{"id":50195,"date":"2020-08-11T09:20:07","date_gmt":"2020-08-11T09:20:07","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=50195"},"modified":"2024-08-30T16:37:23","modified_gmt":"2024-08-30T16:37:23","slug":"humans-and-ai-in-cybersecurity-a-career-guidance","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/","title":{"rendered":"Humans and AI in Cybersecurity: A Career Guidance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50195\" class=\"elementor elementor-50195\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-247b0487 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"247b0487\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1d68b183\" data-id=\"1d68b183\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-354329de elementor-widget elementor-widget-text-editor\" data-id=\"354329de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Umang-Handa.jpg\" alt=\"Umang Handa\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Umang Handa,<br><strong>Designation:<\/strong> Director of Cybersecurity at a Big 4 Consulting Firm<br><strong>Topic:<\/strong> Humans and&nbsp;<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/exploring-ai-and-cybersecurity\/\" target=\"_blank\">AI in Cybersecurity<\/a>: A Career Guidance<br><strong>Date of Webinar:<\/strong> 29<sup>th<\/sup> Oct, 2020<br><strong>Time and Location:<\/strong> 8:00 am EST\/ 5:30 pm IST\/ 12:00 pm BST<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><br><strong><br><\/strong><\/p>\n<p><strong>Speaker Bio:<\/strong><br>Umang Handa is a Director in PwC Cybersecurity consulting with over a decade of experience in designing, architecting, implementing and running Next generation Cyber Security analytics and operations centers (NG-SOC). He has global experience of serving clients in Australia, Europe, North America and Africa.<br>He has developed a number of innovative methods in Artificial intelligence, machine learning and analytics to better help detect cyber incidents in an advanced fashion, as well as optimize SOC.<br>He is well versed with advanced security operations concepts such as cybersecurity data lake design, build and implementation, machine learning models, cybersecurity automation, cyber threat hunting and cyber threat intelligence.<br>He also holds master&#8217;s degree in Cyber Security.<\/p>\n<p><strong>Topic Abstract: <\/strong><br>Even though AI technology is transforming, few of the aspects in cybersecurity, humans still play a major role, in fact, they are the most crucial part. Even without AI, cybersecurity is still not very transparent to average users as well as tech savvy users. Adding AI brings in many new technologies which remain unexplained to many.<\/p>\n<p>Most often, cybersecurity fights are between people where one side is launching attacks and those attacks are being safeguarded by the defenders at their computers in another place.<br>In this webinar, we will explain why humans cannot be replaced in AI for Cybersecurity.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Why is human involvement important in AI for Cybersecurity?<\/li>\n<li>Job demand: AI for Cybersecurity<\/li>\n<li>How a pathway should be made for a career in AI for Cybersecurity<\/li>\n<li>Steps to build a Career in AI for Cybersecurity<\/li>\n<li>Speaker\u2019s Journey in AI for Cybersecurity- A real Life Case Study<\/li>\n<\/ul>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br><iframe src=\"https:\/\/www.youtube.com\/embed\/Gj67Ni6CuqI\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Umang Handa,Designation: Director of Cybersecurity at a Big 4 Consulting FirmTopic: Humans and&nbsp;AI in Cybersecurity: A Career GuidanceDate of Webinar: 29th Oct, 2020Time and Location: 8:00 am EST\/ 5:30 pm IST\/ 12:00 pm BST Watch Now Speaker Bio:Umang Handa is a Director in PwC Cybersecurity consulting with over a decade of experience in designing,&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79336,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-50195","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Building a Career in AI for Cybersecurity - A Guide | Umang Handa<\/title>\n<meta name=\"description\" content=\"Building a Career in AI for Cybersecurity - A Guide explained by the Umang Handa Umang Handa, Director of Cybersecurity at a Big 4 Consulting Firm.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Humans and AI in Cybersecurity: A Career Guidance\" \/>\n<meta property=\"og:description\" content=\"Building a Career in AI for Cybersecurity - A Guide explained by the Umang Handa Umang Handa, Director of Cybersecurity at a Big 4 Consulting Firm.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-11T09:20:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-30T16:37:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Umang-Handa-00-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"466\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Humans and AI in Cybersecurity: A Career Guidance\",\"datePublished\":\"2020-08-11T09:20:07+00:00\",\"dateModified\":\"2024-08-30T16:37:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/\"},\"wordCount\":333,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Umang-Handa-00-01.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/\",\"name\":\"Building a Career in AI for Cybersecurity - A Guide | Umang Handa\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Umang-Handa-00-01.jpg\",\"datePublished\":\"2020-08-11T09:20:07+00:00\",\"dateModified\":\"2024-08-30T16:37:23+00:00\",\"description\":\"Building a Career in AI for Cybersecurity - A Guide explained by the Umang Handa Umang Handa, Director of Cybersecurity at a Big 4 Consulting Firm.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Umang-Handa-00-01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Umang-Handa-00-01.jpg\",\"width\":466,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/humans-and-ai-in-cybersecurity-a-career-guidance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Humans and AI in Cybersecurity: A Career Guidance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Building a Career in AI for Cybersecurity - A Guide | Umang Handa","description":"Building a Career in AI for Cybersecurity - A Guide explained by the Umang Handa Umang Handa, Director of Cybersecurity at a Big 4 Consulting Firm.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/","og_locale":"en_US","og_type":"article","og_title":"Humans and AI in Cybersecurity: A Career Guidance","og_description":"Building a Career in AI for Cybersecurity - A Guide explained by the Umang Handa Umang Handa, Director of Cybersecurity at a Big 4 Consulting Firm.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-11T09:20:07+00:00","article_modified_time":"2024-08-30T16:37:23+00:00","og_image":[{"width":466,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Umang-Handa-00-01.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Humans and AI in Cybersecurity: A Career Guidance","datePublished":"2020-08-11T09:20:07+00:00","dateModified":"2024-08-30T16:37:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/"},"wordCount":333,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Umang-Handa-00-01.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/","name":"Building a Career in AI for Cybersecurity - A Guide | Umang Handa","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Umang-Handa-00-01.jpg","datePublished":"2020-08-11T09:20:07+00:00","dateModified":"2024-08-30T16:37:23+00:00","description":"Building a Career in AI for Cybersecurity - A Guide explained by the Umang Handa Umang Handa, Director of Cybersecurity at a Big 4 Consulting Firm.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Umang-Handa-00-01.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Umang-Handa-00-01.jpg","width":466,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/humans-and-ai-in-cybersecurity-a-career-guidance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Humans and AI in Cybersecurity: A Career Guidance"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=50195"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50195\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79336"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=50195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=50195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=50195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}