{"id":79698,"date":"2023-08-01T03:11:50","date_gmt":"2023-08-01T03:11:50","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79698"},"modified":"2023-09-18T14:31:52","modified_gmt":"2023-09-18T14:31:52","slug":"cloud-security-avoiding-misconceptions-and-employing-security-best-practices","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/","title":{"rendered":"Cloud Security: Avoiding Misconceptions and Employing Security Best Practices"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79698\" class=\"elementor elementor-79698\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68ebb35 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68ebb35\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3fb270e\" data-id=\"3fb270e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9cf3c6 elementor-widget elementor-widget-text-editor\" data-id=\"d9cf3c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> July 31, 2023<br>\n<strong>Time:<\/strong> 9:30 PM AEST |&nbsp; 5:00 PM IST | 12:30 PM BST<br>\n<strong>Topic:<\/strong> Cloud Security: Avoiding Misconceptions and Employing Security Best Practices<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong><\/p>\n<p>Organizations moving to the cloud or subscribing to products that provide SaaS-based offerings tends to complicate the responsibilities of the service providers and the users. The common misconception is that these cloud service providers (CSPs) are entirely accountable for data security in the cloud environment. This assumption makes organizations highly vulnerable to cloud security threats. While CIOs and CTOs need to balance offensive and defensive strategies,<\/p>\n<p>putting the Shared Responsibility Model into practice is also essential. Sharing security responsibilities between organizations and vendors is crucial to employing a holistic approach to securing cloud data. CIOs and CTOs must clearly understand the boundaries of the Shared Responsibilities Model and employ it to ensure an integrated approach toward cloud security.<\/p>\n<p>The upcoming webinar provides an in-depth analysis of the security of cloud infrastructure and implementing cloud security best practices.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>understanding the need for cloud migration<\/li>\n<li>understanding security responsibilities for different types of cloud services<\/li>\n<li>understanding security responsibilities for different types of cloud services<\/li>\n<li>a holistic identity-driven security framework for the cloud<\/li>\n<li>security strategies for hybrid and multi-cloud infrastructure<\/li>\n<\/ul>\n<p><strong>Speaker Bio:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Sentil-Velaytham.png\" alt=\"Patric\" width=\"200\"><strong>Sentil Velaytham<\/strong>, Staff Cloud Solutions Architect, VMware<\/p>\n<p><strong>Bio:<\/strong> Senthil Velaytham is a self-proclaimed technical evangelist known for his passion for solving business problems and optimizing IT infrastructure. Sentil has successfully assisted numerous customers in achieving their goals throughout his career. He has worked closely with renowned technology partners, including Druva, AWS, Commvault, EMC, NetApp, CISCO, VMWare, Microsoft, Juniper Networks, Extreme Networks, HP, Nutanix, and many more. Recognized as a bona fide champion of cloud technology and Software as a Service (SaaS), he firmly believes in minimizing technical management to maximize output. His deep understanding of the fundamentals and inner workings of these technologies has helped him address inadequate technological integration challenges through elegant, effective, and cost-efficient solutions. With his passion for pushing boundaries, Sentil upholds his unwavering commitment to team success and is a force to be reckoned with in technology and business.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"watch\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/8d-mMgZsH7E\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: July 31, 2023 Time: 9:30 PM AEST |&nbsp; 5:00 PM IST | 12:30 PM BST Topic: Cloud Security: Avoiding Misconceptions and Employing Security Best Practices Watch Now Abstract: Organizations moving to the cloud or subscribing to products that provide SaaS-based offerings tends to complicate the responsibilities of the service providers and the users. The&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79853,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-79698","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Overcoming Misconceptions to Strengthen Cloud Security Practices<\/title>\n<meta name=\"description\" content=\"Learn about cloud security misconceptions and the importance of the Shared Responsibility Model in our upcoming webinar with Sentil Velaytham.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security: Avoiding Misconceptions and Employing Security Best Practices\" \/>\n<meta property=\"og:description\" content=\"Learn about cloud security misconceptions and the importance of the Shared Responsibility Model in our upcoming webinar with Sentil Velaytham.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-01T03:11:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-18T14:31:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cloud Security: Avoiding Misconceptions and Employing Security Best Practices\",\"datePublished\":\"2023-08-01T03:11:50+00:00\",\"dateModified\":\"2023-09-18T14:31:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/\"},\"wordCount\":376,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/\",\"name\":\"Overcoming Misconceptions to Strengthen Cloud Security Practices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg\",\"datePublished\":\"2023-08-01T03:11:50+00:00\",\"dateModified\":\"2023-09-18T14:31:52+00:00\",\"description\":\"Learn about cloud security misconceptions and the importance of the Shared Responsibility Model in our upcoming webinar with Sentil Velaytham.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cloud Security: Avoiding Misconceptions and Employing Security Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Overcoming Misconceptions to Strengthen Cloud Security Practices","description":"Learn about cloud security misconceptions and the importance of the Shared Responsibility Model in our upcoming webinar with Sentil Velaytham.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security: Avoiding Misconceptions and Employing Security Best Practices","og_description":"Learn about cloud security misconceptions and the importance of the Shared Responsibility Model in our upcoming webinar with Sentil Velaytham.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-08-01T03:11:50+00:00","article_modified_time":"2023-09-18T14:31:52+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cloud Security: Avoiding Misconceptions and Employing Security Best Practices","datePublished":"2023-08-01T03:11:50+00:00","dateModified":"2023-09-18T14:31:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/"},"wordCount":376,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/","name":"Overcoming Misconceptions to Strengthen Cloud Security Practices","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg","datePublished":"2023-08-01T03:11:50+00:00","dateModified":"2023-09-18T14:31:52+00:00","description":"Learn about cloud security misconceptions and the importance of the Shared Responsibility Model in our upcoming webinar with Sentil Velaytham.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/Cloud-Security-Avoiding-Misconceptions-and-Employing-Security-Best-Practices.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-security-avoiding-misconceptions-and-employing-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cloud Security: Avoiding Misconceptions and Employing Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79698"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79853"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}