{"id":25243,"date":"2019-05-14T06:00:33","date_gmt":"2019-05-14T06:00:33","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=25243"},"modified":"2026-01-27T09:01:45","modified_gmt":"2026-01-27T09:01:45","slug":"the-best-way-to-stop-social-engineering-scams-with-ai","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/","title":{"rendered":"The Best Way to Stop Social Engineering Scams with AI"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25243\" class=\"elementor elementor-25243\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e170629 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e170629\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27a0ed2f\" data-id=\"27a0ed2f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7aa42609 elementor-widget elementor-widget-text-editor\" data-id=\"7aa42609\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Puneet-Mehta.jpg.webp\" alt=\"Puneet Mehta\" width=\"200\" \/><\/p><p><strong>Speaker<\/strong> Puneet Mehta,<br \/><strong>Designation:<\/strong> Chief Technologist &amp; Principal Advisor, Global Advisory Services at SDG Corporation<br \/><strong>Topic:<\/strong> The Best Way to Stop Social Engineering Scams with AI<br \/><strong>Date of Webinar:<\/strong> 15<sup>th<\/sup> May, 2020<br \/><strong>Time and Location:<\/strong> 2:30 pm IST\/ 5 pm SGT\/ 9.00 am GMT<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><br \/><strong><br \/><\/strong><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>Speaker Bio:<\/strong><br \/>Puneet is a Researcher, Author, Speaker, and Cybersecurity Evangelist. He has over 22 years of experience in diverse technical, leadership, advisory, and product development positions focusing around cybersecurity &amp; risk for global Fortune 500 clients. He is a trusted advisor in cyber defense strategy, designing, building, and operating large scale and cutting-edge security platforms in complex and fast-paced environments. He is an expert in establishing and directing security and technology operations, projects, programs, and initiatives. His area of expertise includes cyber defense strategy, red teaming\/penetration testing, threat hunting &amp; intelligence, <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\">cyber incident handling &amp; response<\/a>, digital forensics, cyber risk management, and more.<\/p><p><strong>Topic Abstract: <\/strong><br \/>Social engineering is on the rise, and organizations need to respond to it appropriately. Humans are usually the weakest factor in maintaining social security. That\u2019s why smart hackers target humans, not machines. As we know, social engineering attacks are rapidly increasing in today\u2019s networks and are weakening the cybersecurity chain due to the advancement of digital communication technology. While organizations try to prevent those exploitations, many attackers are still able to overcome security countermeasures using artificial intelligence (AI) techniques.<\/p><p>Social engineering attacks don\u2019t necessarily involve technology; it could be as simple as engaging in a conversation and exploiting human nature. The attacker aims to fool individuals or enterprises into accomplishing actions that result in them acquiring confidential data. Attacks like these are mainly targeted toward the banking sector and other high-value entities.<\/p><p>This webinar will discuss social engineering attacks and how to combat them using AI. We will dive into the shadowy world of weaponized AI to find out how we can prevent social engineering attacks. This webinar also aims to demonstrate the applicability and effectiveness of these AI techniques in the present scenario. The consensus is that soon without AI, organizations will not be able to protect their digital assets.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"watch\"><\/a><\/p><p><iframe src=\"https:\/\/www.youtube.com\/embed\/D02GuiVjh24\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Puneet Mehta,Designation: Chief Technologist &amp; Principal Advisor, Global Advisory Services at SDG CorporationTopic: The Best Way to Stop Social Engineering Scams with AIDate of Webinar: 15th May, 2020Time and Location: 2:30 pm IST\/ 5 pm SGT\/ 9.00 am GMT Watch Now \u00a0 Speaker Bio:Puneet is a Researcher, Author, Speaker, and Cybersecurity Evangelist. He has&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79434,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-25243","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Combat Social Engineering Attacks Using AI | Puneet Mehta<\/title>\n<meta name=\"description\" content=\"Combat Social Engineering Attacks Using AI explained by the Puneet Mehta, Chief Technologist &amp; Principal Advisor, Global Advisory Services at SDG Corporation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Best Way to Stop Social Engineering Scams with AI\" \/>\n<meta property=\"og:description\" content=\"Combat Social Engineering Attacks Using AI explained by the Puneet Mehta, Chief Technologist &amp; Principal Advisor, Global Advisory Services at SDG Corporation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-14T06:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T09:01:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Puneet-Mehta-May-2020.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"The Best Way to Stop Social Engineering Scams with AI\",\"datePublished\":\"2019-05-14T06:00:33+00:00\",\"dateModified\":\"2026-01-27T09:01:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/\"},\"wordCount\":382,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Puneet-Mehta-May-2020.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/\",\"name\":\"Combat Social Engineering Attacks Using AI | Puneet Mehta\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Puneet-Mehta-May-2020.jpg\",\"datePublished\":\"2019-05-14T06:00:33+00:00\",\"dateModified\":\"2026-01-27T09:01:45+00:00\",\"description\":\"Combat Social Engineering Attacks Using AI explained by the Puneet Mehta, Chief Technologist & Principal Advisor, Global Advisory Services at SDG Corporation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Puneet-Mehta-May-2020.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Puneet-Mehta-May-2020.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-best-way-to-stop-social-engineering-scams-with-ai\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Best Way to Stop Social Engineering Scams with AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Combat Social Engineering Attacks Using AI | Puneet Mehta","description":"Combat Social Engineering Attacks Using AI explained by the Puneet Mehta, Chief Technologist & Principal Advisor, Global Advisory Services at SDG Corporation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/","og_locale":"en_US","og_type":"article","og_title":"The Best Way to Stop Social Engineering Scams with AI","og_description":"Combat Social Engineering Attacks Using AI explained by the Puneet Mehta, Chief Technologist & Principal Advisor, Global Advisory Services at SDG Corporation.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2019-05-14T06:00:33+00:00","article_modified_time":"2026-01-27T09:01:45+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Puneet-Mehta-May-2020.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"The Best Way to Stop Social Engineering Scams with AI","datePublished":"2019-05-14T06:00:33+00:00","dateModified":"2026-01-27T09:01:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/"},"wordCount":382,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Puneet-Mehta-May-2020.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/","name":"Combat Social Engineering Attacks Using AI | Puneet Mehta","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Puneet-Mehta-May-2020.jpg","datePublished":"2019-05-14T06:00:33+00:00","dateModified":"2026-01-27T09:01:45+00:00","description":"Combat Social Engineering Attacks Using AI explained by the Puneet Mehta, Chief Technologist & Principal Advisor, Global Advisory Services at SDG Corporation.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Puneet-Mehta-May-2020.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2019\/05\/Puneet-Mehta-May-2020.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-best-way-to-stop-social-engineering-scams-with-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"The Best Way to Stop Social Engineering Scams with AI"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=25243"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/25243\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79434"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=25243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=25243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=25243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}