{"id":5280,"date":"2018-08-31T05:19:07","date_gmt":"2018-08-31T05:19:07","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=5280"},"modified":"2023-06-05T07:32:14","modified_gmt":"2023-06-05T07:32:14","slug":"the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/","title":{"rendered":"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5280\" class=\"elementor elementor-5280\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c838510 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c838510\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c17c75a\" data-id=\"c17c75a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51ddc652 elementor-widget elementor-widget-text-editor\" data-id=\"51ddc652\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Name:<\/strong> Sameera De Alwis, Military Cyber Intelligence and Lawful Interception Expert\n<strong>Topic:<\/strong> THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD\n<strong>Date of Webinar:<\/strong> 31st October 2018\n<strong>Time and Location:<\/strong> 4pm SLST\/10:30 am GMT\/ 6:30 pm SGT\n\n<a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a>\n<strong>Speaker Bio:<\/strong> Although, my life portraying manifold status of tech and non-tech fortes, I am exceptionally a High-Tech Cyber Intelligence Specialist and Lawful Interception Expert employed for a Classified Special Military\/Defense Force and Command &amp; Control Center in a Secret-Service agency (somewhere in the world indeed). Also, I am a top-ranking Senior Lecturer for quite a lot of highest standing worldwide Universities for the subjects of Information Security, Online Privacy, Cyber\/Digital Forensics, and Cyber Security. And, a high-level Senior Cyber-Intelligence and Reverse Engineering Expert Consultant for numerous Fortune 500 companies in the world. I am here at this peak of the world, only because of my poor ever-loving mother who lost her innocent soul back in dark-eve 2007 September and the true gratitude should be only with my ever-loving parents and my dearest teachers who gave my utterly exceptional life. Well, that\u2019s me and myself.\n\n<strong>Topic Abstract:<\/strong> This talk will elaborate on state-sponsored warrantless wiretapping and government mass surveillance over the lawful interception.\n\nThis exceptionally sporadic topic evidently vowing the PoC for the nutshell theory of Glenn Greenwald&#8217;s &#8220;NO PLACE TO HIDE&#8221; vouched over his authored book. I am demonstrating the true impact of the Lawful Cyber-Espionages and many other Top-Secret Covert Cyber Associated Intelligence Eagle-Eye campaigns that persistently lead by the worldwide authoritative governments with the reputed sources. The evidence only based on every publically available verified source and every document is redacted by the specified responsible parties. This incredibly challenging topic discussed only by few experts in the world due to its sensitive nature and the lack of the spot-on knowledge with regards to the Top-Secret Covert Cyber Operations, inadequate knowledge in Military\/Law Enforcement and Intelligence Agencies, and mostly the natural anxiety factor of the human being. Only more than a few brave souls openly addressed these factual in the past. In this demonstration, I am only relying on the publicly available source of evidence and that academically putative evidence are all lawfully acknowledged by those who responsible for their own actions over the world\u2019s cyber spectrum.\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<a name=\"register\"><\/a>\n<iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/FtDO4nnYIoU\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Name: Sameera De Alwis, Military Cyber Intelligence and Lawful Interception Expert Topic: THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD Date of Webinar: 31st October 2018 Time and Location: 4pm SLST\/10:30 am GMT\/ 6:30 pm SGT Watch Now Speaker Bio: Although, my life portraying manifold status of tech and non-tech fortes, I&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79589,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-5280","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Analyzing State-Sponsored Warrantless Wiretapping | Sameera De Alwis<\/title>\n<meta name=\"description\" content=\"Analyzing State-Sponsored Warrantless Wiretapping explained by the Sameera De Alwis, Military Cyber Intelligence and Lawful Interception Expert.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD\" \/>\n<meta property=\"og:description\" content=\"Analyzing State-Sponsored Warrantless Wiretapping explained by the Sameera De Alwis, Military Cyber Intelligence and Lawful Interception Expert.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-31T05:19:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:32:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/08\/Sameera-De-Alwis.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD\",\"datePublished\":\"2018-08-31T05:19:07+00:00\",\"dateModified\":\"2023-06-05T07:32:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/\"},\"wordCount\":414,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Sameera-De-Alwis.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/\",\"name\":\"Analyzing State-Sponsored Warrantless Wiretapping | Sameera De Alwis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Sameera-De-Alwis.jpg\",\"datePublished\":\"2018-08-31T05:19:07+00:00\",\"dateModified\":\"2023-06-05T07:32:14+00:00\",\"description\":\"Analyzing State-Sponsored Warrantless Wiretapping explained by the Sameera De Alwis, Military Cyber Intelligence and Lawful Interception Expert.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Sameera-De-Alwis.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Sameera-De-Alwis.jpg\",\"width\":465,\"height\":310,\"caption\":\"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Analyzing State-Sponsored Warrantless Wiretapping | Sameera De Alwis","description":"Analyzing State-Sponsored Warrantless Wiretapping explained by the Sameera De Alwis, Military Cyber Intelligence and Lawful Interception Expert.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/","og_locale":"en_US","og_type":"article","og_title":"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD","og_description":"Analyzing State-Sponsored Warrantless Wiretapping explained by the Sameera De Alwis, Military Cyber Intelligence and Lawful Interception Expert.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2018-08-31T05:19:07+00:00","article_modified_time":"2023-06-05T07:32:14+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/08\/Sameera-De-Alwis.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD","datePublished":"2018-08-31T05:19:07+00:00","dateModified":"2023-06-05T07:32:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/"},"wordCount":414,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/08\/Sameera-De-Alwis.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/","name":"Analyzing State-Sponsored Warrantless Wiretapping | Sameera De Alwis","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/08\/Sameera-De-Alwis.jpg","datePublished":"2018-08-31T05:19:07+00:00","dateModified":"2023-06-05T07:32:14+00:00","description":"Analyzing State-Sponsored Warrantless Wiretapping explained by the Sameera De Alwis, Military Cyber Intelligence and Lawful Interception Expert.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/08\/Sameera-De-Alwis.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2018\/08\/Sameera-De-Alwis.jpg","width":465,"height":310,"caption":"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-biggest-cyber-hawk-and-prying-eye-threats-to-the-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"THE BIGGEST CYBER HAWK AND PRYING EYE THREATS TO THE WORLD"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/5280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=5280"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/5280\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79589"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=5280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=5280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=5280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}