{"id":50198,"date":"2020-08-10T04:10:03","date_gmt":"2020-08-10T04:10:03","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=50198"},"modified":"2023-06-05T07:19:12","modified_gmt":"2023-06-05T07:19:12","slug":"cybersecurity-in-industry-4-0-all-you-should-know","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/","title":{"rendered":"Cybersecurity in Industry 4.0: All you should know"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"50198\" class=\"elementor elementor-50198\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ea36d85 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ea36d85\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e49fae2\" data-id=\"6e49fae2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35b06a4d elementor-widget elementor-widget-text-editor\" data-id=\"35b06a4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/headshot_1-2.jpeg\" alt=\"Maurice Dawson Jr\" width=\"200\"><\/p>\n<p><strong>Speaker<\/strong> Maurice Dawson Jr,<br>\n<strong>Designation:<\/strong> Director of IIT Center for Cyber Security and Forensics Education (C2SAFE)<br>\nIllinois Institute of Technology<br>\n<strong>Topic:<\/strong> Cybersecurity in Industry 4.0: All you should know<br>\n<strong>Date of Webinar:<\/strong> 27<sup>th<\/sup> Oct, 2020<br>\n<strong>Time and Location:<\/strong> 12:00 pm CDT | 10:30 pm IST | 05:00 pm GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><br>\n<strong>Speaker Bio:<\/strong><br>\nMaurice Dawson serves as the Distinguished Member and Director of Illinois Institute of Technology&#8217;s Center for Cyber Security and Forensics Education, accredited by the National Security Agency and Department of Homeland Security. He is also an Assistant Professor of Information Technology and Management in the College of Computing. Maurice has earned a Ph.D. in Cyber Security from the Intelligence Systems Research Centre at London Metropolitan University in 2017 and a Doctor of Computer Science from Colorado Technical University in 2009. Before joining Illinois Tech, Maurice served as an Assistant Professor at the University of Missouri &#8211; St. Louis with Visiting Professorships to the Technical University of Munich, Polytechnic University of Puerto Rico, and the University of Tennessee Space Institute. Additionally, he has been a Fulbright Scholar to Prince Sultan University in Saudi Arabia, and South Ural State University in Russia. He was recently awarded his fourth Fulbright Scholar Grant to Botswana International University of Science and Technology to lecture and perform research in cybersecurity and forensics. Dawson has a decade of experience in the defense and aerospace industry.<\/p>\n<p>Faculty Profile: https:\/\/www.iit.edu\/directory\/people\/maurice-dawson<br>\nLinkedIn Profile: https:\/\/www.linkedin.com\/in\/mauricedawson\/<\/p>\n<p><strong>Topic Abstract: <\/strong><br>\nThe 4th industrial revolution is commonly referred to as Industry 4.0. At the moment, the trend with manufacturing industries is automation and unparalleled levels of data exchange, relying on the integration of the Internet of Things. Industry 4.0 introduces us to a hyperconnected system that includes the smarter use of robotics to effectively and efficiently move manufacturing to a new height. However, with all these technological systems, it is important to ensure that cybersecurity plays a role during the rise of this digital industrial revolution. In the United Kingdom, more than 80 manufacturing plants were hit by cyberattacks, while threats in this specific industry have risen. The pitfalls of having hyperconnected systems leave an entire industry even more vulnerable than the traditional enterprise system design.<\/p>\n<p>Students learn that the manufacturing floor could serve as a place that allows an attacker to gather critical data from devices and inflict damage on any of the products being produced. Take, for instance, an attacker, a nation-state or otherwise, that targets a seed in development. A food shortage is one outcome; another is that the attacker could make the victim nation-state reliant on them for food or supplies, altering how well its government functions. This is but one of several critical infrastructure sectors poorly protected, yet it is steadily increasing the use of technology.<\/p>\n<p><b>Key Takeaways:<\/b><\/p>\n<ul>\n<li>Industry 4.0 brings unprecedented challenges into manufacturing while at the same time allowing for manufacturing to change at unprecedented levels.<\/li>\n<li>For Industry 4.0 to occur, it is going to require entirely new approaches to cybersecurity management.<\/li>\n<li>As manufacturing is a critical infrastructure, technology, policies, and education will need to be addressed to protect this sector appropriately.<\/li>\n<\/ul>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe src=\"https:\/\/www.youtube.com\/embed\/eMCBZi7uaCw\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker Maurice Dawson Jr, Designation: Director of IIT Center for Cyber Security and Forensics Education (C2SAFE) Illinois Institute of Technology Topic: Cybersecurity in Industry 4.0: All you should know Date of Webinar: 27th Oct, 2020 Time and Location: 12:00 pm CDT | 10:30 pm IST | 05:00 pm GMT Watch Now Speaker Bio: Maurice Dawson&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79344,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-50198","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>All You Need to Know About Cybersecurity in Industry 4.0 | ECCU<\/title>\n<meta name=\"description\" content=\"All You Need to Know About Cybersecurity in Industry 4.0 explained by the Maurice Dawson Jr, through EC-Council University.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in Industry 4.0: All you should know\" \/>\n<meta property=\"og:description\" content=\"All You Need to Know About Cybersecurity in Industry 4.0 explained by the Maurice Dawson Jr, through EC-Council University.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T04:10:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:19:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Maurice-Dawson-Jr.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cybersecurity in Industry 4.0: All you should know\",\"datePublished\":\"2020-08-10T04:10:03+00:00\",\"dateModified\":\"2023-06-05T07:19:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/\"},\"wordCount\":545,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Maurice-Dawson-Jr.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/\",\"name\":\"All You Need to Know About Cybersecurity in Industry 4.0 | ECCU\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Maurice-Dawson-Jr.jpg\",\"datePublished\":\"2020-08-10T04:10:03+00:00\",\"dateModified\":\"2023-06-05T07:19:12+00:00\",\"description\":\"All You Need to Know About Cybersecurity in Industry 4.0 explained by the Maurice Dawson Jr, through EC-Council University.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Maurice-Dawson-Jr.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Maurice-Dawson-Jr.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecurity-in-industry-4-0-all-you-should-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity in Industry 4.0: All you should know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"All You Need to Know About Cybersecurity in Industry 4.0 | ECCU","description":"All You Need to Know About Cybersecurity in Industry 4.0 explained by the Maurice Dawson Jr, through EC-Council University.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in Industry 4.0: All you should know","og_description":"All You Need to Know About Cybersecurity in Industry 4.0 explained by the Maurice Dawson Jr, through EC-Council University.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-10T04:10:03+00:00","article_modified_time":"2023-06-05T07:19:12+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Maurice-Dawson-Jr.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cybersecurity in Industry 4.0: All you should know","datePublished":"2020-08-10T04:10:03+00:00","dateModified":"2023-06-05T07:19:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/"},"wordCount":545,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Maurice-Dawson-Jr.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/","name":"All You Need to Know About Cybersecurity in Industry 4.0 | ECCU","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Maurice-Dawson-Jr.jpg","datePublished":"2020-08-10T04:10:03+00:00","dateModified":"2023-06-05T07:19:12+00:00","description":"All You Need to Know About Cybersecurity in Industry 4.0 explained by the Maurice Dawson Jr, through EC-Council University.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Maurice-Dawson-Jr.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Maurice-Dawson-Jr.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecurity-in-industry-4-0-all-you-should-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity in Industry 4.0: All you should know"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=50198"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/50198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79344"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=50198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=50198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=50198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}