{"id":80194,"date":"2023-10-31T12:23:53","date_gmt":"2023-10-31T12:23:53","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80194"},"modified":"2025-09-04T17:56:50","modified_gmt":"2025-09-04T17:56:50","slug":"integrative-cyber-security-strategy-for-ciso-decisions","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/","title":{"rendered":"Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs\u2019 Decision-Making\u202f"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80194\" class=\"elementor elementor-80194\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-72bb855 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"72bb855\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8e585e1\" data-id=\"8e585e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1ba29d9 elementor-widget elementor-widget-text-editor\" data-id=\"1ba29d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> October 30, 2023<br \/><strong>Time:<\/strong> 9:30 AM EDT | 8:30 AM CDT | 2:30 PM CET | 7:00 PM IST<br \/><strong>Topic:<\/strong> Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs&#8217; Decision-Making<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> As threat landscapes evolve, holistic security strategies are essential for modern organizations to protect their data and business. At the core of any holistic cyber security lies experiential learning and proactive defenses, which necessitates a combination of ethical hacking and forensic capabilities. Pen testing identifies vulnerabilities, while<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/\"> digital forensics<\/a> assesses the real-world impact of potential breaches. CISOs can leverage the data collected during pen testing to develop proactive security measures and incident response plans. The data gathered from digital forensics investigations can feed into the pen testing process, allowing security teams to focus on simulating real-world attack scenarios based on historical incidents. A holistic cyber security strategy that integrates pen testing and digital forensics is crucial for CISOs&#8217; decision-making. Such an approach combines cyber security&#8217;s proactive and reactive aspects, while providing a comprehensive view of an organization&#8217;s security posture. With this integration, CISOs can make informed decisions to safeguard their organization&#8217;s digital assets effectively. The current webinar aims to understand how pen testing and forensics can integrate to deliver holistic security.<\/span><\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>proactive security with penetration testing<\/li><li>the role of forensics in proactive cyber security<\/li><li>the need for integrating forensics into pen-testing capabilities<\/li><li>the development of a forensic-dependent pen testing approach<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/DrErdalOzkaya.jpg.webp\" alt=\"DrErdalOzkaya\" width=\"200\" \/><strong>Dr. Erdal Ozkaya,\u202f<\/strong>CISO at Xcitium<\/p><p><strong>Bio:<\/strong> Both IDC and CIO Online have recognized Dr. Erdal Ozkaya. He is known as a passionate, solutions-oriented professional with a comprehensive global background within the information technology, information security, and cyber security fields. He is committed to providing individuals and organizations with accurate, easily accessible information about cyber security and privacy issues in the internet age. Dr. Erdal is a collaborative team leader with his key areas of expertise spanning end-to-end IT solutions, management, communications, and innovation. He is also a renowned public speaker, an award-winning technical expert, a book author, and a writer of certifications (courseware and exams) for prestigious organizations such as Microsoft, EC Council, and other expert-level vendors.<\/p><p><strong>Some of his recent awards include the following:<\/strong><\/p><ul><li>2022: Global Cybersecurity Leader of the Year (InfoSec Awards), Best IT Blogs by Cisco (Top 5), DX Inspire Award, Microsoft Most Valuable Professional Alumni Award, Nomination by Western Sydney University<\/li><li>2021: Best CISO for Banking and Financial Sector CIO Online &amp; IDC: Top 50 Technology Leaders, Security Magazine Top CISO Tycoon Success Magazine, Technology Leaders to Follow, EC Council C|EH Hall of Fame, Microsoft Most Valuable Professional<\/li><li>2020: Khaleej Times &#8220;CISO Power List,&#8221; Cyber Security Legend by GEC Media Group, &#8220;Superhero CISO&#8221; by Enterprise IT, Top CISO by Security ME Magazine<\/li><li>2019: CISO Mag \u201cHall of Fame,\u201d and Cybersecurity Influencer of the Year, Microsoft Regional Director<\/li><li>2018: NATO Center of Excellence Award<\/li><li>2017: Microsoft Platinum Club (employee of the year), Security Professional of the Year<\/li><\/ul><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/q5Vi27W8mIk\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 30, 2023Time: 9:30 AM EDT | 8:30 AM CDT | 2:30 PM CET | 7:00 PM ISTTopic: Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs&#8217; Decision-Making Watch Now Abstract: As threat landscapes evolve, holistic security strategies are essential for modern organizations to protect their data and business. At the core&hellip;<\/p>\n","protected":false},"author":33,"featured_media":80270,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80194","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Security Strategy: Pen Testing and Forensics for CISO Decision-Making<\/title>\n<meta name=\"description\" content=\"In this webinar, discover how CISOs can leverage both penetration testing and digital forensics to make informed cyber security decisions for organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs\u2019 Decision-Making\u202f\" \/>\n<meta property=\"og:description\" content=\"In this webinar, discover how CISOs can leverage both penetration testing and digital forensics to make informed cyber security decisions for organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-31T12:23:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T17:56:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs\u2019 Decision-Making\u202f\",\"datePublished\":\"2023-10-31T12:23:53+00:00\",\"dateModified\":\"2025-09-04T17:56:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/\"},\"wordCount\":510,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/\",\"name\":\"Cyber Security Strategy: Pen Testing and Forensics for CISO Decision-Making\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg\",\"datePublished\":\"2023-10-31T12:23:53+00:00\",\"dateModified\":\"2025-09-04T17:56:50+00:00\",\"description\":\"In this webinar, discover how CISOs can leverage both penetration testing and digital forensics to make informed cyber security decisions for organizations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/integrative-cyber-security-strategy-for-ciso-decisions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs\u2019 Decision-Making\u202f\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security Strategy: Pen Testing and Forensics for CISO Decision-Making","description":"In this webinar, discover how CISOs can leverage both penetration testing and digital forensics to make informed cyber security decisions for organizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/","og_locale":"en_US","og_type":"article","og_title":"Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs\u2019 Decision-Making\u202f","og_description":"In this webinar, discover how CISOs can leverage both penetration testing and digital forensics to make informed cyber security decisions for organizations.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-10-31T12:23:53+00:00","article_modified_time":"2025-09-04T17:56:50+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs\u2019 Decision-Making\u202f","datePublished":"2023-10-31T12:23:53+00:00","dateModified":"2025-09-04T17:56:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/"},"wordCount":510,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/","name":"Cyber Security Strategy: Pen Testing and Forensics for CISO Decision-Making","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg","datePublished":"2023-10-31T12:23:53+00:00","dateModified":"2025-09-04T17:56:50+00:00","description":"In this webinar, discover how CISOs can leverage both penetration testing and digital forensics to make informed cyber security decisions for organizations.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Integrative-Cyber-security-Strategy-for-CISOs_Blog.jpg.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/integrative-cyber-security-strategy-for-ciso-decisions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Holistic Cyber Security Strategy: Integrating Pen Testing and Forensics for CISOs\u2019 Decision-Making\u202f"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80194"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80194\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80270"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}