{"id":80277,"date":"2023-11-11T04:31:46","date_gmt":"2023-11-11T04:31:46","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80277"},"modified":"2025-06-25T11:25:23","modified_gmt":"2025-06-25T11:25:23","slug":"a-cisos-advice-on-cyber-resilience-best-practices","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/","title":{"rendered":"The CISO&#8217;s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80277\" class=\"elementor elementor-80277\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f587338 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f587338\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb95c11\" data-id=\"eb95c11\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cbc3e4 elementor-widget elementor-widget-text-editor\" data-id=\"6cbc3e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> November 10, 2023<br \/><strong>Time:<\/strong> 8:30 AM EST | 7:30 AM CST | 2:30 PM CET | 7:00 PM IST<br \/><strong>Topic:<\/strong> The CISO&#8217;s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> Cyber resilience can be described as an organization&#8217;s capacity to anticipate, respond to, and rebound from cyber attacks. It encompasses a range of tactics, processes, and tools employed to shield businesses from cyber threats. These tactics include but are not restricted to executing vulnerability assessment and penetration testing (VAPT), maintaining software with timely patching and updates, continuous surveillance and threat detection capabilities, secure and immutable backup procedures, third-party risk management, forensics, and more. The roles of <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-chief-information-security-officer-cciso\/\">chief information security officers (CISOs)<\/a> and other security leaders who must meticulously devise and implement cyber resilience programs are pivotal. To craft an effective resilience program, CISOs must weigh security requirements, available resources, and capabilities while staying attuned to evolving threats in the cybersecurity landscape.<\/span><\/p><p>The current webinar aims to explain the principles behind developing and implementing a cyber resilience strategy and highlight the best practices that CISOs should consider for their efficient deployment and operation. Additionally, the webinar emphasizes the potential pitfalls to avoid when creating and implementing a cyber resilience strategy to ensure it remains robust in the face of future threats.<br \/><strong>Key takeaways:<\/strong><\/p><ul><li>Understanding cyber resilience: significance and definition<\/li><li>Guidelines for crafting and deploying a cyber resilience strategy<\/li><li>Optimal approaches to attaining a robust security framework<\/li><li>Common errors to avoid when developing and executing a cyber resilience strategy<\/li><\/ul><p><strong>Speaker:<\/strong><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Mark.Houpt_-scaled.jpg\" alt=\"Mark\" width=\"200\" \/> <strong>Mark Houpt,<\/strong> Chief Security Officer at DataBank Holdings Ltd.<\/p><p><strong>Bio:<\/strong> Mark is the Chief Information Security Officer of DataBank, boasting over three decades of expertise in information security and technology across diverse industries. He became a part of DataBank in 2017 following the acquisition of Edge Hosting, where he has served as CISO since 2015. His leadership role encompasses strategic planning, security oversight, compliance, and contributing his deep subject matter knowledge to an integrated information security program.<\/p><p>Regarded as a renowned security speaker, blogger, podcaster, and entrepreneur, Mark has undertaken an expansive professional journey: from safeguarding Fortune 50 financial institutions and healthcare entities and acting as a CTO in higher education, to being a cryptologist with the US Navy. His impressive list of certifications includes CISSP, CCSP, C|EH v9, C|HFI, and more. Mark&#8217;s expertise particularly shines in comprehending and translating complex regulations like FedRAMP, FISMA, CMMC, HIPAA, GDPR, and PCI-DSS for clients. His qualifications match the demanding standards of multiple DoD positions, and he&#8217;s an active member in leading global security organizations.<\/p><p>Outside of his professional realm, Mark is a dedicated philanthropist, helping ensure economic security for those in need, and is a passionate aviation and wildlife photographer. Together with his wife, Maria, they share three grown children. For more on Mark, refer to his LinkedIn profile. At DataBank, he proudly leads a team of expert security architects and compliance engineers.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/QW5kcrdP0zE?si=zq6PEoccPBcejbno\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 10, 2023Time: 8:30 AM EST | 7:30 AM CST | 2:30 PM CET | 7:00 PM ISTTopic: The CISO&#8217;s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid Watch Now Abstract: Cyber resilience can be described as an organization&#8217;s capacity to anticipate, respond to, and rebound from cyber attacks. It encompasses a&hellip;<\/p>\n","protected":false},"author":32,"featured_media":80284,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80277","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Resilience Lessons from a Chief Information Security Officer<\/title>\n<meta name=\"description\" content=\"In this webinar, a CISO shares insights on the significance of cyber resilience, steps to develop a cyber resilience strategy, common pitfalls to avoid, best practices to follow, and much more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The CISO&#039;s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid\" \/>\n<meta property=\"og:description\" content=\"In this webinar, a CISO shares insights on the significance of cyber resilience, steps to develop a cyber resilience strategy, common pitfalls to avoid, best practices to follow, and much more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-11T04:31:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T11:25:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"The CISO&#8217;s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid\",\"datePublished\":\"2023-11-11T04:31:46+00:00\",\"dateModified\":\"2025-06-25T11:25:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/\"},\"wordCount\":513,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/\",\"name\":\"Cyber Resilience Lessons from a Chief Information Security Officer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg\",\"datePublished\":\"2023-11-11T04:31:46+00:00\",\"dateModified\":\"2025-06-25T11:25:23+00:00\",\"description\":\"In this webinar, a CISO shares insights on the significance of cyber resilience, steps to develop a cyber resilience strategy, common pitfalls to avoid, best practices to follow, and much more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-cisos-advice-on-cyber-resilience-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The CISO&#8217;s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Resilience Lessons from a Chief Information Security Officer","description":"In this webinar, a CISO shares insights on the significance of cyber resilience, steps to develop a cyber resilience strategy, common pitfalls to avoid, best practices to follow, and much more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"The CISO's Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid","og_description":"In this webinar, a CISO shares insights on the significance of cyber resilience, steps to develop a cyber resilience strategy, common pitfalls to avoid, best practices to follow, and much more.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-11-11T04:31:46+00:00","article_modified_time":"2025-06-25T11:25:23+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"The CISO&#8217;s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid","datePublished":"2023-11-11T04:31:46+00:00","dateModified":"2025-06-25T11:25:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/"},"wordCount":513,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/","name":"Cyber Resilience Lessons from a Chief Information Security Officer","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg","datePublished":"2023-11-11T04:31:46+00:00","dateModified":"2025-06-25T11:25:23+00:00","description":"In this webinar, a CISO shares insights on the significance of cyber resilience, steps to develop a cyber resilience strategy, common pitfalls to avoid, best practices to follow, and much more.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/A-CISOs-Advice-on-Cyber-Resilience-Best-Practices-2.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-cisos-advice-on-cyber-resilience-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"The CISO&#8217;s Guide to Cyber Resilience: Best Practices and Pitfalls to Avoid"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80277"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80277\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80284"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}