{"id":58232,"date":"2023-03-28T10:00:25","date_gmt":"2023-03-28T10:00:25","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=58232"},"modified":"2023-06-05T07:01:45","modified_gmt":"2023-06-05T07:01:45","slug":"threats-cloud-environment","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/","title":{"rendered":"Monitoring Threats in All Types of Cloud Environments"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"58232\" class=\"elementor elementor-58232\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-405828ca elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"405828ca\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f06ebbe\" data-id=\"f06ebbe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55b8f394 elementor-widget elementor-widget-text-editor\" data-id=\"55b8f394\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> March 28, 2023<br \/><strong>Time:<\/strong> 9:30 PM MYT | 7:00 PM IST | 8:30 AM EST\u00a0<br \/><strong>Topic:<\/strong> Monitoring Threats in All Types of Cloud Environments<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> As cloud adoption rapidly expands, organizations face many security threats that can compromise their cloud infrastructure and data. Therefore, companies must have effective threat-monitoring tools and strategies to safeguard their cloud environment, but this is easier said than done. The need for a stringent threat monitoring policy puts an additional burden on security teams to manage access and privileges.<\/p><p>Most threats related to cloud assets fall under identity and access management, privileged accounts, third-party vendors, etc. Therefore, monitoring infrastructure and objects in the cloud is a critical and continuous process involving various tools, suites, and automation capabilities to enhance visibility.<\/p><p>The current webinar aims to help participants understand the risks related to cloud storage and operations as well as strategies for a comprehensive framework for monitoring and detecting insider and external threats. The webinar also discusses the recommended telemetry for automating threat detection processes and continuous cloud environment monitoring.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>common threats associated with cloud storage, infrastructure, and applications<\/li><li>recommended telemetry to monitor threats<\/li><li>recommendations around threat monitoring for cloud infrastructure, identities, and objects<\/li><li>adjusting threat detection capabilities in line with the shared responsibility model<\/li><li>developing threat detection and monitoring framework for SaaS, PaaS, and IaaS<\/li><li>incorporating a zero-trust model to improve the security posture<\/li><\/ul><p><strong>Speakers:<\/strong><br \/><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Kayzad.jpg.webp\"><img decoding=\"async\" class=\"alignleft wp-image-2265 size-full\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Kayzad.jpg.webp\" alt=\"Kayzad Vanskuiwalla\" width=\"200\" height=\"22\" \/><\/a><strong>Kayzad Vanskuiwalla<\/strong>, Director \u2013 Threat Hunting &amp; Intelligence, Securonix.<\/p><p><strong>Bio:<\/strong> Kayzad is a Director for Threat Hunting and Intelligence with Securonix. He has over 9 years of experience in automating the detection of advanced scenarios in cyber and insider threats, with a key focus on cloud infrastructure. He has worked across various specialized verticals<br \/>for different Fortune 100 customers across the globe. Kayzad\u2019s specialty is identifying control gaps and recommending solutions to help prioritize threat scenarios with a combination of known bad IOCs and unknown TTPs referencing frameworks like MITRE. An alumnus of George Mason University, Kayzad is extremely passionate about cybersecurity and has a master\u2019s degree in computer science with a core focus on information security and assurance. He constantly strives to keep learning and is certified with ISC2\u2019s CISSP, CCSP, ISACA\u2019s CISM, and CRISC.<\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Kunal.jpg.webp\" alt=\"Kunal\" width=\"200\" \/><strong>Kunal Sehgal<\/strong>, Director, Security Decoded<\/p><p><strong>Bio:<\/strong> Kunal Sehgal has been a cyber-evangelist for over 15 years and is an untiring advocate of cyber threat intelligence sharing. He encourages cyber-defenders to work together by maintaining a strong camaraderie across public and private organizations, spanning sectorial and geographical barriers. He is not only actively connected with various communities in Asia but also regularly shares credible intelligence with law enforcement agencies worldwide. These efforts have helped organizations protect themselves against cyberthreats and helped sectors become more resilient.<\/p><p>In his professional capacity, Kunal has worked on setting up two information sharing and analysis centers in Singapore to serve the APAC Region. He has also worked with all major National CERTs, regulators, and other government bodies in Asia, to strengthen intelligence networks for combating cybercrime. Currently, he provides virtual CISO services focusing on the SME sector. In 2018, Kunal was part of a global working group chaired by the GFCE to make policy-related recommendations to a panel of 90+ member countries.<\/p><p>Kunal invests his non-working hours researching, blogging, and presenting at cyber events across Asia. He has earned 17 certifications\/degrees, has co-authored two whitepapers, and is the official reviewer of five published books, all in the cyber realm. His latest book on cyber blue team strategies is set to be published in February 2023.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/zpXkvPdtRLU\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: March 28, 2023 Time: 9:30 PM MYT | 7:00 PM IST | 8:30 AM EST&nbsp; Topic: Monitoring Threats in All Types of Cloud Environments Watch Now Abstract: As cloud adoption rapidly expands, organizations face many security threats that can compromise their cloud infrastructure and data. Therefore, companies must have effective threat-monitoring tools and strategies&hellip;<\/p>\n","protected":false},"author":32,"featured_media":78942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-58232","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Identifying Threats in the Cloud<\/title>\n<meta name=\"description\" content=\"Monitoring threats in all cloud environments is a must fororganizations to maintain their security posture, comply withregulations, and protect their sensitive data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitoring Threats in All Types of Cloud Environments\" \/>\n<meta property=\"og:description\" content=\"Monitoring threats in all cloud environments is a must fororganizations to maintain their security posture, comply withregulations, and protect their sensitive data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-28T10:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T07:01:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/Webinar-Banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Monitoring Threats in All Types of Cloud Environments\",\"datePublished\":\"2023-03-28T10:00:25+00:00\",\"dateModified\":\"2023-06-05T07:01:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Webinar-Banner.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/\",\"name\":\"Identifying Threats in the Cloud\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Webinar-Banner.jpg\",\"datePublished\":\"2023-03-28T10:00:25+00:00\",\"dateModified\":\"2023-06-05T07:01:45+00:00\",\"description\":\"Monitoring threats in all cloud environments is a must fororganizations to maintain their security posture, comply withregulations, and protect their sensitive data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Webinar-Banner.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Webinar-Banner.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threats-cloud-environment\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Monitoring Threats in All Types of Cloud Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identifying Threats in the Cloud","description":"Monitoring threats in all cloud environments is a must fororganizations to maintain their security posture, comply withregulations, and protect their sensitive data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/","og_locale":"en_US","og_type":"article","og_title":"Monitoring Threats in All Types of Cloud Environments","og_description":"Monitoring threats in all cloud environments is a must fororganizations to maintain their security posture, comply withregulations, and protect their sensitive data.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-03-28T10:00:25+00:00","article_modified_time":"2023-06-05T07:01:45+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/Webinar-Banner.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Monitoring Threats in All Types of Cloud Environments","datePublished":"2023-03-28T10:00:25+00:00","dateModified":"2023-06-05T07:01:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/"},"wordCount":610,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/Webinar-Banner.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/","name":"Identifying Threats in the Cloud","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/Webinar-Banner.jpg","datePublished":"2023-03-28T10:00:25+00:00","dateModified":"2023-06-05T07:01:45+00:00","description":"Monitoring threats in all cloud environments is a must fororganizations to maintain their security posture, comply withregulations, and protect their sensitive data.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/Webinar-Banner.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/03\/Webinar-Banner.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threats-cloud-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Monitoring Threats in All Types of Cloud Environments"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/58232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=58232"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/58232\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/78942"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=58232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=58232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=58232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}