{"id":57629,"date":"2022-10-28T10:00:57","date_gmt":"2022-10-28T10:00:57","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=57629"},"modified":"2023-06-05T07:03:57","modified_gmt":"2023-06-05T07:03:57","slug":"combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/","title":{"rendered":"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57629\" class=\"elementor elementor-57629\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3ce84c2c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ce84c2c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34ad40ff\" data-id=\"34ad40ff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1819a419 elementor-widget elementor-widget-text-editor\" data-id=\"1819a419\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> October 28, 2022<br \/><strong>Time:<\/strong> 10 a.m. ET\/7:30 p.m. IST\/10 p.m. SGT<br \/><strong>Topic:<\/strong> Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Cyber-psychological issues among online users are rising, with mental health being the new attack target. Amidst the ongoing pandemic, COVID-related misinformation is the newest attack vector. This online threat is so significant that the World Health Organization (WHO) has called it a COVID \u201cinfodemic.\u201d Recently, there have been some research and development (R&amp;D) initiatives to address the threat plaguing the cybersecurity landscape. However, much work remains to be done.<\/p><p>As part of an ongoing R&amp;D project, we are exploring approaches to address COVID-19 cyberattacks by using data analytics-driven knowledge recommender models, which are meant to act as an advisor for netizens regarding the credibility of online COVID information. We are looking to develop a technology that will advise users on the credibility of COVID websites to safeguard them against infodemic cyber threats.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Learn about the COVID infodemic.<\/li><li>Learn about COVID infodemic-based cybersecurity attacks that exploit human vulnerabilities.<\/li><li>Learn about emerging solutions, including ongoing R&amp;D work to protect online users from COVID-19 cyberattacks.<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Ankur-Chattopadhyay.jpg.webp\" alt=\"Ankur Chattopadhyay\" width=\"200\" \/><strong>Dr. Ankur Chattopadhyay<\/strong> Assistant Professor of Cybersecurity at Northern Kentucky University (NKU)<\/p><p><strong>Bio:<\/strong> Dr. Ankur Chattopadhyay is an assistant professor of computer science and cybersecurity in the School of Computing &amp; Analytics at Northern Kentucky University (NKU). He currently serves as the program coordinator of the NKU bachelor\u2019s in cybersecurity program. He earned his PhD in computer science from the University of Colorado at Colorado Springs and has worked with the NSA\/NSF as the PI\/Program Director for multiple GenCyber program grant awards since 2017. His research interests include visual privacy, authentication trust, cybersecurity &amp; CS education, privacy-enhancing &amp; inclusive machine vision, online healthcare information assurance, trustworthy AI, and cybersecurity. He has more than 15 years of work experience in academics and industry.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Axgc_I5_5F4\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 28, 2022Time: 10 a.m. ET\/7:30 p.m. IST\/10 p.m. SGTTopic: Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic Watch Now Abstract: Cyber-psychological issues among online users are rising, with mental health being the new attack target. Amidst the ongoing pandemic, COVID-related misinformation is the newest attack vector. This online threat is so significant that&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79010,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-57629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to address the threat plaguing the cybersecurity landscape?<\/title>\n<meta name=\"description\" content=\"The pandemic has increased cyber risk. Join the webinar to learn about COVID infodemic-based cybersecurity attacks and how to combat them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic\" \/>\n<meta property=\"og:description\" content=\"The pandemic has increased cyber risk. Join the webinar to learn about COVID infodemic-based cybersecurity attacks and how to combat them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-28T10:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:03:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic\",\"datePublished\":\"2022-10-28T10:00:57+00:00\",\"dateModified\":\"2023-06-05T07:03:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/\"},\"wordCount\":347,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/\",\"name\":\"How to address the threat plaguing the cybersecurity landscape?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg\",\"datePublished\":\"2022-10-28T10:00:57+00:00\",\"dateModified\":\"2023-06-05T07:03:57+00:00\",\"description\":\"The pandemic has increased cyber risk. Join the webinar to learn about COVID infodemic-based cybersecurity attacks and how to combat them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg\",\"width\":465,\"height\":310,\"caption\":\"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to address the threat plaguing the cybersecurity landscape?","description":"The pandemic has increased cyber risk. Join the webinar to learn about COVID infodemic-based cybersecurity attacks and how to combat them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/","og_locale":"en_US","og_type":"article","og_title":"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic","og_description":"The pandemic has increased cyber risk. Join the webinar to learn about COVID infodemic-based cybersecurity attacks and how to combat them.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-10-28T10:00:57+00:00","article_modified_time":"2023-06-05T07:03:57+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic","datePublished":"2022-10-28T10:00:57+00:00","dateModified":"2023-06-05T07:03:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/"},"wordCount":347,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/","name":"How to address the threat plaguing the cybersecurity landscape?","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg","datePublished":"2022-10-28T10:00:57+00:00","dateModified":"2023-06-05T07:03:57+00:00","description":"The pandemic has increased cyber risk. Join the webinar to learn about COVID infodemic-based cybersecurity attacks and how to combat them.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/Combatting-Cybersecurity-Attacks-Amidst-a-Raging-COVID-Infodemic-Free-Resource.jpg","width":465,"height":310,"caption":"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combatting-cybersecurity-attacks-amidst-a-raging-covid-infodemic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Combatting Cybersecurity Attacks Amidst a Raging COVID Infodemic"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=57629"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57629\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79010"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=57629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=57629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=57629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}