{"id":56392,"date":"2022-02-17T04:20:19","date_gmt":"2022-02-17T04:20:19","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56392"},"modified":"2023-06-05T07:08:32","modified_gmt":"2023-06-05T07:08:32","slug":"roadmap-to-implementing-a-successful-information-security-program","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/","title":{"rendered":"Implementing Effective Information Security Architecture for Organizations: A Roadmap"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56392\" class=\"elementor elementor-56392\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f36bb11 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f36bb11\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30fa31ad\" data-id=\"30fa31ad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33dc3f60 elementor-widget elementor-widget-text-editor\" data-id=\"33dc3f60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> February 16, 2022<br \/><strong>Time:<\/strong> 3 p.m. CET\/ 9 a.m. EST\/ 7:30 p.m. IST<br \/><strong>Topic:<\/strong> Implementing Effective Information Security Architecture for Organizations: A Roadmap<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><\/p><p>In today\u2019s market, the success of an organization depends heavily on how it manages its information security architecture. No organization wants to be in a situation where its cybersecurity fails to meet the standards demanded by the current threat landscape. Implementing and managing cybersecurity practices in global businesses involves assessing the current state of an organization\u2019s security; selecting, building, and deploying security policies and frameworks; providing training on security education and awareness; and repeatedly testing security systems for flaws.<\/p><p>Security implementation is a continuous process. It is essential for business leaders to ensure that their infosec teams are provided with sufficient resources and that everyone in their organization is well versed in basic security knowledge to avoid security incidents that result from human error. Thus, in addition to assessing and monitoring their organization\u2019s networks and digital assets, IT and security leaders must create a dynamic culture that implements business-friendly security measures and controls while maintaining seamless operations when collaborating with colleagues and stakeholders.<\/p><p>This webinar explains how to plan and implement ideal cybersecurity programs in large and global enterprises at the operative and management levels. In light of the shift in the current IT landscape toward cloud-based operations and storage, it has become essential for application and storage security teams to pivot their operations efforts to the virtual space, and the current security market is gearing up to do the same.<\/p><p>As security technology trends involve cloud security and DevSecOps, managerial efforts should address how to implement the best available security frameworks and information security management systems to manage risk and ensure business continuity. The webinar also discusses structural approaches to risk-based implementation and strategic security management design.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>How to determine a clear and effective implementation approach using security progress ratings<\/li><li>The implementation frameworks available in the current market and their associated processes and procedures<\/li><li>How to ensure resource utilization and compliance<\/li><li>How to augment security programs with information security management systems<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Matthia-Head-Shot.jpg.webp\" alt=\"Matthias Muhlert\" width=\"200\" \/><strong>Matthias Muhlert, <\/strong>Chief Information Security Officer (CISO)<\/p><p><strong>Bio: <\/strong> Matthias Muhlert is a highly qualified information security professional with over 20 years of diversified experience developing and implementing information security processes and leading information security governance programs. He currently focuses on providing leadership and strategic development for information security services within an international organization. Matthias is adept at handling international projects and working on multicultural teams in dynamic, fast-paced, data-sensitive environments. He is an expert in identifying and mitigating security risks through conducting business process reviews and developing appropriate plans and solutions. He is a strong communicator with excellent interpersonal and negotiation skills and the ability to develop and maintain mutually beneficial relationships with key project stakeholders. He enjoys being part of and managing, motivating, and guiding cross-functional project and information security teams and thrives in high-pressure, challenging working environments.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/zKI0pvwinnA\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 16, 2022Time: 3 p.m. CET\/ 9 a.m. EST\/ 7:30 p.m. ISTTopic: Implementing Effective Information Security Architecture for Organizations: A Roadmap Watch Now Abstract: In today\u2019s market, the success of an organization depends heavily on how it manages its information security architecture. No organization wants to be in a situation where its cybersecurity fails&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79069,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56392","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Implementing Information Security Architecture for Organizations<\/title>\n<meta name=\"description\" content=\"In an evolving threat landscape, improving your organization\u2019s cybersecurity is crucial. Learn a CISO\u2019s risk-based approach to strategic security management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing Effective Information Security Architecture for Organizations: A Roadmap\" \/>\n<meta property=\"og:description\" content=\"In an evolving threat landscape, improving your organization\u2019s cybersecurity is crucial. Learn a CISO\u2019s risk-based approach to strategic security management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-17T04:20:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:08:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/Matthias-Muhlert-465x310-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Implementing Effective Information Security Architecture for Organizations: A Roadmap\",\"datePublished\":\"2022-02-17T04:20:19+00:00\",\"dateModified\":\"2023-06-05T07:08:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/\"},\"wordCount\":521,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Matthias-Muhlert-465x310-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/\",\"name\":\"Implementing Information Security Architecture for Organizations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Matthias-Muhlert-465x310-1.jpg\",\"datePublished\":\"2022-02-17T04:20:19+00:00\",\"dateModified\":\"2023-06-05T07:08:32+00:00\",\"description\":\"In an evolving threat landscape, improving your organization\u2019s cybersecurity is crucial. Learn a CISO\u2019s risk-based approach to strategic security management.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Matthias-Muhlert-465x310-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/Matthias-Muhlert-465x310-1.jpg\",\"width\":465,\"height\":310,\"caption\":\"Implementing Effective Information Security Architecture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/roadmap-to-implementing-a-successful-information-security-program\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Implementing Effective Information Security Architecture for Organizations: A Roadmap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Implementing Information Security Architecture for Organizations","description":"In an evolving threat landscape, improving your organization\u2019s cybersecurity is crucial. Learn a CISO\u2019s risk-based approach to strategic security management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/","og_locale":"en_US","og_type":"article","og_title":"Implementing Effective Information Security Architecture for Organizations: A Roadmap","og_description":"In an evolving threat landscape, improving your organization\u2019s cybersecurity is crucial. Learn a CISO\u2019s risk-based approach to strategic security management.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-02-17T04:20:19+00:00","article_modified_time":"2023-06-05T07:08:32+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/Matthias-Muhlert-465x310-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Implementing Effective Information Security Architecture for Organizations: A Roadmap","datePublished":"2022-02-17T04:20:19+00:00","dateModified":"2023-06-05T07:08:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/"},"wordCount":521,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/Matthias-Muhlert-465x310-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/","name":"Implementing Information Security Architecture for Organizations","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/Matthias-Muhlert-465x310-1.jpg","datePublished":"2022-02-17T04:20:19+00:00","dateModified":"2023-06-05T07:08:32+00:00","description":"In an evolving threat landscape, improving your organization\u2019s cybersecurity is crucial. Learn a CISO\u2019s risk-based approach to strategic security management.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/Matthias-Muhlert-465x310-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/02\/Matthias-Muhlert-465x310-1.jpg","width":465,"height":310,"caption":"Implementing Effective Information Security Architecture"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/roadmap-to-implementing-a-successful-information-security-program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Implementing Effective Information Security Architecture for Organizations: A Roadmap"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56392"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56392\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79069"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}