{"id":56315,"date":"2022-01-11T05:30:38","date_gmt":"2022-01-11T05:30:38","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56315"},"modified":"2023-06-05T07:08:59","modified_gmt":"2023-06-05T07:08:59","slug":"why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/","title":{"rendered":"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56315\" class=\"elementor elementor-56315\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-77419f1c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77419f1c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f50159\" data-id=\"4f50159\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-474ac8b4 elementor-widget elementor-widget-text-editor\" data-id=\"474ac8b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> 11<sup>th<\/sup> January, 2022<br \/><strong>Time:<\/strong> 8.30 AM PST\/10.00 PM IST<br \/><strong>Topic:<\/strong> The Skills Gap in Cloud Security: Why It Exists and How It Can Be Bridged<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><\/p><p>As the pandemic motivated many businesses to migrate their workloads to the cloud due to the increase in remote work, technologies such as cloud computing and IoT expanded the attack surface and stretched security talent thin. Ransomware attacks and incidents related to cloud misconfiguration have shown that, though businesses are excited to migrate to the cloud, their security capabilities fall short of addressing the associated complexities.<\/p><p>Now more than ever, digital transformation has exacerbated the demand for digital security and its associated professions. The value provided by cloud technology and storage cannot be refuted, and this technology has fueled an increasing need for enterprises to secure their virtual assets. Even if prominent cloud service providers (CSPs) are employed by organizations for their complete virtual data management, security is not the sole responsibility of the CSP. The shared architecture of the cloud requires organizations of all sizes to employ security personnel to assure that no attack surface or misconfiguration is exposed.\u00a0Join our webinar, where Jeff Sowell will discuss the critical skills gap in cloud security and the practical measures that can be taken to create new skills or fill in the existing gaps.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>The craze of cloud computing and storage technology<\/li><li>The cloud security problem<\/li><li>Security in cloud matters<\/li><li>Cloud security skills gap<\/li><li>Creating new skills\/filling the gap<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/bala-kannan.png.webp\" alt=\"bala kannan\" width=\"200\" \/><strong>Bala Kannan, <\/strong>Senior Cloud and Security Architect<\/p><p><strong>Bio: <\/strong>Bala Kannan is a senior cloud and security architect . He has more than 15 years of security experience and currently leads cloud, container, and API security in his role. He successfully implemented DevSecOps for platform and infrastructure services across his organization. Kannan has a successful track record designing security programs; building, managing, and retaining an international talent pool; and establishing strategic partnerships with leadership and internal stakeholders.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/GoXhua4FhMk\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: 11th January, 2022Time: 8.30 AM PST\/10.00 PM ISTTopic: The Skills Gap in Cloud Security: Why It Exists and How It Can Be Bridged Watch Now Abstract: As the pandemic motivated many businesses to migrate their workloads to the cloud due to the increase in remote work, technologies such as cloud computing and IoT expanded&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79076,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56315","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>THE SKILLS GAP IN CLOUD SECURITY : How can you leverage it<\/title>\n<meta name=\"description\" content=\"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED explained by the Bala Kannan, Senior Cloud and Security Architect.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED\" \/>\n<meta property=\"og:description\" content=\"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED explained by the Bala Kannan, Senior Cloud and Security Architect.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-11T05:30:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:08:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Bala-Kannan-465x310-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED\",\"datePublished\":\"2022-01-11T05:30:38+00:00\",\"dateModified\":\"2023-06-05T07:08:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/\"},\"wordCount\":359,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Bala-Kannan-465x310-3.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/\",\"name\":\"THE SKILLS GAP IN CLOUD SECURITY : How can you leverage it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Bala-Kannan-465x310-3.jpg\",\"datePublished\":\"2022-01-11T05:30:38+00:00\",\"dateModified\":\"2023-06-05T07:08:59+00:00\",\"description\":\"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED explained by the Bala Kannan, Senior Cloud and Security Architect.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Bala-Kannan-465x310-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Bala-Kannan-465x310-3.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"THE SKILLS GAP IN CLOUD SECURITY : How can you leverage it","description":"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED explained by the Bala Kannan, Senior Cloud and Security Architect.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/","og_locale":"en_US","og_type":"article","og_title":"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED","og_description":"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED explained by the Bala Kannan, Senior Cloud and Security Architect.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-01-11T05:30:38+00:00","article_modified_time":"2023-06-05T07:08:59+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Bala-Kannan-465x310-3.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED","datePublished":"2022-01-11T05:30:38+00:00","dateModified":"2023-06-05T07:08:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/"},"wordCount":359,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Bala-Kannan-465x310-3.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/","name":"THE SKILLS GAP IN CLOUD SECURITY : How can you leverage it","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Bala-Kannan-465x310-3.jpg","datePublished":"2022-01-11T05:30:38+00:00","dateModified":"2023-06-05T07:08:59+00:00","description":"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED explained by the Bala Kannan, Senior Cloud and Security Architect.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Bala-Kannan-465x310-3.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/01\/Bala-Kannan-465x310-3.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-is-there-a-skills-gap-in-cloud-security-how-can-you-leverage-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"THE SKILLS GAP IN CLOUD SECURITY: WHY IT EXISTS AND HOW IT CAN BE BRIDGED"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56315"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56315\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79076"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}