{"id":79610,"date":"2023-06-09T10:00:00","date_gmt":"2023-06-09T10:00:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79610"},"modified":"2025-09-04T17:35:13","modified_gmt":"2025-09-04T17:35:13","slug":"trends-technologies-in-digital-forensics","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/recent-cybertalks\/trends-technologies-in-digital-forensics\/","title":{"rendered":"The Future of Digital Forensics: Trends and Emerging Technologies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79610\" class=\"elementor elementor-79610\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e7a7f0a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e7a7f0a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf54779\" data-id=\"cf54779\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6295cb0 elementor-widget elementor-widget-text-editor\" data-id=\"6295cb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> June 9, 2023<br \/><strong>Time:<\/strong> 7:00 PM IST | 3:30 PM CEST | 9:30 AM EDT<br \/><strong>Topic:<\/strong> The Future of Digital Forensics: Trends and Emerging Technologies<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Digital forensics is the process of discovering and analyzing digital evidence related to cyber crime to uncover information that can be presented in a court of law. However, the evolution of the technology landscape has made <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/\">digital forensics<\/a> more challenging than ever because data processing and storage are now possible across different environments. Along with these emerging technologies, which have transformed the previously existing border for data security, accompanying cyber crimes have also evolved to exploit unidentified vulnerabilities in these modern technologies. With the help of novel technologies, digital forensics must grow now to combat these new challenges. The future of forensics will see the incorporation of new methods for improving security and gaining the ability to scale investigations. The current webinar explains how technological evolution has changed the forensic landscape and how computer forensics can utilize similar novel technologies to advance its capabilities.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>the impact of emerging technologies and trends on computer forensics<\/li><li>forensic challenges associated with IT operation and storage environments<\/li><li>the types of technologies that could be adopted by digital forensics<\/li><li>the role of artificial intelligence (AI) and machine learning (ML) in scaling forensics capabilitie<\/li><\/ul><p><strong>Speakers:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Arun-Soni_Cybertalks.png\" alt=\"Arun Soni\" width=\"200\" \/><strong>Arun Soni<\/strong>, Author \u2022 Cybersecurity Expert (C|EH) \u2022 Digital Evidence Specialist (DES) \u2022 Limca Book of Records Holder<\/p><p><strong>Bio:<\/strong> Arun Soni is an internationally acclaimed author and cybersecurity expert from Chandigarh (India). He has authored 182 books for schools\/colleges on IT, AI, and cybersecurity. His books are widely read in India and abroad by millions of students. His latest book, The Cybersecurity-Self Help Guide, is available worldwide and was also exhibited at the World Book Fair 2023 in New Delhi. Arun has the distinction of having his name entered in the Limca Book of Records under the category \u201cMost Computer Books Written at the Age of 37.\u201d He also holds many other national and international records. He is a cybersecurity trainer working for the cause of spreading awareness by conducting webinars\/seminars and workshops in schools, colleges, and corporations.<\/p><p>Arun is a Certified Ethical Hacker (C|EH) from EC-Council and a Digital Evidence Specialist (DES) from the Asian School of Cyber Laws, Pune. For his contribution to computer education and cybersecurity, he has been admired and covered by many major news portals, magazines, and newspapers such as The Tribune, The Indian Express, Times of India, Dainik Bhaskar, Yahoo News, The Economic Times, Business Standard, ANI News, The Print, Zee 5, Daily Hunt, England News portal, France network Time, Kuwait Times, UAE Times, Vancouver<\/p><p>Herald, and many others. He has also appeared as an expert commentator on several nationwide TV channels and FM radio.<\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Santosh_Cybertalks.png\" alt=\"Santosh\" width=\"200\" \/><strong>Lt Col (Dr.) Santosh Khadsare (Retd)<\/strong>, VP &#8211; Digital Forensics, Incident Response &amp; eSec Forte Technologies<\/p><p><strong>Bio:<\/strong> Lt. Col (Dr.) Santosh Khadsare (retd.) is an army veteran and is presently the vice president of Digital Forensics &amp; Incident Response (DFIR) at eSec Forte Technologies. He is a cybersecurity and DFIR professional with more than 25 years of experience in cybersecurity, digital forensics, cyber law, information security, cyber auditing, and incident response. He holds certifications such as C|HFI, C|EH, RHCSA, IVTA (CMU, Pittsburgh, USA), Advance Cyber Forensic Course (CDAC), Cyber Crime Investigator (CCI), Cyber Crime Intervention Officer (CCIO) and Access Data Certified Professional in addition to his B.E in Electronics and Telecommunications.