{"id":80244,"date":"2023-10-17T10:59:00","date_gmt":"2023-10-17T10:59:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80244"},"modified":"2024-10-24T10:34:43","modified_gmt":"2024-10-24T10:34:43","slug":"the-art-of-cyber-resilience-strategies-for-effective-protection","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/","title":{"rendered":"The Art of Cyber Resilience: Strategies for Effective Protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80244\" class=\"elementor elementor-80244\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eee8e5f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eee8e5f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34d762e\" data-id=\"34d762e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe029de elementor-widget elementor-widget-text-editor\" data-id=\"fe029de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> October 17, 2023<br \/><strong>Time:<\/strong> 3:30 PM CAT | 9:30 AM EDT | 7:00 PM IST<br \/><strong>Topic:<\/strong> The Art of Cyber Resilience: Strategies for Effective Protection<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> Modern-day cybersecurity primarily revolves around cyber resilience, i.e., an organization&#8217;s ability to prepare for, respond to, and recover from cyber attacks. Organizations are said to be resilient to cyber threats if their business operations do not slow down or come to a halt after a significant security incident. Thus, a diversified backup and recovery strategy is equally important, where it can be ensured that critical information remains accessible even if systems are compromised.<\/p><p>The aim of making the security posture resilient is not only to ensure uninterrupted critical operations but also to develop effective cyber resilience strategies that integrate technology, people, and processes. As part of the cyber resilience strategy, organizations must implement cutting-edge tools and continuously monitor their assets and networks to defend against threats proactively and develop cyber defense policies, capabilities, capacity, and partnerships to be resilient to cyber threats. Cyber resilience also demands a culture of cybersecurity awareness and education among employees alongside technology implementation such as regular software updates, encryption, and patch management to help eliminate vulnerabilities. The current webinar discusses the importance of cyber resilience strategies and the steps to create an effective method to prevent threats and respond to incidents.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>what cyber resilience is and why it is important<\/li><li>understanding the cyber resilience life cycle<\/li><li>steps for creating a cyber resilience strategy<\/li><li>tips and tools to achieve cyber resilience<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Happy-Amon-scaled.jpg.webp\" alt=\"happy-amon\" width=\"200\" \/><strong>Happy Amon,<\/strong> Cybersecurity Consultant and Co-Founder of Bit Dimension Pty Ltd (Botswana)<br \/><strong>Bio:<\/strong> Ms. Happy Amon is an IT Expert with over 15 years of experience in the IT and cyber security fields, majorly focused in information technology administration and cybersecurity consultation. Happy Amon is a member of the International Association of Privacy Professionals and holds qualifications such as a Bachelor of Information Systems, <a href=\"https:\/\/www.eccu.edu\/academics\/master-of-science-in-cyber-security\/\" target=\"_blank\" rel=\"noopener\">MSC Cybersecurity<\/a>, Global IT Course (Information Security &amp; Cybersecurity), Certified Chief Information Security Officer v1 (C|CISO), Computer Hacker Forensic Investigator (C|HFI), Certified Information Systems Security Professional (CISSP), Operations Management, Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), CCNP Route at Cisco Networking, ITIL V3 Foundation, Administering Microsoft SQL Server 2012 Databases, Ethical Hacking, CCNA Security, and CCNA.<\/p><p>She has an exceptional track record in IT administration, network administration, pen testing, policy creation, risk assessment and management, security assessments, and audit\/security governance and compliance with multinational companies.<\/p><p>Happy Amon also strives to raise cybersecurity awareness as a Cyber 221 Digital Ambassador, capitalizing on her proven expertise and hands-on experience in executing security governance, risk assessments, compliance, conducting security audits, assessing the effectiveness of controls, data privacy, incident response, and cyber operations to assist the governmental sector, NGOs, schools and the technical communities with her experience and knowledge in the field.<\/p><p><a name=\"attend\"><\/a><\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/aGSpGqbE12M?si=FUtVMorMzYJR1kzL\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 17, 2023Time: 3:30 PM CAT | 9:30 AM EDT | 7:00 PM ISTTopic: The Art of Cyber Resilience: Strategies for Effective Protection Watch Now Abstract: Modern-day cybersecurity primarily revolves around cyber resilience, i.e., an organization&#8217;s ability to prepare for, respond to, and recover from cyber attacks. Organizations are said to be resilient to&hellip;<\/p>\n","protected":false},"author":33,"featured_media":80245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80244","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Resilience Tactics: A Practical Guide<\/title>\n<meta name=\"description\" content=\"Gain a better understanding of cyber resilience and the procedures necessary to develop successful cyber resilience plans for improved cybersecurity in this expert-led webinar\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Art of Cyber Resilience: Strategies for Effective Protection\" \/>\n<meta property=\"og:description\" content=\"Gain a better understanding of cyber resilience and the procedures necessary to develop successful cyber resilience plans for improved cybersecurity in this expert-led webinar\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-17T10:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-24T10:34:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1152\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"The Art of Cyber Resilience: Strategies for Effective Protection\",\"datePublished\":\"2023-10-17T10:59:00+00:00\",\"dateModified\":\"2024-10-24T10:34:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/\",\"name\":\"Cyber Resilience Tactics: A Practical Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg\",\"datePublished\":\"2023-10-17T10:59:00+00:00\",\"dateModified\":\"2024-10-24T10:34:43+00:00\",\"description\":\"Gain a better understanding of cyber resilience and the procedures necessary to develop successful cyber resilience plans for improved cybersecurity in this expert-led webinar\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg\",\"width\":1152,\"height\":768,\"caption\":\"A-Practical-Guide-to-Cyber-Resilience\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-art-of-cyber-resilience-strategies-for-effective-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Art of Cyber Resilience: Strategies for Effective Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Resilience Tactics: A Practical Guide","description":"Gain a better understanding of cyber resilience and the procedures necessary to develop successful cyber resilience plans for improved cybersecurity in this expert-led webinar","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/","og_locale":"en_US","og_type":"article","og_title":"The Art of Cyber Resilience: Strategies for Effective Protection","og_description":"Gain a better understanding of cyber resilience and the procedures necessary to develop successful cyber resilience plans for improved cybersecurity in this expert-led webinar","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-10-17T10:59:00+00:00","article_modified_time":"2024-10-24T10:34:43+00:00","og_image":[{"width":1152,"height":768,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"The Art of Cyber Resilience: Strategies for Effective Protection","datePublished":"2023-10-17T10:59:00+00:00","dateModified":"2024-10-24T10:34:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/"},"wordCount":498,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/","name":"Cyber Resilience Tactics: A Practical Guide","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg","datePublished":"2023-10-17T10:59:00+00:00","dateModified":"2024-10-24T10:34:43+00:00","description":"Gain a better understanding of cyber resilience and the procedures necessary to develop successful cyber resilience plans for improved cybersecurity in this expert-led webinar","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/A-Practical-Guide-to-Cyber-Resilience-1152x768-1.jpg","width":1152,"height":768,"caption":"A-Practical-Guide-to-Cyber-Resilience"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-art-of-cyber-resilience-strategies-for-effective-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"The Art of Cyber Resilience: Strategies for Effective Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80244"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80244\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80245"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}