{"id":25148,"date":"2019-05-06T12:51:08","date_gmt":"2019-05-06T12:51:08","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=25148"},"modified":"2023-06-05T07:24:18","modified_gmt":"2023-06-05T07:24:18","slug":"coronavirus-a-reality-check-for-your-business-continuity-plan","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/","title":{"rendered":"Coronavirus \u2013 A reality check for Your BCP"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25148\" class=\"elementor elementor-25148\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-39ca1099 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39ca1099\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d819a56\" data-id=\"2d819a56\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c341d83 elementor-widget elementor-widget-text-editor\" data-id=\"6c341d83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Varun-Srivastava-1.jpg\" alt=\"Varun Srivastava\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Varun Srivastava,<br>\n<strong>Designation:<\/strong> Head of Cyber Threat Intelligence &#8211; Injazat\/Mubadala<br>\n<strong>Topic:<\/strong> Coronavirus \u2013 A reality check for Your BCP<br>\n<strong>Date of Webinar:<\/strong> 15<sup>th<\/sup> Apr, 2020<br>\n<strong>Time and Location:<\/strong> 05:00 pm Dubai Time \/ 06:30 pm IST \/ 02:00 pm BST<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><br>\n<strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong><br>\nVarun Srivastava is a Cyber Security Professional with 13+ years of experience in the industry. He currently heads the Cyber Threat Intelligence function for Injazat\/Mubadala based in Abu Dhabi, UAE. Varun started his career as a co-founder of a Cyber Security firm that handled extensive projects across public and private sector organizations, covering the US, Europe, and Southeast Asia regions. Varun has later worked in senior positions of Fortune 500 companies, including Philips, Adobe, and PwC. His extended skills include the building of large-scale cyber security operations center, operationalizing cyber security solutions, implementing strategic cyber security frameworks, and executing global audit programs. Varun has authored multiple books and research papers on cyber security and has been a recipient of the PwC experience award for his exemplary performance. Varun serves as an advisory board member for several startups\/SMEs to contribute towards organic growth in evolving cybersecurity offerings, such as blockchain technology and e-commerce. He regularly speaks at global cyber security conferences, including CISO Leadership Summit, among others.<\/p>\n<p><strong>Topic Abstract: <\/strong><br>\nPandemics aren&#8217;t the usual business disruption, but sometimes these events impact a significant portion of the ecosystem. A pandemic, such as a coronavirus (COVID-19) outbreak, challenges existing business continuity management (BCM) initiatives of all the organizations. The COVID-19 coronavirus has left many organizations unsure whether their risk mitigation is sufficient. Most organizations have done some pandemic planning, but still, there are many unanswered questions about whether they have done everything they can to manage the risks. COVID-19 is causing a humanitarian crisis of global proportions, with hundreds of thousands of lives disrupted. Sadly, we&#8217;re not nearing the end of the crisis. COVID-19 is also a test case for good and bad leadership. What should a leader be focused on amid a global disruption?<\/p>\n<p>As the global economy progresses through the late-stage business cycle impacted by this pandemic, organizations must prepare to navigate through moments of economic flux, which could be economical, geopolitical, environmental, social, or competitive. During this time of uncertainty, most executives choose to stay &#8220;on course.&#8221; However, failing to act on opportunities and risks presented by the flux would be a grave mistake. The most successful organizations take risks in &#8220;the flux,&#8221; those places in the enterprise journey where others slow down.<\/p>\n<p>Is your business continuity management ready for the challenge? With this webinar, you would learn how you can utilize BCM in times of crisis, understand the leadership perspective dealing with a pandemic, and be better prepared for any similar future events. Key agenda of the webinar includes:<\/p>\n<ol>\n<li>Pandemic preparedness framework<\/li>\n<li>Leadership perspective for Pandemic Management<\/li>\n<li>Situation monitoring to determine a change in severity<\/li>\n<li>Finance and treasury implications<\/li>\n<li>Pandemic communications program<\/li>\n<li>Impact on business operations<\/li>\n<li>IT actions and considerations<\/li>\n<li>After-action review<\/li>\n<\/ol>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/TBBEFwE5Zhg\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Varun Srivastava, Designation: Head of Cyber Threat Intelligence &#8211; Injazat\/Mubadala Topic: Coronavirus \u2013 A reality check for Your BCP Date of Webinar: 15th Apr, 2020 Time and Location: 05:00 pm Dubai Time \/ 06:30 pm IST \/ 02:00 pm BST Watch Now Speaker Bio: Varun Srivastava is a Cyber Security Professional with 13+ years&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79450,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-25148","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Utilizing Business Continuity Management in Crisis | ECCU<\/title>\n<meta name=\"description\" content=\"Utilizing Business Continuity Management in Crisis explained by the Varun Srivastava through EC-Council University.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coronavirus \u2013 A reality check for Your BCP\" \/>\n<meta property=\"og:description\" content=\"Utilizing Business Continuity Management in Crisis explained by the Varun Srivastava through EC-Council University.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-06T12:51:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:24:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Varun-Srivastava.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Coronavirus \u2013 A reality check for Your BCP\",\"datePublished\":\"2019-05-06T12:51:08+00:00\",\"dateModified\":\"2023-06-05T07:24:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/\"},\"wordCount\":521,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Varun-Srivastava.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/\",\"name\":\"Utilizing Business Continuity Management in Crisis | ECCU\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Varun-Srivastava.jpg\",\"datePublished\":\"2019-05-06T12:51:08+00:00\",\"dateModified\":\"2023-06-05T07:24:18+00:00\",\"description\":\"Utilizing Business Continuity Management in Crisis explained by the Varun Srivastava through EC-Council University.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Varun-Srivastava.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Varun-Srivastava.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/coronavirus-a-reality-check-for-your-business-continuity-plan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Coronavirus \u2013 A reality check for Your BCP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Utilizing Business Continuity Management in Crisis | ECCU","description":"Utilizing Business Continuity Management in Crisis explained by the Varun Srivastava through EC-Council University.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/","og_locale":"en_US","og_type":"article","og_title":"Coronavirus \u2013 A reality check for Your BCP","og_description":"Utilizing Business Continuity Management in Crisis explained by the Varun Srivastava through EC-Council University.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-05-06T12:51:08+00:00","article_modified_time":"2023-06-05T07:24:18+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Varun-Srivastava.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Coronavirus \u2013 A reality check for Your BCP","datePublished":"2019-05-06T12:51:08+00:00","dateModified":"2023-06-05T07:24:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/"},"wordCount":521,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Varun-Srivastava.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/","name":"Utilizing Business Continuity Management in Crisis | ECCU","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Varun-Srivastava.jpg","datePublished":"2019-05-06T12:51:08+00:00","dateModified":"2023-06-05T07:24:18+00:00","description":"Utilizing Business Continuity Management in Crisis explained by the Varun Srivastava through EC-Council University.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Varun-Srivastava.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Varun-Srivastava.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/coronavirus-a-reality-check-for-your-business-continuity-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Coronavirus \u2013 A reality check for Your BCP"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=25148"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25148\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79450"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=25148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=25148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=25148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}