{"id":80780,"date":"2023-12-06T10:38:55","date_gmt":"2023-12-06T10:38:55","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80780"},"modified":"2023-12-18T09:40:37","modified_gmt":"2023-12-18T09:40:37","slug":"exploring-ai-generated-attack-vectors","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/","title":{"rendered":"Unleashing the Beast: Exploring AI-Generated Attack Vectors\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80780\" class=\"elementor elementor-80780\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c2fa6c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c2fa6c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d9a561\" data-id=\"8d9a561\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08c9133 elementor-widget elementor-widget-text-editor\" data-id=\"08c9133\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> December 4, 2023<br>\n<strong>Time:<\/strong> 9:00 AM EST | 3:00 PM CET | 7:30 PM IST<br>\n<strong>Topic:<\/strong> Unleashing the Beast: Exploring AI-Generated Attack Vectors<\/p><p>\n<a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> With AI showing promising outcomes for a wide range of digital processes, threat actors find it lucrative to adopt AI technologies to enhance their cyber attack operations. AI-generated attack vectors are a concern, as they leverage AI&#8217;s capabilities to craft sophisticated and adaptive threats that can bypass traditional security measures. AI-generated attack vectors include a range of techniques, from machine learning-powered phishing attacks to automated malware creation and evasion strategies. One concerning aspect is the ability of AI to analyze vast datasets and identify vulnerabilities in systems or networks, allowing attackers to exploit weaknesses more efficiently. In this rapidly evolving landscape, staying ahead of the curve is essential to safeguarding digital assets and privacy in an AI-driven world. The current webinar explores AI-generated attack vectors, as understanding these evolving threats is the first step in developing effective countermeasures. This webinar also discusses approaches to advancing AI-driven security solutions that are capable of detecting and mitigating AI-generated attacks while also fostering responsible AI development to mitigate potential misuse.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding the role of AI in the security and threat landscape<\/li>\n<li>AI-driven attack vector development<\/li>\n<li>Understanding AI-driven human and system hacking<\/li>\n<li>Identifying and mitigating AI-driven attacks<\/li>\n<li>Developing counterintelligence: AI-driven security<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Dennis-Houchin_Profile.jpg\" alt=\"luis\" width=\"200\"><strong>Dennis Houchin,<\/strong> President, Ad Hoc Information Systems<br>\n<strong>Bio:<\/strong> Dennis Houchin is the President of Ad Hoc Information Systems, a consultancy he founded in 1994. He has spent 41 years in information systems and security, and he has helped small businesses navigate the complexities of cybersecurity for 25 years. Today, Dennis actively explores AI&#8217;s role in cybersecurity, staying on the bleeding edge of technology.<\/p>\n<p>Dennis is also an instructor and mentor specializing in ethical hacking and digital forensics\/incident response (DFIR). He coaches his boot camp students toward successful cybersecurity careers. He&#8217;s authored three impactful books: The Passion Principles, The Achievement Protocol, and Cybersecurity for Executives, Managers, and Leaders. The first two are focused on personal development and living a fulfilling life. The third introduces the underbelly of cybersecurity to decision-makers.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/sQSOWx4riJM?si=ENjwns6xC91VDVRg\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 4, 2023 Time: 9:00 AM EST | 3:00 PM CET | 7:30 PM IST Topic: Unleashing the Beast: Exploring AI-Generated Attack Vectors Watch Now Abstract: With AI showing promising outcomes for a wide range of digital processes, threat actors find it lucrative to adopt AI technologies to enhance their cyber attack operations. AI-generated&hellip;<\/p>\n","protected":false},"author":32,"featured_media":80781,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80780","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Exploring the Creation of New Attack Vectors Through the Use of AI<\/title>\n<meta name=\"description\" content=\"In this webinar, you will learn about AI-generated attack vectors, the strategy for developing AI-driven security solutions that can mitigate such threats, and much more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploring the Creation of New Attack Vectors Through the Use of AI\" \/>\n<meta property=\"og:description\" content=\"In this webinar, you will learn about AI-generated attack vectors, the strategy for developing AI-driven security solutions that can mitigate such threats, and much more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-06T10:38:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-18T09:40:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/11\/Exploring-AI-Generated-Attack-Vectors.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Unleashing the Beast: Exploring AI-Generated Attack Vectors\u00a0\" \/>\n<meta name=\"twitter:description\" content=\"In this webinar, you will learn about AI-generated attack vectors, the strategy for developing AI-driven security solutions that can mitigate such threats, and much more.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Unleashing the Beast: Exploring AI-Generated Attack Vectors\u00a0\",\"datePublished\":\"2023-12-06T10:38:55+00:00\",\"dateModified\":\"2023-12-18T09:40:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/\"},\"wordCount\":378,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Exploring-AI-Generated-Attack-Vectors.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/\",\"name\":\"Exploring the Creation of New Attack Vectors Through the Use of AI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Exploring-AI-Generated-Attack-Vectors.jpg\",\"datePublished\":\"2023-12-06T10:38:55+00:00\",\"dateModified\":\"2023-12-18T09:40:37+00:00\",\"description\":\"In this webinar, you will learn about AI-generated attack vectors, the strategy for developing AI-driven security solutions that can mitigate such threats, and much more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Exploring-AI-Generated-Attack-Vectors.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Exploring-AI-Generated-Attack-Vectors.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/exploring-ai-generated-attack-vectors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Unleashing the Beast: Exploring AI-Generated Attack Vectors\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Exploring the Creation of New Attack Vectors Through the Use of AI","description":"In this webinar, you will learn about AI-generated attack vectors, the strategy for developing AI-driven security solutions that can mitigate such threats, and much more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/","og_locale":"en_US","og_type":"article","og_title":"Exploring the Creation of New Attack Vectors Through the Use of AI","og_description":"In this webinar, you will learn about AI-generated attack vectors, the strategy for developing AI-driven security solutions that can mitigate such threats, and much more.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-12-06T10:38:55+00:00","article_modified_time":"2023-12-18T09:40:37+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/11\/Exploring-AI-Generated-Attack-Vectors.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Unleashing the Beast: Exploring AI-Generated Attack Vectors\u00a0","twitter_description":"In this webinar, you will learn about AI-generated attack vectors, the strategy for developing AI-driven security solutions that can mitigate such threats, and much more.","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Unleashing the Beast: Exploring AI-Generated Attack Vectors\u00a0","datePublished":"2023-12-06T10:38:55+00:00","dateModified":"2023-12-18T09:40:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/"},"wordCount":378,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/11\/Exploring-AI-Generated-Attack-Vectors.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/","name":"Exploring the Creation of New Attack Vectors Through the Use of AI","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/11\/Exploring-AI-Generated-Attack-Vectors.jpg","datePublished":"2023-12-06T10:38:55+00:00","dateModified":"2023-12-18T09:40:37+00:00","description":"In this webinar, you will learn about AI-generated attack vectors, the strategy for developing AI-driven security solutions that can mitigate such threats, and much more.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/11\/Exploring-AI-Generated-Attack-Vectors.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/11\/Exploring-AI-Generated-Attack-Vectors.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/exploring-ai-generated-attack-vectors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Unleashing the Beast: Exploring AI-Generated Attack Vectors\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80780"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80780\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80781"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}