{"id":5262,"date":"2018-11-29T06:47:18","date_gmt":"2018-11-29T06:47:18","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=5262"},"modified":"2023-06-05T07:31:22","modified_gmt":"2023-06-05T07:31:22","slug":"tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/","title":{"rendered":"Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSPs)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5262\" class=\"elementor elementor-5262\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5141c4a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5141c4a9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-17eceada\" data-id=\"17eceada\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17cc8bad elementor-widget elementor-widget-text-editor\" data-id=\"17cc8bad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dawie-Wentzel.jpg-1.webp\" alt=\"Dawie Wentzel\" width=\"200\"><\/p>\n<p><strong>Name:<\/strong> Dawie Wentzel, Head of Cyber Forensic Investigations at Absa Group<br>\n<strong>Topic:<\/strong> Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSP&#8217;s)<br>\n<strong>Date of Webinar:<\/strong> 20<sup>th<\/sup> February, 2019<br>\n<strong>Time and Location:<\/strong> 11:00am South Africa<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Speaker Bio:<\/strong> Dawie Wentzel, Head of Cyber Forensics Investigation at Absa Group, is responsible for managing the groups Cyber Forensic Investigations (CFI) function. Dawie has more than 20 years of experience working in the Financial Services industry and Law Enforcement environments and is a keen explorer of the latest forensic tools and techniques to optimize incident response, digital forensic investigations, and eDiscovery. Dawie co-established the Cyber Forensic Investigations Lab at Barclays Africa in 2014 and holds a Masters\u2019 degree (MSc) from The University of South Africa (UNISA).<\/p>\n<p><strong>Topic Abstract:<\/strong> During this webinar, we will be exploring the latest tools and methods to collect cloud-stored data in accordance with evidentiary requirements. The numerous challenges of legally obtaining cloud-stored electronic evidence and possible solutions will also be discussed.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/zVkCkmG2Uqc\" width=\"100%\" height=\"400\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Dawie Wentzel, Head of Cyber Forensic Investigations at Absa Group Topic: Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSP&#8217;s) Date of Webinar: 20th February, 2019 Time and Location: 11:00am South Africa Watch Now &nbsp; Speaker Bio: Dawie Wentzel, Head of Cyber Forensics Investigation at Absa Group, is responsible for managing&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79568,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-5262","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Efficient Tools for Collecting Digital Evidence from CSPs<\/title>\n<meta name=\"description\" content=\"Efficient Tools for Collecting Digital Evidence from CSPs explained by the Dawie Wentzel, Head of Cyber Forensic Investigations at Absa Group.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSPs)\" \/>\n<meta property=\"og:description\" content=\"Efficient Tools for Collecting Digital Evidence from CSPs explained by the Dawie Wentzel, Head of Cyber Forensic Investigations at Absa Group.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-29T06:47:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Dawie-Wentzel-Feb-2019.jpg.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSPs)\",\"datePublished\":\"2018-11-29T06:47:18+00:00\",\"dateModified\":\"2023-06-05T07:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/\"},\"wordCount\":196,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Dawie-Wentzel-Feb-2019.jpg.webp\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/\",\"name\":\"Efficient Tools for Collecting Digital Evidence from CSPs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Dawie-Wentzel-Feb-2019.jpg.webp\",\"datePublished\":\"2018-11-29T06:47:18+00:00\",\"dateModified\":\"2023-06-05T07:31:22+00:00\",\"description\":\"Efficient Tools for Collecting Digital Evidence from CSPs explained by the Dawie Wentzel, Head of Cyber Forensic Investigations at Absa Group.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Dawie-Wentzel-Feb-2019.jpg.webp\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Dawie-Wentzel-Feb-2019.jpg.webp\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSPs)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Efficient Tools for Collecting Digital Evidence from CSPs","description":"Efficient Tools for Collecting Digital Evidence from CSPs explained by the Dawie Wentzel, Head of Cyber Forensic Investigations at Absa Group.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/","og_locale":"en_US","og_type":"article","og_title":"Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSPs)","og_description":"Efficient Tools for Collecting Digital Evidence from CSPs explained by the Dawie Wentzel, Head of Cyber Forensic Investigations at Absa Group.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2018-11-29T06:47:18+00:00","article_modified_time":"2023-06-05T07:31:22+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Dawie-Wentzel-Feb-2019.jpg.webp","type":"image\/webp"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSPs)","datePublished":"2018-11-29T06:47:18+00:00","dateModified":"2023-06-05T07:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/"},"wordCount":196,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Dawie-Wentzel-Feb-2019.jpg.webp","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/","name":"Efficient Tools for Collecting Digital Evidence from CSPs","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Dawie-Wentzel-Feb-2019.jpg.webp","datePublished":"2018-11-29T06:47:18+00:00","dateModified":"2023-06-05T07:31:22+00:00","description":"Efficient Tools for Collecting Digital Evidence from CSPs explained by the Dawie Wentzel, Head of Cyber Forensic Investigations at Absa Group.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Dawie-Wentzel-Feb-2019.jpg.webp","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/11\/Dawie-Wentzel-Feb-2019.jpg.webp","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/tools-and-methods-for-collecting-digital-evidence-from-cloud-service-providers-csps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Tools and Methods for Collecting Digital Evidence from Cloud Service Providers (CSPs)"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/5262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=5262"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/5262\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79568"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=5262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=5262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=5262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}