{"id":81513,"date":"2024-03-25T11:31:15","date_gmt":"2024-03-25T11:31:15","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81513"},"modified":"2024-03-26T05:25:51","modified_gmt":"2024-03-26T05:25:51","slug":"empowering-security-a-woman-cisos-journey-to-success","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/","title":{"rendered":"Inspiring Women in Cybersecurity: A CISO&#8217;s Journey to Success"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81513\" class=\"elementor elementor-81513\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ae74491 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ae74491\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b19821\" data-id=\"8b19821\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83878d4 elementor-widget elementor-widget-text-editor\" data-id=\"83878d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> March 15, 2024<br>\n<strong>Time:<\/strong> 10:30 AM EDT | 3:30 PM CET | 8:00 PM IST<br>\n<strong>Topic:<\/strong> Inspiring Women in Cybersecurity: A CISO&#8217;s Journey to Success<br><br><\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> In the current digital landscape, where cyber threats are rapidly evolving, the role of Chief Information Security Officers (CISOs) in safeguarding an organization\u2019s digital architecture has become paramount. However, the journey to success in this field presents challenges, particularly for individuals in leadership positions. This webinar aims to illuminate the inspiring journey of a pioneering CISO and delves into the speaker\u2019s experiences, achievements, challenges, and lessons learned. From gaining expertise in navigating the security landscape to fostering diversity and inclusion within security teams, this webinar aims to provide actionable strategies for organizations to develop their security and corporate culture further. Drawing from real-world experiences and insights, our speaker will also share her invaluable perspectives on overcoming barriers, breaking stereotypes, and thriving as a leader in cybersecurity. Thus encouraging and inspiring future leaders of security through this webinar.<\/p>\n<div>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Driving the change: What inspires me to pursue a career in cybersecurity?<\/li>\n<li>Common challenges faced by information security leaders<\/li>\n<li>Building effective teams: Empowering diversity in the cybersecurity workforce<\/li>\n<li>Success stories: Journey from technologist to a security leader<\/li>\n<\/ul>\n<\/div>\n<div><strong>Speaker:<\/strong><\/div>\n<div>\n<p><img decoding=\"async\" class=\" wp-image-59426 alignleft\" src=\"https:\/\/staging.eccu.edu\/wp-content\/uploads\/2024\/02\/Michele-Myauo.png\" alt=\"Michele Myauo\" width=\"205\" height=\"223\"> <strong>Michele Myauo,<\/strong> Cybersecurity &amp; IT Executive<\/p>\n<\/div>\n<div>\n<p>Michele Myauo, Ph.D., is a distinguished cybersecurity and IT executive, board member, speaker, and author. She has over 22 years of experience in academia, industry, and government, with the U.S. Intelligence Community and departments including Commerce, Defense, Energy, Homeland Security, and State. She has handled cybersecurity, IT systems engineering, services sales, and business execution abroad. Myauo also led the North America Health and Public Service Security Industry at Accenture. As a Managing Director and Senior Security Executive, Myauo focused on supporting the healthcare industry, state and local governments, academic institutions, and nonprofit organizations to innovate and accomplish more sustainably by quickly implementing safe and robust cybersecurity solutions.<\/p>\n<p>Before Accenture, Myauo held leadership positions at Microsoft as Director of Cybersecurity Services Delivery for the Global Secure Infrastructure Practice and led the Azure Global Special Capabilities Infrastructure and Innovation Cybersecurity group. Myauo held cybersecurity and IT leadership positions at IBM and was a professor at George Washington University. Myauo holds a Doctorate in systems engineering from George Washington University, an M.S. in industrial and organization psychology from the University of Baltimore, and a B.S. in psychology from Bethany College. Myauo won the 2023 Global CISO Forum World 200 CIO\/CISO award. She serves on the National CyberWatch Center National Visiting Committee and EC-Council Global Advisory Board for C|EH (Certified Ethical Hacker).<\/p>\n<\/div>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/ViW9yEhk0QM?si=tSZAWERbDIx-NrjF\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: March 15, 2024 Time: 10:30 AM EDT | 3:30 PM CET | 8:00 PM IST Topic: Inspiring Women in Cybersecurity: A CISO&#8217;s Journey to Success Watch Now Abstract: In the current digital landscape, where cyber threats are rapidly evolving, the role of Chief Information Security Officers (CISOs) in safeguarding an organization\u2019s digital architecture has&hellip;<\/p>\n","protected":false},"author":77,"featured_media":81554,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81513","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Inspiring Women in Information Security<\/title>\n<meta name=\"description\" content=\"In this webinar, explore the inspiring journey of a woman in cybersecurity and pioneering CISO to safeguard organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inspiring Women in Cybersecurity: A CISO&#039;s Journey to Success\" \/>\n<meta property=\"og:description\" content=\"In this webinar, explore the inspiring journey of a woman in cybersecurity and pioneering CISO to safeguard organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-25T11:31:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-26T05:25:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-5.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"Inspiring Women in Cybersecurity: A CISO&#8217;s Journey to Success\",\"datePublished\":\"2024-03-25T11:31:15+00:00\",\"dateModified\":\"2024-03-26T05:25:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/\"},\"wordCount\":460,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-5.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/\",\"name\":\"Inspiring Women in Information Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-5.jpg\",\"datePublished\":\"2024-03-25T11:31:15+00:00\",\"dateModified\":\"2024-03-26T05:25:51+00:00\",\"description\":\"In this webinar, explore the inspiring journey of a woman in cybersecurity and pioneering CISO to safeguard organizations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-5.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/465X310-2-5.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"women-leadership\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/empowering-security-a-woman-cisos-journey-to-success\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Inspiring Women in Cybersecurity: A CISO&#8217;s Journey to Success\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inspiring Women in Information Security","description":"In this webinar, explore the inspiring journey of a woman in cybersecurity and pioneering CISO to safeguard organizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/","og_locale":"en_US","og_type":"article","og_title":"Inspiring Women in Cybersecurity: A CISO's Journey to Success","og_description":"In this webinar, explore the inspiring journey of a woman in cybersecurity and pioneering CISO to safeguard organizations.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-03-25T11:31:15+00:00","article_modified_time":"2024-03-26T05:25:51+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-5.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"Inspiring Women in Cybersecurity: A CISO&#8217;s Journey to Success","datePublished":"2024-03-25T11:31:15+00:00","dateModified":"2024-03-26T05:25:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/"},"wordCount":460,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-5.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/","name":"Inspiring Women in Information Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-5.jpg","datePublished":"2024-03-25T11:31:15+00:00","dateModified":"2024-03-26T05:25:51+00:00","description":"In this webinar, explore the inspiring journey of a woman in cybersecurity and pioneering CISO to safeguard organizations.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-5.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/465X310-2-5.jpg","width":1938,"height":1292,"caption":"women-leadership"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/empowering-security-a-woman-cisos-journey-to-success\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Inspiring Women in Cybersecurity: A CISO&#8217;s Journey to Success"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81513"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81513\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81554"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}