{"id":55249,"date":"2020-08-18T12:55:19","date_gmt":"2020-08-18T12:55:19","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55249"},"modified":"2024-11-04T07:36:11","modified_gmt":"2024-11-04T07:36:11","slug":"why-is-application-security-important-for-your-business","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/","title":{"rendered":"Why Is Application Security Important for Your Business?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55249\" class=\"elementor elementor-55249\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-43037120 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"43037120\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b79ceab\" data-id=\"b79ceab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24e88d49 elementor-widget elementor-widget-text-editor\" data-id=\"24e88d49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Webinar Type:<\/strong> Panel Discussion<br>\n<strong>Date:<\/strong> 28<sup>th<\/sup>&nbsp;April , 2021<br>\n<strong>Time:<\/strong>&nbsp;8.30 PM IST \/ 4.00 PM GMT \/ 5.00 PM CET<br>\n<strong>Topic: <\/strong>Why Is Application Security Important for Your Business?<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract: <\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Application security is no longer an afterthought but a foremost. Application security is important because current applications are often available on various networks and connected to the cloud, increasing vulnerabilities to threats and security breaches. There is a growing pressure and incentive not only to ensure security at the network level, but also within the applications themselves. One of the reasons for this is that hackers are preying on applications more with their attacks today than in the past. Application security testing can reveal weaknesses at the application level, helping to prevent these attacks.<\/span><\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ol>\n<li>To lay the foundation required by all application developers.<\/li>\n<li>To help development organizations produce secure applications.<\/li>\n<\/ol>\n<h4>Moderator:<\/h4>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Dragan-Pleskonjic.jpg.webp\" alt=\"Dragan Pleskonjic\" width=\"200\"><\/p>\n<p><strong>Dragan Pleskonjic,<\/strong> Entrepreneur | Executive | Advisor | Software &amp; Cyber Security | ML &amp; AI | Author | Researcher | Innovator | Founder | Leader<\/p>\n<p><strong>Bio:<\/strong> Dragan Pleskonjic is an experienced high-tech entrepreneur and executive with a strong background in information security, computer systems and networks security, software and application security, and software development methodologies and architectures. He also possesses proven leadership and talent for management and organization of successful teams. He has initiated and held leading positions in a number of industry projects, as well as in research and development projects. Has worked at top positions at international companies with global coverage, with experience in mergers, acquisitions, company integration, and startups. With excellent theoretical and practical knowledge, he leads research and development that is well-connected and aligned with professional work and best practices in companies, organizations, and institutions.<\/p>\n<hr>\n<h4>Panelists:<\/h4>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/Paresh-Rathod.jpg\" alt=\"Paresh Rathod\" width=\"200\"><\/p>\n<p><strong>Paresh Rathod,<\/strong> Technology and Innovation Expert, Educator<\/p>\n<p><strong>Bio:<\/strong> Paresh Rathod is a technology expert and educator with a holistic growth mindset. He is deeply passionate about advancing technology and making a positive impact on those around him. Committed to service, contribution, inspiration, and upliftment, Paresh dedicates his efforts to benefit individuals, communities, and organizations with whom he is associated.<\/p>\n<p> Paresh takes on various roles in organizations and communities, volunteering his professional expertise to support the growth of SMEs and community organizations.<\/p>\n<p>Through his tireless dedication, Paresh Rathod continues to pave the way toward a brighter future for humanity.<\/p>\n<hr>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Sundar-Pic.png.webp\" alt=\"Sundar Dandapani\" width=\"200\"><\/p>\n<p><strong>Sundar Dandapani,<\/strong> Director, Cybersecurity<\/p>\n<p><strong>Bio:<\/strong> As Director, Cybersecurity Practice at Capgemini, Sundar Dandapani is leading the Cyber Solutioning function. In this role, he and his team are responsible for crafting cyber solutions against client requirements across the full spectrum of cyber technologies and industry verticals.<br>\nPrior to his current role, he was the Cyber Practice lead in the Financial Services business unit for 4 years, successfully building capability across the Application Security, Identity &amp; Access Management, and Security Engineering domains. It is this role that helped Sundar realize the importance of application security and the huge gap between supply and demand of application security professionals in the market.<\/p>\n<p>He comes with an overall IT experience of 27 years and has donned multiple roles, covering pre-sales, solution architecture, security architecture reviews, identity &amp; access management implementation &amp; support, access governance, application support, system administration, and even mainframe hardware maintenance.