{"id":79961,"date":"2023-09-08T01:00:00","date_gmt":"2023-09-08T01:00:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=79961"},"modified":"2025-09-09T11:54:27","modified_gmt":"2025-09-09T11:54:27","slug":"threat-intelligence-analysis","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/","title":{"rendered":"Threat Intel Analysis and Its Influences on Hunt Team Operations and SOAR"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79961\" class=\"elementor elementor-79961\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-23b6463 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"23b6463\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1881cc\" data-id=\"c1881cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4622733 elementor-widget elementor-widget-text-editor\" data-id=\"4622733\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> September 8, 2023<br><strong>Time:<\/strong> 8:30 AM MDT | 9:30 AM CDT | 8:00 PM IST<br><strong>Topic:<\/strong> Threat Intel Analysis and its Influences on Hunt Team Operations and SOAR<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong>&nbsp;Threat hunting helps locate gaps in detection, discover new threats and TTPs, etc., that could add to the threat intelligence process and analysis. This webinar will discuss intel analysis from the stance of predictive analytics leveraging the TAHITI (Targeted Hunting Integrating Threat Intelligence) methodology and how it can feed accurate intelligence with a focus on gathering data and developing informational use cases based upon industry (Market Verticals) modeled threats.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding threats and risks for organizations based on intelligence and reporting (VERIS, MITRE ATT&amp;CK, Threat Actor Intel)<\/li>\n<li>Understanding the TAHITI threat hunt methodology and how it feeds new use cases and coverage of risks<\/li>\n<li><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/\">Understanding the Threat Intelligence<\/a> and Security Operations Lifecycle and how Intelligence and Threat Hunting can make the SOC more efficient and effective<\/li>\n<li>Understanding how to prioritize risks presented by threats and inefficiencies and how to combat them with automation<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Randy.jpg\" alt=\"Randy Thomas\" width=\"200\"><strong>Randy Thomas<\/strong>, Director of Advanced Security Services at Syntax<\/p>\n<p><strong>Bio:<\/strong> Randy is responsible for the SOC, security product development (which includes Detection as Code), DFIR, incident command (IC), vulnerability management, threat intelligence-driven security operations, threat hunting, and offensive security at Syntax, a leading managed cloud provider.<\/p>\n<p>Randy has over 21 years of experience in enterprise cyber security in various environments, including the U.S. Military and intelligence for commercial ECOM, retail, and MSP\/MSSP markets. He leverages his combined 28+ years of enterprise IT experience and 18 years of experience in DevOps\/DevSecOps SOC, security engineering, and software development to deliver high-quality security products and solutions.<\/p>\n<p><img decoding=\"async\" class=\" wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Bryan-Austin-scaled.jpg\" alt=\"Bryan Austin\" width=\"200\" height=\"202\"><strong>Bryan Austin<\/strong>, Manager of Security Operations at Syntax<\/p>\n<p><strong>Bio:<\/strong> Bryan is the Manager of Security Operations at Syntax. He heads up the development of operational maturity, threat intelligence, automation, threat analysis, and incident response. Bryan has over 20 years of cyber security and IT experience in organizations ranging from MSSPs to retail and finance organizations. As the security operations manager, Bryan coordinates response and active hunts in multiple large organizations. He coordinates with teams worldwide to ensure customers and the organization manage risk effectively.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br><div class=\"video-placeholder-youtube\" data-cky-tag=\"video-placeholder\" id=\"sUpfNlSx\" style=\"width: 581px; height: 450px; background-image: linear-gradient(rgba(76, 72, 72, 0.7), rgba(76, 72, 72, 0.7)), url(&quot;https:\/\/img.youtube.com\/vi\/FYv9dWvFMKo\/maxresdefault.jpg&quot;);\"><p class=\"video-placeholder-text-youtube\" data-cky-tag=\"placeholder-title\" style=\"display: block; border-color: rgb(0, 0, 0); background-color: rgb(0, 0, 0); color: rgb(255, 255, 255);\">Please accept cookies to access this content<\/p><p class=\"video-placeholder-text-youtube\" data-cky-tag=\"placeholder-title\" style=\"display: block; border-color: rgb(0, 0, 0); background-color: rgb(0, 0, 0); color: rgb(255, 255, 255);\"><br><\/p><\/div><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: September 8, 2023Time: 8:30 AM MDT | 9:30 AM CDT | 8:00 PM ISTTopic: Threat Intel Analysis and its Influences on Hunt Team Operations and SOAR Watch Now Abstract:&nbsp;Threat hunting helps locate gaps in detection, discover new threats and TTPs, etc., that could add to the threat intelligence process and analysis. This webinar will&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79962,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-79961","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Threat Intelligence Analysis and Its Impact on Hunt Team<\/title>\n<meta name=\"description\" content=\"Learn how to leverage intelligence and threat analysis for effective SOC operations and security automation in our webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intel Analysis and Its Influences on Hunt Team Operations and SOAR\" \/>\n<meta property=\"og:description\" content=\"Learn how to leverage intelligence and threat analysis for effective SOC operations and security automation in our webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-08T01:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-09T11:54:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Threat-Intelligence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Threat Intel Analysis and Its Influences on Hunt Team Operations and SOAR\",\"datePublished\":\"2023-09-08T01:00:00+00:00\",\"dateModified\":\"2025-09-09T11:54:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/\"},\"wordCount\":399,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Threat-Intelligence.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/\",\"name\":\"Threat Intelligence Analysis and Its Impact on Hunt Team\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Threat-Intelligence.jpg\",\"datePublished\":\"2023-09-08T01:00:00+00:00\",\"dateModified\":\"2025-09-09T11:54:27+00:00\",\"description\":\"Learn how to leverage intelligence and threat analysis for effective SOC operations and security automation in our webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Threat-Intelligence.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Threat-Intelligence.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/threat-intelligence-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Threat Intel Analysis and Its Influences on Hunt Team Operations and SOAR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Threat Intelligence Analysis and Its Impact on Hunt Team","description":"Learn how to leverage intelligence and threat analysis for effective SOC operations and security automation in our webinar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Threat Intel Analysis and Its Influences on Hunt Team Operations and SOAR","og_description":"Learn how to leverage intelligence and threat analysis for effective SOC operations and security automation in our webinar.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-09-08T01:00:00+00:00","article_modified_time":"2025-09-09T11:54:27+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Threat-Intelligence.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Threat Intel Analysis and Its Influences on Hunt Team Operations and SOAR","datePublished":"2023-09-08T01:00:00+00:00","dateModified":"2025-09-09T11:54:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/"},"wordCount":399,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Threat-Intelligence.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/","name":"Threat Intelligence Analysis and Its Impact on Hunt Team","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Threat-Intelligence.jpg","datePublished":"2023-09-08T01:00:00+00:00","dateModified":"2025-09-09T11:54:27+00:00","description":"Learn how to leverage intelligence and threat analysis for effective SOC operations and security automation in our webinar.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Threat-Intelligence.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Threat-Intelligence.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/threat-intelligence-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Threat Intel Analysis and Its Influences on Hunt Team Operations and SOAR"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=79961"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/79961\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79962"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=79961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=79961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=79961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}