{"id":57924,"date":"2022-12-22T10:00:23","date_gmt":"2022-12-22T10:00:23","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=57924"},"modified":"2026-03-11T22:00:34","modified_gmt":"2026-03-11T22:00:34","slug":"web-application-hacking-trends-2023","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/","title":{"rendered":"Hacking Trends for Web Applications and What We Can Expect In 2023"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57924\" class=\"elementor elementor-57924\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5296731a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5296731a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-21f90e8f\" data-id=\"21f90e8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27722b46 elementor-widget elementor-widget-text-editor\" data-id=\"27722b46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> December 21, 2022<br \/><strong>Time:<\/strong> 8.00 p.m. IST\/9.30 a.m. EST\/3.30 p.m. CET<br \/><strong>Topic:<\/strong> Hacking Trends for Web Applications and What We Can Expect In 2023<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> With organizations shifting their digital infrastructure to the cloud, the frontier of security and associated threats and vulnerabilities have changed drastically. Technological advancements such as remote access, application programming interface (API), automation capabilities, artificial intelligence (AI), etc., further influence the threat landscape. Logically, incorporating new technologies will bring newfound opportunities from the perspective of both cybersecurity and cyberthreats.<\/p><p>While threat actors aim at finding the new vulnerabilities among these changes, the role of the security personnel is to determine the risks and implement adequate measures to mitigate these risks. To deal with the evolving threat patterns, security professionals and aspirants need to learn and understand the change occurring as part of the technology trend and assess its impact from the security perspective for web and mobile applications. The upcoming webinar discusses current trends and noticeable changes that will affect the application&#8217;s security capabilities.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Role of AI and ML in improving incident detection and response<\/li><li>Understanding the need for a cloud-ready security solution<\/li><li>Impact of increased API integration on application security<\/li><li>Role of automation in enhancing the security capabilities<\/li><li>The role of DevSecOps and container security for applications<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"alignleft wp-image-2265 size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/DrErdalOzkaya.jpg.webp\" alt=\"Erdal Ozkaya- CISO at Xcitium\" width=\"200\" height=\"200\" \/><strong>Dr. Erdal Ozkaya<\/strong>, CISO at Xcitium<\/p><p><strong>Bio:<\/strong> Dr. Erdal Ozkaya is listed among the top 50 technology leaders by IDC and CIO Online. He is a passionate, solutions-focused professional with a comprehensive global background in information technology, information security, and cyber security.<\/p><p>Dr. Erdal is a collaborative team leader with the key areas of his expertise spanning end-to-end IT solutions, management, communications, and innovation. He is committed to delivering accurate, accessible resources to inform individuals and organizations of cybersecurity and privacy matters in the internet age. In addition, he is a well-known public speaker, an award-winning technical expert, a book author, and a writer of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC-Council, and other expert-level vendors.<\/p><p>Some of his recent awards include:<\/p><ul><li>2022: Global Cybersecurity Leader of the Year (InfoSec Awards<\/li><li>Best IT Blogs by Cisco (Top 5)<\/li><li>DX Inspire Award<\/li><li>Microsoft Most Valuable Professional<\/li><li>Alumni Award Nomination by Western Sydney University<\/li><li>2021: Best CISO for Banking and Financial Sector<\/li><li>CIO Online &amp; IDC: Top 50 Technology Leaders, Security Magazine Top CISO<\/li><li>Tycoon Success Magazine, Technology Leaders to Follow<\/li><li>EC-Council C|EH Hall of Fame<\/li><li>Microsoft Most Valuable Professional<\/li><li>2020: Khaleej Times &#8220;CISO Power List&#8221;<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/yr5GyJrumIo\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 21, 2022Time: 8.00 p.m. IST\/9.30 a.m. EST\/3.30 p.m. CETTopic: Hacking Trends for Web Applications and What We Can Expect In 2023 Watch Now Abstract: With organizations shifting their digital infrastructure to the cloud, the frontier of security and associated threats and vulnerabilities have changed drastically. Technological advancements such as remote access, application programming&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79000,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-57924","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Upcoming Web Application Hacking Trends In 2023<\/title>\n<meta name=\"description\" content=\"The threat landscape has drastically changed with cloud adoption. Learn about web application hacking trends for 2023 in our exclusive webinar with Dr. Erdal Ozkaya.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Trends for Web Applications and What We Can Expect In 2023\" \/>\n<meta property=\"og:description\" content=\"The threat landscape has drastically changed with cloud adoption. Learn about web application hacking trends for 2023 in our exclusive webinar with Dr. Erdal Ozkaya.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-22T10:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T22:00:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Hacking Trends for Web Applications and What We Can Expect In 2023\",\"datePublished\":\"2022-12-22T10:00:23+00:00\",\"dateModified\":\"2026-03-11T22:00:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/\"},\"wordCount\":443,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/\",\"name\":\"Upcoming Web Application Hacking Trends In 2023\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg\",\"datePublished\":\"2022-12-22T10:00:23+00:00\",\"dateModified\":\"2026-03-11T22:00:34+00:00\",\"description\":\"The threat landscape has drastically changed with cloud adoption. Learn about web application hacking trends for 2023 in our exclusive webinar with Dr. Erdal Ozkaya.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/web-application-hacking-trends-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hacking Trends for Web Applications and What We Can Expect In 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Upcoming Web Application Hacking Trends In 2023","description":"The threat landscape has drastically changed with cloud adoption. Learn about web application hacking trends for 2023 in our exclusive webinar with Dr. Erdal Ozkaya.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/","og_locale":"en_US","og_type":"article","og_title":"Hacking Trends for Web Applications and What We Can Expect In 2023","og_description":"The threat landscape has drastically changed with cloud adoption. Learn about web application hacking trends for 2023 in our exclusive webinar with Dr. Erdal Ozkaya.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-12-22T10:00:23+00:00","article_modified_time":"2026-03-11T22:00:34+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Hacking Trends for Web Applications and What We Can Expect In 2023","datePublished":"2022-12-22T10:00:23+00:00","dateModified":"2026-03-11T22:00:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/"},"wordCount":443,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/","name":"Upcoming Web Application Hacking Trends In 2023","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg","datePublished":"2022-12-22T10:00:23+00:00","dateModified":"2026-03-11T22:00:34+00:00","description":"The threat landscape has drastically changed with cloud adoption. Learn about web application hacking trends for 2023 in our exclusive webinar with Dr. Erdal Ozkaya.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Upcoming-Web-Application-Hacking-Trends-In-2023-ECCU-1.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/web-application-hacking-trends-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Hacking Trends for Web Applications and What We Can Expect In 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=57924"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57924\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79000"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=57924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=57924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=57924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}