{"id":49842,"date":"2020-08-10T02:40:52","date_gmt":"2020-08-10T02:40:52","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=49842"},"modified":"2023-06-05T07:19:44","modified_gmt":"2023-06-05T07:19:44","slug":"stopping-stupid-how-to-stop-user-error","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/","title":{"rendered":"Stopping Stupid: How to Stop User Error"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"49842\" class=\"elementor elementor-49842\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3cf6e92a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3cf6e92a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-50cbecd\" data-id=\"50cbecd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-536728a6 elementor-widget elementor-widget-text-editor\" data-id=\"536728a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ira-Headshot-Grey.png.webp\" alt=\"Ira Winkler\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Ira Winkler,<br><strong>Designation:<\/strong> President of Secure Mentem<br><strong>Topic:<\/strong> Stopping Stupid: How to Stop User Error<br><strong>Date of Webinar:<\/strong> 29<sup>th<\/sup> Sep, 2020<br><strong>Time and Location:<\/strong> 10:30 am EDT\/ 08:00 pm IST\/ 03:30 pm BST<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>Speaker Bio:<\/strong><br>Ira Winkler, CISSP, is President of Secure Mentem and author of Advanced Persistent Security and the forthcoming \u2018You Can Stop Stupid.\u2019 He is considered one of the world\u2019s most influential security professionals and has been named a \u2018Modern Day James Bond\u2019 by the media. He did this by performing espionage simulations, where he physically and technically broke into some of the largest companies in the world and investigated crimes against them, telling them how to protect their information and computer infrastructure cost-effectively. He continues to perform these espionage simulations, as well as assisting organizations in developing a cost-effective security program.<\/p>\n<p>Ira also won the Hall of Fame award from the Information Systems Security Association, as well as several other prestigious industry awards. Most recently, CSO Magazine named Ira a CSO Compass Award winner as The Awareness Crusader.<\/p>\n<p><strong>Topic Abstract: <\/strong><br>Security professionals adopted the expression or sentiment, &#8220;You can&#8217;t stop stupid.&#8221; The reason is that they believe no matter what they do, a user will still be able to bypass their best security efforts. In practice, they seem to be correct. This is a gross failure of their security programs, as users are an embedded part of an organization. The problem is that even though &#8220;stupid&#8221; is expected, security professionals haven&#8217;t changed their methods to mitigate it. As a result, we have single events, creating hundreds of millions of dollars in losses, with billions in loss overall.<\/p>\n<p>The failure to &#8220;stop stupid&#8221; means users are the primary attack vector for the most damaging attacks. Attackers keep advancing their techniques, as organizations continue to rely on awareness for thwarting sophisticated criminals, nation-states, and sociopaths. Independently, security teams buy products. Policy teams write policies that get put on the shelf. The scale of the resulting losses is unacceptable in any other field responsible for preventing financial loss. More important, awareness does nothing to prevent malicious actions, which accounts for 28% of losses.<\/p>\n<p>Cybersecurity programs need to stop relying on independent tactics and adopt strategies from military, counterterrorism, accounting, and safety sciences. Awareness is just a tactic that, while a form of risk reduction, will fail and must be part of an overall strategy that accounts for imperfect tactics. This presentation discusses applying strategies such as &#8220;Left of Boom&#8221; and &#8220;Right of Boom&#8221; from counterterrorism, creating an environment that removes the possibility of mistakes from safety science, and accounting processes that proactively detect and mitigate fraud to address the human problem. Stupid can be stopped through the application of a strategy, instead of random tactics.<\/p>\n<p><b><span data-contrast=\"auto\">Key Takeaways:<\/span><\/b><\/p>\n<ul>\n<li>User error is only a symptom of the problem within your security program.<\/li>\n<li>Awareness is a valuable tool, but it is only a part of the solution<\/li>\n<li>Adopting safety science and counterterrorism methods to stop the damage caused by user actions.<\/li>\n<\/ul>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br><iframe src=\"https:\/\/www.youtube.com\/embed\/k9wj4xsYwS8\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Ira Winkler, Designation: President of Secure Mentem Topic: Stopping Stupid: How to Stop User Error Date of Webinar: 29th Sep, 2020 Time and Location: 10:30 am EDT\/ 08:00 pm IST\/ 03:30 pm BST Watch Now Speaker Bio: Ira Winkler, CISSP, is President of Secure Mentem and author of Advanced Persistent Security and the forthcoming&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79363,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-49842","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Proactively Detect and Mitigate User Errors | Ira Winkler<\/title>\n<meta name=\"description\" content=\"Proactively Detect and Mitigate User Errors explained by the Ira Winkler, President of Secure Mentem through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stopping Stupid: How to Stop User Error\" \/>\n<meta property=\"og:description\" content=\"Proactively Detect and Mitigate User Errors explained by the Ira Winkler, President of Secure Mentem through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T02:40:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:19:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Ira-Winkler-21.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Stopping Stupid: How to Stop User Error\",\"datePublished\":\"2020-08-10T02:40:52+00:00\",\"dateModified\":\"2023-06-05T07:19:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/\"},\"wordCount\":528,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ira-Winkler-21.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/\",\"name\":\"Proactively Detect and Mitigate User Errors | Ira Winkler\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ira-Winkler-21.jpg\",\"datePublished\":\"2020-08-10T02:40:52+00:00\",\"dateModified\":\"2023-06-05T07:19:44+00:00\",\"description\":\"Proactively Detect and Mitigate User Errors explained by the Ira Winkler, President of Secure Mentem through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ira-Winkler-21.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Ira-Winkler-21.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/stopping-stupid-how-to-stop-user-error\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Stopping Stupid: How to Stop User Error\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Proactively Detect and Mitigate User Errors | Ira Winkler","description":"Proactively Detect and Mitigate User Errors explained by the Ira Winkler, President of Secure Mentem through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/","og_locale":"en_US","og_type":"article","og_title":"Stopping Stupid: How to Stop User Error","og_description":"Proactively Detect and Mitigate User Errors explained by the Ira Winkler, President of Secure Mentem through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-10T02:40:52+00:00","article_modified_time":"2023-06-05T07:19:44+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Ira-Winkler-21.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Stopping Stupid: How to Stop User Error","datePublished":"2020-08-10T02:40:52+00:00","dateModified":"2023-06-05T07:19:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/"},"wordCount":528,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Ira-Winkler-21.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/","name":"Proactively Detect and Mitigate User Errors | Ira Winkler","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Ira-Winkler-21.jpg","datePublished":"2020-08-10T02:40:52+00:00","dateModified":"2023-06-05T07:19:44+00:00","description":"Proactively Detect and Mitigate User Errors explained by the Ira Winkler, President of Secure Mentem through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Ira-Winkler-21.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Ira-Winkler-21.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/stopping-stupid-how-to-stop-user-error\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Stopping Stupid: How to Stop User Error"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/49842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=49842"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/49842\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79363"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=49842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=49842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=49842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}