{"id":5097,"date":"2018-11-28T06:32:35","date_gmt":"2018-11-28T06:32:35","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=5097"},"modified":"2023-06-05T07:31:35","modified_gmt":"2023-06-05T07:31:35","slug":"threat-intelligence-how-to-future-proof-your-cybersecurity-strategy","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/","title":{"rendered":"Threat Intelligence: How to Future-Proof Your Cybersecurity Strategy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5097\" class=\"elementor elementor-5097\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1f5cd593 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1f5cd593\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-695abe1a\" data-id=\"695abe1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5fdf98d6 elementor-widget elementor-widget-text-editor\" data-id=\"5fdf98d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Faisal-Yahya.jpg.webp\" alt=\"Faisal Yahya\" width=\"200\"><\/p>\n<p><strong>Name:<\/strong> Faisal Yahya, Head of IT, PT IBS Insurance Broking Service<br>\n<strong>Topic:<\/strong> Threat Intelligence: How to Future-Proof your Cybersecurity Strategy<br>\n<strong>Date of Webinar:<\/strong> 16<sup>th<\/sup> January, 2019<br>\n<strong>Time and Location:<\/strong> 5:30pm Jakarta Time\/4:00pm IST\/10:30am GMT<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong><br><\/strong><\/p><p><strong>Speaker Bio: <\/strong>Faisal has two decades of progressive leadership experience in Cybersecurity, IT Strategy, and Enterprise Architecture. Engaged with the Asian IT communities, actively researching, speaking and advocating for better Cybersecurity practices and defining improved IT Quality Assurance. Experience in white paper development, capability briefings, technical presentations to clients and technical writing. Playing an integral role in spearheading all Integration of IS\/IT, IT Strategy, Project Management, Vendor Management, Program Management, and Business Process Improvement. He is self-driven, forward-thinking, highly-versatile, innovative, and a hands-on, Chief Information Officer of a reputable Insurance Broking in Indonesia. Faisal is an official and Certified EC-Council Instructor (CEI) for CCISO certification.<\/p>\n<p>Apart from coaching the next generation leaders, Faisal actively engages with the IT communities within the region, giving time on researching, speaking at public conferences and advocating on better Cybersecurity practices and defining improvements in the IT Quality Assurance space. He is passionate about applying the latest technology securely and efficiently.<\/p>\n<p><strong>Topic Abstract: <\/strong><br>\nCyberSecurity is a holistic and &#8216;equilibrium-like&#8217; of protection, detection, and response. Over the past few years, we&#8217;ve started seeing Threat Intelligence products and services. Security operation teams are consolidating them into their arsenal as the reason for two trends in computing.<\/p>\n<p>First, companies practically have nearly lost control of our computing environment. Our data is mostly held in the cloud by other services provider\u2019s companies. Moreover, our networks likely are outsourced, and security tools are disjointed. This situation makes the response far more complicated and involved manual tasks because we might not have visibility into all parts of our critical network infrastructures and no automation and integration framework to quickly prevent successful cyberattacks.<\/p>\n<p>Second, attacks are getting more sophisticated. The rise of APTs (advanced persistent threats), ransomware, cryptojacking &#8211; attacks that specifically target for reasons other than pure financial theft &#8211; brings with it a new variety of attacker, which requires a different threat model. The situation is getting worse as hacking becomes a more integral part of geopolitics, unrelated networks are increasingly collaterally damaged in nation-state fights. These ever-increasing number of cyberattacks requires the integrated cybersecurity platform and powerful machine learning to detect, analyze, predict, automate and defend against the cyber threats in nearly real-time.<\/p>\n<p>In this session, we discuss the concept of cyber threat intelligence and its main challenges and opportunities for 2019 toward future-proof cybersecurity strategy, and then briefly introduce the integrated security platform which can addresses the current difficulties of disjointed tools and how to leverage threat intelligence to prevent latest cyberattacks and use security automation as much as possible.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p>.