{"id":25167,"date":"2019-05-08T13:00:40","date_gmt":"2019-05-08T13:00:40","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=25167"},"modified":"2023-06-05T07:23:56","modified_gmt":"2023-06-05T07:23:56","slug":"the-key-difference-between-disaster-recovery-and-business-continuity","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/","title":{"rendered":"Do you know the key difference between DR and BC?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25167\" class=\"elementor elementor-25167\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-462a51c3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"462a51c3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-46ec4fde\" data-id=\"46ec4fde\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-282600 elementor-widget elementor-widget-text-editor\" data-id=\"282600\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Leonardo-Ovidio-de-Melo-Ferreira-1.jpg\" alt=\"Leonardo Ov\u00eddio de Melo Ferreira\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Leonardo Ov\u00eddio de Melo Ferreira ,<br>\n<strong>Designation:<\/strong> CISO at Brazilian Institution<br>\n<strong>Topic:<\/strong> Do you know the key difference between DR and BC?<br>\n<strong>Date of Webinar:<\/strong> 21<sup>st<\/sup> Apr, 2020<br>\n<strong>Time and Location:<\/strong> 11:30 am Brazil time \/ 08:00 pm IST\/ 03:30 pm BST<\/p>\n<a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a>\n\n<p><strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong><br>\nLeonardo comes with more than 16 years of experience in Information Security and IT Governance for both national and international companies, belonging to insurance, telecommunication, energy, and reinsurance sectors. With graduation in Information Technology and MBA in Information Security and Audit System, Leonardo Ov\u00eddio has been a part of various strategic projects involving information security, cyber risks, data privacy, IT governance, and business continuity plan. He has been through an extension course from Harvard and Brigham Young Universities, where he shared national and international speeches on security posture and cyber risks. Currently, he is the CISO at a Brazilian Reinsurance Company.<\/p>\n<p><strong>Topic Abstract: <\/strong><br>\nThe companies need to be prepared for unexpected disasters or crises that might occur anytime and anywhere to be able to continue the business. With this in mind, a disaster recovery concept after the crisis should be a part of the business continuity strategy.<\/p>\n<p>Many might misunderstand the concept of a Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP). The key lies in knowing which plan should be implemented when. The purpose of the business continuity plan is to provide ways to keep business operations flowing with as little impact as possible. On the other hand, the Disaster Recovery Plan focuses on how the companies return to normal operations without getting affected and with the proper controls in place.<\/p>\n<p>With COVID-19, many companies put the BCP to work, making many decisions that involved business, technology, process, and people. Most companies now provide remote access to their employees to keep the company going. However, some BCPs consider 25% or more people working focused on critical areas. The business continuity strategy must consider an approach to measure the cyber maturity in both business continuity and disaster recovery plans to keep the same level of maturity and mitigate the probability of cyber incidents in these moments.<\/p>\n<p>Business continuity covers the entire organization with a robust communication approach, mainly with board members, while Disaster Recovery focuses on the IT infrastructure and processes.<\/p>\n<p>One of the challenges is to keep the BCP plan updated following the dynamism of the business and new technologies. An important concept to consider with new business applications is a BCP\/DRP by design model.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/XLkOGMWkjrg\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Leonardo Ov\u00eddio de Melo Ferreira , Designation: CISO at Brazilian Institution Topic: Do you know the key difference between DR and BC? Date of Webinar: 21st Apr, 2020 Time and Location: 11:30 am Brazil time \/ 08:00 pm IST\/ 03:30 pm BST Watch Now Speaker Bio: Leonardo comes with more than 16 years of&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79446,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-25167","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Understanding Business Continuity and Disaster Recovery Plans<\/title>\n<meta name=\"description\" content=\"Understanding Business Continuity and Disaster Recovery Plans explained by the Leonardo Ov\u00eddio de Melo Ferreira.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do you know the key difference between DR and BC?\" \/>\n<meta property=\"og:description\" content=\"Understanding Business Continuity and Disaster Recovery Plans explained by the Leonardo Ov\u00eddio de Melo Ferreira.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-08T13:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:23:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Leonardo-Ovidio-de-Melo-Ferreira.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Do you know the key difference between DR and BC?\",\"datePublished\":\"2019-05-08T13:00:40+00:00\",\"dateModified\":\"2023-06-05T07:23:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/\"},\"wordCount\":440,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Leonardo-Ovidio-de-Melo-Ferreira.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/\",\"name\":\"Understanding Business Continuity and Disaster Recovery Plans\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Leonardo-Ovidio-de-Melo-Ferreira.jpg\",\"datePublished\":\"2019-05-08T13:00:40+00:00\",\"dateModified\":\"2023-06-05T07:23:56+00:00\",\"description\":\"Understanding Business Continuity and Disaster Recovery Plans explained by the Leonardo Ov\u00eddio de Melo Ferreira.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Leonardo-Ovidio-de-Melo-Ferreira.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Leonardo-Ovidio-de-Melo-Ferreira.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-key-difference-between-disaster-recovery-and-business-continuity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Do you know the key difference between DR and BC?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Business Continuity and Disaster Recovery Plans","description":"Understanding Business Continuity and Disaster Recovery Plans explained by the Leonardo Ov\u00eddio de Melo Ferreira.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/","og_locale":"en_US","og_type":"article","og_title":"Do you know the key difference between DR and BC?","og_description":"Understanding Business Continuity and Disaster Recovery Plans explained by the Leonardo Ov\u00eddio de Melo Ferreira.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-05-08T13:00:40+00:00","article_modified_time":"2023-06-05T07:23:56+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Leonardo-Ovidio-de-Melo-Ferreira.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Do you know the key difference between DR and BC?","datePublished":"2019-05-08T13:00:40+00:00","dateModified":"2023-06-05T07:23:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/"},"wordCount":440,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Leonardo-Ovidio-de-Melo-Ferreira.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/","name":"Understanding Business Continuity and Disaster Recovery Plans","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Leonardo-Ovidio-de-Melo-Ferreira.jpg","datePublished":"2019-05-08T13:00:40+00:00","dateModified":"2023-06-05T07:23:56+00:00","description":"Understanding Business Continuity and Disaster Recovery Plans explained by the Leonardo Ov\u00eddio de Melo Ferreira.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Leonardo-Ovidio-de-Melo-Ferreira.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Leonardo-Ovidio-de-Melo-Ferreira.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-key-difference-between-disaster-recovery-and-business-continuity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Do you know the key difference between DR and BC?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=25167"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79446"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=25167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=25167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=25167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}