{"id":55390,"date":"2020-08-18T13:40:04","date_gmt":"2020-08-18T13:40:04","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55390"},"modified":"2023-06-05T07:13:38","modified_gmt":"2023-06-05T07:13:38","slug":"why-incident-response-should-be-the-next-thing-you-automate","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/","title":{"rendered":"Why Incident Response Should Be the Next Thing You Automate"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55390\" class=\"elementor elementor-55390\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2f06daea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2f06daea\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f9385c3\" data-id=\"1f9385c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2b37a145 elementor-widget elementor-widget-text-editor\" data-id=\"2b37a145\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/Harris-Picture.png\" alt=\"Harris D. Schwartz\" width=\"200\" \/><\/p><p><strong>Speaker:<\/strong> Harris D. Schwartz,<br \/><strong>Designation:<\/strong> Vice President Security Advisory, Aon<br \/><strong>Topic:<\/strong> Why Incident Response Should Be the Next Thing You Automate<br \/><strong>Date of Webinar:<\/strong> 26<sup>th<\/sup> May, 2021<br \/><strong>Time and Location:<\/strong> 7:30 AM PDT\/ 8:00 PM IST\/ 10:30 AM EDT\/ 3:30 PM BST<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Speaker Bio:<\/strong><\/p><p>Harris Schwartz is a Vice President within the Advisory Services practice. He leads the Cyber Resilience service line within the Cyber Solutions practice. Cyber Resilience services include IR Preparedness, Security Operation Capabilities, Crisis Management (BCP\/DR), Industrial Resilience (IOT IIOT, ICS), CISO Advisory, Security Culture, and Insider Threat Program development. In addition, Harris provides virtual CISO (vCISO) and strategic advisory services, business development support and enjoys building partnerships and collaborating across the firm.<\/p><p>Prior to joining Aon, Harris was a leader in Nippon Telegraph &amp; Telephone (NTT) Security Advisory Services practice running Executive Risk &amp; Advisory (globally), which also included vCISO services to a wide variety of companies and industry verticals. Harris is an experienced Information Security professional with over 30 years of private sector experience developing and implementing comprehensive security, risk and investigations programs.<\/p><p>Harris has held senior leadership security roles at Levi Strauss &amp; Company, Safeway-Albertsons, and The Walt Disney Company. Harris also has extensive experience building and developing global security programs, including cyber threat intelligence, data protection, privacy, and insider threat programs. Harris has extensive experience advising executives at Pharmaceutical and Biotech companies with cyber\/physical security, insider threat programs, and supply chain investigations. Harris&#8217; experience transcends cyber into physical security areas, including domestic terrorism, personal security vulnerability assessments, building security audits, insider threat mitigation programs, and general investigations.<\/p><p><strong>Key Certifications:<\/strong><\/p><p>Certified Computer Forensics Specialist (CCFS-DOJ)<\/p><p>Certified Data Privacy Solutions Engineer (CDPSE)<\/p><p><strong>Topic Abstract: <\/strong><\/p><p>Automation will take over a majority of manual processes shortly. With the growth in the technology industry comes the possibility of risk, thereby increasing cyber incidents.<\/p><p>AI in the next decade aims to automate repetitive tasks across all industries, including cybersecurity. Incident response, an essential aspect of cybersecurity, must also be automated for ease in process and faster reporting. This webinar talks about the challenges and scope of implementation of AI for repetitive tasks in incident response.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>A case study where AI was implemented during the cybersecurity incident response process<\/li><li>What incident response tasks could be automated in the next decade?<\/li><li>What challenges\/limitations might professionals face while automating the Incident Response Process<\/li><li>What is the scope of implementing automation, considering the complexity of the future of cyberattacks?<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/YmcGc_9LXgY\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Speaker: Harris D. Schwartz,Designation: Vice President Security Advisory, AonTopic: Why Incident Response Should Be the Next Thing You AutomateDate of Webinar: 26th May, 2021Time and Location: 7:30 AM PDT\/ 8:00 PM IST\/ 10:30 AM EDT\/ 3:30 PM BST Watch Now Speaker Bio: Harris Schwartz is a Vice President within the Advisory Services practice. He leads&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79147,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55390","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI in Incident Response - Challenges and Scope | Harris D. Schwartz<\/title>\n<meta name=\"description\" content=\"AI in Incident Response - Challenges and Scope explained by the Harris D. Schwartz, Vice President Security Advisory, Aon.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Incident Response Should Be the Next Thing You Automate\" \/>\n<meta property=\"og:description\" content=\"AI in Incident Response - Challenges and Scope explained by the Harris D. Schwartz, Vice President Security Advisory, Aon.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T13:40:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:13:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Harris-D.-Schwartz.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Why Incident Response Should Be the Next Thing You Automate\",\"datePublished\":\"2020-08-18T13:40:04+00:00\",\"dateModified\":\"2023-06-05T07:13:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/\"},\"wordCount\":438,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Harris-D.-Schwartz.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/\",\"name\":\"AI in Incident Response - Challenges and Scope | Harris D. Schwartz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Harris-D.-Schwartz.jpg\",\"datePublished\":\"2020-08-18T13:40:04+00:00\",\"dateModified\":\"2023-06-05T07:13:38+00:00\",\"description\":\"AI in Incident Response - Challenges and Scope explained by the Harris D. Schwartz, Vice President Security Advisory, Aon.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Harris-D.-Schwartz.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Harris-D.-Schwartz.jpg\",\"width\":465,\"height\":310,\"caption\":\"Harris-D.-Schwartz\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-incident-response-should-be-the-next-thing-you-automate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Why Incident Response Should Be the Next Thing You Automate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI in Incident Response - Challenges and Scope | Harris D. Schwartz","description":"AI in Incident Response - Challenges and Scope explained by the Harris D. Schwartz, Vice President Security Advisory, Aon.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/","og_locale":"en_US","og_type":"article","og_title":"Why Incident Response Should Be the Next Thing You Automate","og_description":"AI in Incident Response - Challenges and Scope explained by the Harris D. Schwartz, Vice President Security Advisory, Aon.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T13:40:04+00:00","article_modified_time":"2023-06-05T07:13:38+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Harris-D.-Schwartz.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Why Incident Response Should Be the Next Thing You Automate","datePublished":"2020-08-18T13:40:04+00:00","dateModified":"2023-06-05T07:13:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/"},"wordCount":438,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Harris-D.-Schwartz.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/","name":"AI in Incident Response - Challenges and Scope | Harris D. Schwartz","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Harris-D.-Schwartz.jpg","datePublished":"2020-08-18T13:40:04+00:00","dateModified":"2023-06-05T07:13:38+00:00","description":"AI in Incident Response - Challenges and Scope explained by the Harris D. Schwartz, Vice President Security Advisory, Aon.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Harris-D.-Schwartz.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Harris-D.-Schwartz.jpg","width":465,"height":310,"caption":"Harris-D.-Schwartz"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-incident-response-should-be-the-next-thing-you-automate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Why Incident Response Should Be the Next Thing You Automate"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55390"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55390\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79147"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}