{"id":55116,"date":"2020-08-18T12:05:52","date_gmt":"2020-08-18T12:05:52","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55116"},"modified":"2025-10-31T09:11:14","modified_gmt":"2025-10-31T09:11:14","slug":"cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/","title":{"rendered":"Cyber Threat Intelligence &#038; Incident Response: Best Practices to Secure Your Cloud"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55116\" class=\"elementor elementor-55116\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-274e7e0d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"274e7e0d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73c7b6b0\" data-id=\"73c7b6b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72f50668 elementor-widget elementor-widget-text-editor\" data-id=\"72f50668\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Malini-Rao.jpg.webp\" alt=\"Malini Rao\" width=\"200\" \/><\/p><p><strong>Speaker:<\/strong> Malini Rao,<br \/><strong>Designation:<\/strong> Global Head &#8211; Cybersecurity and GRC Operations<br \/><strong>Topic:<\/strong> Cyber Threat Intelligence &amp; Incident Response: Best Practices to Secure Your Cloud<br \/><strong>Date of Webinar:<\/strong> 9<sup>th<\/sup> April , 2021<br \/><strong>Time and Location:<\/strong> 7:00 PM IST\/ 9:30 AM EST\/ 2:30 PM BST<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>\u00a0<\/strong><\/p><p><strong>Speaker Bio:<\/strong><\/p><p>Malini Rao has two decades of extensive experience and expertise working globally in various areas of cybersecurity such as cyber defense, cyber forensics, application security, cloud security, DevSecOps, security operations, IT governance, risk and compliance management, cyber risk management, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/network-security\/guide-to-iot-security-protecting-critical-networks\/\" target=\"_blank\" rel=\"noopener\">IOT security<\/a>, and identity &amp; access management. Malini has managed large multimillion-dollar projects and large teams globally. She has rich experience working in various industry verticals like financial services, healthcare, information technology services, retail, consumer goods, and energy, as well as for oil and gas industry clients. She has taken up challenging roles and worked her way up the corporate ladder, taking up leadership roles as a Cybersecurity Architect, Program Manager, CISO, Head of Cybersecurity &amp; GRC Operations, and Global Practice Head. Malini is also a global woman in cybersecurity influencer and board member of the women in cybersecurity community at ISSA. She has received many recognitions and awards for her contributions as a cybersecurity influencer and mentor. She is a CCISO, CEH, CCSK, and GRCP certified security &amp; GRC professional and an international speaker.<\/p><p><strong>Topic Abstract: <\/strong><\/p><p>The cyber threat landscape is rapidly evolving and growing as organizations are moving to the cloud and cyber adversaries are continuously adapting their tactics in response. Threat intelligence enables IT teams to gain an understanding of the attacker\u2019s motives and behavior, and this insight can then be leveraged to inform future decision-making on monitoring and reducing threats. With so much information coming in, collecting data or feeds for threat intelligence can feel like a daunting task, especially once your organization begins to consider how it should apply the insights gained. In this webinar, we will discuss the threat intelligence and incident response process in detail, and further explore best practices for leveraging security data and threat intelligence to meet your cybersecurity needs, how to measure threat intelligence, and how to make sure the right action is taken for the identified threats using the data collected.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>An introduction to threat intelligence and incident response in the cloud.<\/li><li>Best practices to leverage data security and threat intelligence.<\/li><li>How to measure threat intelligence and key steps to ensure the right data is used.<\/li><li>Actions to be taken as part of the incident response process for hybrid cloud environments.<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/GSQXIhD4EFM\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker: Malini Rao,Designation: Global Head &#8211; Cybersecurity and GRC OperationsTopic: Cyber Threat Intelligence &amp; Incident Response: Best Practices to Secure Your CloudDate of Webinar: 9th April , 2021Time and Location: 7:00 PM IST\/ 9:30 AM EST\/ 2:30 PM BST Watch Now \u00a0 Speaker Bio: Malini Rao has two decades of extensive experience and expertise working&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79167,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55116","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Best Threat Intelligence Practices to Meet Your Cybersecurity Needs<\/title>\n<meta name=\"description\" content=\"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs explained by the Malini Rao Global Head \u2013 Cybersecurity through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence &amp; Incident Response: Best Practices to Secure Your Cloud\" \/>\n<meta property=\"og:description\" content=\"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs explained by the Malini Rao Global Head \u2013 Cybersecurity through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T12:05:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-31T09:11:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Malini-Rao-465x310_v2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cyber Threat Intelligence &#038; Incident Response: Best Practices to Secure Your Cloud\",\"datePublished\":\"2020-08-18T12:05:52+00:00\",\"dateModified\":\"2025-10-31T09:11:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/\"},\"wordCount\":448,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Malini-Rao-465x310_v2-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/\",\"name\":\"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Malini-Rao-465x310_v2-1.jpg\",\"datePublished\":\"2020-08-18T12:05:52+00:00\",\"dateModified\":\"2025-10-31T09:11:14+00:00\",\"description\":\"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs explained by the Malini Rao Global Head \u2013 Cybersecurity through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Malini-Rao-465x310_v2-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Malini-Rao-465x310_v2-1.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Intelligence &#038; Incident Response: Best Practices to Secure Your Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs","description":"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs explained by the Malini Rao Global Head \u2013 Cybersecurity through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Intelligence & Incident Response: Best Practices to Secure Your Cloud","og_description":"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs explained by the Malini Rao Global Head \u2013 Cybersecurity through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T12:05:52+00:00","article_modified_time":"2025-10-31T09:11:14+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Malini-Rao-465x310_v2-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cyber Threat Intelligence &#038; Incident Response: Best Practices to Secure Your Cloud","datePublished":"2020-08-18T12:05:52+00:00","dateModified":"2025-10-31T09:11:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/"},"wordCount":448,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Malini-Rao-465x310_v2-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/","name":"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Malini-Rao-465x310_v2-1.jpg","datePublished":"2020-08-18T12:05:52+00:00","dateModified":"2025-10-31T09:11:14+00:00","description":"Best Threat Intelligence Practices to Meet Your Cybersecurity Needs explained by the Malini Rao Global Head \u2013 Cybersecurity through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Malini-Rao-465x310_v2-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Malini-Rao-465x310_v2-1.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-incident-response-best-practices-to-secure-your-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Intelligence &#038; Incident Response: Best Practices to Secure Your Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55116"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55116\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79167"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}