{"id":4325,"date":"2018-07-25T06:53:34","date_gmt":"2018-07-25T06:53:34","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=4325"},"modified":"2023-06-05T07:00:52","modified_gmt":"2023-06-05T07:00:52","slug":"developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/","title":{"rendered":"Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4325\" class=\"elementor elementor-4325\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-312b9440 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"312b9440\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7207f9db\" data-id=\"7207f9db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23feba54 elementor-widget elementor-widget-text-editor\" data-id=\"23feba54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/07\/Majed-pp.jpeg\" alt=\"Majed Alshodari\" width=\"200\"><\/p>\n<p><strong>Name:<\/strong> Majed Alshodari, Head of Information Security Department<br><strong>Topic:<\/strong> Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business<br><strong>Date of Webinar:<\/strong> 14th August 2018<br><strong>Time and Location:<\/strong> 12 PM AST(Arabian Standard Time)\/ 9:00 AM GMT\/ 2:30 PM IST<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><br><strong><br><\/strong><\/p><p><strong>Speaker Bio:<\/strong> Eng. Majed Mohammad Alshodari is finalist for the 2018 CISO of the Year award by EC-Council, also, Certified Chief Information Security Officer &#8220;CCISO&#8221; &amp; Licensed IT Director. He has over 18 years of Information Technology professional experience and specially in Information Security at both the senior management and technical hands-on in different industries such as contracting, banking, retail, Oil &amp; Gas, facility management, engineering, refinery, real estate, hospitality, construction, automotive, and investment. In addition to the business digital transformation along with rich knowledge and expertise in establishing and operating the Information Technology and Information Security businesses. His main aim to provide enterprises and mega projects with the information technology and insight, enabling businesses, integrate functions, guidance and leadership that will foster a successful digitized secured business decision-making platform using the right set of IT secure and credible portfolios starting by the Information Technology\/Information Security strategy development all the way down to the technical deployment stage with high-satisfied businesses.<\/p>\n<p><strong>Topic Abstract:<\/strong> Developing Corporate Information Security Strategy for the Digital Era requires great combinations of business alignments and analysis, cooperation, and technical expertise.<\/p>\n<p><span id=\":ae.co\" class=\"tL8wMe EMoHub\" dir=\"ltr\">Nowadays businesses are becoming very challenging and in a position that they have ever been before due to the business lines restructuring (turn around \u2013 Holding\/subsidiaries) and hunting efficiency and optimization, especially for traditional businesses that are still running under the assumption of cyber security understanding rather than Information security agenda emplace.<\/span><br>In this session, we will learn how to develop Corporate Information Security Strategy which are aligned with your business using six effective Information Security programs.<\/p>\n<p>To know more about the strategy and how to kick-off the programs, please do register and attend the webinar.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br><span style=\"color: #993300;\">Certificate of Attendance from EC-Council University will be awarded to all the participants on attending the entire session.<\/span><\/p>\n<hr>\n<h2 id=\"attend\">Watch The Webinar<\/h2>\n<p><iframe title=\"Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business\" src=\"https:\/\/www.youtube.com\/embed\/CgVWPgcDeQA\" width=\"825\" height=\"464\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Majed Alshodari, Head of Information Security Department Topic: Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business Date of Webinar: 14th August 2018 Time and Location: 12 PM AST(Arabian Standard Time)\/ 9:00 AM GMT\/ 2:30 PM IST Watch Now Speaker Bio: Eng. Majed Mohammad Alshodari is finalist for the 2018 CISO&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-4325","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Align the Corporate Information Security Strategy with Your Business<\/title>\n<meta name=\"description\" content=\"Align the Corporate Information Security Strategy with Your Business explained by the Majed Alshodari, Head of Information Security Department.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business\" \/>\n<meta property=\"og:description\" content=\"Align the Corporate Information Security Strategy with Your Business explained by the Majed Alshodari, Head of Information Security Department.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-25T06:53:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:00:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/07\/Majed-Alshodari.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business\",\"datePublished\":\"2018-07-25T06:53:34+00:00\",\"dateModified\":\"2023-06-05T07:00:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/\"},\"wordCount\":372,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Majed-Alshodari.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/\",\"name\":\"Align the Corporate Information Security Strategy with Your Business\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Majed-Alshodari.jpg\",\"datePublished\":\"2018-07-25T06:53:34+00:00\",\"dateModified\":\"2023-06-05T07:00:52+00:00\",\"description\":\"Align the Corporate Information Security Strategy with Your Business explained by the Majed Alshodari, Head of Information Security Department.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Majed-Alshodari.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Majed-Alshodari.jpg\",\"width\":465,\"height\":310,\"caption\":\"Majed-Alshodari\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Align the Corporate Information Security Strategy with Your Business","description":"Align the Corporate Information Security Strategy with Your Business explained by the Majed Alshodari, Head of Information Security Department.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/","og_locale":"en_US","og_type":"article","og_title":"Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business","og_description":"Align the Corporate Information Security Strategy with Your Business explained by the Majed Alshodari, Head of Information Security Department.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2018-07-25T06:53:34+00:00","article_modified_time":"2023-06-05T07:00:52+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/07\/Majed-Alshodari.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business","datePublished":"2018-07-25T06:53:34+00:00","dateModified":"2023-06-05T07:00:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/"},"wordCount":372,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/07\/Majed-Alshodari.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/","name":"Align the Corporate Information Security Strategy with Your Business","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/07\/Majed-Alshodari.jpg","datePublished":"2018-07-25T06:53:34+00:00","dateModified":"2023-06-05T07:00:52+00:00","description":"Align the Corporate Information Security Strategy with Your Business explained by the Majed Alshodari, Head of Information Security Department.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/07\/Majed-Alshodari.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/07\/Majed-Alshodari.jpg","width":465,"height":310,"caption":"Majed-Alshodari"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/developing-a-corporate-information-security-strategy-and-roadmap-that-aligned-with-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/4325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=4325"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/4325\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79241"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=4325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=4325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=4325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}