{"id":55014,"date":"2020-08-18T11:55:52","date_gmt":"2020-08-18T11:55:52","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55014"},"modified":"2023-08-23T11:34:12","modified_gmt":"2023-08-23T11:34:12","slug":"how-to-conduct-vendor-risk-management-to-prevent-data-leaks","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/","title":{"rendered":"How to Conduct Vendor Risk Management to Prevent Data Leaks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55014\" class=\"elementor elementor-55014\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-688ccadd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"688ccadd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fcc1908\" data-id=\"4fcc1908\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-689f5171 elementor-widget elementor-widget-text-editor\" data-id=\"689f5171\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\n<strong>Speaker:<\/strong> Latha Sunderkrishnan,<br><strong>Designation:<\/strong> Founder-Director of Clarimonde Solutions OPC Pvt. Ltd.<br><strong>Topic:<\/strong> How to Conduct Vendor Risk Management to Prevent Data Leaks<br><strong>Date of Webinar:<\/strong> March 24<sup>th<\/sup> , 2021<br><strong>Time and Location:<\/strong> 8.30 PM IST\/ 4.00 PM CET\/ 8.00 AM PST<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Speaker Bio:<\/strong><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-2265 size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/latha-pic.jpg\" alt=\"Latha Sunderkrishnan\" width=\"200\" height=\"380\"><\/p>\n<p>Latha Sunderkrishnan (Independent Director, CISA, ISO27001 LA, COBIT 5 Foundation) is the Founder-Director of Clarimonde Solutions OPC Pvt. Ltd. India.<\/p>\n<p>She is an Electronics Engineer with more than 25 years of experience in IT and Information Security. She has worked with various multinational organizations in a wide variety of technologies. She has experience in cybersecurity audits and consulting, including managing projects for ISO 27001:2013 ISO9001, PCI DSS, Information Security Risk Management, IT Act compliance, data leak prevention, and regulatory audits, and vendor management.<\/p>\n<p>She has wide-ranging experience in training, implementation, audit process, and conducting training for ICAI &#8211; Faculty for CA institute.<\/p>\n<p>She has held various leadership positions in software projects, quality assurance and management, customer support, testing, and release management.<\/p>\n<p><strong>Topic Abstract: <\/strong><\/p>\n<p>Modern enterprises outsource non-core processes and operations to business partners and vendors, and it is immensely important that a thorough risk assessment is performed of all control aspects and at all times \u2014 before the outsourcing and continuing risk assessments.<\/p>\n<p>Regulators hold enterprises responsible for data leakages by business partners and vendors. Therefore, enterprises need to ensure that appropriate metrics for measurement of vendor and business partner performance is well laid out in the agreements with the vendors and business partners.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Emerging practices are organizing People, Processes, and Technology in such a manner that Vendor Risk Management has become an integral part of the Enterprise Risk Management and Governance and Compliance (GRC).<\/li>\n<li>Third-party audits of businesses and operations of key vendor and business partners need to be conducted.<\/li>\n<\/ul>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/1kKy7blRLbs\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker: Latha Sunderkrishnan,Designation: Founder-Director of Clarimonde Solutions OPC Pvt. Ltd.Topic: How to Conduct Vendor Risk Management to Prevent Data LeaksDate of Webinar: March 24th , 2021Time and Location: 8.30 PM IST\/ 4.00 PM CET\/ 8.00 AM PST Watch Now Speaker Bio: Latha Sunderkrishnan (Independent Director, CISA, ISO27001 LA, COBIT 5 Foundation) is the Founder-Director of&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79171,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55014","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Efficient Vendor Risk Management to Prevent Data Leaks<\/title>\n<meta name=\"description\" content=\"Efficient Vendor Risk Management to Prevent Data Leaks explained by the Latha Sunderkrishnan, through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Conduct Vendor Risk Management to Prevent Data Leaks\" \/>\n<meta property=\"og:description\" content=\"Efficient Vendor Risk Management to Prevent Data Leaks explained by the Latha Sunderkrishnan, through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T11:55:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-23T11:34:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Latha-Sunderkrishnan-465x310-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"How to Conduct Vendor Risk Management to Prevent Data Leaks\",\"datePublished\":\"2020-08-18T11:55:52+00:00\",\"dateModified\":\"2023-08-23T11:34:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/\"},\"wordCount\":320,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Latha-Sunderkrishnan-465x310-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/\",\"name\":\"Efficient Vendor Risk Management to Prevent Data Leaks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Latha-Sunderkrishnan-465x310-1.jpg\",\"datePublished\":\"2020-08-18T11:55:52+00:00\",\"dateModified\":\"2023-08-23T11:34:12+00:00\",\"description\":\"Efficient Vendor Risk Management to Prevent Data Leaks explained by the Latha Sunderkrishnan, through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Latha-Sunderkrishnan-465x310-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Latha-Sunderkrishnan-465x310-1.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How to Conduct Vendor Risk Management to Prevent Data Leaks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Efficient Vendor Risk Management to Prevent Data Leaks","description":"Efficient Vendor Risk Management to Prevent Data Leaks explained by the Latha Sunderkrishnan, through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/","og_locale":"en_US","og_type":"article","og_title":"How to Conduct Vendor Risk Management to Prevent Data Leaks","og_description":"Efficient Vendor Risk Management to Prevent Data Leaks explained by the Latha Sunderkrishnan, through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T11:55:52+00:00","article_modified_time":"2023-08-23T11:34:12+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Latha-Sunderkrishnan-465x310-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"How to Conduct Vendor Risk Management to Prevent Data Leaks","datePublished":"2020-08-18T11:55:52+00:00","dateModified":"2023-08-23T11:34:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/"},"wordCount":320,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Latha-Sunderkrishnan-465x310-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/","name":"Efficient Vendor Risk Management to Prevent Data Leaks","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Latha-Sunderkrishnan-465x310-1.jpg","datePublished":"2020-08-18T11:55:52+00:00","dateModified":"2023-08-23T11:34:12+00:00","description":"Efficient Vendor Risk Management to Prevent Data Leaks explained by the Latha Sunderkrishnan, through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Latha-Sunderkrishnan-465x310-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Latha-Sunderkrishnan-465x310-1.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-to-conduct-vendor-risk-management-to-prevent-data-leaks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"How to Conduct Vendor Risk Management to Prevent Data Leaks"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55014"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55014\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79171"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}