{"id":81510,"date":"2024-03-27T08:04:44","date_gmt":"2024-03-27T08:04:44","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81510"},"modified":"2024-04-03T04:48:11","modified_gmt":"2024-04-03T04:48:11","slug":"key-elements-of-cybersecurity-and-implementation","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/","title":{"rendered":"Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81510\" class=\"elementor elementor-81510\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-943bdbc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"943bdbc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-541a868\" data-id=\"541a868\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-95e57ea elementor-widget elementor-widget-text-editor\" data-id=\"95e57ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> March 26, 2024<br>\n<strong>Time:<\/strong> 12:30 AM AEDT | 2:30 PM CET | 7:00 PM IST<br>\n<strong>Topic:<\/strong> Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong>Abstract:&nbsp;<\/strong>Ransomware is one of modern cybersecurity&#8217;s most pervasive and damaging threats. To combat this ever-evolving threat, organizations must adopt a comprehensive approach to recovery. The National Institute of Standards and Technology (NIST) offers a robust framework designed to guide entities through ransomware recovery. The webinar will explore the NIST Framework&#8217;s five essential stages: Identify, Protect, Detect, Respond, and Recover. Throughout the session, participants will gain invaluable insights into each phase&#8217;s importance and the practical implementation strategy. Aimed at cybersecurity professionals, IT Managers, and decision-makers, this webinar is for those seeking to improve their Ransomware Recovery posture. By leveraging the NIST Framework&#8217;s proven methodology, candidates will be equipped to navigate the complex landscape of ransomware threats and safeguard their environment.<\/p>\n<div>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding the importance of adopting a comprehensive approach to combat ransomware threats<\/li>\n<li>Role of active detection and response capabilities in mitigating the ransomware impact<\/li>\n<li>Understanding the significance of proactive risk management and recovery planning<\/li>\n<li>Establishing the framework for proactive risk management to streamline the recovery process and reduce downtime<\/li>\n<li>Practical strategies for implementing ransomware detection and mitigation capabilities<\/li>\n<\/ul>\n<\/div>\n<div><strong>Speaker:<\/strong><\/div>\n<div>\n<p><strong><img decoding=\"async\" class=\" wp-image-59430 alignleft\" src=\"https:\/\/staging.eccu.edu\/wp-content\/uploads\/2024\/02\/Sentil-Head-Shot-1-300x268.png\" alt=\"Sentil Velaytham\" width=\"174\" height=\"156\">Sentil Velaytham,<\/strong> Staff Solutions Architect, VMware by Broadcom<\/p>\n<\/div>\n<div>\n<p>Sentil Velaytham is an esteemed technical strategist celebrated for his adeptness in resolving business challenges and enhancing IT frameworks. Throughout his career, Sentil has effectively supported numerous clients in attaining their objectives. He has cultivated strong collaborations with distinguished technology partners like Druva, AWS, Commvault, EMC, NetApp, CISCO, VMWare, Microsoft, Juniper Networks, Extreme Networks, HP, Nutanix, and others.<\/p>\n<p>Acknowledged as a true advocate for cloud technology and Software as a Service (SaaS), he staunchly advocates for streamlining technical operations to optimize productivity. Leveraging his profound understanding of these technologies, he addresses complex integration hurdles with refined, efficient, and cost-effective approaches. Driven by a fervent commitment to innovation, Sentil consistently prioritizes team success, establishing himself as a key person of influence in both the technological and business spheres.<\/p>\n<\/div>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe width=\"100%\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/iMViuucT3ps?si=XGsthf56ZIk3zcwg\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: March 26, 2024 Time: 12:30 AM AEDT | 2:30 PM CET | 7:00 PM IST Topic: Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them Watch Now Abstract:&nbsp;Ransomware is one of modern cybersecurity&#8217;s most pervasive and damaging threats. To combat this ever-evolving threat, organizations must adopt a comprehensive approach to&hellip;<\/p>\n","protected":false},"author":77,"featured_media":81511,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81510","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Implementation of 5 Cybersecurity Key Elements<\/title>\n<meta name=\"description\" content=\"Join the webinar on a comprehensive approach to ransomware detection and recovery with five key elements of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them\" \/>\n<meta property=\"og:description\" content=\"Join the webinar on a comprehensive approach to ransomware detection and recovery with five key elements of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-27T08:04:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-03T04:48:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them\",\"datePublished\":\"2024-03-27T08:04:44+00:00\",\"dateModified\":\"2024-04-03T04:48:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/\"},\"wordCount\":380,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-4.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/\",\"name\":\"Implementation of 5 Cybersecurity Key Elements\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-4.jpg\",\"datePublished\":\"2024-03-27T08:04:44+00:00\",\"dateModified\":\"2024-04-03T04:48:11+00:00\",\"description\":\"Join the webinar on a comprehensive approach to ransomware detection and recovery with five key elements of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-4.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Key Elements of Cybersecurity Framework\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/key-elements-of-cybersecurity-and-implementation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Implementation of 5 Cybersecurity Key Elements","description":"Join the webinar on a comprehensive approach to ransomware detection and recovery with five key elements of cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/","og_locale":"en_US","og_type":"article","og_title":"Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them","og_description":"Join the webinar on a comprehensive approach to ransomware detection and recovery with five key elements of cybersecurity.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-03-27T08:04:44+00:00","article_modified_time":"2024-04-03T04:48:11+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-4.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them","datePublished":"2024-03-27T08:04:44+00:00","dateModified":"2024-04-03T04:48:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/"},"wordCount":380,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-4.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/","name":"Implementation of 5 Cybersecurity Key Elements","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-4.jpg","datePublished":"2024-03-27T08:04:44+00:00","dateModified":"2024-04-03T04:48:11+00:00","description":"Join the webinar on a comprehensive approach to ransomware detection and recovery with five key elements of cybersecurity.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-4.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-4.jpg","width":1938,"height":1292,"caption":"Key Elements of Cybersecurity Framework"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/key-elements-of-cybersecurity-and-implementation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81510"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81510\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81511"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}