{"id":81315,"date":"2024-02-12T06:46:58","date_gmt":"2024-02-12T06:46:58","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81315"},"modified":"2024-02-20T06:21:15","modified_gmt":"2024-02-20T06:21:15","slug":"cyber-resilience-detection-to-recovery","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/","title":{"rendered":"From Detection to Recovery: A Comprehensive Approach to Cyber Resilience"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81315\" class=\"elementor elementor-81315\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8f9a12f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8f9a12f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-725c432\" data-id=\"725c432\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d92c9b elementor-widget elementor-widget-text-editor\" data-id=\"8d92c9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> February 9, 2024<br \/><strong>Time:<\/strong> 3:30 PM CAT | 8:30 AM EST | 7:00 PM IST<br \/><strong>Topic:<\/strong> From Detection to Recovery: A Comprehensive Approach to Cyber Resilience<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> The present-day cybersecurity primarily focuses on developing cyber resilience for businesses, i.e., strengthening an organization&#8217;s ability to prepare, respond, and recover from cyberattacks. Detection is the first line of defense, involving robust monitoring systems, anomaly identification, and incorporating threat intelligence. Detection of potential breaches is critical for facilitating timely intervention. However, security resilience must go beyond mere detection to encompass effective response, containment, and recovery processes. The true measure of an organization\u2019s resilience lies in its ability to sustain business operations without significant disruption, even after a security incident. Thus, Cyber resilience demands a culture of awareness and education among employees alongside technology implementation. This upcoming webinar aims to delve into understanding the performance of a comprehensive cyber resilience strategy encompassing collaboration across organizational functions, advanced technologies, and continuous learning from evolving threat landscapes.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Need for holistic cyber resilience program.<\/li><li>Elements of cyber resilience strategy<\/li><li>Implementing cyber resilience strategies across varied IT platforms<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/Happy-Amon-scaled.jpg.webp\" alt=\"Happy-amon\" width=\"200\" \/><strong>Happy Amon<\/strong>, Cybersecurity Consultant and Co-Founder of Bit Dimension Pty Ltd (Botswana)<br \/><strong>Bio:<\/strong> Ms. Happy Amon is an IT Expert with over 15 years of experience in IT and cyber security, mainly focused on information technology administration and cybersecurity consultation. Happy Amon is a member of the International Association of Privacy Professionals and holds qualifications such as a Bachelor of Information Systems, MSC Cybersecurity, Global IT Course (Information Security &amp; Cybersecurity), Certified Chief Information Security Officer v1 (C|CISO), Computer Hacker Forensic Investigator (C|HFI), Certified Information Systems Security Professional (CISSP), Operations Management, Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), CCNP Route at Cisco Networking, ITIL V3 Foundation, Administering Microsoft SQL Server 2012 Databases, Ethical Hacking, CCNA Security, and CCNA. She has an exceptional track record in IT administration, network administration, pen testing, policy creation, risk assessment and management, security assessments, audit\/security governance, and compliance with multinational companies. Happy Amon also strives to raise cybersecurity awareness as a Cyber 221 Digital Ambassador, capitalizing on her proven expertise and hands-on experience in executing security governance, risk assessments, compliance, conducting security audits, assessing the effectiveness of controls, data privacy, incident response, and cyber operations to assist the governmental sector, NGOs, schools and the technical communities with her experience and knowledge in the field.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/blZGw9sAA5U?si=L2Ddyubw6aq3-m_r\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 9, 2024Time: 3:30 PM CAT | 8:30 AM EST | 7:00 PM ISTTopic: From Detection to Recovery: A Comprehensive Approach to Cyber Resilience Watch Now Abstract: The present-day cybersecurity primarily focuses on developing cyber resilience for businesses, i.e., strengthening an organization&#8217;s ability to prepare, respond, and recover from cyberattacks. Detection is the first&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81316,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81315","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Navigate Cyber Resilience: From Detection to Recovery<\/title>\n<meta name=\"description\" content=\"Discover the evolving environment of cybersecurity and build business resilience through enhanced detection, response, and recovery\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigate Cyber Resilience: From Detection to Recovery\" \/>\n<meta property=\"og:description\" content=\"Discover the evolving environment of cybersecurity and build business resilience through enhanced detection, response, and recovery\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-12T06:46:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T06:21:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/01\/Cyber-Resilience-Program.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Navigate Cyber Resilience: From Detection to Recovery\" \/>\n<meta name=\"twitter:description\" content=\"Discover the evolving environment of cybersecurity and build business resilience through enhanced detection, response, and recovery\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"From Detection to Recovery: A Comprehensive Approach to Cyber Resilience\",\"datePublished\":\"2024-02-12T06:46:58+00:00\",\"dateModified\":\"2024-02-20T06:21:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/\"},\"wordCount\":426,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Cyber-Resilience-Program.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/\",\"name\":\"Navigate Cyber Resilience: From Detection to Recovery\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Cyber-Resilience-Program.jpg\",\"datePublished\":\"2024-02-12T06:46:58+00:00\",\"dateModified\":\"2024-02-20T06:21:15+00:00\",\"description\":\"Discover the evolving environment of cybersecurity and build business resilience through enhanced detection, response, and recovery\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Cyber-Resilience-Program.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/Cyber-Resilience-Program.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-resilience-detection-to-recovery\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From Detection to Recovery: A Comprehensive Approach to Cyber Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Navigate Cyber Resilience: From Detection to Recovery","description":"Discover the evolving environment of cybersecurity and build business resilience through enhanced detection, response, and recovery","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/","og_locale":"en_US","og_type":"article","og_title":"Navigate Cyber Resilience: From Detection to Recovery","og_description":"Discover the evolving environment of cybersecurity and build business resilience through enhanced detection, response, and recovery","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-02-12T06:46:58+00:00","article_modified_time":"2024-02-20T06:21:15+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/01\/Cyber-Resilience-Program.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Navigate Cyber Resilience: From Detection to Recovery","twitter_description":"Discover the evolving environment of cybersecurity and build business resilience through enhanced detection, response, and recovery","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"From Detection to Recovery: A Comprehensive Approach to Cyber Resilience","datePublished":"2024-02-12T06:46:58+00:00","dateModified":"2024-02-20T06:21:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/"},"wordCount":426,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/01\/Cyber-Resilience-Program.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/","name":"Navigate Cyber Resilience: From Detection to Recovery","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/01\/Cyber-Resilience-Program.jpg","datePublished":"2024-02-12T06:46:58+00:00","dateModified":"2024-02-20T06:21:15+00:00","description":"Discover the evolving environment of cybersecurity and build business resilience through enhanced detection, response, and recovery","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/01\/Cyber-Resilience-Program.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/01\/Cyber-Resilience-Program.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-resilience-detection-to-recovery\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"From Detection to Recovery: A Comprehensive Approach to Cyber Resilience"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81315"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81315\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81316"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}