{"id":80023,"date":"2023-09-15T05:50:00","date_gmt":"2023-09-15T05:50:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80023"},"modified":"2023-09-21T06:09:14","modified_gmt":"2023-09-21T06:09:14","slug":"artificial-intelligence-primer","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/","title":{"rendered":"Artificial Intelligence Primer &#8211; Risk Management and Compliance Considerations\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80023\" class=\"elementor elementor-80023\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7922782 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7922782\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9175cea\" data-id=\"9175cea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5790ced elementor-widget elementor-widget-text-editor\" data-id=\"5790ced\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> September 15, 2023<br>\n<strong>Time:<\/strong> 9:00 AM MDT | 11:00 AM EDT | 5:00 PM CEST | 8:30 PM IST<br>\n<strong>Topic:<\/strong> Artificial Intelligence Primer \u2013 Risk Management and Compliance Considerations<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><br>\n<strong><br><\/strong><\/p><p><strong>Abstract:<\/strong> Artificial intelligence (AI) is a rapidly developing field that profoundly impacts our world, as it is used in various healthcare, transportation, and customer service applications. In this webinar, we will explore AI\u2019s potential for revolutionizing how we live and work. Get an overview of the history, key terms, and taxonomy of AI. This discussion will also explore the network effect of AI, an idea that the value of AI increases as more people and organizations use it. Participants will also learn about the AI ecosystem and landscape, which includes the different actors involved in the development and use of AI.<\/p>\n<p>This engaging session will also shed light on compliance and risk concerns related to AI, including how this technology can be used for malicious purposes such as the risk of AI-powered malware and cyber attacks.<\/p>\n<p>Learn about the key considerations and best practices for using AI responsibly. These considerations include ensuring that AI is used fairly and ethically as well as mitigating the risks associated with AI.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>the history of artificial intelligence<\/li>\n<li>key terminology<\/li>\n<li>compliance and risk concerns<\/li>\n<li>cyber security threats<\/li>\n<li>emerging regulations and best practices<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/01\/Marlene.jpg.webp\" alt=\"Marelene\" width=\"200\"><strong>Marlene Veum<\/strong>, Independent Cyber Security Consultant and Advisor, Web3 and Decentralized Technologies<\/p>\n<p><strong>Bio:<\/strong> Marlene Veum is a senior-level cyber security professional with vast experience providing strategic and technical direction in secure product and service delivery, architecture and assurance, risk management, and compliance oversight. She\u2019s led multimillion-dollar security and technology initiatives, threat intelligence, and critical operations that support national and international IT enterprises and cloud services. She is also an expert in implementing secure architecture, identity and access management services, technical security controls, risk management, and compliance programs following US and international banking, financial services, healthcare, export laws, and various privacy mandates.<\/p>\n<p>Marlene has a track record of successfully leading secure cloud development operations in encryption standards, virtualization, configuration management, continuous monitoring, service reliability engineering, and vulnerability management. She has traveled to over 14 countries and performed audits, risk assessments, and forensic reviews as part of her international experience. She oversees mergers and acquisitions security assessments and integrations, ensuring that critical security vulnerabilities and audit findings are sufficiently mitigated in acquired products, services, and assumed IT infrastructure.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<a name=\"attend\"><\/a>\n<a name=\"attend\"><\/a>\n<iframe title=\"Threat Intel Analysis and its Influences on Hunt Team Operations and SOAR\" src=\"https:\/\/www.youtube.com\/embed\/zeKBHuQrmjw\" width=\"825\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: September 15, 2023 Time: 9:00 AM MDT | 11:00 AM EDT | 5:00 PM CEST | 8:30 PM IST Topic: Artificial Intelligence Primer \u2013 Risk Management and Compliance Considerations Watch Now Abstract: Artificial intelligence (AI) is a rapidly developing field that profoundly impacts our world, as it is used in various healthcare, transportation, and&hellip;<\/p>\n","protected":false},"author":32,"featured_media":80140,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80023","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Risk Management and Compliance with AI<\/title>\n<meta name=\"description\" content=\"While AI has impacted our lives, it isn\u2019t free of challenges. Learn how to use AI responsibly in this webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Artificial Intelligence Primer - Risk Management and Compliance Considerations\u00a0\" \/>\n<meta property=\"og:description\" content=\"While AI has impacted our lives, it isn\u2019t free of challenges. Learn how to use AI responsibly in this webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-15T05:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T06:09:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/artificial-intelligence-primer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1940\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Artificial Intelligence Primer &#8211; Risk Management and Compliance Considerations\u00a0\",\"datePublished\":\"2023-09-15T05:50:00+00:00\",\"dateModified\":\"2023-09-21T06:09:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/\"},\"wordCount\":419,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/artificial-intelligence-primer.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/\",\"name\":\"Risk Management and Compliance with AI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/artificial-intelligence-primer.jpg\",\"datePublished\":\"2023-09-15T05:50:00+00:00\",\"dateModified\":\"2023-09-21T06:09:14+00:00\",\"description\":\"While AI has impacted our lives, it isn\u2019t free of challenges. Learn how to use AI responsibly in this webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/artificial-intelligence-primer.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/artificial-intelligence-primer.jpg\",\"width\":1940,\"height\":1292,\"caption\":\"artificial-intelligence-primer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/artificial-intelligence-primer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Artificial Intelligence Primer &#8211; Risk Management and Compliance Considerations\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risk Management and Compliance with AI","description":"While AI has impacted our lives, it isn\u2019t free of challenges. Learn how to use AI responsibly in this webinar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/","og_locale":"en_US","og_type":"article","og_title":"Artificial Intelligence Primer - Risk Management and Compliance Considerations\u00a0","og_description":"While AI has impacted our lives, it isn\u2019t free of challenges. Learn how to use AI responsibly in this webinar.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-09-15T05:50:00+00:00","article_modified_time":"2023-09-21T06:09:14+00:00","og_image":[{"width":1940,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/artificial-intelligence-primer.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Artificial Intelligence Primer &#8211; Risk Management and Compliance Considerations\u00a0","datePublished":"2023-09-15T05:50:00+00:00","dateModified":"2023-09-21T06:09:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/"},"wordCount":419,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/artificial-intelligence-primer.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/","name":"Risk Management and Compliance with AI","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/artificial-intelligence-primer.jpg","datePublished":"2023-09-15T05:50:00+00:00","dateModified":"2023-09-21T06:09:14+00:00","description":"While AI has impacted our lives, it isn\u2019t free of challenges. Learn how to use AI responsibly in this webinar.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/artificial-intelligence-primer.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2021\/02\/artificial-intelligence-primer.jpg","width":1940,"height":1292,"caption":"artificial-intelligence-primer"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/artificial-intelligence-primer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Artificial Intelligence Primer &#8211; Risk Management and Compliance Considerations\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80023"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80023\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80140"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}