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/MqPHdF8qQ9g\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 9, 2023Time: 7:00 PM IST | 3:30 PM CEST | 9:30 AM EDTTopic: The Future of Digital Forensics: Trends and Emerging Technologies Watch Now Abstract: Digital forensics is the process of discovering and analyzing digital evidence related to cyber crime to uncover information that can be presented in a court of law. However,&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79611,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-79610","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Future Trends and Emerging Technologies in Digital Forensics<\/title>\n<meta name=\"description\" content=\"In this webinar, cybersecurity experts will discuss the future of digital forensics, including the advantages of developing trends and technology and the setbacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Future of Digital Forensics: Trends and Emerging Technologies\" \/>\n<meta property=\"og:description\" content=\"In this webinar, cybersecurity experts will discuss the future of digital forensics, including the advantages of developing trends and technology and the setbacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-09T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T17:35:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Trends-and-Technologies-in-Digital-Forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"The Future of Digital Forensics: Trends and Emerging Technologies\",\"datePublished\":\"2023-06-09T10:00:00+00:00\",\"dateModified\":\"2025-09-04T17:35:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/\"},\"wordCount\":594,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Trends-and-Technologies-in-Digital-Forensics.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/\",\"name\":\"Future Trends and Emerging Technologies in Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Trends-and-Technologies-in-Digital-Forensics.jpg\",\"datePublished\":\"2023-06-09T10:00:00+00:00\",\"dateModified\":\"2025-09-04T17:35:13+00:00\",\"description\":\"In this webinar, cybersecurity experts will discuss the future of digital forensics, including the advantages of developing trends and technology and the setbacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Trends-and-Technologies-in-Digital-Forensics.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Trends-and-Technologies-in-Digital-Forensics.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/trends-technologies-in-digital-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Recent Cybertalks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/recent-cybertalks\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"The Future of Digital Forensics: Trends and Emerging Technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Future Trends and Emerging Technologies in Digital Forensics","description":"In this webinar, cybersecurity experts will discuss the future of digital forensics, including the advantages of developing trends and technology and the setbacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/","og_locale":"en_US","og_type":"article","og_title":"The Future of Digital Forensics: Trends and Emerging Technologies","og_description":"In this webinar, cybersecurity experts will discuss the future of digital forensics, including the advantages of developing trends and technology and the setbacks.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-06-09T10:00:00+00:00","article_modified_time":"2025-09-04T17:35:13+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Trends-and-Technologies-in-Digital-Forensics.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"The Future of Digital Forensics: Trends and Emerging Technologies","datePublished":"2023-06-09T10:00:00+00:00","dateModified":"2025-09-04T17:35:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/"},"wordCount":594,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Trends-and-Technologies-in-Digital-Forensics.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/","name":"Future Trends and Emerging Technologies in Digital Forensics","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Trends-and-Technologies-in-Digital-Forensics.jpg","datePublished":"2023-06-09T10:00:00+00:00","dateModified":"2025-09-04T17:35:13+00:00","description":"In this webinar, cybersecurity experts will discuss the future of digital forensics, including the advantages of developing trends and technology and the setbacks.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Trends-and-Technologies-in-Digital-Forensics.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Trends-and-Technologies-in-Digital-Forensics.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/trends-technologies-in-digital-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Recent Cybertalks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/recent-cybertalks\/"},{"@type":"ListItem","position":5,"name":"The Future of Digital Forensics: Trends and Emerging Technologies"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79610"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79611"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}