{"id":81205,"date":"2024-01-17T15:35:00","date_gmt":"2024-01-17T15:35:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81205"},"modified":"2024-02-01T07:52:54","modified_gmt":"2024-02-01T07:52:54","slug":"confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/","title":{"rendered":"Confessions of a CIA Operative &#8211; Unveiling the Secrets of Human Hacking"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81205\" class=\"elementor elementor-81205\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-01449ed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01449ed\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d6dc0d\" data-id=\"9d6dc0d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d397df elementor-widget elementor-widget-text-editor\" data-id=\"2d397df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> January 17, 2024<br>\n<strong>Time:<\/strong> 8:30 AM EST | 2:30 PM CET | 7:00 PM IST<br>\n<strong>Topic:<\/strong> Confessions of a CIA Operative &#8211; Unveiling the Secrets of Human Hacking<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> The human factor serves as both the primary defense and the initial vulnerability in the face of cyber threats. It is often the first target for threat actors seeking a successful cyberattack. Threat actors meticulously identify, assess, and manipulate key personnel within a target organization to enhance their human hacking activities through social engineering strategies. Social engineering is the skillful exploitation of trust, empathy, and cognitive biases to mislead and manipulate individuals into revealing confidential information, granting unauthorized access, or engaging in actions they would otherwise avoid. This malicious practice encompasses a wide range of techniques, including impersonation, pretexting, phishing, and baiting, all aimed at exploiting human vulnerability. This webinar aims to provide a thorough understanding of human hacking by delving into the mindset of threat actors and highlighting the tactics and methodologies they employ throughout the process. It draws upon the expertise of a former CIA operative to offer valuable insights into how threat actors identify, assess, and manipulate insiders in their quest to breach security and obtain high-value intelligence. Additionally, it aims to highlight the proactive approaches that both businesses and individuals can adopt to protect themselves from being a target of human hacking.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Exploring why humans are prone to human hacking<\/li>\n<li>Delving into threat actors and their goals<\/li>\n<li>Understanding the role of social media platforms in identifying potential social engineering targets<\/li>\n<li>Leveraging insider motivations and weaknesses for advanced social engineering<\/li>\n<li>Understanding the rise of deep fake technology<\/li>\n<li>Key actionable steps to avoid becoming a victim of human hacking<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/Peter-Warmka-.jpg\" alt=\"Peter Warmka\" width=\"200\"><strong>Peter Warmka,<\/strong> Human Hacker and Founder of Counterintelligence Institute<\/p>\n<p><strong>Bio:<\/strong><br>\nPeter Warmka is a former senior intelligence officer with the CIA, with over 20 years of experience in breaching the security of target organizations overseas. He is an adjunct professor at Webster University&#8217;s Masters in Cybersecurity Program, founder of Orlando-based Counterintelligence Institute, LLC, and author of the non-fiction book &#8220;Confessions of a CIA Spy &#8211; The Art of Human Hacking.&#8221; He is passionate about helping the city, state, and federal government entities, non-profits, academic institutes, private companies, and individuals to safeguard their sensitive proprietary and personal data. In addition to conducting his signature training program, Peter is a frequent conference speaker, guest podcaster, and author of numerous publications on social engineering and the manipulation of insiders.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe width=\"100%\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/ojjE3M-tQig?si=RuhSbW9tp3IF78fd\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: January 17, 2024 Time: 8:30 AM EST | 2:30 PM CET | 7:00 PM IST Topic: Confessions of a CIA Operative &#8211; Unveiling the Secrets of Human Hacking Watch Now Abstract: The human factor serves as both the primary defense and the initial vulnerability in the face of cyber threats. It is often the&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81289,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81205","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A CIA Operative Shares the Secrets of Human Hacking<\/title>\n<meta name=\"description\" content=\"This webinar takes a deep dive into human hacking, with a former CIA agent sharing insights on how threat actors facilitate human hacking via social engineering, preventive measures, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Confessions of a CIA Operative - Unveiling the Secrets of Human Hacking\" \/>\n<meta property=\"og:description\" content=\"This webinar takes a deep dive into human hacking, with a former CIA agent sharing insights on how threat actors facilitate human hacking via social engineering, preventive measures, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-17T15:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-01T07:52:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/465x310-New.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Confessions of a CIA Operative &#8211; Unveiling the Secrets of Human Hacking\",\"datePublished\":\"2024-01-17T15:35:00+00:00\",\"dateModified\":\"2024-02-01T07:52:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/\"},\"wordCount\":438,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/465x310-New.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/\",\"name\":\"A CIA Operative Shares the Secrets of Human Hacking\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/465x310-New.jpg\",\"datePublished\":\"2024-01-17T15:35:00+00:00\",\"dateModified\":\"2024-02-01T07:52:54+00:00\",\"description\":\"This webinar takes a deep dive into human hacking, with a former CIA agent sharing insights on how threat actors facilitate human hacking via social engineering, preventive measures, and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/465x310-New.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/465x310-New.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Confessions of a CIA Operative &#8211; Unveiling the Secrets of Human Hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A CIA Operative Shares the Secrets of Human Hacking","description":"This webinar takes a deep dive into human hacking, with a former CIA agent sharing insights on how threat actors facilitate human hacking via social engineering, preventive measures, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Confessions of a CIA Operative - Unveiling the Secrets of Human Hacking","og_description":"This webinar takes a deep dive into human hacking, with a former CIA agent sharing insights on how threat actors facilitate human hacking via social engineering, preventive measures, and more.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-01-17T15:35:00+00:00","article_modified_time":"2024-02-01T07:52:54+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/465x310-New.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Confessions of a CIA Operative &#8211; Unveiling the Secrets of Human Hacking","datePublished":"2024-01-17T15:35:00+00:00","dateModified":"2024-02-01T07:52:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/"},"wordCount":438,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/465x310-New.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/","name":"A CIA Operative Shares the Secrets of Human Hacking","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/465x310-New.jpg","datePublished":"2024-01-17T15:35:00+00:00","dateModified":"2024-02-01T07:52:54+00:00","description":"This webinar takes a deep dive into human hacking, with a former CIA agent sharing insights on how threat actors facilitate human hacking via social engineering, preventive measures, and more.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/465x310-New.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/465x310-New.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/confessions-of-a-cia-operative-unveiling-the-secrets-of-human-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Confessions of a CIA Operative &#8211; Unveiling the Secrets of Human Hacking"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81205"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81205\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81289"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}