{"id":55228,"date":"2020-08-18T12:30:10","date_gmt":"2020-08-18T12:30:10","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55228"},"modified":"2024-10-24T11:31:44","modified_gmt":"2024-10-24T11:31:44","slug":"how-network-security-contributes-to-cyber-resilience","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/","title":{"rendered":"HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCE"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55228\" class=\"elementor elementor-55228\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b0fbbf1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1b0fbbf1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1300171f\" data-id=\"1300171f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-217992e7 elementor-widget elementor-widget-text-editor\" data-id=\"217992e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/MicrosoftTeams-image-2.jpg.webp\" alt=\"Bogdan Carlescu\" width=\"200\" \/><\/p><p><strong>Speaker:<\/strong> Bogdan Carlescu,<br \/><strong>Designation:<\/strong> Sr. Product Marketing Manager at Bitdefender<br \/><strong>Topic:<\/strong> HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCE<br \/><strong>Date of Webinar:<\/strong> 15<sup>th<\/sup> April , 2021<br \/><strong>Time and Location:<\/strong> 3:00 PM GMT\/ 8:30 PM IST<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Speaker Bio:<\/strong><\/p><p>Bogdan Carlescu is the Sr. Product Marketing Manager at Bitdefender and has extensive international experience in various roles across the IT Industry, including IT systems integration, cybersecurity, sales engineering, and product management. He enjoys combining his engineering background with industry knowledge and business sense to fulfill his professional mission: helping businesses grow by leveraging technology.<\/p><p><strong>Topic Abstract: <\/strong><\/p><p>As a business\u2019 dependency on digital increases, so are the risks post by cyber threats to its operations. It\u2019s not surprising that organizations around the world are concerned about being targets of cyberattacks and are actively looking to increase their cyber-resilience. Being ready to respond to security incidents enables them to mitigate the consequences of cyber breaches and quickly resume the normal state of business operations.<br \/>Improving cyber-resilience across the organization requires an integrated approach addressing people, processes, and technology. In this webinar, we will focus on how network security adaptive frameworks and <a href=\"https:\/\/www.eccu.edu\/blog\/technology\/the-latest-cybersecurity-technologies-and-trends\/\" target=\"_blank\" rel=\"noopener\">network security technologies<\/a> contribute to a better cybersecurity posture.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Changes in the enterprise environment that increased the need for resilience<\/li><li>New and enhanced cyber threats that pose risks to business operations.<\/li><li>Using an adaptive network security framework (Protect, Detect, Respond, and Predict) to stay ahead of attackers.<\/li><li>Increase cyber-resilience through an integrated approach: Extended detection and response.<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/-ZRoZPcsLQM\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker: Bogdan Carlescu,Designation: Sr. Product Marketing Manager at BitdefenderTopic: HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCEDate of Webinar: 15th April , 2021Time and Location: 3:00 PM GMT\/ 8:30 PM IST Watch Now Speaker Bio: Bogdan Carlescu is the Sr. Product Marketing Manager at Bitdefender and has extensive international experience in various roles across the IT Industry,&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79163,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55228","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Contribution of Network Security to Cyber Resilience | Bogdan Carlescu<\/title>\n<meta name=\"description\" content=\"How network security adaptive frameworks and network security technologies contribute to a better cybersecurity posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCE\" \/>\n<meta property=\"og:description\" content=\"How network security adaptive frameworks and network security technologies contribute to a better cybersecurity posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T12:30:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-24T11:31:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Bogdan-Carlescu-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCE\",\"datePublished\":\"2020-08-18T12:30:10+00:00\",\"dateModified\":\"2024-10-24T11:31:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/\"},\"wordCount\":270,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Bogdan-Carlescu-02.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/\",\"name\":\"Contribution of Network Security to Cyber Resilience | Bogdan Carlescu\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Bogdan-Carlescu-02.jpg\",\"datePublished\":\"2020-08-18T12:30:10+00:00\",\"dateModified\":\"2024-10-24T11:31:44+00:00\",\"description\":\"How network security adaptive frameworks and network security technologies contribute to a better cybersecurity posture.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Bogdan-Carlescu-02.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Bogdan-Carlescu-02.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-network-security-contributes-to-cyber-resilience\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Contribution of Network Security to Cyber Resilience | Bogdan Carlescu","description":"How network security adaptive frameworks and network security technologies contribute to a better cybersecurity posture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/","og_locale":"en_US","og_type":"article","og_title":"HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCE","og_description":"How network security adaptive frameworks and network security technologies contribute to a better cybersecurity posture.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T12:30:10+00:00","article_modified_time":"2024-10-24T11:31:44+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Bogdan-Carlescu-02.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCE","datePublished":"2020-08-18T12:30:10+00:00","dateModified":"2024-10-24T11:31:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/"},"wordCount":270,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Bogdan-Carlescu-02.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/","name":"Contribution of Network Security to Cyber Resilience | Bogdan Carlescu","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Bogdan-Carlescu-02.jpg","datePublished":"2020-08-18T12:30:10+00:00","dateModified":"2024-10-24T11:31:44+00:00","description":"How network security adaptive frameworks and network security technologies contribute to a better cybersecurity posture.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Bogdan-Carlescu-02.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Bogdan-Carlescu-02.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-network-security-contributes-to-cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"HOW NETWORK SECURITY CONTRIBUTES TO CYBER-RESILIENCE"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55228"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55228\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79163"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}