{"id":25170,"date":"2019-05-10T08:53:52","date_gmt":"2019-05-10T08:53:52","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=25170"},"modified":"2023-06-05T07:23:48","modified_gmt":"2023-06-05T07:23:48","slug":"how-thorough-is-your-bcp-to-handle-work-from-home","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/","title":{"rendered":"Business Continuity in the new WFH Culture"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25170\" class=\"elementor elementor-25170\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27aceeec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27aceeec\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e33caee\" data-id=\"6e33caee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e440fd9 elementor-widget elementor-widget-text-editor\" data-id=\"7e440fd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Arif-Hameed-1.jpg\" alt=\"Arif Hameed\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Arif Hameed,<br>\n<strong>Designation:<\/strong> Senior Director, Client Security, Equifax Canada<br>\n<strong>Topic:<\/strong> Business Continuity in the new WFH Culture<br>\n<strong>Date of Webinar:<\/strong> 29<sup>th<\/sup> Apr, 2020<br>\n<strong>Time and Location:<\/strong> 11:30 am EDT\/ 09:00 pm IST\/ 04:30 pm BST<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><br>\n<strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong><br>\nArif Hameed is Senior Director at Equifax, where he leads a team that handles client cybersecurity assurance activities, including questionnaires, audits, remediation support, security schedules, RFPs, etc. Before his role at Equifax, he worked at two of the largest banks in Canada in Security Advisory, IT Risk, Third-Party Cyber Risk, and IT Audit. He actively participates in industry organizations, including EC-Council, Cloud Security Alliance, SecureWorld, ISACA, and sits on the Program Advisory Committee of education institutions.<\/p>\n<p><strong>Topic Abstract: <\/strong><\/p>\n<div>\n<p><span lang=\"EN-US\">Disasters and unexpected disruptions can impact a business negatively. Generally, these incidents don&#8217;t hinder long-<\/span><span lang=\"EN-US\">t<\/span><span lang=\"EN-US\">erm<\/span><span lang=\"EN-US\">&nbsp;business operations, but when they do, can your business continuity plan (BCP) handle it?&nbsp;&nbsp;<\/span><\/p>\n<\/div>\n<div>\n<div>\n<p><span lang=\"EN-US\">During a pandemic like COVID-19, businesses are adopting and&nbsp;<\/span><span lang=\"EN-US\">managing<\/span><span lang=\"EN-US\">&nbsp;the consequences of &#8220;work from home&#8221; culture. Today&#8217;s technologies indeed&nbsp;<\/span><span lang=\"EN-US\">ma<\/span><span lang=\"EN-US\">k<\/span><span lang=\"EN-US\">e<\/span><span lang=\"EN-US\">&nbsp;it possible for organizations to enable remote working, but&nbsp;<\/span><span lang=\"EN-US\">they<\/span><span lang=\"EN-US\">&nbsp;also gave birth to<\/span><span lang=\"EN-US\">&nbsp;a&nbsp;<\/span><span lang=\"EN-US\">myriad of security concerns.&nbsp;<\/span><span lang=\"EN-US\">That\u2019s why<\/span><span lang=\"EN-US\">&nbsp;businesses need a robust set of controls to ensure business resilience. They require solid planning, clear policies, and excellent communication. With this presentation, learn some of the potential deficiencies of a business continuity plan and ways to address them while&nbsp;<\/span><span lang=\"EN-US\">managing<\/span><span lang=\"EN-US\">&nbsp;<\/span><span lang=\"EN-US\">the security and productivity of&nbsp;<\/span><span lang=\"EN-US\">your<\/span><span lang=\"EN-US\">&nbsp;<\/span><span lang=\"EN-US\">remote workforce<\/span><span lang=\"EN-US\">.&nbsp;&nbsp;&nbsp;<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"EN-US\">Takeaways:&nbsp;&nbsp;<\/span><\/p>\n<\/div>\n<ol>\n<li><span lang=\"EN-US\">Major challenges while handling&nbsp;<\/span><span lang=\"EN-US\">a&nbsp;<\/span><span lang=\"EN-US\">remote working situation using regular BCP<\/span><span lang=\"EN-US\">.<\/span><\/li>\n<li><span lang=\"EN-US\">How to build a secure environment for employees working from home to ensure confidentiality and availability<\/span><span lang=\"EN-US\">.<\/span><\/li>\n<\/ol>\n<\/div>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/8wtfjC-tXqk\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Arif Hameed, Designation: Senior Director, Client Security, Equifax Canada Topic: Business Continuity in the new WFH Culture Date of Webinar: 29th Apr, 2020 Time and Location: 11:30 am EDT\/ 09:00 pm IST\/ 04:30 pm BST Watch Now Speaker Bio: Arif Hameed is Senior Director at Equifax, where he leads a team that handles client&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79442,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-25170","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Business Continuity in the New WFH Culture | Arif Hameed<\/title>\n<meta name=\"description\" content=\"How to build a secure environment for employees working from home to ensure confidentiality and availability.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Continuity in the new WFH Culture\" \/>\n<meta property=\"og:description\" content=\"How to build a secure environment for employees working from home to ensure confidentiality and availability.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-10T08:53:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:23:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Arif-Hameed.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Business Continuity in the new WFH Culture\",\"datePublished\":\"2019-05-10T08:53:52+00:00\",\"dateModified\":\"2023-06-05T07:23:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/\"},\"wordCount\":317,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Arif-Hameed.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/\",\"name\":\"Business Continuity in the New WFH Culture | Arif Hameed\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Arif-Hameed.jpg\",\"datePublished\":\"2019-05-10T08:53:52+00:00\",\"dateModified\":\"2023-06-05T07:23:48+00:00\",\"description\":\"How to build a secure environment for employees working from home to ensure confidentiality and availability.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Arif-Hameed.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Arif-Hameed.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-thorough-is-your-bcp-to-handle-work-from-home\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Business Continuity in the new WFH Culture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Business Continuity in the New WFH Culture | Arif Hameed","description":"How to build a secure environment for employees working from home to ensure confidentiality and availability.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/","og_locale":"en_US","og_type":"article","og_title":"Business Continuity in the new WFH Culture","og_description":"How to build a secure environment for employees working from home to ensure confidentiality and availability.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-05-10T08:53:52+00:00","article_modified_time":"2023-06-05T07:23:48+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Arif-Hameed.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Business Continuity in the new WFH Culture","datePublished":"2019-05-10T08:53:52+00:00","dateModified":"2023-06-05T07:23:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/"},"wordCount":317,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Arif-Hameed.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/","name":"Business Continuity in the New WFH Culture | Arif Hameed","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Arif-Hameed.jpg","datePublished":"2019-05-10T08:53:52+00:00","dateModified":"2023-06-05T07:23:48+00:00","description":"How to build a secure environment for employees working from home to ensure confidentiality and availability.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Arif-Hameed.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Arif-Hameed.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-thorough-is-your-bcp-to-handle-work-from-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Business Continuity in the new WFH Culture"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=25170"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25170\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79442"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=25170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=25170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=25170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}