{"id":24939,"date":"2019-04-21T09:09:10","date_gmt":"2019-04-21T09:09:10","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=24939"},"modified":"2023-06-05T07:25:29","modified_gmt":"2023-06-05T07:25:29","slug":"women-wanted-benefits-of-cybersecurity-careers","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/","title":{"rendered":"Women Wanted: Benefits of Cybersecurity Careers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24939\" class=\"elementor elementor-24939\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2120ebd5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2120ebd5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-218eca1f\" data-id=\"218eca1f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46b16e72 elementor-widget elementor-widget-text-editor\" data-id=\"46b16e72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Charlene-K.-Coon.jpg.webp\" alt=\"Charlene K. Coon\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Charlene K. Coon,<br>\n<strong>Designation:<\/strong> Lead Information Security Systems Engineer at L3harris Technologies<br>\n<strong>Topic:<\/strong> Women Wanted: Benefits of Cybersecurity Careers<br>\n<strong>Date of Webinar:<\/strong> 5<sup>th<\/sup> Mar, 2020<br>\n<strong>Time and Location:<\/strong> 8.30 pm MST\/ 9:00 am IST\/ 11.30 am SGT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><\/p>\n<h4><br><\/h4><h4>Speaker Bio:<\/h4>\n<p><strong>Charlene K. Coon<\/strong> is a cybersecurity leader with over 20 years of experience in cybersecurity, information technology, and Sr. executive management. She is currently pursuing her Doctoral of Computer Science \u2013 Cybersecurity and Information Assurance. She supports an international cyber portfolio of programs as large as 2B dollars and joined the cyber ranks initially by meeting the challenge to become EC-Council certified as a Certified Ethical Hacker (CEH). Since the EC-Council introduction (a.k.a. addiction) into cybersecurity, Charlene has received a Master of Information Security and Assurance and over 20 industry certifications and certificates. She currently works for the 6th largest U.S. government contractor, L3Harris, whose clients have some of the highest security standards in the world. Charlene also leads the Global Empowerment of Women in Cybersecurity group, an effort to help more women fall in love with cybersecurity, provide a path to offering scholarships, provide a resource for companies to outreach to women in cybersecurity, bring mentors on board, and provide a networking forum for cybersecurity women globally.<\/p>\n<p><strong>Topic Abstract: <\/strong><\/p>\n<p>This webinar will present the key benefits of why more women should opt to build a career in cybersecurity and how they can do so. Cybersecurity roles are varied and in high demand across the world, and (bonus) women are very good at cybersecurity! Yet, they are underrepresented in the industry.<\/p>\n<p>Bricata\u2019s 2019 research reported that:<\/p>\n<ul>\n<li>69% of their teams are understaffed: significantly by 21% and somewhat by 48%<\/li>\n<li>58% have unfilled cybersecurity positions open<\/li>\n<li>32% report hiring takes six months or longer to find candidates \u2013 this was only 26%, in 2018<\/li>\n<li>82% cited employers having to re-evaluate their own pay scales due to employees having to be replaced when competitors offer better financial incentives, as the industry becomes very comparative and understaffed<\/li>\n<\/ul>\n<p>This webinar will focus on the fears and hurdles of entering the cybersecurity, and how you can overcome them! Cybersecurity is a very lucrative career path and is in high demand. The United States, Mondo (2019) reports that the average salary range in common cybersecurity roles is:<\/p>\n<ul>\n<li>CISOs: $175,000 \u2013 $275,000<\/li>\n<li>Information security managers: $120,000 \u2013 $185,000<\/li>\n<li>Application security engineers: $120,000 \u2013 $182,500<\/li>\n<li>Network security engineers: $115,000 \u2013 $172,500<\/li>\n<li>Cybersecurity engineers: $110,000 \u2013 $165,000<\/li>\n<\/ul>\n<p>Come and see what the hype about women transitioning into cybersecurity roles is about!<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/WzPVCfGN6Ck\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Charlene K. Coon, Designation: Lead Information Security Systems Engineer at L3harris Technologies Topic: Women Wanted: Benefits of Cybersecurity Careers Date of Webinar: 5th Mar, 2020 Time and Location: 8.30 pm MST\/ 9:00 am IST\/ 11.30 am SGT Watch Now Speaker Bio: Charlene K. Coon is a cybersecurity leader with over 20 years of experience&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79474,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-24939","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Cybersecurity Needs More Woman and How to Bridge the Gap<\/title>\n<meta name=\"description\" content=\"Why Cybersecurity Needs More Woman and How to Bridge the Gap explained by the Charlene K. Coon, through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Women Wanted: Benefits of Cybersecurity Careers\" \/>\n<meta property=\"og:description\" content=\"Why Cybersecurity Needs More Woman and How to Bridge the Gap explained by the Charlene K. Coon, through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-21T09:09:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:25:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Charlene-K.-Coon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Women Wanted: Benefits of Cybersecurity Careers\",\"datePublished\":\"2019-04-21T09:09:10+00:00\",\"dateModified\":\"2023-06-05T07:25:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/\"},\"wordCount\":424,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Charlene-K.-Coon.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/\",\"name\":\"Why Cybersecurity Needs More Woman and How to Bridge the Gap\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Charlene-K.-Coon.jpg\",\"datePublished\":\"2019-04-21T09:09:10+00:00\",\"dateModified\":\"2023-06-05T07:25:29+00:00\",\"description\":\"Why Cybersecurity Needs More Woman and How to Bridge the Gap explained by the Charlene K. Coon, through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Charlene-K.-Coon.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Charlene-K.-Coon.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-wanted-benefits-of-cybersecurity-careers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Women Wanted: Benefits of Cybersecurity Careers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Cybersecurity Needs More Woman and How to Bridge the Gap","description":"Why Cybersecurity Needs More Woman and How to Bridge the Gap explained by the Charlene K. Coon, through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/","og_locale":"en_US","og_type":"article","og_title":"Women Wanted: Benefits of Cybersecurity Careers","og_description":"Why Cybersecurity Needs More Woman and How to Bridge the Gap explained by the Charlene K. Coon, through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-04-21T09:09:10+00:00","article_modified_time":"2023-06-05T07:25:29+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Charlene-K.-Coon.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Women Wanted: Benefits of Cybersecurity Careers","datePublished":"2019-04-21T09:09:10+00:00","dateModified":"2023-06-05T07:25:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/"},"wordCount":424,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Charlene-K.-Coon.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/","name":"Why Cybersecurity Needs More Woman and How to Bridge the Gap","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Charlene-K.-Coon.jpg","datePublished":"2019-04-21T09:09:10+00:00","dateModified":"2023-06-05T07:25:29+00:00","description":"Why Cybersecurity Needs More Woman and How to Bridge the Gap explained by the Charlene K. Coon, through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Charlene-K.-Coon.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Charlene-K.-Coon.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-wanted-benefits-of-cybersecurity-careers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Women Wanted: Benefits of Cybersecurity Careers"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=24939"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/24939\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79474"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=24939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=24939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=24939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}