{"id":54983,"date":"2020-08-18T11:00:31","date_gmt":"2020-08-18T11:00:31","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=54983"},"modified":"2023-06-05T07:15:28","modified_gmt":"2023-06-05T07:15:28","slug":"exploring-a-new-cyberspace-of-communicating-vehicles","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/","title":{"rendered":"Exploring a New Cyberspace of Communicating Vehicles"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"54983\" class=\"elementor elementor-54983\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d64e71d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d64e71d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-14ea3dee\" data-id=\"14ea3dee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b0a7543 elementor-widget elementor-widget-text-editor\" data-id=\"3b0a7543\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ikjot-Saini.jpg.webp\" alt=\"Ikjot Saini\" width=\"200\" \/><\/p><p><strong>Speaker:<\/strong> Ikjot Saini,<br \/><strong>Designation:<\/strong> Assistant Professor, University of Windsor<br \/><strong>Topic:<\/strong> Exploring a New Cyberspace of Communicating Vehicles<br \/><strong>Date of Webinar:<\/strong> March 12<sup>th<\/sup> , 2021<br \/><strong>Time and Location:<\/strong> 8:30 AM EST\/ 7:00 PM IST\/ 1:30 PM GMT<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p>Dr. Ikjot Saini is a cybersecurity expert whose research is focused on Connected and Autonomous Vehicles covering the security and privacy of V2X and in-vehicle security. She has published many research papers and journal articles, including V2X privacy schemes, engineering privacy attacks for equitable assessment, and DSRC network congestion and routing protocols. Upon completion of her Ph.D., she joined as an Assistant Professor in the School of Computer Science at the University of Windsor. She is also an independent Security Consultant. She is serving as the Academic Director of the Automotive Security Research Group and chapter lead at Windsor, as well as a member of the APMA Cyber Security Committee as a V2X technology expert. Dr. Saini is passionate about cybersecurity and is a leading voice promoting women\u2019s participation and leadership. She founded the first Canadian Student Chapter of Women in Cybersecurity (WiCyS), with a mission to provide opportunities for women to learn and get hands-on experience. It was awarded the Student Chapter of the Year in 2020 among 103 student chapters. She is also currently serving as Academic Chair on WiCyS Ontario Affiliate Board and on the Auto Parts Manufacturers Association &#8211; Cyber Security Committee as V2X Technology Expert. She is a stream owner of \u201cIoT and Edge Security\u201d at Aggregate Intellect, serving on various advisory committees. She was the winner of the Cyber Woman of the Year award in 2020 and inaugural WEtech Alliance Woman in Tech of the Year award in 2019. She has been featured in the 2020 Canadians to Watch list by Auto News Canada.<\/p><p><strong>Topic Abstract: <\/strong><\/p><p>The emerging technology of Connected Vehicles is dedicated to the increasing safety and prevention of traffic congestion and collisions due to the growing number of vehicles on the road. It provides communication among nearby vehicles and with roadside infrastructure. This introduces a new cyberspace of communicating vehicles. This cyberspace can be seen as Internet of Vehicles (as a subset of Internet of Things) where the vehicles will be able to communicate to everything in the surroundings from the traffic lights to pedestrians. In this session, we will discuss the underlying potential security threats and privacy concerns of this technology. With the increasing demand for connectivity and technology development, cybersecurity concerns have risen exponentially. The global automotive cybersecurity job market is in a talent crunch, as well as facing talent gaps.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Transformation of the cyber landscape with emerging mobility solutions.<\/li><li>Practice \u201cSecurity by design\u201d and \u201cPrivacy by design\u201d principles.<\/li><li>Education and awareness of Auto Security to enrich future workplaces<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe src=\"https:\/\/www.youtube.com\/embed\/IRcpRwnPXkI\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker: Ikjot Saini, Designation: Assistant Professor, University of Windsor Topic: Exploring a New Cyberspace of Communicating Vehicles Date of Webinar: March 12th , 2021 Time and Location: 8:30 AM EST\/ 7:00 PM IST\/ 1:30 PM GMT Watch Now Dr. Ikjot Saini is a cybersecurity expert whose research is focused on Connected and Autonomous Vehicles covering&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79279,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-54983","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Threats and Privacy Concerns of Communicating Vehicles | ECCU<\/title>\n<meta name=\"description\" content=\"Security Threats and Privacy Concerns of Communicating Vehicles explained by the Ikjot Saini, Assistant Professor, University of Windsor.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploring a New Cyberspace of Communicating Vehicles\" \/>\n<meta property=\"og:description\" content=\"Security Threats and Privacy Concerns of Communicating Vehicles explained by the Ikjot Saini, Assistant Professor, University of Windsor.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T11:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:15:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ikjot-Saini-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Exploring a New Cyberspace of Communicating Vehicles\",\"datePublished\":\"2020-08-18T11:00:31+00:00\",\"dateModified\":\"2023-06-05T07:15:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/\"},\"wordCount\":484,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ikjot-Saini-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/\",\"name\":\"Security Threats and Privacy Concerns of Communicating Vehicles | ECCU\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ikjot-Saini-1.jpg\",\"datePublished\":\"2020-08-18T11:00:31+00:00\",\"dateModified\":\"2023-06-05T07:15:28+00:00\",\"description\":\"Security Threats and Privacy Concerns of Communicating Vehicles explained by the Ikjot Saini, Assistant Professor, University of Windsor.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ikjot-Saini-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Ikjot-Saini-1.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-a-new-cyberspace-of-communicating-vehicles\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Exploring a New Cyberspace of Communicating Vehicles\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Threats and Privacy Concerns of Communicating Vehicles | ECCU","description":"Security Threats and Privacy Concerns of Communicating Vehicles explained by the Ikjot Saini, Assistant Professor, University of Windsor.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/","og_locale":"en_US","og_type":"article","og_title":"Exploring a New Cyberspace of Communicating Vehicles","og_description":"Security Threats and Privacy Concerns of Communicating Vehicles explained by the Ikjot Saini, Assistant Professor, University of Windsor.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T11:00:31+00:00","article_modified_time":"2023-06-05T07:15:28+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ikjot-Saini-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Exploring a New Cyberspace of Communicating Vehicles","datePublished":"2020-08-18T11:00:31+00:00","dateModified":"2023-06-05T07:15:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/"},"wordCount":484,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ikjot-Saini-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/","name":"Security Threats and Privacy Concerns of Communicating Vehicles | ECCU","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ikjot-Saini-1.jpg","datePublished":"2020-08-18T11:00:31+00:00","dateModified":"2023-06-05T07:15:28+00:00","description":"Security Threats and Privacy Concerns of Communicating Vehicles explained by the Ikjot Saini, Assistant Professor, University of Windsor.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ikjot-Saini-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Ikjot-Saini-1.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-a-new-cyberspace-of-communicating-vehicles\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Exploring a New Cyberspace of Communicating Vehicles"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/54983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=54983"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/54983\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79279"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=54983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=54983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=54983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}