{"id":55431,"date":"2020-08-18T14:30:15","date_gmt":"2020-08-18T14:30:15","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55431"},"modified":"2024-04-22T07:00:44","modified_gmt":"2024-04-22T07:00:44","slug":"cyber-risk-quantified-why-you-need-it-and-how-to-start","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/","title":{"rendered":"Cyber Risk Quantified: Why You Need It and How to Start?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55431\" class=\"elementor elementor-55431\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6cd56800 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6cd56800\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6dfabd22\" data-id=\"6dfabd22\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d9d6c09 elementor-widget elementor-widget-text-editor\" data-id=\"6d9d6c09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Webinar Type:<\/strong> Panel Discussion<br \/><strong>Date:<\/strong> 24<sup>th<\/sup>\u00a0June , 2021<br \/><strong>Time:<\/strong>\u00a010 AM EST\/ 9 AM CST\/ 7:30 PM IST<br \/><strong>Topic: <\/strong>Cyber Risk Quantified: Why You Need It and How to Start?<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong>The need to manage cyber risk is more pressing than ever. According to the World Economic Forum\u2019s The Global Risks Report 2021, cybersecurity failure ranks among the top ten risks for businesses in terms of likelihood. In terms of impact, cybersecurity failure (IT Infrastructure Failure) didn\u2019t even make a list in 2017\u2014but now they\u2019re listed at No. 10. As cyber risk grows, so does the need to quantify it. If you can\u2019t quantify risk, how can you calculate how much cyber insurance you need? Or prioritize investments in security controls based on where you see the most risk? Or calculate the return on those investments? The good news is you can quantify cyber risk.<\/p><p>The future of any organization fairly depends upon how well it predicts and responds to challenges &#8211; cybersecurity risks being among the top challenges. An organization should be able to quantify its risks and prepare itself accordingly to make strategic decisions.<\/p><p>For this reason, risk quantification is gaining attention from industry experts; and along with evaluating risk qualitatively, organizations are interested in quantifying them.<\/p><p><strong>Key Takeaways:<\/strong><\/p><ol><li>What is Risk Quantification and what is the difference between Qualitative Risks and Quantitative Risks?<\/li><li>Why is it important for an organization<\/li><li>Process \/methodology to implement.<\/li><li>Case Study \/ Recent industry example.<\/li><li>Challenges<\/li><\/ol><h4>Moderator:<\/h4><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Ken.jpg.webp\" alt=\"Ken Muir\" width=\"200\" \/><\/p><p><strong>Ken Muir,<\/strong> vCISO, LCM Security Inc.<\/p><p><strong>Bio:<\/strong> Ken Muir is a globally recognized leader in Information Technology and Cybersecurity. vCISO, author, speaker, research contributor, and think tank member, Ken has been recognized as one of the Top 100 Cybersecurity Thought Leaders in 2020. Ken Muir has 27 years of experience in cybersecurity and holds two of the top globally recognized certifications from Information Systems Audit and Control Association, Inc. (ISACA). In his career, Ken has served as Chief Information Security Officer to many companies and has worked on national security projects for Canada and the United States. Ken is a thought leader on cybersecurity topics, including the importance of building a solid cybersecurity strategy, cyber warfare, cyber-criminal enterprises, nation-state espionage, and Deep Learning AI for cybersecurity. Ken is a member of the EC-Council Global Advisory Board and involved in the Global AI Think Tank. He is a research contributor, and his insights have been published in 2021 Predictions, Top 100 Thought Leaders, Top Cybersecurity Magazine, IT World Canada, and other publications. Ken has been a featured speaker at dozens of private and public sector events, including the Global Counter-Terrorism Council. Ken is currently involved in a global committee developing recommendations for an update to the Centre for Internet Security Critical Security Controls, a global standard that will come out in 2021.<\/p><hr \/><h4>Panelists:<\/h4><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Vinit.jpg.webp\" alt=\"Vinit Sinha\" width=\"200\" \/><\/p><p><strong>Vinit Sinha,<\/strong> Director \u2013 Cybersecurity SME, Mastercard<\/p><p><strong>Bio:<\/strong> With more than 15 years of experience in information security, cybersecurity, data privacy, and risk management, Vinit Sinha is a multifaceted technical leader. With profound knowledge and experience in information security, cybersecurity, data privacy, audit, governance, and compliance, he has delivered optimal solutions to automobiles, telecom, BFSI, IT\/ITES, etc.<br \/>Along with being an advisory board member to EC-Council cybersecurity certifications, he is also a joint secretary of the ISACA New Delhi Chapter and a prominent speaker advocating for information security solutions against various attack vectors.<br \/>His specializations include identity and access management, threat and vulnerability management, API security, mobile security, threat intelligence, malware analysis, governance, compliance, risk management, and cyber resiliency.