{"id":81112,"date":"2023-12-20T11:33:00","date_gmt":"2023-12-20T11:33:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81112"},"modified":"2023-12-20T11:34:56","modified_gmt":"2023-12-20T11:34:56","slug":"modern-ciso-challenges-fostering-a-security-culture-in-global-organizations","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/","title":{"rendered":"Modern CISO Challenges: Fostering a Security Culture in Global Organizations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81112\" class=\"elementor elementor-81112\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-707ad6d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"707ad6d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ae1c81\" data-id=\"4ae1c81\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-435e63f elementor-widget elementor-widget-text-editor\" data-id=\"435e63f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> December 14, 2023<br>\n<strong>Time:<\/strong> 9.00 AM EST | 3.00 PM CET | 7:30 PM IST<br>\n<strong>Topic:<\/strong> Modern CISO Challenges: Fostering a Security Culture in Global Organizations<br>\n<a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> Multicultural teams are crucial in the current business environment, which transcends geographical boundaries but also comes with distinctive challenges. The modern chief information security officer (CISO) faces a daunting task in navigating the intricate landscape of building a robust cybersecurity culture within global organizations. As technology advances, CISOs grapple with diverse challenges, including fostering awareness, aligning security goals with business objectives, and adapting to varying cultural contexts.<\/p><p>\nErin Meyer\u2019s widely recognized theory\u2014the culture map\u2014offers a valuable framework for <a href=\"https:\/\/erinmeyer.com\/\" target=\"_blank\" rel=\"noopener\">navigating cultural complexity<\/a> while conducting global business. Based on this framework, CISOs should adapt their leadership styles to understand and overcome the cultural differences within their teams, which can present challenges in areas like communication, time management, workplace standards, decision-making, and problem-solving. This webinar highlights how a CISO can become a cultural architect, orchestrating a cohesive cybersecurity culture across multinational teams.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding the role of a CISO in the modern threat landscape<\/li>\n<li>Recognizing the challenges of building a strong cybersecurity culture<\/li>\n<li>Understanding the responsibilities of a CISO in fostering a balanced work environment<\/li>\n<li>Steps to build a healthy security culture in an organization<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/GeorgeDobrea.png.webp\" alt=\"george-dobrea\" width=\"200\"><strong>George Dobrea,<\/strong> Co-founder and CEO of XEDUCO Institute<\/p>\n<p><strong>Bio:<\/strong><br>\nCo-founder and CEO of XEDUCO Institute, George Dobrea is a cybersecurity expert and a well-known technical instructor with over 35 years of business experience delivering consulting services and training programs to military, commercial, and public organizations in 30+ countries.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe width=\"100%\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/tUE-3AecMcU?si=zRaK4QaR7QNRgSxW\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 14, 2023 Time: 9.00 AM EST | 3.00 PM CET | 7:30 PM IST Topic: Modern CISO Challenges: Fostering a Security Culture in Global Organizations Watch Now Abstract: Multicultural teams are crucial in the current business environment, which transcends geographical boundaries but also comes with distinctive challenges. The modern chief information security officer&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81166,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81112","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Modern CISOs and the Culture Map: Global Cybersecurity Culture Challenges<\/title>\n<meta name=\"description\" content=\"Find out what steps CISOs can take to maintain consistency in cybersecurity operations inside global corporations with geographically distributed teams and unique work environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Modern CISO Challenges: Fostering a Security Culture in Global Organizations\" \/>\n<meta property=\"og:description\" content=\"Find out what steps CISOs can take to maintain consistency in cybersecurity operations inside global corporations with geographically distributed teams and unique work environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-20T11:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-20T11:34:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Modern CISO Challenges: Fostering a Security Culture in Global Organizations\",\"datePublished\":\"2023-12-20T11:33:00+00:00\",\"dateModified\":\"2023-12-20T11:34:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/\"},\"wordCount\":287,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/\",\"name\":\"Modern CISOs and the Culture Map: Global Cybersecurity Culture Challenges\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg\",\"datePublished\":\"2023-12-20T11:33:00+00:00\",\"dateModified\":\"2023-12-20T11:34:56+00:00\",\"description\":\"Find out what steps CISOs can take to maintain consistency in cybersecurity operations inside global corporations with geographically distributed teams and unique work environments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Modern CISO Challenges: Fostering a Security Culture in Global Organizations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Modern CISOs and the Culture Map: Global Cybersecurity Culture Challenges","description":"Find out what steps CISOs can take to maintain consistency in cybersecurity operations inside global corporations with geographically distributed teams and unique work environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/","og_locale":"en_US","og_type":"article","og_title":"Modern CISO Challenges: Fostering a Security Culture in Global Organizations","og_description":"Find out what steps CISOs can take to maintain consistency in cybersecurity operations inside global corporations with geographically distributed teams and unique work environments.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-12-20T11:33:00+00:00","article_modified_time":"2023-12-20T11:34:56+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Modern CISO Challenges: Fostering a Security Culture in Global Organizations","datePublished":"2023-12-20T11:33:00+00:00","dateModified":"2023-12-20T11:34:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/"},"wordCount":287,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/","name":"Modern CISOs and the Culture Map: Global Cybersecurity Culture Challenges","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg","datePublished":"2023-12-20T11:33:00+00:00","dateModified":"2023-12-20T11:34:56+00:00","description":"Find out what steps CISOs can take to maintain consistency in cybersecurity operations inside global corporations with geographically distributed teams and unique work environments.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Modern-CISOs-and-the-Culture-Map-Global-Cybersecurity-Culture-Challenges.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-ciso-challenges-fostering-a-security-culture-in-global-organizations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Modern CISO Challenges: Fostering a Security Culture in Global Organizations"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81112"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81112\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81166"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}