{"id":56038,"date":"2020-08-18T18:00:18","date_gmt":"2020-08-18T18:00:18","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56038"},"modified":"2026-01-23T08:10:38","modified_gmt":"2026-01-23T08:10:38","slug":"fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/","title":{"rendered":"Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56038\" class=\"elementor elementor-56038\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-43d6833a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"43d6833a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-245c7eb4\" data-id=\"245c7eb4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4719141f elementor-widget elementor-widget-text-editor\" data-id=\"4719141f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> 27<sup>th<\/sup> Oct, 2021<br \/><strong>Time:<\/strong> 10:00 AM EST \/ 8:00 AM MST\/ 7:30 PM IST<br \/><strong>Topic:<\/strong> Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><\/p><p>While recent years saw exponential growth in digital advancements and an increase expansion to remote workforce. This rapid change in operations and technologies was unforgiving in revealing inadequate security measures. Attackers are leveraging these security gaps and launching sophisticated attacks to exploit even minor security vulnerabilities to bypass security infrastructure, launch cyberattacks, infest systems and networks with malware, or conduct data breaches.<\/p><p>Some of the most common security vulnerabilities are:<\/p><ol><li>Malware infestation<\/li><li>SQL injection<\/li><li>Authorization bypass<\/li><li>Unrestricted upload of malicious content<\/li><li>Cross-Site Scripting (XSS)<\/li><\/ol><p>Security vulnerabilities allow attackers to potentially gain unauthorized access to systems, potentially allowing them to bypassing the authentication process, upload, edit or delete files, data records, and applications from systems. Therefore, it is incredibly vital to proactively identify and report vulnerabilities early on, to mitigate before they can be exploited. Organizations can build security research and <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\">incident handling response<\/a> strategies to proactively tackle the risk from security vulnerabilities. An incident management strategy includes creating a pre-planned process that considers every aspect of an incident, its after-effects, and countermeasures for a future incident of a similar type.<br \/>This webinar will focus on creating a proactive security management process that includes incident response and security research.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Introduction to Incident Handling and Response Plan<\/li><li>Importance of Offensive Security Research<\/li><li>Identifying areas to focus<\/li><li>How to leverage security vulnerabilities to educate development practices<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Stephanie-Domas-scaled.jpg.webp\" alt=\"Stephanie Domas\" width=\"200\" \/><strong>Stephanie Domas, <\/strong>Director Strategic Security &amp; Communications, Intel Corporation<\/p><p><strong>Bio: <\/strong> Stephanie Domas is the Director of Strategic Cybersecurity and Communications at Intel. She leads the development of complex security and communications strategies for hardware and firmware security. Prior to Intel, Stephanie spent 8 years focused on medical device cybersecurity, leading a startup company and consulting with a broad range of manufacturers from the newest startups to the industry giants. She is the founder and lead trainer for cybersecurity training company DazzleCatDuo. Her past experience includes 10 years of reverse engineering and vulnerability analysis research as a defense contractor.<\/p><p><img decoding=\"async\" class=\"size-full wp-image-56031 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Ricoh-Danielson-1.jpg-1.webp\" alt=\"Ricoh Danielson\" width=\"200\" height=\"179\" \/><strong>Ricoh Danielson, <\/strong>Executive Advisory of Incident Response and Digital Forensics \u2013 A Cyber Security Firm.<\/p><p><strong>Bio:<\/strong> Ricoh Danielson has elaborative experience in handling cyber incident response, cyber security, information security, privacy and compliance. Ricoh has helped major retailers, financial and health care organizations to mitigate threats and risks from an information security, privacy, and compliance standpoint.<\/p><p>Further, Ricoh has handled cyber incidents for major world-renowned healthcare, financial and retail firms. He is also a Digital Forensics expert for criminal and civil court cases.<\/p><p>Ricoh is a graduate of Thomas Jefferson School of Law, UCLA and the University of Arizona. He is also a US Army Combat Veteran who is actively involved in entrepreneurship.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/m0b8JUCBqO8\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: 27th Oct, 2021Time: 10:00 AM EST \/ 8:00 AM MST\/ 7:30 PM ISTTopic: Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues Watch Now Abstract: While recent years saw exponential growth in digital advancements and an increase expansion to remote workforce. This rapid change in operations and technologies was unforgiving in&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79107,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56038","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Vulnerabilities - Causes and Resolution Through Incident Handling<\/title>\n<meta name=\"description\" content=\"Security Vulnerabilities - Causes and Resolution Through Incident Handling explained by Stephanie Domas and Ricoh Danielson.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues\" \/>\n<meta property=\"og:description\" content=\"Security Vulnerabilities - Causes and Resolution Through Incident Handling explained by Stephanie Domas and Ricoh Danielson.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T18:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T08:10:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues\",\"datePublished\":\"2020-08-18T18:00:18+00:00\",\"dateModified\":\"2026-01-23T08:10:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/\"},\"wordCount\":493,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/\",\"name\":\"Security Vulnerabilities - Causes and Resolution Through Incident Handling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg\",\"datePublished\":\"2020-08-18T18:00:18+00:00\",\"dateModified\":\"2026-01-23T08:10:38+00:00\",\"description\":\"Security Vulnerabilities - Causes and Resolution Through Incident Handling explained by Stephanie Domas and Ricoh Danielson.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg\",\"width\":300,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Vulnerabilities - Causes and Resolution Through Incident Handling","description":"Security Vulnerabilities - Causes and Resolution Through Incident Handling explained by Stephanie Domas and Ricoh Danielson.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/","og_locale":"en_US","og_type":"article","og_title":"Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues","og_description":"Security Vulnerabilities - Causes and Resolution Through Incident Handling explained by Stephanie Domas and Ricoh Danielson.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T18:00:18+00:00","article_modified_time":"2026-01-23T08:10:38+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues","datePublished":"2020-08-18T18:00:18+00:00","dateModified":"2026-01-23T08:10:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/"},"wordCount":493,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/","name":"Security Vulnerabilities - Causes and Resolution Through Incident Handling","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg","datePublished":"2020-08-18T18:00:18+00:00","dateModified":"2026-01-23T08:10:38+00:00","description":"Security Vulnerabilities - Causes and Resolution Through Incident Handling explained by Stephanie Domas and Ricoh Danielson.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/Stephanie-DomasRicoh-Danielson-300x300-1.jpg","width":300,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamental-causes-of-vulnerabilities-and-how-incident-handling-can-solve-vulnerability-issues\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Fundamental Causes of Vulnerabilities and How Incident Handling Can Solve Vulnerability Issues"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56038"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56038\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79107"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}