{"id":50125,"date":"2020-08-10T04:30:59","date_gmt":"2020-08-10T04:30:59","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=50125"},"modified":"2024-04-01T10:47:29","modified_gmt":"2024-04-01T10:47:29","slug":"ransomware-vs-healthcare-beat-it-with-resilience","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/","title":{"rendered":"Ransomware Vs. Healthcare: Beat it with Resilience!"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50125\" class=\"elementor elementor-50125\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-529b0d60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"529b0d60\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7bf47e03\" data-id=\"7bf47e03\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76451210 elementor-widget elementor-widget-text-editor\" data-id=\"76451210\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-2265 size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Michael-Doran.jpg\" alt=\"Michael Doran- GSK\" width=\"200\" height=\"250\" \/><\/p><p><strong>Speaker<\/strong> Michael Doran,<br \/><strong>Designation:<\/strong> Cyber Resilience and Due Diligence Director, GSK<br \/><strong>Topic:<\/strong> Ransomware Vs. Healthcare: Beat it with Resilience!<br \/><strong>Date of Webinar:<\/strong> 27<sup>th<\/sup> Oct, 2020<br \/><strong>Time and Location:<\/strong> 10:00 am CST | 08:30 pm IST | 03:00 pm GMT<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>Speaker Bio:<\/strong><br \/>Michael Doran is an information security leader and cyber resiliency expert. He holds multiple security certifications and has consulted for Fortune 500 companies in an incident response capacity as well as helping a wide range of clients within the private and public sector improve cyber resiliency by building, optimizing and maintaining their cybersecurity systems and incident response programs. Michael is an expert in digital forensics, as well as managing complex forensic and data breach investigations. He has led the forensic analysis and incident response efforts to assist large and small corporations targeted by advanced nation-state malware, provided deep analysis of elaborate and advanced malware campaigns targeting the direct deposit segments and point of sale systems of various organizations. While his background is in digital forensics, investigations and incident response, his distinct specialization is definitely developing and improving security incident response programs by performing maturity assessments, developing tactical incident response playbooks, and writing incident response and incident management plans. He also has extensive experience in designing and facilitating complex breach simulations and tabletop exercises at the technical, Board and Executive levels. In private, he enjoys researching and learning new technologies, all things cryptocurrency and spending time with his wife and daughters.<\/p><p><strong>Topic Abstract: <\/strong><br \/>It is the call that every security professional and executive dreads. The organization has just been hit with ransomware and everything has been locked down.<\/p><p>The cyber landscape has witnessed a dramatic shift from small crimes to large-scale ransomware attacks. Read the news and you will find stories of threat groups from around the world inflicting damage on large and small businesses alike, encrypting vital data and costing millions in recovery, lost revenue and reputation. Although the protection of the organization\u2019s crown jewels has always been the focus of cyber security professionals, current attacks can halt business operations entirely and are causing cyber defenders to revamp their current strategies to compensate for the shift.<\/p><p>Given the growing likelihood that a ransomware attack will occur, businesses can\u2019t afford to put all their trust on cyber-security measures to prevent attacks. While the traditional cyber defense mechanisms help in preventing conventional attacks, as the threat landscape continues to expand, businesses will need an all-encompassing strategy to help mitigate those risks. In short, they must become cyber resilient.<\/p><p>This discussion will explore the advancement of ransomware attacks and the impact that their disruptions have within the healthcare industry. Additionally, the importance of cyber resilience, how its prominence over the traditional cyber security approach as shifted strategy development and how organizations should treat cyber resilience as a matter of priority concern in their preparation for a ransomware attack.<\/p><p><b>Key Takeaways:<\/b><\/p><ul><li>Understand the impact of ransomware in the healthcare industry.<\/li><li>Response challenges and areas to avoid before an attack.<\/li><li>Turning response efforts into cyber resilience: practical strategies to ensure operational recovery.<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe src=\"https:\/\/www.youtube.com\/embed\/SqRRKAWGjZQ\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Michael Doran,Designation: Cyber Resilience and Due Diligence Director, GSKTopic: Ransomware Vs. Healthcare: Beat it with Resilience!Date of Webinar: 27th Oct, 2020Time and Location: 10:00 am CST | 08:30 pm IST | 03:00 pm GMT Watch Now \u00a0 \u00a0 Speaker Bio:Michael Doran is an information security leader and cyber resiliency expert. He holds multiple security&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79342,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-50125","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware Vs. Healthcare: Beat it with Resilience | Michael Doran<\/title>\n<meta name=\"description\" content=\"Ransomware Vs. Healthcare: Beat it with Resilience explained by the Michael Doran, Cyber Resilience and Due Diligence Director, GSK.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Vs. Healthcare: Beat it with Resilience!\" \/>\n<meta property=\"og:description\" content=\"Ransomware Vs. Healthcare: Beat it with Resilience explained by the Michael Doran, Cyber Resilience and Due Diligence Director, GSK.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T04:30:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-01T10:47:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Micheal-Doran-02-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"466\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Ransomware Vs. Healthcare: Beat it with Resilience!\",\"datePublished\":\"2020-08-10T04:30:59+00:00\",\"dateModified\":\"2024-04-01T10:47:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/\"},\"wordCount\":533,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Micheal-Doran-02-01.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/\",\"name\":\"Ransomware Vs. Healthcare: Beat it with Resilience | Michael Doran\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Micheal-Doran-02-01.jpg\",\"datePublished\":\"2020-08-10T04:30:59+00:00\",\"dateModified\":\"2024-04-01T10:47:29+00:00\",\"description\":\"Ransomware Vs. Healthcare: Beat it with Resilience explained by the Michael Doran, Cyber Resilience and Due Diligence Director, GSK.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Micheal-Doran-02-01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Micheal-Doran-02-01.jpg\",\"width\":466,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ransomware-vs-healthcare-beat-it-with-resilience\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Ransomware Vs. Healthcare: Beat it with Resilience!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware Vs. Healthcare: Beat it with Resilience | Michael Doran","description":"Ransomware Vs. Healthcare: Beat it with Resilience explained by the Michael Doran, Cyber Resilience and Due Diligence Director, GSK.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Vs. Healthcare: Beat it with Resilience!","og_description":"Ransomware Vs. Healthcare: Beat it with Resilience explained by the Michael Doran, Cyber Resilience and Due Diligence Director, GSK.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-10T04:30:59+00:00","article_modified_time":"2024-04-01T10:47:29+00:00","og_image":[{"width":466,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Micheal-Doran-02-01.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Ransomware Vs. Healthcare: Beat it with Resilience!","datePublished":"2020-08-10T04:30:59+00:00","dateModified":"2024-04-01T10:47:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/"},"wordCount":533,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Micheal-Doran-02-01.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/","name":"Ransomware Vs. Healthcare: Beat it with Resilience | Michael Doran","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Micheal-Doran-02-01.jpg","datePublished":"2020-08-10T04:30:59+00:00","dateModified":"2024-04-01T10:47:29+00:00","description":"Ransomware Vs. Healthcare: Beat it with Resilience explained by the Michael Doran, Cyber Resilience and Due Diligence Director, GSK.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Micheal-Doran-02-01.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Micheal-Doran-02-01.jpg","width":466,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ransomware-vs-healthcare-beat-it-with-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Ransomware Vs. Healthcare: Beat it with Resilience!"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=50125"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50125\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79342"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=50125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=50125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=50125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}