{"id":56831,"date":"2022-03-09T10:00:04","date_gmt":"2022-03-09T10:00:04","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56831"},"modified":"2023-06-05T08:31:10","modified_gmt":"2023-06-05T08:31:10","slug":"cyberthreat-hunting-intelligence-iot-environments","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/","title":{"rendered":"Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56831\" class=\"elementor elementor-56831\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b7842fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b7842fd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-59ceb5c8\" data-id=\"59ceb5c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-221d4b6f elementor-widget elementor-widget-text-editor\" data-id=\"221d4b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> May 27, 2022<br \/><strong>Time:<\/strong> 10 a.m. EDT\/3 p.m. BST\/7:30 p.m. IST<br \/><strong>Topic:<\/strong> Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong><\/p><p>Cybersecurity is a never-ending fight. As security professionals develop advanced strategies to stop one attack, malicious hackers invent more sophisticated tactics for penetrating networks and covertly stealing confidential data. Cyberthreat hunting and cyberthreat intelligence are emerging fields in cybersecurity. Security experts employ these practices to identify patterns of suspicious activity and thwart potential threats.<\/p><p>Due to the shortcomings of traditional security measures in protecting Internet of Things (IoT) devices, many organizations are turning to artificial intelligence (AI) techniques, such as machine learning classification, for attack detection. This webinar will delve into AI techniques for threat hunting and threat intelligence in IoT environments and why they are an important part of any defense posture.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Why traditional security defense mechanisms are not suitable for protecting IoT environments<\/li><li>How to identify vulnerabilities that change organizational risk profile in an IoT environment<\/li><li>How AI techniques can be leveraged for cyberthreat hunting in IoT environments<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Ali-Pic.jpg.webp\" alt=\"Ali Dehghantanha\" width=\"200\" \/><strong>Ali Dehghantanha, <\/strong>Canada Research Chair in Cybersecurity and Threat Intelligence, University of Guelph<\/p><p><strong>Bio: <\/strong> Dr. Ali Dehghantanha is an academic entrepreneur in cybersecurity and Canada Research Chair in Cybersecurity and Threat Intelligence at the University of Guelph, Ontario, Canada. He is the director of the Cyber Science Lab and the founder and director of the Master of Cybersecurity and Threat Intelligence program at the University of Guelph.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/83WZnuypNJ4\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 27, 2022 Time: 10 a.m. EDT\/3 p.m. BST\/7:30 p.m. IST Topic: Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments Watch Now Abstract: Cybersecurity is a never-ending fight. As security professionals develop advanced strategies to stop one attack, malicious hackers invent more sophisticated tactics for penetrating networks and covertly stealing confidential data.&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79039,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56831","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyberthreat Hunting and Intelligence in IoT Environments<\/title>\n<meta name=\"description\" content=\"Cyberattacks on Internet of Things devices are increasing rapidly. Learn how cyberthreat intelligence and threat hunting can strengthen organizations\u2019 defenses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks on Internet of Things devices are increasing rapidly. Learn how cyberthreat intelligence and threat hunting can strengthen organizations\u2019 defenses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-09T10:00:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T08:31:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments\",\"datePublished\":\"2022-03-09T10:00:04+00:00\",\"dateModified\":\"2023-06-05T08:31:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/\"},\"wordCount\":277,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/\",\"name\":\"Cyberthreat Hunting and Intelligence in IoT Environments\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg\",\"datePublished\":\"2022-03-09T10:00:04+00:00\",\"dateModified\":\"2023-06-05T08:31:10+00:00\",\"description\":\"Cyberattacks on Internet of Things devices are increasing rapidly. Learn how cyberthreat intelligence and threat hunting can strengthen organizations\u2019 defenses.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Cyberthreat Hunting and Intelligence in IoT Environments\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyberthreat-hunting-intelligence-iot-environments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyberthreat Hunting and Intelligence in IoT Environments","description":"Cyberattacks on Internet of Things devices are increasing rapidly. Learn how cyberthreat intelligence and threat hunting can strengthen organizations\u2019 defenses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/","og_locale":"en_US","og_type":"article","og_title":"Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments","og_description":"Cyberattacks on Internet of Things devices are increasing rapidly. Learn how cyberthreat intelligence and threat hunting can strengthen organizations\u2019 defenses.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-03-09T10:00:04+00:00","article_modified_time":"2023-06-05T08:31:10+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments","datePublished":"2022-03-09T10:00:04+00:00","dateModified":"2023-06-05T08:31:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/"},"wordCount":277,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/","name":"Cyberthreat Hunting and Intelligence in IoT Environments","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg","datePublished":"2022-03-09T10:00:04+00:00","dateModified":"2023-06-05T08:31:10+00:00","description":"Cyberattacks on Internet of Things devices are increasing rapidly. Learn how cyberthreat intelligence and threat hunting can strengthen organizations\u2019 defenses.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Cyberthreat-Hunting-and-Intelligence-in-IoT-Environments.jpg","width":1938,"height":1292,"caption":"Cyberthreat Hunting and Intelligence in IoT Environments"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyberthreat-hunting-intelligence-iot-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56831","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56831"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56831\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79039"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}