{"id":55989,"date":"2020-08-18T17:50:16","date_gmt":"2020-08-18T17:50:16","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=55989"},"modified":"2023-06-05T07:12:03","modified_gmt":"2023-06-05T07:12:03","slug":"cloud-security-best-practices-to-protect-data-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/","title":{"rendered":"Cloud Security Best Practices to Protect Data in the Cloud"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"55989\" class=\"elementor elementor-55989\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-16ec167b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16ec167b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1210bae4\" data-id=\"1210bae4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e2838d3 elementor-widget elementor-widget-text-editor\" data-id=\"3e2838d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> 21<sup>st<\/sup> October, 2021<br \/><strong>Time:<\/strong> 10:30 AM BST \/ 3:00 PM IST<br \/><strong>Topic:<\/strong> Cloud Security Best Practices to Protect Data in the Cloud<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong><\/p><p>Abstract: In the wake of the pandemic, businesses are migrating to digital platforms. Specifically, businesses are switching to the cloud because of the scalability, agility, and cost optimization benefits it offers. \u201cGartner predicts that public cloud spending will exceed 45% of all enterprise IT spending by 2026, up from less than 17% in 2021.\u201d While there is a huge market demand, enterprises are still concerned about cloud cybersecurity and privacy issues owing to the rise in data breaches. Data loss, internal threats, hacked interfaces, and data breaches remain top security concerns for enterprises using the cloud.<\/p><p>In the discussion, panel members will discuss various trends of cloud adoption, security and privacy concerns, and some of the best practices to address them.<\/p><p><strong>Key Takeaways:<\/strong><\/p><ul><li>What is cloud computing and its benefits?<\/li><li>Define cloud deployment models.<\/li><li>What are the current trends of digitization and cloud adoption?<\/li><li>Why is such a trend developing?<\/li><li>What are the barriers to cloud adoption?<\/li><li>What are the best practices of cloud security to accelerate business when migrating to cloud?<\/li><\/ul><p><strong>Speakers:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-56030 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Dr_Wendy.png\" alt=\"Dr. Wendy Ng\" width=\"200\" height=\"219\" \/><strong>Dr. Wendy Ng, <\/strong>Cloud Security Architect Lead, OneWeb<\/p><p><strong>Bio:<\/strong> Wendy is the Cloud Security Architect Lead and subject matter expert at OneWeb, a communications company leveraging Leo Earth Orbit (LEO) satellites for egalitarian broadband connectivity. She defined the strategy for Experian&#8217;s global DevSecOps transformation initiative. With a background in infrastructure and cloud security, she is a keynote speaker and thought leader with over 70 articles published. Wendy honed her technical consulting skills from experiences in several industries, including aerospace, healthcare, financial services, telecommunications, transport logistics, and critical national infrastructure. She started her commercial career as a technical consultant at Cisco before experiences at PwC and Deloitte. She is a trained medical and data scientist with practical experience in statistics, machine learning, and AI algorithms. Wendy completed her doctoral studies at the University of Oxford in medical genetics and has contributed to the scientific community through peer-reviewed publications<\/p><p><img decoding=\"async\" class=\"size-full wp-image-56031 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/satya.png.webp\" alt=\"Satyavathi_Divadari\" width=\"200\" height=\"179\" \/><strong>Satyavathi Divadari, <\/strong>CyberRes Cloud CTO, Micro Focus.<\/p><p><strong>Bio:<\/strong> Satyavathi Divadari is working as CyberRes Cloud CTO at Micro Focus and is also the Chairman of the CSA Bangalore Chapter and a Global Advisory Board Member of CTIA in EC-Council. She is a noted speaker in national and international forums.<\/p><p>Satya has over 23 years of experience in the Banking, Telecom, IT\/ITES, and Media industries and leadership positions at News Corp, Cognizant, Wells Fargo, Capgemini, IBM, and Tata Communications Ltd.<\/p><p>She is a cross-functional enterprise architect in Cloud Security, Security Operations, Application Security, Network Security, Identity Governance and Administration, and Data Security. She has proven her expertise in defining and executing security controls around strategic digital transformations and built secure environments with an improved return of investment through Continuous Improvement and Innovation culture.<\/p><p>She holds various certifications that include AWS Cloud Solution Architect Associate, CFE, CIPT, TOGAF, PMP, and CISSP*.