{"id":55949,"date":"2020-08-18T17:10:05","date_gmt":"2020-08-18T17:10:05","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55949"},"modified":"2023-06-05T07:12:31","modified_gmt":"2023-06-05T07:12:31","slug":"increasing-popularity-of-web-applications-security-the-skills-required-to-succeed","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/","title":{"rendered":"Increasing Popularity of Web Applications Security &#038; the Skills Required to Succeed"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55949\" class=\"elementor elementor-55949\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b17e5d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b17e5d3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-222d4c8a\" data-id=\"222d4c8a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-793fc164 elementor-widget elementor-widget-text-editor\" data-id=\"793fc164\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> 29<sup>st<\/sup> Sep, 2021<br \/><strong>Time:<\/strong> 7:30 PM IST \/ 7:00 AM PST\/ 4:00 PM CET.<br \/><strong>Topic:<\/strong> Increasing Popularity of Web Applications Security &amp; the Skills Required to Succeed<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><\/p><p>The pandemic pushed scores of organizations to adapt to remote work, driving a culture of cloud-based collaborations and an enhanced usage of web applications. While this change was necessary, it came at the cost of security, making web applications vulnerable to cyberattacks. According to the report published by Acunetix, \u201c2020 saw the first year of several in which the state of web app security did not improve, and in the case of some high-severity vulnerabilities, worsened.\u201d And about 60% of the organization said that they are most concerned about the web application attacks in the State of AppSec 2021 report by Barracuda.<\/p><p>The demand for application security continues to soar as most of the global workforce is still working from home. The application security industry is forecasted to grow at 16.1% CAGR and become a $13.2 billion market by 2025. According to Forbes, the application security field is projected to grow 164% and will be one of the top 5 cybersecurity jobs in demand.<\/p><p>Join this expert-led webinar to learn all about web application security and the skills you need to succeed in this field. The session will be hosted by industry leaders who will explain what makes these skills valuable for a web application security professional.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Top web application vulnerabilities<\/li><li>Defending web applications<\/li><li>Web application penetration testing demand<\/li><li>Role of Web Application Hacking and Security to prepare for the future<\/li><\/ul><p><strong><span class=\"TextRun SCXW23540505 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW23540505 BCX0\">Speaker<\/span><\/span>:<\/strong><\/p><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Patric-Pic.jpg.webp\" alt=\"Patric J.M. Versteeg\" width=\"200\" \/><\/p><p><strong>Patric J.M. Versteeg, <\/strong>CISO at Viterra B.V.<\/p><p><strong>Bio: <\/strong>Patric Versteeg believes he can make this world a better place through profound information and cybersecurity management. He is constantly challenging traditional information and cybersecurity thinking.<\/p><p>Through continuous training and education, he has positioned himself amongst the top information and cybersecurity professionals. His primary interest lies in the fields of leadership, organizational behavior, and cybersecurity culture.<\/p><p>Patric has built and led information and cybersecurity teams around the world, leading strategic information and cybersecurity change. With 20+ years of experience in delivering strategic planning, engaging leadership, sharp analysis, and custom solutions, he ensures that businesses stay secure in the ever-changing security landscape.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/lo5ePcR11nY\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: 29st Sep, 2021Time: 7:30 PM IST \/ 7:00 AM PST\/ 4:00 PM CET.Topic: Increasing Popularity of Web Applications Security &amp; the Skills Required to Succeed Watch Now Abstract: The pandemic pushed scores of organizations to adapt to remote work, driving a culture of cloud-based collaborations and an enhanced usage of web applications. While this&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79121,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55949","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Essential Skills to Succeed in Web Application Security | ECCU<\/title>\n<meta name=\"description\" content=\"Essential Skills to Succeed in Web Application Security explained by the Patric J.M. Versteeg, CISO at Viterra B.V. through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increasing Popularity of Web Applications Security &amp; the Skills Required to Succeed\" \/>\n<meta property=\"og:description\" content=\"Essential Skills to Succeed in Web Application Security explained by the Patric J.M. Versteeg, CISO at Viterra B.V. through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T17:10:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:12:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Patric.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Increasing Popularity of Web Applications Security &#038; the Skills Required to Succeed\",\"datePublished\":\"2020-08-18T17:10:05+00:00\",\"dateModified\":\"2023-06-05T07:12:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/\"},\"wordCount\":394,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Patric.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/\",\"name\":\"Essential Skills to Succeed in Web Application Security | ECCU\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Patric.jpg\",\"datePublished\":\"2020-08-18T17:10:05+00:00\",\"dateModified\":\"2023-06-05T07:12:31+00:00\",\"description\":\"Essential Skills to Succeed in Web Application Security explained by the Patric J.M. Versteeg, CISO at Viterra B.V. through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Patric.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Patric.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Increasing Popularity of Web Applications Security &#038; the Skills Required to Succeed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Essential Skills to Succeed in Web Application Security | ECCU","description":"Essential Skills to Succeed in Web Application Security explained by the Patric J.M. Versteeg, CISO at Viterra B.V. through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/","og_locale":"en_US","og_type":"article","og_title":"Increasing Popularity of Web Applications Security & the Skills Required to Succeed","og_description":"Essential Skills to Succeed in Web Application Security explained by the Patric J.M. Versteeg, CISO at Viterra B.V. through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T17:10:05+00:00","article_modified_time":"2023-06-05T07:12:31+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Patric.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Increasing Popularity of Web Applications Security &#038; the Skills Required to Succeed","datePublished":"2020-08-18T17:10:05+00:00","dateModified":"2023-06-05T07:12:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/"},"wordCount":394,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Patric.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/","name":"Essential Skills to Succeed in Web Application Security | ECCU","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Patric.jpg","datePublished":"2020-08-18T17:10:05+00:00","dateModified":"2023-06-05T07:12:31+00:00","description":"Essential Skills to Succeed in Web Application Security explained by the Patric J.M. Versteeg, CISO at Viterra B.V. through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Patric.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Patric.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/increasing-popularity-of-web-applications-security-the-skills-required-to-succeed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Increasing Popularity of Web Applications Security &#038; the Skills Required to Succeed"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55949"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55949\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79121"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}