{"id":57514,"date":"2022-09-15T10:00:00","date_gmt":"2022-09-15T10:00:00","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=57514"},"modified":"2023-07-24T05:56:56","modified_gmt":"2023-07-24T05:56:56","slug":"security-stack-data-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/","title":{"rendered":"How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57514\" class=\"elementor elementor-57514\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-545de09d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"545de09d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-771c66f5\" data-id=\"771c66f5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a75b3a8 elementor-widget elementor-widget-text-editor\" data-id=\"6a75b3a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> September 15, 2022<br \/><strong>Time:<\/strong> 9 a.m. CDT\/5 p.m. IDT\/7:30 p.m. IST<br \/><strong>Topic:<\/strong> How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Risk management is an essential part of any cybersecurity posture, but it is separate from security stack performance. Compliance and risk management frameworks are important, but they do not digest, reflect, or analyze any data crucial to the security stack. These frameworks assess an organization\u2019s security strategies and recommend actions to mitigate cybersecurity threats. So how do we evaluate the tools and policies we adopt to ensure compliance and thwart attacks effectively?<\/p><p>A new category of solutions called Cybersecurity Performance Management (CPM) enables real-time, data-driven assessment of cybersecurity stack performance, using self-generated data directly from the stack. CPM helps CISOs and other cybersecurity stakeholders streamline decision-making with a risk-based, performance-driven approach and offers insights into the actual optimization of cybersecurity stacks while helping identify, track, and report on trends.<\/p><p>Security experts need 360-degree visibility into their security stacks to reduce risk and enhance incident management programs. With CPM, they can see the bigger picture while drilling down to the specifics, thus enabling them to make swift decisions. A quantifiable CPM empowers security teams to prioritize security incidents, allowing security leaders to make informed decisions. This webinar will explore how the data from security stacks can help strengthen your cybersecurity posture and manage risks.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Make sure you measure everything you need to manage in a cyberattack<\/li><li>Leverage your security stack data to stay ahead of threats<\/li><li>How security stack data can help achieve compliance<\/li><li>How cybersecurity performance management can enhance security programs<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Mike-Admon.png.webp\" alt=\"Mike Admon\" width=\"200\" \/><strong>Mike Admon,<\/strong> Co-Founder &amp; CTO, SeeMetrics Inc.<\/p><p><strong>Bio:<\/strong> Mike Admon is the co-founder and CTO of SeeMetrics Inc. He has over 20 years of executive cybersecurity and project management experience in leading global enterprises. His previous positions include the CISO of Bright Machines, the CTO of Verint Systems, and the Principal Cyber Security Architect in Cisco Systems CoE. Mike has also served in an executive role at Elbit Systems subsidiary leading SOAR delivery.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/zzsFkdi5J6Y\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: September 15, 2022 Time: 9 a.m. CDT\/5 p.m. IDT\/7:30 p.m. IST Topic: How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture Watch Now Abstract: Risk management is an essential part of any cybersecurity posture, but it is separate from security stack performance. Compliance and risk management frameworks are important, but they do&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79018,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-57514","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Leverage Security Stack Data to Strengthen Cybersecurity Posture<\/title>\n<meta name=\"description\" content=\"Traditional cybersecurity approaches are no longer enough. Learn how security experts can leverage security stack data to thwart cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture\" \/>\n<meta property=\"og:description\" content=\"Traditional cybersecurity approaches are no longer enough. Learn how security experts can leverage security stack data to thwart cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-24T05:56:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture\",\"datePublished\":\"2022-09-15T10:00:00+00:00\",\"dateModified\":\"2023-07-24T05:56:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/\"},\"wordCount\":376,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/\",\"name\":\"Leverage Security Stack Data to Strengthen Cybersecurity Posture\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg\",\"datePublished\":\"2022-09-15T10:00:00+00:00\",\"dateModified\":\"2023-07-24T05:56:56+00:00\",\"description\":\"Traditional cybersecurity approaches are no longer enough. Learn how security experts can leverage security stack data to thwart cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg\",\"width\":465,\"height\":310,\"caption\":\"Leverage Security Stack Data to Strengthen Cybersecurity Posture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-stack-data-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Leverage Security Stack Data to Strengthen Cybersecurity Posture","description":"Traditional cybersecurity approaches are no longer enough. Learn how security experts can leverage security stack data to thwart cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture","og_description":"Traditional cybersecurity approaches are no longer enough. Learn how security experts can leverage security stack data to thwart cyberattacks.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-09-15T10:00:00+00:00","article_modified_time":"2023-07-24T05:56:56+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture","datePublished":"2022-09-15T10:00:00+00:00","dateModified":"2023-07-24T05:56:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/"},"wordCount":376,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/","name":"Leverage Security Stack Data to Strengthen Cybersecurity Posture","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg","datePublished":"2022-09-15T10:00:00+00:00","dateModified":"2023-07-24T05:56:56+00:00","description":"Traditional cybersecurity approaches are no longer enough. Learn how security experts can leverage security stack data to thwart cyberattacks.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/03\/Leverage-Security-Stack-Data-to-Strengthen-Cybersecurity-Posture-ECCU.jpg","width":465,"height":310,"caption":"Leverage Security Stack Data to Strengthen Cybersecurity Posture"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-stack-data-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"How to Leverage Security Stack Data to Strengthen Your Cybersecurity Posture"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=57514"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57514\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79018"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=57514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=57514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=57514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}