{"id":80197,"date":"2023-10-10T11:09:00","date_gmt":"2023-10-10T11:09:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80197"},"modified":"2023-11-09T07:17:49","modified_gmt":"2023-11-09T07:17:49","slug":"cyber-threat-intelligence-tools-techniques","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/","title":{"rendered":"Current Trends in Cyber Threat Intelligence Tools and Techniques"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80197\" class=\"elementor elementor-80197\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ef3736b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ef3736b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-131441e\" data-id=\"131441e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39b8778 elementor-widget elementor-widget-text-editor\" data-id=\"39b8778\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> October 10<sup>th<\/sup>, 2023<br>\n<strong>Time:<\/strong> 5:00 PM EAT | 10:00 AM EDT | 7:30 PM IST<br>\n<strong>Topic:<\/strong> Current Trends in Cyber Threat Intelligence Tools and Techniques<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> As cyber threats accelerate, security professionals need to remain abreast of the ever-evolving threat landscape. An effective defense against these threats often hinges on a reliable threat intelligence strategy. Whether dealing with threat intelligence or identifying and managing high-priority alerts, security analysts frequently detect and pinpoint compromise indicators. This task often requires using various tools and technologies geared toward threat hunting and intelligence sharing while simultaneously integrating this process into the existing security infrastructure.<\/p>\n<p>Threat intelligence involves collecting and aggregating data from diverse sources, monitoring continuously, and applying advanced analytical capabilities to yield actionable insights. Given the labor-intensive and persistent nature of this process, a comprehensive security strategy that is agile enough to integrate new tools and automation processes seamlessly is required. In the current webinar, we aim to explore the impact of such a rapidly shifting threat landscape on threat intelligence capabilities and highlight the prevailing trends in tools and technologies that currently dominate security efforts globally.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>the current state of the threat landscape<\/li>\n<li>outlining current threat intelligence capabilities<\/li>\n<li>advancements in threat intelligence accumulation and sharing<\/li>\n<li>new technologies influencing threat intelligence<\/li>\n<li>advancement in threat intelligence tools<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/09\/Bright.png\" alt=\"Bright-Gameli\" width=\"200\"><strong>Bright Gameli Mawudor,<\/strong> PhD<\/p>\n<p><strong>Bio:<\/strong> Dr. Bright Gameli Mawudor is a pioneering thought leader in cyber security. As the Cyber Security Engineering Lead at MARA, a leader in Web3 and Blockchain technology in Africa, he is at the forefront of innovation.<\/p>\n<p>He founded Africahackon, a cyber security collective that promotes excellence and community engagement throughout Africa.<\/p>\n<p>With a Ph.D. in IT Convergence and Application Engineering, Dr. Bright is a highly respected advisor and has delivered captivating talks at over 280 conferences and workshops. His implementation of cutting-edge security strategies and cyber resilience advising for prominent organizations has garnered global recognition.<\/p>\n<p>Driven by his expertise and leadership, he is dedicated to securing Africa&#8217;s digital future.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe width=\"100%\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/Iphp4P2t-m0?si=Qd7bDh2yglf9JkJC\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 10th, 2023 Time: 5:00 PM EAT | 10:00 AM EDT | 7:30 PM IST Topic: Current Trends in Cyber Threat Intelligence Tools and Techniques Watch Now Abstract: As cyber threats accelerate, security professionals need to remain abreast of the ever-evolving threat landscape. An effective defense against these threats often hinges on a reliable&hellip;<\/p>\n","protected":false},"author":33,"featured_media":80198,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80197","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Intelligence Tools and Techniques<\/title>\n<meta name=\"description\" content=\"Learn how the changing threat landscape has driven security professionals to enhance threat intelligence capabilities and shape intelligence tools and processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Current Trends in Cyber Threat Intelligence Tools and Techniques\" \/>\n<meta property=\"og:description\" content=\"Learn how the changing threat landscape has driven security professionals to enhance threat intelligence capabilities and shape intelligence tools and processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-10T11:09:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-09T07:17:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/09\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"Current Trends in Cyber Threat Intelligence Tools and Techniques\",\"datePublished\":\"2023-10-10T11:09:00+00:00\",\"dateModified\":\"2023-11-09T07:17:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/\"},\"wordCount\":358,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/\",\"name\":\"Cyber Threat Intelligence Tools and Techniques\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg\",\"datePublished\":\"2023-10-10T11:09:00+00:00\",\"dateModified\":\"2023-11-09T07:17:49+00:00\",\"description\":\"Learn how the changing threat landscape has driven security professionals to enhance threat intelligence capabilities and shape intelligence tools and processes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Current Trends in Cyber Threat Intelligence Tools and Techniques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-tools-techniques\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Current Trends in Cyber Threat Intelligence Tools and Techniques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence Tools and Techniques","description":"Learn how the changing threat landscape has driven security professionals to enhance threat intelligence capabilities and shape intelligence tools and processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/","og_locale":"en_US","og_type":"article","og_title":"Current Trends in Cyber Threat Intelligence Tools and Techniques","og_description":"Learn how the changing threat landscape has driven security professionals to enhance threat intelligence capabilities and shape intelligence tools and processes.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-10-10T11:09:00+00:00","article_modified_time":"2023-11-09T07:17:49+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/09\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"Current Trends in Cyber Threat Intelligence Tools and Techniques","datePublished":"2023-10-10T11:09:00+00:00","dateModified":"2023-11-09T07:17:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/"},"wordCount":358,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/09\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/","name":"Cyber Threat Intelligence Tools and Techniques","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/09\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg","datePublished":"2023-10-10T11:09:00+00:00","dateModified":"2023-11-09T07:17:49+00:00","description":"Learn how the changing threat landscape has driven security professionals to enhance threat intelligence capabilities and shape intelligence tools and processes.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/09\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/09\/Current-Trends-in-Cyber-Threat-Intelligence-Tools-and-Techniques_Blog.jpg","width":1938,"height":1292,"caption":"Current Trends in Cyber Threat Intelligence Tools and Techniques"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-tools-techniques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Current Trends in Cyber Threat Intelligence Tools and Techniques"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80197"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80197\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80198"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}