{"id":25035,"date":"2019-04-28T09:00:12","date_gmt":"2019-04-28T09:00:12","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=25035"},"modified":"2023-06-05T07:25:00","modified_gmt":"2023-06-05T07:25:00","slug":"women-in-cybersecurity-from-the-workforce-to-the-boardroom","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/","title":{"rendered":"Women in Cybersecurity: From the Workforce to the Boardroom"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25035\" class=\"elementor elementor-25035\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56e5622e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56e5622e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-209c7ef2\" data-id=\"209c7ef2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5cadae52 elementor-widget elementor-widget-text-editor\" data-id=\"5cadae52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Happy-Amon-scaled-1.jpg\" alt=\"Marzida Mohd Noor\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Marzida Mohd Noor,<br>\n<strong>Designation:<\/strong> Independent Non-Executive Director of Affin Bank Berhad, Heriot-Watt University and an active member of 30% Club Malaysian Chapter<br>\n<strong>Topic:<\/strong> Women in Cybersecurity: From the Workforce to the Boardroom<br>\n<strong>Date of Webinar:<\/strong> 26<sup>th<\/sup> Mar, 2020<br>\n<strong>Time and Location:<\/strong> 5:30 pm SGT\/ 3 pm IST\/ 12:30 pm KSA<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><\/p>\n<h4><br><\/h4><h4>Speaker Bio:<\/h4>\n<p>Marzida has extensive experience in leading IT business change and transformation, IT management and operations, program management, outsourcing, and management consulting. She was the Chief Information Officer of Malaysia Airlines and Head of Global IT Delivery Centre for SAP HR programs and projects at Shell Malaysia. Marzida is currently an Independent Non-Executive Director of Affin Bank Berhad, lending her experience in providing oversight on the company\u2019s IT, digital transformation, and cybersecurity.<\/p>\n<p>Marzida is an active member of the 30% Club Malaysian Chapter, a business campaign to support a sustainable business-led change to improve the gender imbalance on Malaysian corporate boards.<\/p>\n<p><strong>Topic Abstract: <\/strong><\/p>\n<p>The world is facing a shortage of cybersecurity talent, and men outnumber women by about three to one.<\/p>\n<p>With cybersecurity becoming one of the top five business risks, the boards of directors are now charged with providing oversight of a company\u2019s cybersecurity, ensuring appropriate risks mitigation strategies, systems, processes, and controls are in place. This has given rise to a demand for boards of directors with skills and experience in technology and cybersecurity.<\/p>\n<p>Having more women in cybersecurity promotes diversity in perspectives, leadership, and experience and is good for business. We need people with disparate backgrounds since threat actors, hackers, and &#8216;bad guys&#8217; also have a wide variety of backgrounds and experiences.<\/p>\n<p>Although men outnumber women in cybersecurity, there is evidence that higher percentages of women are advancing to leadership and decision-making positions.<\/p>\n<p>Cybersecurity and technology, in general, still has a perception problem where many women don\u2019t see them as viable career paths. Long-standing biases and gender stereotypes are steering women away from science-related fields.<\/p>\n<p>More must be done to develop a sustainable and healthy pipeline of women cybersecurity professionals to reduce the shortage and narrow the gender gap in the workforce.<\/p>\n<p>For all these challenges, we envision a bright future ahead\u2026<\/p>\n<p><em>What can be done to attract, recruit, train, and retain more women cybersecurity professionals? <\/em><\/p>\n<p>Join in the conversation.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/wEwixAYnmOs\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Marzida Mohd Noor, Designation: Independent Non-Executive Director of Affin Bank Berhad, Heriot-Watt University and an active member of 30% Club Malaysian Chapter Topic: Women in Cybersecurity: From the Workforce to the Boardroom Date of Webinar: 26th Mar, 2020 Time and Location: 5:30 pm SGT\/ 3 pm IST\/ 12:30 pm KSA Watch Now Speaker Bio:&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79465,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-25035","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Women in Cybersecurity : From the Workforce to the Boardroom<\/title>\n<meta name=\"description\" content=\"Women in Cybersecurity: From the Workforce to the Boardroom Marzida Mohd Noor, through EC-Council University.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Women in Cybersecurity: From the Workforce to the Boardroom\" \/>\n<meta property=\"og:description\" content=\"Women in Cybersecurity: From the Workforce to the Boardroom Marzida Mohd Noor, through EC-Council University.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-28T09:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:25:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Happy-Amon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Women in Cybersecurity: From the Workforce to the Boardroom\",\"datePublished\":\"2019-04-28T09:00:12+00:00\",\"dateModified\":\"2023-06-05T07:25:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/\"},\"wordCount\":404,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Happy-Amon.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/\",\"name\":\"Women in Cybersecurity : From the Workforce to the Boardroom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Happy-Amon.jpg\",\"datePublished\":\"2019-04-28T09:00:12+00:00\",\"dateModified\":\"2023-06-05T07:25:00+00:00\",\"description\":\"Women in Cybersecurity: From the Workforce to the Boardroom Marzida Mohd Noor, through EC-Council University.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Happy-Amon.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Happy-Amon.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Women in Cybersecurity: From the Workforce to the Boardroom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Women in Cybersecurity : From the Workforce to the Boardroom","description":"Women in Cybersecurity: From the Workforce to the Boardroom Marzida Mohd Noor, through EC-Council University.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/","og_locale":"en_US","og_type":"article","og_title":"Women in Cybersecurity: From the Workforce to the Boardroom","og_description":"Women in Cybersecurity: From the Workforce to the Boardroom Marzida Mohd Noor, through EC-Council University.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-04-28T09:00:12+00:00","article_modified_time":"2023-06-05T07:25:00+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Happy-Amon.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Women in Cybersecurity: From the Workforce to the Boardroom","datePublished":"2019-04-28T09:00:12+00:00","dateModified":"2023-06-05T07:25:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/"},"wordCount":404,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Happy-Amon.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/","name":"Women in Cybersecurity : From the Workforce to the Boardroom","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Happy-Amon.jpg","datePublished":"2019-04-28T09:00:12+00:00","dateModified":"2023-06-05T07:25:00+00:00","description":"Women in Cybersecurity: From the Workforce to the Boardroom Marzida Mohd Noor, through EC-Council University.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Happy-Amon.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Happy-Amon.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-from-the-workforce-to-the-boardroom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Women in Cybersecurity: From the Workforce to the Boardroom"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=25035"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25035\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79465"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=25035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=25035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=25035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}