{"id":57789,"date":"2022-11-22T10:00:25","date_gmt":"2022-11-22T10:00:25","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=57789"},"modified":"2023-09-04T11:00:03","modified_gmt":"2023-09-04T11:00:03","slug":"avoiding-cyberterrorism-through-actionable-intelligence","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/","title":{"rendered":"Avoiding Cyberterrorism Through Actionable Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57789\" class=\"elementor elementor-57789\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1ae18991 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1ae18991\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-279078c3\" data-id=\"279078c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a5281e9 elementor-widget elementor-widget-text-editor\" data-id=\"a5281e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> November 22, 2022<br \/><strong>Time:<\/strong> 8. a.m. MST\/5 p.m. CEST\/8:30 p.m. IST<br \/><strong>Topic:<\/strong> Avoiding Cyberterrorism Through Actionable Intelligence<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> According to the United States Institute of Peace (USIP), cyberterrorism can be best defined as the combination of terrorism and cyberspace. By inciting violence or spreading fear among a target population\u2014for example, by destroying key infrastructure, stealing sensitive information, intercepting military communications, or advancing an extremist political agenda\u2014cyberterrorist attacks are carried out to further nefarious political or social objectives (Sheldon &amp; Hanna, 2022; Yunos &amp; Sulaman, 2017).<\/p><p>Cyberterrorism has grabbed headlines in the recent past within the information security community and government bodies. In an era of digitalization and rapid technology advancements, the havoc caused by cyber terrorists can debilitate economies, disrupt organizational infrastructure, and put national security at risk.<\/p><p>This webinar will discuss the measures we can take to combat cyber terrorism and avoid their serious consequences. Participants will learn how to collect, assess, and share actionable intelligence to prevent security threats.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>How serious is cyberterrorism in 2022?<\/li><li>What steps can be taken to manage vulnerabilities and thwart cyberattacks?<\/li><li>Why is threat intelligence important to counter cyberterrorism?<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Ricoh-Danielson-1.jpg.webp\" alt=\"Ricoh Danielson\" width=\"200\" \/><strong>Ricoh Danielson<\/strong>, Vice President and Chief Information Security Officer<\/p><p><strong>Bio:<\/strong> Ricoh Danielson is information security and digital forensics professional with over 15 years of expertise managing incident response and digital forensics matters for domestic and international clients. He is experienced in handling cyber breaches, security incidents, and digital forensics in the healthcare, financial, and retail spaces. Ricoh has partnered with law firms, government agencies, and private clients to provide digital forensics services for high-profile and newsworthy cyber incidents. In addition to being a cybersecurity professional, he is a U.S. Army combat veteran.<\/p><p><strong>References:<\/strong><br \/>Sheldon, R. &amp; Hanna, K. (2022). Definition: cyberterrorism. Tech Target.<br \/><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cyberterrorism\" target=\"_blank\" rel=\"noopener\">https:\/\/www.techtarget.com\/searchsecurity\/definition\/cyberterrorism<\/a><\/p><p>Yunos, Z. &amp; Sulaman, S. (2017). Understanding cyber terrorism from motivational perspectives. Journal of Information Warfare, 16(4), 1\u201313. <a href=\"https:\/\/www.jstor.org\/journal\/jinfowarf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.jstor.org\/stable\/26504114<\/a><\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/yDV6G2Swx2s\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 22, 2022Time: 8. a.m. MST\/5 p.m. CEST\/8:30 p.m. ISTTopic: Avoiding Cyberterrorism Through Actionable Intelligence Watch Now Abstract: According to the United States Institute of Peace (USIP), cyberterrorism can be best defined as the combination of terrorism and cyberspace. By inciting violence or spreading fear among a target population\u2014for example, by destroying key infrastructure,&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79008,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-57789","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Prevent Cyberterrorism through Threat Analysis<\/title>\n<meta name=\"description\" content=\"Learn how you can rely on actionable intelligence through threat analysis to assess vulnerabilities &amp; prevent cyberterrorism.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoiding Cyberterrorism Through Actionable Intelligence\" \/>\n<meta property=\"og:description\" content=\"Learn how you can rely on actionable intelligence through threat analysis to assess vulnerabilities &amp; prevent cyberterrorism.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-22T10:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-04T11:00:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Avoiding Cyberterrorism Through Actionable Intelligence\",\"datePublished\":\"2022-11-22T10:00:25+00:00\",\"dateModified\":\"2023-09-04T11:00:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/\"},\"wordCount\":346,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/\",\"name\":\"Prevent Cyberterrorism through Threat Analysis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg\",\"datePublished\":\"2022-11-22T10:00:25+00:00\",\"dateModified\":\"2023-09-04T11:00:03+00:00\",\"description\":\"Learn how you can rely on actionable intelligence through threat analysis to assess vulnerabilities & prevent cyberterrorism.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/avoiding-cyberterrorism-through-actionable-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Avoiding Cyberterrorism Through Actionable Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Prevent Cyberterrorism through Threat Analysis","description":"Learn how you can rely on actionable intelligence through threat analysis to assess vulnerabilities & prevent cyberterrorism.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Avoiding Cyberterrorism Through Actionable Intelligence","og_description":"Learn how you can rely on actionable intelligence through threat analysis to assess vulnerabilities & prevent cyberterrorism.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-11-22T10:00:25+00:00","article_modified_time":"2023-09-04T11:00:03+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Avoiding Cyberterrorism Through Actionable Intelligence","datePublished":"2022-11-22T10:00:25+00:00","dateModified":"2023-09-04T11:00:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/"},"wordCount":346,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/","name":"Prevent Cyberterrorism through Threat Analysis","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg","datePublished":"2022-11-22T10:00:25+00:00","dateModified":"2023-09-04T11:00:03+00:00","description":"Learn how you can rely on actionable intelligence through threat analysis to assess vulnerabilities & prevent cyberterrorism.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/11\/Prevent-Cyberterrorism-through-Threat-Analysis-ECCU.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/avoiding-cyberterrorism-through-actionable-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Avoiding Cyberterrorism Through Actionable Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=57789"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57789\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79008"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=57789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=57789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=57789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}