{"id":57943,"date":"2023-01-18T10:00:53","date_gmt":"2023-01-18T10:00:53","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=57943"},"modified":"2023-06-05T07:02:55","modified_gmt":"2023-06-05T07:02:55","slug":"essential-cybersecurity-skills-professionals","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/","title":{"rendered":"Cybersecurity Skills Essential For Combating Cyber Risks Today"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"57943\" class=\"elementor elementor-57943\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27a2eab5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27a2eab5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1424563\" data-id=\"1424563\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ff4c25f elementor-widget elementor-widget-text-editor\" data-id=\"6ff4c25f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> January 18, 2023<br>\n<strong>Time:<\/strong> 7:30 p.m. IST\/9 a.m. EST\/8 a.m. CST\/2 p.m. GMT<br>\n<strong>Topic:<\/strong> Cybersecurity Skills Essential For Combating Cyber Risks Today<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> With institutions and businesses of all sizes relying heavily on computerized operations to manage their daily needs, the threat to data security is increasing rapidly. While technological advancements continue transforming the digital infrastructure, threat actors ramp up their hacking efforts by incorporating novel technologies. The parallel shift caused due to incorporation of cloud and IoT has created a new frontier for both cybercriminals and security teams to discover gaps and vulnerabilities. The increase in the volume of attacks requires cybersecurity professionals to automate many of the known security processes to afford more time to analyze the shift in the cyberthreat trends and behavior of the attacker. Also, the use of artificial intelligence and machine learning provides cybersecurity teams the means to tackle highly sophisticated threats that probably use similar technologies for their purpose. The current webinar highlights the essential technologies and associated skills that cybersecurity professionals and teams should incorporate to protect the infrastructure and data from outsider and insider threats.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>How cloud computing and IoT have shifted the security posture of the business<\/li>\n<li>The need to secure IoT and mobile devices and associated skills<\/li>\n<li>The importance of automating security efforts against known risks<\/li>\n<li>How artificial intelligence and machine learning are game changers for both cyberthreat and cybersecurity<\/li>\n<li>The skills required for behavioral analysis, and access management<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Amol-Kodag.jpg.webp\" alt=\"Amol Kodag\" width=\"200\"><strong>Amol Kodag<\/strong>, Engineering Director \u2013 R&amp;D &amp; Head, Cardiovascular Portfolio, Medtronic Engineering and Innovation Center<\/p>\n<p><strong>Bio:<\/strong> Amol Kodag is associated with Medtronic as an Engineering Director \u2013 R&amp;D &amp; Head for the Cardiovascular Portfolio at Medtronic Engineering and Innovation Center in Hyderabad. He is focused on building patient-centric MedTech connected care solutions and contributing to advancing the Medtronic mission to alleviate pain, restore health, and extend life.<\/p>\n<p>Amol is a senior engineering and technology leader with rich industry experience in establishing and leading global R&amp;D organizations, driving technology strategies and digital transformation plans. He is passionate about developing innovative products and technology solutions that significantly improve the quality of human life and the community around us.<\/p>\n<p>Amol has leadership experience in building and heading various product and technology groups, Centers of Excellence,&#8217; especially in software, IoT\/Cloud, connectivity, cybersecurity, and data science. An industry leader, he has built and launched innovative products for MedTech, aerospace, vehicle, industrial IoT, and the electrical sector. As part of industry and academic affiliations, he regularly participates as a speaker or panelist for global seminars and academic events.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/WnEAZCJ5-Ag\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: January 18, 2023 Time: 7:30 p.m. IST\/9 a.m. EST\/8 a.m. CST\/2 p.m. GMT Topic: Cybersecurity Skills Essential For Combating Cyber Risks Today Watch Now Abstract: With institutions and businesses of all sizes relying heavily on computerized operations to manage their daily needs, the threat to data security is increasing rapidly. While technological advancements continue&hellip;<\/p>\n","protected":false},"author":32,"featured_media":78980,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-57943","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Skills Cybersecurity Professionals Need to Address Today&#039;s Cyber Concerns<\/title>\n<meta name=\"description\" content=\"Security experts require upgraded skills to deal with evolving cyberthreats. How can automation, AI, and ML technologies improve cyber defense strategies?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Skills Essential For Combating Cyber Risks Today\" \/>\n<meta property=\"og:description\" content=\"Security experts require upgraded skills to deal with evolving cyberthreats. How can automation, AI, and ML technologies improve cyber defense strategies?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-18T10:00:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:02:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/Essential-Cybersecurity-Skills-ECCU.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cybersecurity Skills Essential For Combating Cyber Risks Today\",\"datePublished\":\"2023-01-18T10:00:53+00:00\",\"dateModified\":\"2023-06-05T07:02:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Essential-Cybersecurity-Skills-ECCU.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/\",\"name\":\"Skills Cybersecurity Professionals Need to Address Today's Cyber Concerns\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Essential-Cybersecurity-Skills-ECCU.jpg\",\"datePublished\":\"2023-01-18T10:00:53+00:00\",\"dateModified\":\"2023-06-05T07:02:55+00:00\",\"description\":\"Security experts require upgraded skills to deal with evolving cyberthreats. How can automation, AI, and ML technologies improve cyber defense strategies?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Essential-Cybersecurity-Skills-ECCU.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Essential-Cybersecurity-Skills-ECCU.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/essential-cybersecurity-skills-professionals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity Skills Essential For Combating Cyber Risks Today\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Skills Cybersecurity Professionals Need to Address Today's Cyber Concerns","description":"Security experts require upgraded skills to deal with evolving cyberthreats. How can automation, AI, and ML technologies improve cyber defense strategies?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Skills Essential For Combating Cyber Risks Today","og_description":"Security experts require upgraded skills to deal with evolving cyberthreats. How can automation, AI, and ML technologies improve cyber defense strategies?","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-01-18T10:00:53+00:00","article_modified_time":"2023-06-05T07:02:55+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/Essential-Cybersecurity-Skills-ECCU.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cybersecurity Skills Essential For Combating Cyber Risks Today","datePublished":"2023-01-18T10:00:53+00:00","dateModified":"2023-06-05T07:02:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/"},"wordCount":463,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/Essential-Cybersecurity-Skills-ECCU.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/","name":"Skills Cybersecurity Professionals Need to Address Today's Cyber Concerns","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/Essential-Cybersecurity-Skills-ECCU.jpg","datePublished":"2023-01-18T10:00:53+00:00","dateModified":"2023-06-05T07:02:55+00:00","description":"Security experts require upgraded skills to deal with evolving cyberthreats. How can automation, AI, and ML technologies improve cyber defense strategies?","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/Essential-Cybersecurity-Skills-ECCU.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/Essential-Cybersecurity-Skills-ECCU.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/essential-cybersecurity-skills-professionals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity Skills Essential For Combating Cyber Risks Today"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=57943"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/57943\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/78980"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=57943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=57943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=57943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}