{"id":24923,"date":"2019-04-17T12:00:19","date_gmt":"2019-04-17T12:00:19","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24923"},"modified":"2023-06-05T07:25:53","modified_gmt":"2023-06-05T07:25:53","slug":"cyber-forensics-in-the-ever-evolving-world-of-electronics","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/","title":{"rendered":"Cyber Forensics in the Ever-evolving World of Electronics"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24923\" class=\"elementor elementor-24923\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10dbc5da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10dbc5da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-371d8fcc\" data-id=\"371d8fcc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c8d015 elementor-widget elementor-widget-text-editor\" data-id=\"52c8d015\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Luis-O.-Noguerol.jpg.webp\" alt=\"Dr. Luis O. Noguerol\" width=\"200\"><\/p>\n<p><strong>Name<\/strong> Dr. Luis O. Noguerol,<br>\n<strong>Designation:<\/strong> President &amp; CEO at Advanced Division of Informatics &amp; Technology, Inc.<br>\n<strong>Topic:<\/strong> Cyber forensics in the ever-evolving world of electronics<br>\n<strong>Date of Webinar:<\/strong> 19<sup>th<\/sup> Feb, 2020<br>\n<strong>Time and Location:<\/strong> 10 am EST\/ 8:30 pm IST\/ 3 pm GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><\/p>\n<h4><br><\/h4><h4>Speaker Bio:<\/h4>\n<p>Dr. Luis O. Noguerol is the Information System Security Officer (ISSO) for the U.S. Department of Commerce, National Oceanic, and Atmospheric Administration (NOAA) Southeast Region Fisheries Science Center, and also, the President &amp; CEO of Advanced Division of Informatics &amp; Technology, Inc. He has over 35 years of experience in Information Security and Information Technology in a variety of areas. He is a Certified EC-Council Instructor, Certified Microsoft Trainer, and Certified Technical Trainer. In 2016, Dr. Noguerol was awarded the \u201cC|CISO of the year\u201d global title by the EC-Council Foundation and InfoSec Institute and recently completed his 79th IT Certification.<\/p>\n<p>Dr. Noguerol has been a featured speaker at Information Technology\/Information Security events throughout North America, Europe, Central America, and South America, as well as in multiple TV\/ radio shows and is involved in several cybersecurity panels. As the ISSO for the U.S. Department of Commerce, Dr. Noguerol oversees the cybersecurity operation for five states in the Southeast Region.<\/p>\n<p><strong>Topic Abstract: <\/strong><\/p>\n<p>With the growing popularity of different types of electronic devices, the necessity to have positive control of the electronic data is not only a legal requirement but also an ethical obligation. The question is: how do you know you are protecting your electronic data? As time passes, judicial systems all around the world are accepting more electronic evidence instead of traditional ways as papers. This is an ongoing process with essential changes from country to Country, State to State, and from Court to Court. Business expectations for availability are rising, and recovery time objectives (RTOs) for more and more applications are nearing zero.<br>\nDigital Forensics deals with the assessment of electronic assets, to grasp, investigate, analyze, and determine what has been happening in your information technology systems; including mobile devices, mainly when you have some suspicions about the occurrence of any abuse, crime, (fraud), or just a simple intrusion in your systems.<br>\nInterpreting electronic data in raw format requires extensive theoretical preparation, (please note that I said theoretical preparation, intentionally), and proven skills, especially in the fields of electronics, physics, mathematics, and information technology.<br>\nCybersecurity is under much pressure, but even nowadays, the topic of digital forensics is still unattended in most of the organizations. The questions to ask yourself are:<\/p>\n<ul>\n<li>What can I do to discover whatever happened in my system with exactitude, to prove that someone has been misbehaving or how and who put my company&#8217;s information at risk?<\/li>\n<li>How to collect specific pieces of evidence, (never-ever general artifacts), to prove any &#8220;wrongdoings&#8221; or attacks.<\/li>\n<li>Phishing or hunting, or both?<\/li>\n<\/ul>\n<p>In this live webinar, we are going to talk about possible responses to those topics.<\/p>\n<p>NOTE: Participating Candidates will receive a Certificate of Attendance<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/9rHhrZYpPO4\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name Dr. Luis O. Noguerol, Designation: President &amp; CEO at Advanced Division of Informatics &amp; Technology, Inc. Topic: Cyber forensics in the ever-evolving world of electronics Date of Webinar: 19th Feb, 2020 Time and Location: 10 am EST\/ 8:30 pm IST\/ 3 pm GMT Watch Now Speaker Bio: Dr. Luis O. Noguerol is the Information&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79483,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24923","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Forensics in the Ever-Evolving World of Electronics | ECCU<\/title>\n<meta name=\"description\" content=\"Cyber Forensics in the Ever-Evolving World of Electronics explained by the Dr. Luis O. Noguerol through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Forensics in the Ever-evolving World of Electronics\" \/>\n<meta property=\"og:description\" content=\"Cyber Forensics in the Ever-Evolving World of Electronics explained by the Dr. Luis O. Noguerol through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-17T12:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:25:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Luis-O.-Noguerol.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cyber Forensics in the Ever-evolving World of Electronics\",\"datePublished\":\"2019-04-17T12:00:19+00:00\",\"dateModified\":\"2023-06-05T07:25:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/\"},\"wordCount\":522,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Luis-O.-Noguerol.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/\",\"name\":\"Cyber Forensics in the Ever-Evolving World of Electronics | ECCU\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Luis-O.-Noguerol.jpg\",\"datePublished\":\"2019-04-17T12:00:19+00:00\",\"dateModified\":\"2023-06-05T07:25:53+00:00\",\"description\":\"Cyber Forensics in the Ever-Evolving World of Electronics explained by the Dr. Luis O. Noguerol through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Luis-O.-Noguerol.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Dr.-Luis-O.-Noguerol.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-forensics-in-the-ever-evolving-world-of-electronics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Forensics in the Ever-evolving World of Electronics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Forensics in the Ever-Evolving World of Electronics | ECCU","description":"Cyber Forensics in the Ever-Evolving World of Electronics explained by the Dr. Luis O. Noguerol through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Forensics in the Ever-evolving World of Electronics","og_description":"Cyber Forensics in the Ever-Evolving World of Electronics explained by the Dr. Luis O. Noguerol through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-04-17T12:00:19+00:00","article_modified_time":"2023-06-05T07:25:53+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Luis-O.-Noguerol.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cyber Forensics in the Ever-evolving World of Electronics","datePublished":"2019-04-17T12:00:19+00:00","dateModified":"2023-06-05T07:25:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/"},"wordCount":522,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Luis-O.-Noguerol.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/","name":"Cyber Forensics in the Ever-Evolving World of Electronics | ECCU","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Luis-O.-Noguerol.jpg","datePublished":"2019-04-17T12:00:19+00:00","dateModified":"2023-06-05T07:25:53+00:00","description":"Cyber Forensics in the Ever-Evolving World of Electronics explained by the Dr. Luis O. Noguerol through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Luis-O.-Noguerol.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dr.-Luis-O.-Noguerol.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-forensics-in-the-ever-evolving-world-of-electronics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cyber Forensics in the Ever-evolving World of Electronics"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24923"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24923\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79483"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}