{"id":56064,"date":"2022-01-21T05:25:21","date_gmt":"2022-01-21T05:25:21","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56064"},"modified":"2024-04-22T07:01:06","modified_gmt":"2024-04-22T07:01:06","slug":"how-modernizing-incident-response-process-can-help-thwart-cybercrime","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/","title":{"rendered":"How Modernizing Incident Response Processes Can Help Stop Cybercrime"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56064\" class=\"elementor elementor-56064\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74b7ba33 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74b7ba33\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-49a9de6b\" data-id=\"49a9de6b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63ae9015 elementor-widget elementor-widget-text-editor\" data-id=\"63ae9015\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> 21<sup>st<\/sup> January, 2022<br><strong>Time:<\/strong> 9:00 AM CST\/4:00 PM CET\/8:30 PM IST<br><strong>Topic:<\/strong> How Modernizing Incident Response Processes Can Help Stop Cybercrime<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong><\/p>\n<p>Cybercrime&nbsp;has skyrocketed as businesses transitioned to a remote work culture in the wake of the pandemic.&nbsp;Ransomware attacks surged 93% in the last six months,&nbsp;fueled&nbsp;by an innovative attack technique called Triple Extortion.<\/p>\n<p>The faster organizations can detect and respond to data breaches and security incidents, the less likely they will significantly impact the data, customer trust, reputation, and revenue.<\/p>\n<p>Information Assurance (IA) is a crucial component for organizations because it targets the security of user data both in transit and throughout storage.<\/p>\n<p>This webinar focuses on why the incident response process should include contingencies for every known scenario and why it is important to keep working with the plan\u2014known scenarios or threat models change rapidly as new threats emerge. We can design and implement the most elaborate security response, but attackers rarely follow the blueprint we think they will. It is important to include every lesson learned in the real world, as well as the information we&#8217;ve learned from others&#8217; mistakes.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>How often do&nbsp;organizations need to review their Incident Response plan?<\/li>\n<li>Why&nbsp;Incident Response plans must keep up with external and internal changes to mitigate repercussions.<\/li>\n<li>How modernizing Incident response processes&nbsp;can ensure standardization,&nbsp;compliance,&nbsp;and rapid response.<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Ricoh-Danielson-1.jpg-1.webp\" alt=\"Ricoh Danielson\" width=\"200\"><strong>Ricoh Danielson, <\/strong>Executive Advisory of Incident Response and Digital Forensics &#8211; A Cyber Security Firm.<\/p>\n<p><strong>Bio: <\/strong> Ricoh Danielson has elaborative experience in handling cyber incident response, cyber security, information security, privacy and compliance. Ricoh has helped major retailers, financial and health care organizations to mitigate threats and risks from an information security, privacy, and compliance standpoint.<\/p>\n<p>Further, Ricoh has handled cyber incidents for major world-renowned healthcare, financial and retail firms. He is also a Digital Forensics expert for criminal and civil court cases.<\/p>\n<p>Ricoh is a graduate of Thomas Jefferson School of Law, UCLA and the University of Arizona. He is also a US Army Combat Veteran who is actively involved in entrepreneurship.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/ogC9pF2_pcg\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: 21st January, 2022Time: 9:00 AM CST\/4:00 PM CET\/8:30 PM ISTTopic: How Modernizing Incident Response Processes Can Help Stop Cybercrime Watch Now Abstract: Cybercrime&nbsp;has skyrocketed as businesses transitioned to a remote work culture in the wake of the pandemic.&nbsp;Ransomware attacks surged 93% in the last six months,&nbsp;fueled&nbsp;by an innovative attack technique called Triple Extortion. The&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79075,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56064","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Modernizing Incident Response Processes can Help Stop Cybercrime | EC-Council<\/title>\n<meta name=\"description\" content=\"How Modernizing Incident Response Processes can Help Stop Cybercrime explained by the Paul Caron through ECCU.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Modernizing Incident Response Processes Can Help Stop Cybercrime\" \/>\n<meta property=\"og:description\" content=\"How Modernizing Incident Response Processes can Help Stop Cybercrime explained by the Paul Caron through ECCU.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-21T05:25:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T07:01:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Ricoh-Danielson-465x310-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"How Modernizing Incident Response Processes Can Help Stop Cybercrime\",\"datePublished\":\"2022-01-21T05:25:21+00:00\",\"dateModified\":\"2024-04-22T07:01:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/\"},\"wordCount\":381,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Ricoh-Danielson-465x310-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/\",\"name\":\"How Modernizing Incident Response Processes can Help Stop Cybercrime | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Ricoh-Danielson-465x310-1.jpg\",\"datePublished\":\"2022-01-21T05:25:21+00:00\",\"dateModified\":\"2024-04-22T07:01:06+00:00\",\"description\":\"How Modernizing Incident Response Processes can Help Stop Cybercrime explained by the Paul Caron through ECCU.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Ricoh-Danielson-465x310-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Ricoh-Danielson-465x310-1.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How Modernizing Incident Response Processes Can Help Stop Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Modernizing Incident Response Processes can Help Stop Cybercrime | EC-Council","description":"How Modernizing Incident Response Processes can Help Stop Cybercrime explained by the Paul Caron through ECCU.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/","og_locale":"en_US","og_type":"article","og_title":"How Modernizing Incident Response Processes Can Help Stop Cybercrime","og_description":"How Modernizing Incident Response Processes can Help Stop Cybercrime explained by the Paul Caron through ECCU.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-01-21T05:25:21+00:00","article_modified_time":"2024-04-22T07:01:06+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Ricoh-Danielson-465x310-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"How Modernizing Incident Response Processes Can Help Stop Cybercrime","datePublished":"2022-01-21T05:25:21+00:00","dateModified":"2024-04-22T07:01:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/"},"wordCount":381,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Ricoh-Danielson-465x310-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/","name":"How Modernizing Incident Response Processes can Help Stop Cybercrime | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Ricoh-Danielson-465x310-1.jpg","datePublished":"2022-01-21T05:25:21+00:00","dateModified":"2024-04-22T07:01:06+00:00","description":"How Modernizing Incident Response Processes can Help Stop Cybercrime explained by the Paul Caron through ECCU.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Ricoh-Danielson-465x310-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Ricoh-Danielson-465x310-1.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-modernizing-incident-response-process-can-help-thwart-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"How Modernizing Incident Response Processes Can Help Stop Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56064"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56064\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79075"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}