{"id":81492,"date":"2024-02-23T12:17:00","date_gmt":"2024-02-23T12:17:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81492"},"modified":"2026-01-23T08:07:15","modified_gmt":"2026-01-23T08:07:15","slug":"elevate-security-threat-intelligence-incident-response","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/","title":{"rendered":"Threat Intelligence and Incident Response: Strengthening Your Security Posture"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81492\" class=\"elementor elementor-81492\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd558cc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd558cc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-905a002\" data-id=\"905a002\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fb4e332 elementor-widget elementor-widget-text-editor\" data-id=\"fb4e332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> March 14, 2024<br \/><strong>Time:<\/strong> 7:30 PM IST | 9:00 AM CDT | 3:00 PM CET |<br \/><strong>Topic:<\/strong> Threat Intelligence and Incident Response: Strengthening Your Security Posture<br \/><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract<\/strong>: The significance of threat intelligence and cyber resilience cannot be overstated in the current threat landscape, where proactive security measures are growing in popularity. Threat intelligence involves in-depth analysis of various data forms using diverse tools and technologies to uncover vulnerabilities, behavior patterns, and attack techniques. Simultaneously, a robust incident response plan, developed based on threat intelligence and vulnerability assessment, helps organizations prepare to mitigate any impacts of cyberattacks.<\/p><div>The upcoming webinar explores the synergy between threat intelligence and incident response, determining their combined efficacy in mitigating risks and minimizing the effects of security breaches. Drawing upon industry expertise, the webinar will delve into the strategic deployment and management of threat intelligence and incident response capabilities. It highlights the role of threat intelligence in anticipating potential threats. It also describes the incident response protocols for detecting, containing, and remediating security incidents to strengthen proactive defenses and minimize business disruption.<\/div><div>\u00a0<\/div><div><strong>Key Takeaways:<\/strong><\/div><div style=\"text-align: left;\"><div><ul><li>Understanding the role of threat intelligence and <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\">incident response<\/a>.<\/li><li>Establishing a framework for threat intelligence and response.<\/li><li>Examining the symbiotic relationship between threat intelligence and incident response.<\/li><li>Leveraging actionable threat intelligence to refine incident response processes.<\/li><li>Incident response best practices for enhancing cyber resilience.<\/li><\/ul><\/div><\/div><div><strong>Speaker:<\/strong><\/div><div><p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-81494 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/1-200x300.jpg\" alt=\"Mr. Arun Soni\" width=\"200\" height=\"300\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/1-200x300.jpg 200w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/1-683x1024.jpg 683w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/1-768x1152.jpg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/1-1024x1536.jpg 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/1-1365x2048.jpg 1365w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/1.jpg 1600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>\u00a0<strong>Arun Soni<\/strong>,\u00a0Cybersecurity Expert (C|EH) \u2022 Digital Evidence Specialist (DES) \u2022 Limca Book of Records Holder<\/p><\/div><div>Mr. Arun Soni is a cybersecurity expert and Certified Ethical Hacker (C|EH) from EC Council (US). He is a Digital Evidence Specialist (DES) from the Asian School of Cyber Laws, Pune. Mr. Soni is an International Author of 182 IT, AI, and Cybersecurity books with the achievement of Recorded written in \u201cThe Limca Book of Records\u201d. His latest book, \u2018The Cybersecurity-Self Help Guide\u2019, is published by the world\u2019s leading publisher, Taylor &amp; Francis Group, UK, and is available worldwide. This book has been exhibited at DEFCON, which is the world\u2019s largest hacker convention held annually in Las Vegas, Nevada, to make IT professionals aware of cybersecurity for consecutively two years.<\/div><div>He has conducted many workshops and webinars in respect to cybersecurity and successfully created cybersecurity modules for the National Stock Exchange Academy (NSE Academy) to be marketed to corporates worldwide. He has been an expert commentator on several nationwide TV channels and FM radio. Mr Soni has also been appreciated worldwide through the England News Portal, France Network Time, Kuwait Times, UAE Times, Vancouver Herald, and many more.<\/div><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/yBzPE_ngTIs?si=-t91pHwXPqmJ7JSj\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: March 14, 2024Time: 7:30 PM IST | 9:00 AM CDT | 3:00 PM CET |Topic: Threat Intelligence and Incident Response: Strengthening Your Security PostureWatch Now Abstract: The significance of threat intelligence and cyber resilience cannot be overstated in the current threat landscape, where proactive security measures are growing in popularity. Threat intelligence involves in-depth&hellip;<\/p>\n","protected":false},"author":77,"featured_media":81497,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81492","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Elevate Security: Threat Intelligence and Incident Response<\/title>\n<meta name=\"description\" content=\"Join our webinar to learn how incident response and threat intelligence work together. Boost security with proactive measures and strategic insights.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Intelligence and Incident Response: Strengthening Your Security Posture\" \/>\n<meta property=\"og:description\" content=\"Join our webinar to learn how incident response and threat intelligence work together. Boost security with proactive measures and strategic insights.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-23T12:17:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-23T08:07:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"Threat Intelligence and Incident Response: Strengthening Your Security Posture\",\"datePublished\":\"2024-02-23T12:17:00+00:00\",\"dateModified\":\"2026-01-23T08:07:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/\"},\"wordCount\":442,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/\",\"name\":\"Elevate Security: Threat Intelligence and Incident Response\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2.jpg\",\"datePublished\":\"2024-02-23T12:17:00+00:00\",\"dateModified\":\"2026-01-23T08:07:15+00:00\",\"description\":\"Join our webinar to learn how incident response and threat intelligence work together. Boost security with proactive measures and strategic insights.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Mr. Arun Soni\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/elevate-security-threat-intelligence-incident-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Threat Intelligence and Incident Response: Strengthening Your Security Posture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Elevate Security: Threat Intelligence and Incident Response","description":"Join our webinar to learn how incident response and threat intelligence work together. Boost security with proactive measures and strategic insights.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/","og_locale":"en_US","og_type":"article","og_title":"Threat Intelligence and Incident Response: Strengthening Your Security Posture","og_description":"Join our webinar to learn how incident response and threat intelligence work together. Boost security with proactive measures and strategic insights.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-02-23T12:17:00+00:00","article_modified_time":"2026-01-23T08:07:15+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"Threat Intelligence and Incident Response: Strengthening Your Security Posture","datePublished":"2024-02-23T12:17:00+00:00","dateModified":"2026-01-23T08:07:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/"},"wordCount":442,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/","name":"Elevate Security: Threat Intelligence and Incident Response","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2.jpg","datePublished":"2024-02-23T12:17:00+00:00","dateModified":"2026-01-23T08:07:15+00:00","description":"Join our webinar to learn how incident response and threat intelligence work together. Boost security with proactive measures and strategic insights.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2.jpg","width":1938,"height":1292,"caption":"Mr. Arun Soni"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/elevate-security-threat-intelligence-incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Threat Intelligence and Incident Response: Strengthening Your Security Posture"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81492"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81492\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81497"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}