{"id":56788,"date":"2022-03-04T04:03:19","date_gmt":"2022-03-04T04:03:19","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56788"},"modified":"2024-04-22T07:06:15","modified_gmt":"2024-04-22T07:06:15","slug":"what-is-future-of-cybersecurity-webinar","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/","title":{"rendered":"What Is the Future of Cybersecurity?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56788\" class=\"elementor elementor-56788\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10cf210b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10cf210b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-637ad3ca\" data-id=\"637ad3ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39ca88ba elementor-widget elementor-widget-text-editor\" data-id=\"39ca88ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> April 28, 2022<br \/><strong>Time:<\/strong> 9 a.m. CDT\/3 p.m. BST\/7:30 p.m. IST<br \/><strong>Topic:<\/strong> What Is the Future of Cybersecurity?<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><\/p><p>With the increasing integration of digital technology into daily life, cyberthreats have become far more prevalent. Advanced cyberattacks are on the rise as organizations rush to incorporate innovative technologies into their business agendas and are thus exposed to new vulnerabilities. As attack vectors and methods become more complex and sophisticated, the scope of cybersecurity is also bound to evolve.<\/p><p>Cybersecurity is no longer just a problem for IT departments; it is now a priority concern for many leaders across industries. In this webinar, a panel of experts will shed light on what cybersecurity means today and how emerging technologies\u2014including artificial intelligence (AI), machine learning, cloud computing, and the Internet of Things (IoT)\u2014will impact the future of cybersecurity.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>How emerging attack vectors are influencing the cyberthreat landscape<\/li><li>The anticipated role of automation and AI in both assisting and mitigating cyberattacks<\/li><li>Cloud environments as the new digital battlefront<\/li><li>The impact of imminent IoT upscaling on cybersecurity<\/li><li>How and why the supply chain is projected to become a prime target for malicious actors<\/li><li>How users are becoming their own passwords through biometric identification<\/li><\/ul><p><strong>Speakers:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Michael-Pic.jpg.webp\" alt=\"Michael Schindler\" width=\"200\" \/><strong>Michael Schindler,<\/strong>Chief Information Security Officer, Educator, and Entrepreneur<\/p><p><strong>Bio: <\/strong> Michael Schindler, a veteran with 27 years of experience in cybersecurity, is an adjunct professor at Collin College in Frisco, Texas, where he teaches the capstone security management course. He also serves as Chief Information Security Officer for LifeLong Medical Care in California, though he currently focuses most of his energy on community engagement and building a new social engagement company. Michael is the conference director for ISSA North Texas; the tri-chair lead for the social transformation domain of Tech Titans, a local community think tank; and a Chamber of Commerce supporter. He has previously served as the executive director of a nonprofit focused on helping people establish and develop cybersecurity careers.<\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Tejas-Shroff.jpg.webp\" alt=\"Tejas Shroff\" width=\"200\" \/><strong>Tejas Shroff,<\/strong>Senior Director of Managed Security Services, NTT DATA Services<\/p><p><strong>Bio: <\/strong> Cybersecurity evangelist Tejas Shroff has led multiple cybersecurity projects and initiatives and is currently Senior Director of Managed Security Services at NTT DATA, where he manages the identity and access management practice. Tejas is also an adjunct professor at the University of Texas at Dallas (UTD), where he teaches various cybersecurity courses to graduate students at the Jindal School of Management. He is a member of FBI-affiliated nonprofit InfraGard National, serves on the advisory board for Collin College\u2019s cybersecurity program, and mentors the UTD Cybersecurity Club.<\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Sunil.jpg.webp\" alt=\"Sunil Varkey\" width=\"200\" \/><strong>Sunil Varkey,<\/strong>Vice President of Global Financial Services, Forescout Technologies Inc.<\/p><p><strong>Bio: <\/strong> Sunil Varkey has over 27 years of security leadership experience with global corporations in the banking, telecommunications, IT-enabled services, software, and manufacturing sectors. He is currently Vice President of Global Financial Services at Forescout and was previously the Global Head of Cyber Security Assessments and Testing at HSBC. He has also served as Symantec\u2019s Chief Technology Officer and Security Strategist for the Middle East, Africa, and Eastern Europe and Wipro Limited\u2019s Vice President and Chief Information Security Officer.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/51gTa4mrapE\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 28, 2022Time: 9 a.m. CDT\/3 p.m. BST\/7:30 p.m. ISTTopic: What Is the Future of Cybersecurity? Watch Now Abstract: With the increasing integration of digital technology into daily life, cyberthreats have become far more prevalent. Advanced cyberattacks are on the rise as organizations rush to incorporate innovative technologies into their business agendas and are&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79047,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56788","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is the Future of Cybersecurity? | EC-Council<\/title>\n<meta name=\"description\" content=\"Finding it hard to keep up with the ever-changing threat landscape? In this webinar, learn how emerging technologies are impacting the future of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is the Future of Cybersecurity?\" \/>\n<meta property=\"og:description\" content=\"Finding it hard to keep up with the ever-changing threat landscape? In this webinar, learn how emerging technologies are impacting the future of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-04T04:03:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T07:06:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/What-Is-the-Future-of-Cybersecurity_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"What Is the Future of Cybersecurity?\",\"datePublished\":\"2022-03-04T04:03:19+00:00\",\"dateModified\":\"2024-04-22T07:06:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/\"},\"wordCount\":545,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/What-Is-the-Future-of-Cybersecurity_1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/\",\"name\":\"What Is the Future of Cybersecurity? | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/What-Is-the-Future-of-Cybersecurity_1.jpg\",\"datePublished\":\"2022-03-04T04:03:19+00:00\",\"dateModified\":\"2024-04-22T07:06:15+00:00\",\"description\":\"Finding it hard to keep up with the ever-changing threat landscape? In this webinar, learn how emerging technologies are impacting the future of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/What-Is-the-Future-of-Cybersecurity_1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/What-Is-the-Future-of-Cybersecurity_1.jpg\",\"width\":465,\"height\":310,\"caption\":\"What Is the Future of Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/what-is-future-of-cybersecurity-webinar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What Is the Future of Cybersecurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is the Future of Cybersecurity? | EC-Council","description":"Finding it hard to keep up with the ever-changing threat landscape? In this webinar, learn how emerging technologies are impacting the future of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/","og_locale":"en_US","og_type":"article","og_title":"What Is the Future of Cybersecurity?","og_description":"Finding it hard to keep up with the ever-changing threat landscape? In this webinar, learn how emerging technologies are impacting the future of cybersecurity.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-03-04T04:03:19+00:00","article_modified_time":"2024-04-22T07:06:15+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/What-Is-the-Future-of-Cybersecurity_1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"What Is the Future of Cybersecurity?","datePublished":"2022-03-04T04:03:19+00:00","dateModified":"2024-04-22T07:06:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/"},"wordCount":545,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/What-Is-the-Future-of-Cybersecurity_1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/","name":"What Is the Future of Cybersecurity? | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/What-Is-the-Future-of-Cybersecurity_1.jpg","datePublished":"2022-03-04T04:03:19+00:00","dateModified":"2024-04-22T07:06:15+00:00","description":"Finding it hard to keep up with the ever-changing threat landscape? In this webinar, learn how emerging technologies are impacting the future of cybersecurity.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/What-Is-the-Future-of-Cybersecurity_1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/What-Is-the-Future-of-Cybersecurity_1.jpg","width":465,"height":310,"caption":"What Is the Future of Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/what-is-future-of-cybersecurity-webinar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"What Is the Future of Cybersecurity?"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56788"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56788\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79047"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}