<\/p><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Ross-Headshot.jpg.webp\" alt=\"Ross Leo\" width=\"200\" \/><\/p><p><strong>Ross Leo, <\/strong> CISO\/Chief Security Architect, Galen Data. Inc<\/p><p><strong>Bio:<\/strong> Ross Leo has been in Information Systems since 1977 and has been an Information Security professional since 1980. Upon attaining his CISSP certification in 1997, Mr. Leo was recruited by Hal Tipton to join ISC2 (a professional role) as Chairman of the Curriculum Development Committee, a role he held until 2004. During his tenure, he directed the team that produced the original curriculum that remains the present foundation of the CISSP used to train CISSP candidates worldwide. Mr. Leo has trained over 13,000 CISSP candidates since 1998 and nearly 4500 in HIPAA privacy and security compliance since 2004.<\/p><p>He is a Charter member of the EC-Council CHFI Advisory Board, a global panel of experts working to establish professional standards and practices in data forensics. He serves on scientific working groups at NIST in both Cloud Security and Forensics. He serves on The American Board of Forensic Engineering and Technology (ABFET) for The American College of Forensic Examiners Institute (ACFEI) and holds several certifications from ISC2 and ISACA. Mr. Leo has been accorded Fellow status for the American Board for Certification in Homeland Security (ABCHS).<\/p><p>Mr. Leo attended Graduate School at the University of Houston and Undergraduate school at Southern Illinois University. Born in Anaheim, California, Mr. Leo lives in Clear Lake City, Texas.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/A6vY2jC8ORk\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Webinar Type: Panel DiscussionDate: 24th\u00a0June , 2021Time:\u00a010 AM EST\/ 9 AM CST\/ 7:30 PM ISTTopic: Cyber Risk Quantified: Why You Need It and How to Start? Watch Now Abstract: The need to manage cyber risk is more pressing than ever. According to the World Economic Forum\u2019s The Global Risks Report 2021, cybersecurity failure ranks among&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55431","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Risk Quantified: Why You Need It and How to Start? | EC-Council<\/title>\n<meta name=\"description\" content=\"Cyber Risk Quantified: Why You Need It and How to Start? explained by the Ken Muir, Vinit Sinha and Ross Leo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Risk Quantified: Why You Need It and How to Start?\" \/>\n<meta property=\"og:description\" content=\"Cyber Risk Quantified: Why You Need It and How to Start? explained by the Ken Muir, Vinit Sinha and Ross Leo.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T14:30:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T07:00:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cyber Risk Quantified: Why You Need It and How to Start?\",\"datePublished\":\"2020-08-18T14:30:15+00:00\",\"dateModified\":\"2024-04-22T07:00:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/\"},\"wordCount\":825,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/\",\"name\":\"Cyber Risk Quantified: Why You Need It and How to Start? | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg\",\"datePublished\":\"2020-08-18T14:30:15+00:00\",\"dateModified\":\"2024-04-22T07:00:44+00:00\",\"description\":\"Cyber Risk Quantified: Why You Need It and How to Start? explained by the Ken Muir, Vinit Sinha and Ross Leo.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg\",\"width\":465,\"height\":310,\"caption\":\"Cyber-Risk-Quantified_Panel-Discussion-Banner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-risk-quantified-why-you-need-it-and-how-to-start\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Risk Quantified: Why You Need It and How to Start?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Risk Quantified: Why You Need It and How to Start? | EC-Council","description":"Cyber Risk Quantified: Why You Need It and How to Start? explained by the Ken Muir, Vinit Sinha and Ross Leo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Risk Quantified: Why You Need It and How to Start?","og_description":"Cyber Risk Quantified: Why You Need It and How to Start? explained by the Ken Muir, Vinit Sinha and Ross Leo.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T14:30:15+00:00","article_modified_time":"2024-04-22T07:00:44+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cyber Risk Quantified: Why You Need It and How to Start?","datePublished":"2020-08-18T14:30:15+00:00","dateModified":"2024-04-22T07:00:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/"},"wordCount":825,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/","name":"Cyber Risk Quantified: Why You Need It and How to Start? | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg","datePublished":"2020-08-18T14:30:15+00:00","dateModified":"2024-04-22T07:00:44+00:00","description":"Cyber Risk Quantified: Why You Need It and How to Start? explained by the Ken Muir, Vinit Sinha and Ross Leo.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Cyber-Risk-Quantified_Panel-Discussion-Banner.jpg","width":465,"height":310,"caption":"Cyber-Risk-Quantified_Panel-Discussion-Banner"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-risk-quantified-why-you-need-it-and-how-to-start\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cyber Risk Quantified: Why You Need It and How to Start?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55431"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55431\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79133"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}