{"id":56254,"date":"2020-08-18T20:00:01","date_gmt":"2020-08-18T20:00:01","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56254"},"modified":"2024-04-22T07:06:05","modified_gmt":"2024-04-22T07:06:05","slug":"threat-hunting-practices-for-security-operations-centers","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/","title":{"rendered":"Best Threat Hunting Practices for Security Operations Centers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56254\" class=\"elementor elementor-56254\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1ca4a5f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1ca4a5f2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2be1e58e\" data-id=\"2be1e58e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c4d65a9 elementor-widget elementor-widget-text-editor\" data-id=\"3c4d65a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> December 21, 2021<br \/><strong>Time:<\/strong>\u00a09 AM CST \/8:00 AM MST\/ 10:00 AM EST \/8:30 PM IST<br \/><strong>Topic: <\/strong> Best Threat Hunting Practices for Security Operations Centers<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong>As cybercrime continues to rise, it costs companies around the world millions of dollars every year. In response to the increasing frequency of malicious attacks, the most difficult challenge security operations centers (SOCs) face today is detecting existing threats that are as yet unknown within an organization.<\/p><p>Threat hunting, an information security strategy, is one of the biggest priorities for organizations today. A SOC equipped with active threat hunters can minimize the organization\u2019s risk of attack, both internally and externally.<\/p><p>This webinar explores some of the best threat hunting methodologies SOCs can implement to detect indicators of compromise and the tactics, techniques, and procedures and advanced threat protection methodologies that can ensure better threat detection and response.<\/p><p><strong>Key Takeaways:<\/strong><\/p><ul><li>What are the various threat hunting activities a SOC typically handles?<\/li><li>Types of threat hunting methodologies<\/li><li>What makes a great threat hunter?<\/li><\/ul><h4>Moderator:<\/h4><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Joshua_Copeland.png.webp\" alt=\"Joshua Copeland\" width=\"200\" \/><\/p><p><strong>Joshua Copeland,<\/strong> SOC Director at <span class=\"NormalTextRun BCX0 SCXW109443831\">AT<\/span><span class=\"NormalTextRun BCX0 SCXW109443831\">&amp;<\/span><span class=\"NormalTextRun BCX0 SCXW109443831\">T<\/span><\/p><p><strong>Bio:<\/strong> Joshua Copeland is a SOC Director in AT&amp;T\u2019s Consulting Division and has more than 20 years of experience in IT and cybersecurity. He retired from the U.S. Air Force in 2018, after which he worked in the federal, SLTT, and commercial sectors, specializing in security and the cloud. Josh holds multiple degrees and certifications in the industry and is a frequent guest speaker at various events and conferences, such as ASIS, AFCEA, and Cyber Security Heroes, to name a few.<\/p><hr \/><h4>Panelists:<\/h4><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mike_Miller.jpg.webp\" alt=\"Mike Miller\" width=\"200\" \/><\/p><p><strong>Mike Miller,<\/strong> vCISO &#8211; Chief Information Security Officer at Cyber Protection Group<\/p><p><strong>Bio:<\/strong> Mike Miller has over 25-year experience as a CISO (Chief Information Security Officer) specializing in GRC (Governance, Risk, and Compliance), PCI, Defensive (SOC \/ Intrusion Detection), and Offensive Security (Penetration Testing), and Incident Response. He is well-versed with OWASP, SANS, PCI, NIST standards and has obtained PCI &#8211; QSA, GIAC \/ GSEC Certifications.<\/p><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Lee_Thomas.png.webp\" alt=\"Lee Thomas\" width=\"200\" \/><strong>Lee Thomas, <\/strong> Sr. Director of Cyber Defense and Architecture at Raytheon Technologies<\/p><p><strong>Bio: <\/strong>Lee Thomas has a proven track record as a security professional and leader of enterprise security teams and programs within the cloud and hybrid service environments. He specializes in threat-based program maturity modeling for security operations and compliance, building SOC and DFIR programs, program design and architecture, compliance, privacy, and vendor vulnerability assessments. In addtion, he is an expert in the application of NIST, SOX, GDPR, and PCI-DSS frameworks in multi-tenant environments. Lee is also experienced in the art of communicating operations risk and responsibilities in cloud services to customers and internal agents and agencies, conducting defense of the enterprise, and supporting compliance processes by developing repeatable programs and processes that allows for measurement of security posture, year over year. He comes with over 18 years of delivering these services in numerous commercial verticals and the U.S. Department of Defence.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/T7jCaftvcgc\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 21, 2021Time:\u00a09 AM CST \/8:00 AM MST\/ 10:00 AM EST \/8:30 PM ISTTopic: Best Threat Hunting Practices for Security Operations Centers Watch Now Abstract: As cybercrime continues to rise, it costs companies around the world millions of dollars every year. In response to the increasing frequency of malicious attacks, the most difficult challenge&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79087,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56254","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Best Threat Hunting Practices for Security Operations Centers | EC-Council<\/title>\n<meta name=\"description\" content=\"Best Threat Hunting Practices for Security Operations Centers explained by the Joshua Copeland, Mike Miller and Lee Thomas.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Threat Hunting Practices for Security Operations Centers\" \/>\n<meta property=\"og:description\" content=\"Best Threat Hunting Practices for Security Operations Centers explained by the Joshua Copeland, Mike Miller and Lee Thomas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-18T20:00:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T07:06:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Best Threat Hunting Practices for Security Operations Centers\",\"datePublished\":\"2020-08-18T20:00:01+00:00\",\"dateModified\":\"2024-04-22T07:06:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/\"},\"wordCount\":504,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/\",\"name\":\"Best Threat Hunting Practices for Security Operations Centers | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg\",\"datePublished\":\"2020-08-18T20:00:01+00:00\",\"dateModified\":\"2024-04-22T07:06:05+00:00\",\"description\":\"Best Threat Hunting Practices for Security Operations Centers explained by the Joshua Copeland, Mike Miller and Lee Thomas.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-hunting-practices-for-security-operations-centers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Best Threat Hunting Practices for Security Operations Centers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Best Threat Hunting Practices for Security Operations Centers | EC-Council","description":"Best Threat Hunting Practices for Security Operations Centers explained by the Joshua Copeland, Mike Miller and Lee Thomas.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/","og_locale":"en_US","og_type":"article","og_title":"Best Threat Hunting Practices for Security Operations Centers","og_description":"Best Threat Hunting Practices for Security Operations Centers explained by the Joshua Copeland, Mike Miller and Lee Thomas.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-08-18T20:00:01+00:00","article_modified_time":"2024-04-22T07:06:05+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Best Threat Hunting Practices for Security Operations Centers","datePublished":"2020-08-18T20:00:01+00:00","dateModified":"2024-04-22T07:06:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/"},"wordCount":504,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/","name":"Best Threat Hunting Practices for Security Operations Centers | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg","datePublished":"2020-08-18T20:00:01+00:00","dateModified":"2024-04-22T07:06:05+00:00","description":"Best Threat Hunting Practices for Security Operations Centers explained by the Joshua Copeland, Mike Miller and Lee Thomas.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2020\/08\/01-Best-Threat-Hunting_Panel-Discussion-Banner-465x310-02.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-hunting-practices-for-security-operations-centers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Best Threat Hunting Practices for Security Operations Centers"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56254"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56254\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79087"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}