<\/p>\n<hr>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Patric-Pic.jpg-1.webp\" alt=\"Patric J.M. Versteeg\" width=\"200\"><\/p>\n<p><strong>Patric J.M. Versteeg, <\/strong>Msc. CISO,&#8221;CISM CISA CRISC CGEIT CDPSE CSX-P CCT CISSP CCSP CCISO CEH ECSA LPT CNDA CHFI CCSK PCS SCF CIPP\/e CIPM CIPT FIP S-DPP S-ISME &#8220;<\/p>\n<p><strong>Bio:<\/strong> Patric believes he can make this world a better place through profound information &amp; cybersecurity management. He challenges traditional information and cybersecurity thinking. He starts with \u201cYes!\u201d<\/p>\n<p>Through continuous training and education, he has positioned himself amongst the top information and cybersecurity professionals. His primary interest lies in the fields of leadership, organizational behavior, and cybersecurity culture.<\/p>\n<p>Patric has built and led information and cybersecurity teams around the globe, leading strategic information and cybersecurity change. With 20+ years of experience in delivering strategic planning, engaging leadership, sharp analysis, and custom solutions, he ensures that businesses stay secure in the ever-changing security landscape.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><\/p>\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/UM0TO4e_ItI\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Webinar Type: Panel Discussion Date: 28th&nbsp;April , 2021 Time:&nbsp;8.30 PM IST \/ 4.00 PM GMT \/ 5.00 PM CET Topic: Why Is Application Security Important for Your Business? Watch Now Abstract: Application security is no longer an afterthought but a foremost. Application security is important because current applications are often available on various networks and&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79155,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55249","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Makes Application Security Vital for Businesses?<\/title>\n<meta name=\"description\" content=\"What Makes Application Security Vital for Businesses? explained by the Dragan Pleskonjic, Entrepreneur through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Is Application Security Important for Your Business?\" \/>\n<meta property=\"og:description\" content=\"What Makes Application Security Vital for Businesses? explained by the Dragan Pleskonjic, Entrepreneur through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T12:55:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-04T07:36:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/MicrosoftTeams-image-18.png\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Why Is Application Security Important for Your Business?\",\"datePublished\":\"2020-08-18T12:55:19+00:00\",\"dateModified\":\"2024-11-04T07:36:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/\"},\"wordCount\":679,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/MicrosoftTeams-image-18.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/\",\"name\":\"What Makes Application Security Vital for Businesses?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/MicrosoftTeams-image-18.png\",\"datePublished\":\"2020-08-18T12:55:19+00:00\",\"dateModified\":\"2024-11-04T07:36:11+00:00\",\"description\":\"What Makes Application Security Vital for Businesses? explained by the Dragan Pleskonjic, Entrepreneur through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/MicrosoftTeams-image-18.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/MicrosoftTeams-image-18.png\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-application-security-important-for-your-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Why Is Application Security Important for Your Business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Makes Application Security Vital for Businesses?","description":"What Makes Application Security Vital for Businesses? explained by the Dragan Pleskonjic, Entrepreneur through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/","og_locale":"en_US","og_type":"article","og_title":"Why Is Application Security Important for Your Business?","og_description":"What Makes Application Security Vital for Businesses? explained by the Dragan Pleskonjic, Entrepreneur through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T12:55:19+00:00","article_modified_time":"2024-11-04T07:36:11+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/MicrosoftTeams-image-18.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Why Is Application Security Important for Your Business?","datePublished":"2020-08-18T12:55:19+00:00","dateModified":"2024-11-04T07:36:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/"},"wordCount":679,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/MicrosoftTeams-image-18.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/","name":"What Makes Application Security Vital for Businesses?","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/MicrosoftTeams-image-18.png","datePublished":"2020-08-18T12:55:19+00:00","dateModified":"2024-11-04T07:36:11+00:00","description":"What Makes Application Security Vital for Businesses? explained by the Dragan Pleskonjic, Entrepreneur through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/MicrosoftTeams-image-18.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/MicrosoftTeams-image-18.png","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-application-security-important-for-your-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Why Is Application Security Important for Your Business?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55249"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55249\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79155"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}