{"id":55117,"date":"2020-07-11T08:12:23","date_gmt":"2020-07-11T08:12:23","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55117"},"modified":"2023-06-15T13:03:24","modified_gmt":"2023-06-15T13:03:24","slug":"women-in-cybersecurity-for-women-by-women","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/","title":{"rendered":"Women in Cybersecurity: For Women. By Women."},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55117\" class=\"elementor elementor-55117\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a438072 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a438072\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4372319\" data-id=\"4372319\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-503d973c elementor-widget elementor-widget-text-editor\" data-id=\"503d973c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Webinar Type:<\/strong> Panel Discussion<br>\n<strong>Date:<\/strong>&nbsp;April 16<sup>th<\/sup>, 2021<br>\n<strong>Time:<\/strong>&nbsp;7:30 pm IST\/ 10 am EST\/ 3:00 pm WAT<br>\n<strong>Topic: <\/strong>Women in Cybersecurity: For Women. By Women.<br>\n<a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong>According to&nbsp;a&nbsp;2019&nbsp;survey,&nbsp;roughly&nbsp;25% of the&nbsp;overall&nbsp;cybersecurity&nbsp;workforce&nbsp;consists of&nbsp;women.&nbsp;While this is&nbsp;considerably better&nbsp;than 2017, when&nbsp;only 11% of its survey participants were women, there is&nbsp;still a long way to go to address this large gender gap.<\/p>\n<p>Considering the various ongoing industry challenges&nbsp;\u2014&nbsp;dramatic gender imbalance and the rising talent gap&nbsp;\u2014&nbsp;several golden opportunities&nbsp;for women to work their way up to significant leadership roles&nbsp;are&nbsp;opening up. Cybersecurity is a vast industry that needs professionals for different primary functions, such as security operations, compliance, incident handling, investigations, auditing, training, and several others. As a woman, you have the choice to choose from dozens of such positions.<\/p>\n<p>This webinar will take you through&nbsp;the&nbsp;roles&nbsp;women&nbsp;have&nbsp;played&nbsp;in&nbsp;the&nbsp;past&nbsp;in&nbsp;the&nbsp;cybersecurity&nbsp;industry&nbsp;and how it has changed over the years, as well as the general misconceptions and myths about women leaders&nbsp;in the cybersecurity industry,&nbsp;straight&nbsp;from global women leaders&nbsp;thriving in&nbsp;the&nbsp;world of cybersecurity.<\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ol>\n<li>Why young women should take up STEM at an academic level.<\/li>\n<li>Common challenges and myths about women in cybersecurity.<\/li>\n<li>Diversity, gender equality, and inclusion in the digital age.<\/li>\n<li>Types of job opportunities for women in the cyber industry and how to land them.<\/li>\n<\/ol>\n<h4>Moderator:<\/h4>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Adora.jpg.webp\" alt=\"Nenne Adaora Nwodo\" width=\"200\"><\/p>\n<p><strong>Nenne Adaora Nwodo,<\/strong> Software Engineer, Microsoft Mixed Reality; Creator, AdoraHack; Public Speaker<\/p>\n<p><strong>Bio:<\/strong> Nenne Adaora (Adora) Nwodo, is a Software Engineer at Microsoft. Adora is a nominee of the Young CISO Awards 2020 (Young CISO Network), an award for young professionals in cybersecurity who go beyond the call of duty to make an impact in their workplace and industry.<\/p>\n<hr>\n<h4>Panelists:<\/h4>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Malini-Rao.jpg.webp\" alt=\"Malini Rao\" width=\"200\"><\/p>\n<p><strong>Malini Rao,<\/strong> Global Head &#8211; Cybersecurity and GRC Operations<\/p>\n<p><strong>Bio:<\/strong> Malini Rao has two decades of extensive experience and expertise working globally in various areas of cybersecurity such as cyber defense, cyber forensics, application security, cloud security, DevSecOps, and more. She is also a global woman in cybersecurity influencer and has taken up challenging roles, working her way up through the corporate ladder in leadership roles such as Global Practice Head and CISO, among numerous other roles over the years.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Headshot_new-copy.jpg-1.webp\" alt=\"Vandana Verma\" width=\"200\"><\/p>\n<p><strong>Vandana Verma, <\/strong>Global Board of Directors at OWASP and Security Solutions Architect at IBM<\/p>\n<p><strong>Bio:<\/strong> Vandana Verma is the Security Solutions Architect at IBM India Software Labs and a member of the OWASP Global Board of Directors. She has experience ranging from application security to infrastructure, and is now dealing with product security. She also works in various communities towards diversity initiatives such as InfosecGirls &amp; WoSec. She has been the keynote speaker and trainer at various public events including Global OWASP AppSec events, BlackHat events, and regional events like BSides in India.