{"id":55962,"date":"2020-08-18T17:55:08","date_gmt":"2020-08-18T17:55:08","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55962"},"modified":"2026-01-27T09:00:33","modified_gmt":"2026-01-27T09:00:33","slug":"what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/","title":{"rendered":"What is the Importance of Operational Technology Cybersecurity in Technological Advancement?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55962\" class=\"elementor elementor-55962\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-107bd87f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"107bd87f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e79c655\" data-id=\"3e79c655\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-202bac07 elementor-widget elementor-widget-text-editor\" data-id=\"202bac07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> 26<sup>th<\/sup> Oct, 2021<br \/><strong>Time:<\/strong> 10 AM EST\/ 7:30 PM IST\/ 3 PM BST<br \/><strong>Topic:<\/strong> What is the Importance of Operational Technology Cybersecurity in Technological Advancement?<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><\/p><p>With our reliance on digital, sensory, and integrated applications on the rise, Operational Technology has become more critical than ever and set to skyrocket by 2025 according to Gartner. It means that becoming well versed in the nitty-gritty of Operational Technology is now essential to enhance productivity and minimize security challenges.<br \/>After a thorough analysis of security training and the roles and responsibilities of security professionals, the webinar on the importance of Operational Technology (OT) Cybersecurity in technological advancement will also cover how to proceed after a threat has been detected. A holistic comprehension of real-time threat detection, OT incident response, disaster recovery plans, a secure configuration process, and the patching procedure will give you an edge over your professional peers. Join Mirel Sehic as he deep dives into the world of Operational Technology to offer the information you need.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Understand the difference between IT and OT environments.<\/li><li>Gain a deeper insight into the threats that can be exploited in OT environments and work on their real-time detection<\/li><li>Set a clear path for OT <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\">cybersecurity incident response<\/a>, configuration process, patching procedure, disaster recovery plan, and the overall maturity improvement.<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"alignleft wp-image-2265 size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mirel-Sehic-Headshot.jpg.webp\" alt=\"Mirel Sehic\" width=\"200\" height=\"200\" \/><strong>Mirel Sehic, <\/strong>Global Director Cybersecurity for Honeywell Building Technologies (HBT)<\/p><p><strong>Bio: <\/strong> Mirel Sehic is the Global Director of Cybersecurity for Honeywell Building Technologies (HBT). Mirel has global experience working with engineering, operations, solution engineering, and sales teams across various Major Hazard Facilities (MHFs) as well as critical infrastructure.<br \/>Mirel is dedicated to addressing challenges and driving new growth opportunities, capabilities, and efficiencies. Mirel promotes best practice excellence ensuring productivity and performance improvements integrating Digital Operations, ICT, and Cybersecurity.<br \/>Mirel is based out of Atlanta, USA and holds a Bachelor of Engineering (Mechatronics and Robotics) with Honors, and Bachelor of Science (Mathematical Modelling) with Honors from Deakin University, Australia.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/YF2jWInfosI\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: 26th Oct, 2021Time: 10 AM EST\/ 7:30 PM IST\/ 3 PM BSTTopic: What is the Importance of Operational Technology Cybersecurity in Technological Advancement? Watch Now Abstract: With our reliance on digital, sensory, and integrated applications on the rise, Operational Technology has become more critical than ever and set to skyrocket by 2025 according to&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55962","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Importance of OT Cybersecurity in Technological Advancement<\/title>\n<meta name=\"description\" content=\"Importance of OT Cybersecurity in Technological Advancement explained by the Mirel Sehic, Global Director Cybersecurity for Honeywell Building Technologies (HBT).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is the Importance of Operational Technology Cybersecurity in Technological Advancement?\" \/>\n<meta property=\"og:description\" content=\"Importance of OT Cybersecurity in Technological Advancement explained by the Mirel Sehic, Global Director Cybersecurity for Honeywell Building Technologies (HBT).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T17:55:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T09:00:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Mirel-Sehic-465x310-1-300x300-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"What is the Importance of Operational Technology Cybersecurity in Technological Advancement?\",\"datePublished\":\"2020-08-18T17:55:08+00:00\",\"dateModified\":\"2026-01-27T09:00:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/\"},\"wordCount\":356,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Mirel-Sehic-465x310-1-300x300-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/\",\"name\":\"Importance of OT Cybersecurity in Technological Advancement\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Mirel-Sehic-465x310-1-300x300-1.jpg\",\"datePublished\":\"2020-08-18T17:55:08+00:00\",\"dateModified\":\"2026-01-27T09:00:33+00:00\",\"description\":\"Importance of OT Cybersecurity in Technological Advancement explained by the Mirel Sehic, Global Director Cybersecurity for Honeywell Building Technologies (HBT).\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Mirel-Sehic-465x310-1-300x300-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Mirel-Sehic-465x310-1-300x300-1.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What is the Importance of Operational Technology Cybersecurity in Technological Advancement?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Importance of OT Cybersecurity in Technological Advancement","description":"Importance of OT Cybersecurity in Technological Advancement explained by the Mirel Sehic, Global Director Cybersecurity for Honeywell Building Technologies (HBT).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/","og_locale":"en_US","og_type":"article","og_title":"What is the Importance of Operational Technology Cybersecurity in Technological Advancement?","og_description":"Importance of OT Cybersecurity in Technological Advancement explained by the Mirel Sehic, Global Director Cybersecurity for Honeywell Building Technologies (HBT).","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T17:55:08+00:00","article_modified_time":"2026-01-27T09:00:33+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Mirel-Sehic-465x310-1-300x300-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"What is the Importance of Operational Technology Cybersecurity in Technological Advancement?","datePublished":"2020-08-18T17:55:08+00:00","dateModified":"2026-01-27T09:00:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/"},"wordCount":356,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Mirel-Sehic-465x310-1-300x300-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/","name":"Importance of OT Cybersecurity in Technological Advancement","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Mirel-Sehic-465x310-1-300x300-1.jpg","datePublished":"2020-08-18T17:55:08+00:00","dateModified":"2026-01-27T09:00:33+00:00","description":"Importance of OT Cybersecurity in Technological Advancement explained by the Mirel Sehic, Global Director Cybersecurity for Honeywell Building Technologies (HBT).","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Mirel-Sehic-465x310-1-300x300-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Mirel-Sehic-465x310-1-300x300-1.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-the-importance-of-operational-technology-cybersecurity-in-technological-advancement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"What is the Importance of Operational Technology Cybersecurity in Technological Advancement?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55962"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55962\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79110"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}