<\/p><p>She has been awarded in multiple forums for her contributions to the community including \u201cTop 20 Indian Women Influencers in Security 2020\u201d by Security India, \u201cCISO Top 100\u201d by CISO Platform, \u201cWomen in tech \u2013 Chief Mentor\u201d by Kamikaze B2B Media, and \u201cTop Technologists -Tech Beacon\u201d award by WEquity.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/iguggaOfXWg\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: 21st October, 2021Time: 10:30 AM BST \/ 3:00 PM ISTTopic: Cloud Security Best Practices to Protect Data in the Cloud Watch Now Abstract: Abstract: In the wake of the pandemic, businesses are migrating to digital platforms. Specifically, businesses are switching to the cloud because of the scalability, agility, and cost optimization benefits it offers.&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79112,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-55989","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Best Practices to Address Cloud Security and Other Concerns | ECCU<\/title>\n<meta name=\"description\" content=\"Best Practices to Address Cloud Security and Other Concerns explained by the Dr. Wendy Ng and Satyavathi Divadari through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security Best Practices to Protect Data in the Cloud\" \/>\n<meta property=\"og:description\" content=\"Best Practices to Address Cloud Security and Other Concerns explained by the Dr. Wendy Ng and Satyavathi Divadari through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T17:50:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:12:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Wendy-Satya-465x310-1-300x300-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cloud Security Best Practices to Protect Data in the Cloud\",\"datePublished\":\"2020-08-18T17:50:16+00:00\",\"dateModified\":\"2023-06-05T07:12:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/\"},\"wordCount\":564,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Wendy-Satya-465x310-1-300x300-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/\",\"name\":\"Best Practices to Address Cloud Security and Other Concerns | ECCU\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Wendy-Satya-465x310-1-300x300-1.jpg\",\"datePublished\":\"2020-08-18T17:50:16+00:00\",\"dateModified\":\"2023-06-05T07:12:03+00:00\",\"description\":\"Best Practices to Address Cloud Security and Other Concerns explained by the Dr. Wendy Ng and Satyavathi Divadari through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Wendy-Satya-465x310-1-300x300-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Wendy-Satya-465x310-1-300x300-1.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-best-practices-to-protect-data-in-the-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cloud Security Best Practices to Protect Data in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best Practices to Address Cloud Security and Other Concerns | ECCU","description":"Best Practices to Address Cloud Security and Other Concerns explained by the Dr. Wendy Ng and Satyavathi Divadari through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security Best Practices to Protect Data in the Cloud","og_description":"Best Practices to Address Cloud Security and Other Concerns explained by the Dr. Wendy Ng and Satyavathi Divadari through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T17:50:16+00:00","article_modified_time":"2023-06-05T07:12:03+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Wendy-Satya-465x310-1-300x300-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cloud Security Best Practices to Protect Data in the Cloud","datePublished":"2020-08-18T17:50:16+00:00","dateModified":"2023-06-05T07:12:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/"},"wordCount":564,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Wendy-Satya-465x310-1-300x300-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/","name":"Best Practices to Address Cloud Security and Other Concerns | ECCU","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Wendy-Satya-465x310-1-300x300-1.jpg","datePublished":"2020-08-18T17:50:16+00:00","dateModified":"2023-06-05T07:12:03+00:00","description":"Best Practices to Address Cloud Security and Other Concerns explained by the Dr. Wendy Ng and Satyavathi Divadari through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Wendy-Satya-465x310-1-300x300-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Wendy-Satya-465x310-1-300x300-1.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-best-practices-to-protect-data-in-the-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cloud Security Best Practices to Protect Data in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=55989"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/55989\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79112"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=55989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=55989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=55989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}