{"id":57329,"date":"2022-03-16T10:00:07","date_gmt":"2022-03-16T10:00:07","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=57329"},"modified":"2023-06-05T07:05:16","modified_gmt":"2023-06-05T07:05:16","slug":"protecting-cloud-environments-ddos-attacks-cep-systems","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/","title":{"rendered":"Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57329\" class=\"elementor elementor-57329\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c71bd02 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c71bd02\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-296b752b\" data-id=\"296b752b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-531ded71 elementor-widget elementor-widget-text-editor\" data-id=\"531ded71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> August 25, 2022<br \/><strong>Time:<\/strong> 9:30 a.m. CDT\/10:30 a.m. EDT\/8 p.m. IST<br \/><strong>Topic:<\/strong> Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><br \/><strong>Abstract: <\/strong><br \/>Distributed Denial of Service (DDoS) attacks are emerging as one of the most concerning cyberthreats to cloud services. While organizations have benefited from cloud features such as the ability to store and process large volumes of data, increased efficiency, and reduced network latency, threat actors and cybercriminals are also leveraging sophisticated techniques to exploit cloud applications through DDoS attacks. Due to the massive data streams generated in the cloud, ongoing data monitoring is a crucial way to gain actionable intelligence that enables security issues to be detected and mitigated. Technologies like event stream and complex event processing (CEP) systems are designed to process, analyze, and monitor large volumes of data in real-time. CEP systems can be used to gain critical insights into DDoS-related security events, which can help cyber and IT teams detect and prevent DDoS attacks. This webinar will discuss the impact of CEP systems and how they can shield cloud applications and data against DDoS attacks.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>How adopting cloud technology impacts the DDoS threat landscape<\/li><li>Various challenges associated with DDoS attacks in cloud environments<\/li><li>The role of CEP systems in detecting advanced DDoS attacks<\/li><li>How CEP systems correlate with elements of cloud environments to mitigate DDoS attacks<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Venkatesan-200x200-1.jpg.webp\" alt=\"Venkatesan\" width=\"200\" \/><strong>Venkatesan P., <\/strong>Founder and Principal Cybersecurity Architect, Way11 Cybersecurity<\/p><p><strong>Bio:<\/strong> Venkatesan P., principal cybersecurity architect and founder of Way11 Cybersecurity, has over 20 years of experience in cybersecurity and information systems. He helps organizations protect their assets against internal and external threats and design successful, cost-effective solutions. His experience spans many verticals in internet security, including threat intelligence research, cloud computing (IaaS and PaaS), security metrics, firewalls, intrusion detection and prevention systems, anomaly detection, authentication, encryption, and secure network architecture.<\/p><p>Venkatesan has delivered various cybersecurity projects for Fortune 100 enterprises across the United States, Europe, and the Asia-Pacific region. He has extensive hands-on experience evaluating different technologies and defining their places in a diverse portfolio of products. He also has a deep understanding of the threats that enterprises face and how to perform a risk assessment based on their vulnerabilities. Venkatesan is a distinguished professor and lecturer who has experience teaching BAT and AAS-level cybersecurity courses.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/CkYxdKZInNQ\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: August 25, 2022Time: 9:30 a.m. CDT\/10:30 a.m. EDT\/8 p.m. ISTTopic: Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks Watch NowAbstract: Distributed Denial of Service (DDoS) attacks are emerging as one of the most concerning cyberthreats to cloud services. While organizations have benefited from cloud features such as the ability to store&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79027,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-57329","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mitigating DDoS Attacks in the Cloud with CEP Systems<\/title>\n<meta name=\"description\" content=\"Learn how cybersecurity teams can use complex event processing (CEP) systems to detect and prevent Distributed Denial of Service (DDoS) attacks in the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks\" \/>\n<meta property=\"og:description\" content=\"Learn how cybersecurity teams can use complex event processing (CEP) systems to detect and prevent Distributed Denial of Service (DDoS) attacks in the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-16T10:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:05:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks\",\"datePublished\":\"2022-03-16T10:00:07+00:00\",\"dateModified\":\"2023-06-05T07:05:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/\"},\"wordCount\":415,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/\",\"name\":\"Mitigating DDoS Attacks in the Cloud with CEP Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg\",\"datePublished\":\"2022-03-16T10:00:07+00:00\",\"dateModified\":\"2023-06-05T07:05:16+00:00\",\"description\":\"Learn how cybersecurity teams can use complex event processing (CEP) systems to detect and prevent Distributed Denial of Service (DDoS) attacks in the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/protecting-cloud-environments-ddos-attacks-cep-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mitigating DDoS Attacks in the Cloud with CEP Systems","description":"Learn how cybersecurity teams can use complex event processing (CEP) systems to detect and prevent Distributed Denial of Service (DDoS) attacks in the cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/","og_locale":"en_US","og_type":"article","og_title":"Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks","og_description":"Learn how cybersecurity teams can use complex event processing (CEP) systems to detect and prevent Distributed Denial of Service (DDoS) attacks in the cloud.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-03-16T10:00:07+00:00","article_modified_time":"2023-06-05T07:05:16+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks","datePublished":"2022-03-16T10:00:07+00:00","dateModified":"2023-06-05T07:05:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/"},"wordCount":415,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/","name":"Mitigating DDoS Attacks in the Cloud with CEP Systems","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg","datePublished":"2022-03-16T10:00:07+00:00","dateModified":"2023-06-05T07:05:16+00:00","description":"Learn how cybersecurity teams can use complex event processing (CEP) systems to detect and prevent Distributed Denial of Service (DDoS) attacks in the cloud.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mitigating-DDoS-Attacks-in-the-Cloud-with-CEP-Systems-ECCU_New.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/protecting-cloud-environments-ddos-attacks-cep-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Protecting the Cloud Computing Environment with CEP Shield against DDoS Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=57329"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57329\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79027"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=57329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=57329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=57329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}