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Beatriz-Pic.jpg.webp\" alt=\"Beatriz Silveira\" width=\"200\"><\/p>\n<p><strong>Beatriz Silveira,<\/strong> SVP, Cyber Intelligence Center Regional Lead APAC, Citi<\/p>\n<p><strong>Bio:<\/strong> Beatriz Silveira is a resilient security professional with more than 17 years of experience in intelligence and conducting investigations related to cyberthreats, cybercrime, cyber-enabled crime, complex frauds, and financial and organized crime. She has been a former Law Enforcement official in Brazil, a Cybercrime Intelligence Officer at INTERPOL Global Complex for Innovation in Singapore, a Blockchain and Cryptocurrency investigator, and Cyber Policy specialist. She is co-author of the book \u201cCyber Investigations Handbook,\u201d published in Brazil.<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Vanessa-Padua.jpg.webp\" alt=\"Vanessa Padua\" width=\"200\"><\/p>\n<p><strong>Vanessa Padua,<\/strong>Cyber security Executive- Director, Microsoft<\/p>\n<p><strong>Bio:<\/strong> Vanessa Padua, MSc., is a Cybersecurity Executive, acting and serving this market in multidisciplinary areas including networking and the cloud. Her personal mission is to guide companies to enable their business through cybersecurity, creating a more resilient environment in the process. Award: Top 50 Women in Cybersecurity Latin America &#8211; WOMCY<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br>\n<iframe width=\"100%\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6qKlvPYnBgk\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Webinar Type: Panel Discussion Date:&nbsp;April 16th, 2021 Time:&nbsp;7:30 pm IST\/ 10 am EST\/ 3:00 pm WAT Topic: Women in Cybersecurity: For Women. By Women. Watch Now Abstract: According to&nbsp;a&nbsp;2019&nbsp;survey,&nbsp;roughly&nbsp;25% of the&nbsp;overall&nbsp;cybersecurity&nbsp;workforce&nbsp;consists of&nbsp;women.&nbsp;While this is&nbsp;considerably better&nbsp;than 2017, when&nbsp;only 11% of its survey participants were women, there is&nbsp;still a long way to go to address this large&hellip;<\/p>\n","protected":false},"author":32,"featured_media":55304,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55117","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Women in Cybersecurity - A Myth-Busting Session With the Pioneers<\/title>\n<meta name=\"description\" content=\"Women in Cybersecurity - Women in Cybersecurity - A Myth-Busting Session With the Female Pioneers explained by the Nenne Adaora Nwodo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Women in Cybersecurity: For Women. By Women.\" \/>\n<meta property=\"og:description\" content=\"Women in Cybersecurity - Women in Cybersecurity - A Myth-Busting Session With the Female Pioneers explained by the Nenne Adaora Nwodo.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-11T08:12:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-15T13:03:24+00:00\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Women in Cybersecurity: For Women. By Women.\",\"datePublished\":\"2020-07-11T08:12:23+00:00\",\"dateModified\":\"2023-06-15T13:03:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/\"},\"wordCount\":682,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/\",\"name\":\"Women in Cybersecurity - A Myth-Busting Session With the Pioneers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2020-07-11T08:12:23+00:00\",\"dateModified\":\"2023-06-15T13:03:24+00:00\",\"description\":\"Women in Cybersecurity - Women in Cybersecurity - A Myth-Busting Session With the Female Pioneers explained by the Nenne Adaora Nwodo.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/women-in-cybersecurity-for-women-by-women\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Women in Cybersecurity: For Women. By Women.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Women in Cybersecurity - A Myth-Busting Session With the Pioneers","description":"Women in Cybersecurity - Women in Cybersecurity - A Myth-Busting Session With the Female Pioneers explained by the Nenne Adaora Nwodo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/","og_locale":"en_US","og_type":"article","og_title":"Women in Cybersecurity: For Women. By Women.","og_description":"Women in Cybersecurity - Women in Cybersecurity - A Myth-Busting Session With the Female Pioneers explained by the Nenne Adaora Nwodo.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-07-11T08:12:23+00:00","article_modified_time":"2023-06-15T13:03:24+00:00","author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Women in Cybersecurity: For Women. By Women.","datePublished":"2020-07-11T08:12:23+00:00","dateModified":"2023-06-15T13:03:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/"},"wordCount":682,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/#primaryimage"},"thumbnailUrl":"","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/","name":"Women in Cybersecurity - A Myth-Busting Session With the Pioneers","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/#primaryimage"},"thumbnailUrl":"","datePublished":"2020-07-11T08:12:23+00:00","dateModified":"2023-06-15T13:03:24+00:00","description":"Women in Cybersecurity - Women in Cybersecurity - A Myth-Busting Session With the Female Pioneers explained by the Nenne Adaora Nwodo.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/women-in-cybersecurity-for-women-by-women\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Women in Cybersecurity: For Women. By Women."}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55117"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55117\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}