<br>\n<a name=\"register\"><\/a><iframe src=\"https:\/\/attendee.gotowebinar.com\/register\/3303385224187631115?source=Social+Media\" width=\"100%\" height=\"1100px\"><br \/>\n<\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Faisal Yahya, Head of IT, PT IBS Insurance Broking Service Topic: Threat Intelligence: How to Future-Proof your Cybersecurity Strategy Date of Webinar: 16th January, 2019 Time and Location: 5:30pm Jakarta Time\/4:00pm IST\/10:30am GMT Watch Now Speaker Bio: Faisal has two decades of progressive leadership experience in Cybersecurity, IT Strategy, and Enterprise Architecture. Engaged with&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79574,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-5097","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Intelligence - Challenges and Opportunities | ECCU<\/title>\n<meta name=\"description\" content=\"Cyber Threat Intelligence - Challenges and Opportunities explained by the Faisal Yahya, Head of IT, PT IBS Insurance Broking Service.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence: How to Future-Proof Your Cybersecurity Strategy\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Intelligence - Challenges and Opportunities explained by the Faisal Yahya, Head of IT, PT IBS Insurance Broking Service.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-28T06:32:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:31:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Faisal-Yahaya.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"466\" \/>\n\t<meta property=\"og:image:height\" content=\"311\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Threat Intelligence: How to Future-Proof Your Cybersecurity Strategy\",\"datePublished\":\"2018-11-28T06:32:35+00:00\",\"dateModified\":\"2023-06-05T07:31:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/\"},\"wordCount\":490,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Faisal-Yahaya.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/\",\"name\":\"Cyber Threat Intelligence - Challenges and Opportunities | ECCU\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Faisal-Yahaya.jpg\",\"datePublished\":\"2018-11-28T06:32:35+00:00\",\"dateModified\":\"2023-06-05T07:31:35+00:00\",\"description\":\"Cyber Threat Intelligence - Challenges and Opportunities explained by the Faisal Yahya, Head of IT, PT IBS Insurance Broking Service.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Faisal-Yahaya.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Faisal-Yahaya.jpg\",\"width\":466,\"height\":311,\"caption\":\"THREAT INTELLIGENCE: HOW TO FUTURE-PROOF YOUR CYBERSECURITY STRATEGY You are h\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Threat Intelligence: How to Future-Proof Your Cybersecurity Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence - Challenges and Opportunities | ECCU","description":"Cyber Threat Intelligence - Challenges and Opportunities explained by the Faisal Yahya, Head of IT, PT IBS Insurance Broking Service.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Threat Intelligence: How to Future-Proof Your Cybersecurity Strategy","og_description":"Cyber Threat Intelligence - Challenges and Opportunities explained by the Faisal Yahya, Head of IT, PT IBS Insurance Broking Service.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2018-11-28T06:32:35+00:00","article_modified_time":"2023-06-05T07:31:35+00:00","og_image":[{"width":466,"height":311,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Faisal-Yahaya.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Threat Intelligence: How to Future-Proof Your Cybersecurity Strategy","datePublished":"2018-11-28T06:32:35+00:00","dateModified":"2023-06-05T07:31:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/"},"wordCount":490,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Faisal-Yahaya.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/","name":"Cyber Threat Intelligence - Challenges and Opportunities | ECCU","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Faisal-Yahaya.jpg","datePublished":"2018-11-28T06:32:35+00:00","dateModified":"2023-06-05T07:31:35+00:00","description":"Cyber Threat Intelligence - Challenges and Opportunities explained by the Faisal Yahya, Head of IT, PT IBS Insurance Broking Service.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Faisal-Yahaya.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Faisal-Yahaya.jpg","width":466,"height":311,"caption":"THREAT INTELLIGENCE: HOW TO FUTURE-PROOF YOUR CYBERSECURITY STRATEGY You are h"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-how-to-future-proof-your-cybersecurity-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Threat Intelligence: How to Future-Proof Your Cybersecurity Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/5097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=5097"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/5097\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79574"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=5097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=5097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=5097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}