{"id":79617,"date":"2023-06-13T16:52:00","date_gmt":"2023-06-13T16:52:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79617"},"modified":"2023-06-15T12:55:34","modified_gmt":"2023-06-15T12:55:34","slug":"human-solution-cybersecurity-landscape","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/","title":{"rendered":"The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79617\" class=\"elementor elementor-79617\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d339fa3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d339fa3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e60d25\" data-id=\"7e60d25\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1392ca3 elementor-widget elementor-widget-text-editor\" data-id=\"1392ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> June 13, 2023<br>\n<strong>Time:<\/strong> 3:00 PM BST | 6:00 PM AST | 7:30 PM IST<br>\n<strong>Topic:<\/strong> The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths<br>\n<a class=\"watch_now_btn elementor-button\" href=\"#register\" target=\"_self\">Watch Now<\/a><br>\n<strong>Abstract:<\/strong> In 2022, according to the Verizon Data Breach Investigations Report, 82% of data breaches involved human error. Nevertheless, the investment in remediating this threat vector has been abysmal with regard to attention, resources, and funds. Throwing more technology at the \u201cproblem\u201d or ramping up Security Education, Training, and Awareness (SETA) programs has not helped significantly. Human factors require human interventions. This webinar focuses on the psychology of human behavior and how it can be leveraged\u202fto transition from being a problem to being the solution.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>cyberpsychology and human-centered cybersecurity<\/li>\n<li>cybersecurity advice fatigue and whether our ill-managed cybersecurity programs are to blame<\/li>\n<li>accidental insiders and their perceptions of cyber risk<\/li>\n<li>human behavior as a driver of cybersecurity assurance<\/li>\n<\/ul>\n<p><strong>Moderator:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Sunil.jpg.webp\" alt=\"Sunil\" width=\"200\"><strong>Sunil Varkey<\/strong>, Security Professional<\/p>\n<p><strong>Bio:<\/strong> Sunil Varkey has over 27 years of leadership experience specializing in cybersecurity with large corporations in banking, telecom, ITES, software, and manufacturing in the Middle East, U.S., and India.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Panelists:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Darren-200px.jpg.webp\" alt=\"Darren-Thomson\" width=\"200\"><strong>Darren Thomson<\/strong>, Vice-President of Product Marketing, One Identity<\/p>\n<p><strong>Bio:<\/strong> During his 30 years in the software industry, Darren has worked in various technical and marketing leadership positions. He currently holds the position of Vice President of Product Marketing at One Identity, a digital identity security provider. Before this, Darren helped CyberCube (a data and analytics provider) to define solution propositions and go-to-market strategies as it ventured into the cyber insurance marketplace. Darren served as the Field-CTO at Symantec in EMEA for several years, where he was responsible for a team of around 200 technicians and operated as one of Symantec&#8217;s senior-most evangelists in the fields of cloud, IoT, risk management, and security strategy.<\/p>\n<p>Darren is a published author, his latest book being Delivery Utility Computing: Business Driven IT Optimization (ISBN 0-470-01576-4). He was educated in Hertfordshire, UK and holds a Certificate of Higher Education (Cert HE) in Social Science as well as several IT-related qualifications, including ITIL Practitioner and Management of Risk (&#8220;MoR&#8221;) accreditations from the UK Office of Government Commerce.<\/p>\n<p>Darren&#8217;s interest and research into the intersections of traditional psychology, criminal, and modern cyber defense give him unique perspectives on how we should be defending our organizations and institutions from cyber threats in the 21st century.<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccu.edu\/wp-content\/uploads\/2023\/05\/Mary-Aji_200px.jpg\" alt=\"Mary Aji\" width=\"200\"><strong>Mary Aji<\/strong>, Consultant &#8211; Human Factors in Cybersecurity\/ Cyberpsychology<\/p>\n<p><strong>Bio:<\/strong> Mary calls herself an &#8220;accidental marketer,&#8221; as she started her career as a software engineer and then carved a niche for herself as a tech marketer in the cybersecurity industry. Over a career spanning 20+ years, Mary has worked with a vast portfolio of cybersecurity vendors and channel partners in the EMEA region. Espousing her passion for tech and zeal for creativity, she has launched a myriad of strategic marketing campaigns and events in the MENA region for technology vendors through the channel. An award-winning channel marketing champion, an ardent cybersecurity enthusiast with a keen interest in human factors, and an aspiring cyberpsychologist, Mary is currently an independent cybersecurity marketing consultant.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"register\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Pph41sIqg7o\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 13, 2023 Time: 3:00 PM BST | 6:00 PM AST | 7:30 PM IST Topic: The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths Watch Now Abstract: In 2022, according to the Verizon Data Breach Investigations Report, 82% of data breaches involved human error. Nevertheless, the investment in remediating this threat vector&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79618,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-79617","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Empowering Humans in Cyberattack Solutioning: Changing the &#039;Weakest Link&#039; Narrative<\/title>\n<meta name=\"description\" content=\"Join our webinar to learn how human psychology can be leveraged to empower humans from being the &#039;weakest link&#039; to a part of cybersecurity &#039;solutions.&#039;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths\" \/>\n<meta property=\"og:description\" content=\"Join our webinar to learn how human psychology can be leveraged to empower humans from being the &#039;weakest link&#039; to a part of cybersecurity &#039;solutions.&#039;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-13T16:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-15T12:55:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths\",\"datePublished\":\"2023-06-13T16:52:00+00:00\",\"dateModified\":\"2023-06-15T12:55:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/\"},\"wordCount\":539,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/\",\"name\":\"Empowering Humans in Cyberattack Solutioning: Changing the 'Weakest Link' Narrative\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg\",\"datePublished\":\"2023-06-13T16:52:00+00:00\",\"dateModified\":\"2023-06-15T12:55:34+00:00\",\"description\":\"Join our webinar to learn how human psychology can be leveraged to empower humans from being the 'weakest link' to a part of cybersecurity 'solutions.'\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Psychology-of-Human-Behavior-in-Threat-Compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-solution-cybersecurity-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Empowering Humans in Cyberattack Solutioning: Changing the 'Weakest Link' Narrative","description":"Join our webinar to learn how human psychology can be leveraged to empower humans from being the 'weakest link' to a part of cybersecurity 'solutions.'","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/","og_locale":"en_US","og_type":"article","og_title":"The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths","og_description":"Join our webinar to learn how human psychology can be leveraged to empower humans from being the 'weakest link' to a part of cybersecurity 'solutions.'","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-06-13T16:52:00+00:00","article_modified_time":"2023-06-15T12:55:34+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths","datePublished":"2023-06-13T16:52:00+00:00","dateModified":"2023-06-15T12:55:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/"},"wordCount":539,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/","name":"Empowering Humans in Cyberattack Solutioning: Changing the 'Weakest Link' Narrative","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg","datePublished":"2023-06-13T16:52:00+00:00","dateModified":"2023-06-15T12:55:34+00:00","description":"Join our webinar to learn how human psychology can be leveraged to empower humans from being the 'weakest link' to a part of cybersecurity 'solutions.'","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Psychology-of-Human-Behavior-in-Threat-Compliance-1.jpg","width":1938,"height":1292,"caption":"Psychology-of-Human-Behavior-in-Threat-Compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-solution-cybersecurity-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79617"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79617\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79618"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}