{"id":55878,"date":"2020-08-18T17:30:29","date_gmt":"2020-08-18T17:30:29","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55878"},"modified":"2026-01-27T09:05:46","modified_gmt":"2026-01-27T09:05:46","slug":"how-cisos-effectively-close-security-skill-gap-within-your-organization","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/","title":{"rendered":"How CISOs Effectively Close Security Gaps Within Your Organization"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55878\" class=\"elementor elementor-55878\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-38700fb0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"38700fb0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7fa62536\" data-id=\"7fa62536\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-62aa8ce5 elementor-widget elementor-widget-text-editor\" data-id=\"62aa8ce5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> 6<sup>th<\/sup> October, 2021<br \/><strong>Time:<\/strong> 8:30 PM IST\/ 4:00 PM BST\/ 8:00 AM PST<br \/><strong>Topic:\u00a0<\/strong>How CISOs Effectively Close Security Gaps Within Your Organization<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong><\/p><p>Cybersecurity skill shortage is a growing issue in the modern business landscape. Hiring and training competent professionals to counter cybersecurity threats is a significant challenge due to the lack of skilled professionals. Cyberattacks occur every 39 seconds, and their global cost has surpassed 5.2 trillion since 2019. Businesses can\u2019t afford to put off adding the right cybersecurity professionals to their team.<\/p><p>Today, businesses can leverage the power of CISOs to tackle this security skill shortage. These professionals hold the necessary expertise in training their teams to improve compliance and productivity. Join us for an exclusive webinar where experts will share their opinion on this issue and the measures needed to address it. Additionally, these experts will discuss how processes like automation and training for existing security professionals is helpful in the long run.<\/p><p><strong>Key Takeaways:<\/strong><\/p><ul><li>How CISOs should look at the security skills gap<\/li><li>What steps a CISO should take to acquire, develop, and manage information security teams<\/li><li>What role automation would play in addressing the issue<\/li><\/ul><p><strong>Speakers:<\/strong><\/p><p><img decoding=\"async\" class=\"alignleft wp-image-56027 size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Dr_Asaad.png\" alt=\"Dr Asaad Moosa\" width=\"200\" height=\"191\" \/><\/p><p><strong>Dr Asaad Moosa, <\/strong>CISO at BFBS, London, UK<\/p><p><strong>Bio:<\/strong> Asaad Moosa is the Chief Information Security Officer (CISO) at BFBS (British Forces Broadcasting Service). He is also the Chairman of the Cyber Security Committee at the UK Digital TV Group (DTG). He holds a PhD in Cyber Security from the University of Reading, UK and has worked as a lecturer of Computer Science and supervised over 20 Masters students in Cyber Security at Reading University. Asaad has over 10 international certifications in cyber security including the EC-Council Certified CISO. He is also a global advisory board member for <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\">EC-Council Incident Handling<\/a>.<\/p><p><img decoding=\"async\" class=\"size-full wp-image-56028 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Karl-Roberts.png\" alt=\"Karl Roberts\" width=\"200\" height=\"208\" \/><\/p><p><strong>Karl Roberts, <\/strong>Director \u2013 Archer IT Limited<\/p><p><strong>Bio:<\/strong> Karl Roberts is the Director of Archer IT limited, a small independent Information Security and Service Management consulting agency with over 20 years of IT experience. Karl has had the pleasure of working with some major companies in both private and public sectors including NHS Supply Shain and DHL. Karl is a certified ISO 27001:2013 Lead Implementor and Lead Auditor, as well as other IT Service Management qualifications.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><iframe id=\"attend\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/DSrXibHKJTQ\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: 6th October, 2021Time: 8:30 PM IST\/ 4:00 PM BST\/ 8:00 AM PSTTopic:\u00a0How CISOs Effectively Close Security Gaps Within Your Organization Watch Now Abstract: Cybersecurity skill shortage is a growing issue in the modern business landscape. Hiring and training competent professionals to counter cybersecurity threats is a significant challenge due to the lack of skilled&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79116,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55878","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Closing the Security Skills Gap as a CISO | Dr. Asaad Moosa<\/title>\n<meta name=\"description\" content=\"Closing the Security Skills Gap as a CISO explained by the Dr Asaad Moosa, CISO at BFBS, London, UK and Karl Roberts, Director \u2013 Archer IT Limited.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How CISOs Effectively Close Security Gaps Within Your Organization\" \/>\n<meta property=\"og:description\" content=\"Closing the Security Skills Gap as a CISO explained by the Dr Asaad Moosa, CISO at BFBS, London, UK and Karl Roberts, Director \u2013 Archer IT Limited.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T17:30:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T09:05:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Asaad-Karll.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"How CISOs Effectively Close Security Gaps Within Your Organization\",\"datePublished\":\"2020-08-18T17:30:29+00:00\",\"dateModified\":\"2026-01-27T09:05:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/\"},\"wordCount\":391,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Asaad-Karll.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/\",\"name\":\"Closing the Security Skills Gap as a CISO | Dr. Asaad Moosa\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Asaad-Karll.jpg\",\"datePublished\":\"2020-08-18T17:30:29+00:00\",\"dateModified\":\"2026-01-27T09:05:46+00:00\",\"description\":\"Closing the Security Skills Gap as a CISO explained by the Dr Asaad Moosa, CISO at BFBS, London, UK and Karl Roberts, Director \u2013 Archer IT Limited.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Asaad-Karll.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Asaad-Karll.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-cisos-effectively-close-security-skill-gap-within-your-organization\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How CISOs Effectively Close Security Gaps Within Your Organization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Closing the Security Skills Gap as a CISO | Dr. Asaad Moosa","description":"Closing the Security Skills Gap as a CISO explained by the Dr Asaad Moosa, CISO at BFBS, London, UK and Karl Roberts, Director \u2013 Archer IT Limited.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/","og_locale":"en_US","og_type":"article","og_title":"How CISOs Effectively Close Security Gaps Within Your Organization","og_description":"Closing the Security Skills Gap as a CISO explained by the Dr Asaad Moosa, CISO at BFBS, London, UK and Karl Roberts, Director \u2013 Archer IT Limited.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T17:30:29+00:00","article_modified_time":"2026-01-27T09:05:46+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Asaad-Karll.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"How CISOs Effectively Close Security Gaps Within Your Organization","datePublished":"2020-08-18T17:30:29+00:00","dateModified":"2026-01-27T09:05:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/"},"wordCount":391,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Asaad-Karll.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/","name":"Closing the Security Skills Gap as a CISO | Dr. Asaad Moosa","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Asaad-Karll.jpg","datePublished":"2020-08-18T17:30:29+00:00","dateModified":"2026-01-27T09:05:46+00:00","description":"Closing the Security Skills Gap as a CISO explained by the Dr Asaad Moosa, CISO at BFBS, London, UK and Karl Roberts, Director \u2013 Archer IT Limited.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Asaad-Karll.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Asaad-Karll.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-cisos-effectively-close-security-skill-gap-within-your-organization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"How CISOs Effectively Close Security Gaps Within Your Organization"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55878"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55878\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79116"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}