\"og:description\" content=\"Deep Learning for Ensure End-to-End Security explained by the Ken Muir Chief Security Officer, LCM Security Inc through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-18T13:50:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-20T07:20:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ken-Muir.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Deep Learning for Endpoint Security\",\"datePublished\":\"2019-04-18T13:50:40+00:00\",\"dateModified\":\"2025-11-20T07:20:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/\"},\"wordCount\":621,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ken-Muir.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/\",\"name\":\"Deep Learning for Ensure End-to-End Security | Ken Muir\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ken-Muir.jpg\",\"datePublished\":\"2019-04-18T13:50:40+00:00\",\"dateModified\":\"2025-11-20T07:20:57+00:00\",\"description\":\"Deep Learning for Ensure End-to-End Security explained by the Ken Muir Chief Security Officer, LCM Security Inc through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ken-Muir.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ken-Muir.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/deep-learning-for-endpoint-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Deep Learning for Endpoint Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Deep Learning for Ensure End-to-End Security | Ken Muir","description":"Deep Learning for Ensure End-to-End Security explained by the Ken Muir Chief Security Officer, LCM Security Inc through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/","og_locale":"en_US","og_type":"article","og_title":"Deep Learning for Endpoint Security","og_description":"Deep Learning for Ensure End-to-End Security explained by the Ken Muir Chief Security Officer, LCM Security Inc through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-04-18T13:50:40+00:00","article_modified_time":"2025-11-20T07:20:57+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ken-Muir.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Deep Learning for Endpoint Security","datePublished":"2019-04-18T13:50:40+00:00","dateModified":"2025-11-20T07:20:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/"},"wordCount":621,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ken-Muir.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/","name":"Deep Learning for Ensure End-to-End Security | Ken Muir","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ken-Muir.jpg","datePublished":"2019-04-18T13:50:40+00:00","dateModified":"2025-11-20T07:20:57+00:00","description":"Deep Learning for Ensure End-to-End Security explained by the Ken Muir Chief Security Officer, LCM Security Inc through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ken-Muir.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ken-Muir.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/deep-learning-for-endpoint-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Deep Learning for Endpoint Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24913"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24913\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79481"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}