{"id":81772,"date":"2024-04-26T10:44:16","date_gmt":"2024-04-26T10:44:16","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81772"},"modified":"2024-05-01T14:05:30","modified_gmt":"2024-05-01T14:05:30","slug":"guide-to-optimal-information-security","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/","title":{"rendered":"CEO\u2019s Guide to Optimal Information Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81772\" class=\"elementor elementor-81772\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-19c935e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"19c935e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374980b\" data-id=\"374980b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d234ca elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3d234ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> April 25, 2024<br>\n<strong>Time:<\/strong> 8:00 AM MDT | 10:00 AM EDT | 7:30 PM IST<br>\n<strong>Topic:<\/strong> Strategic Decision-Making: CEO&#8217;s Guide to Optimal Information Security<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong> Businesses are witnessing a surge in cyber attacks targeting their IT frameworks. The growing risks, like data loss and ransomware, have become diverse and complex. Therefore, business executives and CEOs need to redefine the security vision of their organization&#8217;s digital presence. They must adopt a practical and strategic decision-making approach regarding the company\u2019s information security (IS). A wide range of IS initiatives need to be a part of the organization&#8217;s security awareness culture under the direct supervision of the CEO. These undertakings should include \u2013 identifying vulnerabilities, assessing and quantifying risks, and implementing security standards and government policies. The current webinar aims to understand what role CEOs and executives play in executing information security initiatives. It aims to provide the participants with a comprehensive guide to risk assessments and making optimal strategic decisions to safeguard organizational assets.<\/p>\n<p><strong><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Key Takeaways <\/span>:<\/strong><\/p>\n<ul>\n<li>Understanding the current threat landscape<\/li>\n<li>Risk assessment and telemetries.<\/li>\n<li>Building a culture of security<\/li>\n<li>Strategic investment in security technologies<\/li>\n<li>Incident response and business continuity<\/li>\n<\/ul>\n<p><strong>Speaker :<\/strong><\/p>\n<p><img decoding=\"async\" class=\" wp-image-81774 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cher-Fox-photo-240x300.jpg\" alt=\"Cher A. Fox, President, Fox Consulting\" width=\"183\" height=\"229\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cher-Fox-photo-240x300.jpg 240w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Cher-Fox-photo.jpg 512w\" sizes=\"(max-width: 183px) 100vw, 183px\" \/><strong>Cher A. Fox, <\/strong>President, Fox Consulting<\/p>\n<p><strong>Bio:<\/strong> Cher Fox is a true data geek who&#8217;s been solving the data puzzle for over 35 years. As the President and Founder of Fox Consulting, she advises organizations to proactively define and optimize their processes and enhance quality standards to resolve their most painful data insight issues. Her decades of deep practitioner experience in data, analytics, and business intelligence specialize in crafting and executing strategic analytics roadmaps for global companies dealing with complex financial data solutions. Additionally, Cher guides senior leaders on confidently leveraging their existing software assets to overcome their technology challenges, facilitating better experiences in making data-driven business decisions while also resulting in significant time and money savings on maintenance and support. She is recognized internationally, having spoken at 19 conferences, and is known for championing excellence, empowering organizations to embrace change, and unlocking the full potential of their data assets. Cher also serves as the VP of Marketing for the DAMA Rocky Mountain Chapter.<\/p><p>\n<a name=\"attend\"><\/a><br>\n<iframe width=\"100%\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/J59oPVI32h0?si=_nNn89UFhtS-S4nb\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 25, 2024 Time: 8:00 AM MDT | 10:00 AM EDT | 7:30 PM IST Topic: Strategic Decision-Making: CEO&#8217;s Guide to Optimal Information Security Watch Now Abstract: Businesses are witnessing a surge in cyber attacks targeting their IT frameworks. The growing risks, like data loss and ransomware, have become diverse and complex. Therefore, business&hellip;<\/p>\n","protected":false},"author":77,"featured_media":81806,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81772","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Comprehensive Guide to Optimal Information Security<\/title>\n<meta name=\"description\" content=\"This webinar guides in strategically adopting information security technologies to safeguard against rising cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CEO\u2019s Guide to Optimal Information Security\" \/>\n<meta property=\"og:description\" content=\"This webinar guides in strategically adopting information security technologies to safeguard against rising cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T10:44:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-01T14:05:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/CEOs-Guide-to-Optimal-Information-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1943\" \/>\n\t<meta property=\"og:image:height\" content=\"1295\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"CEO\u2019s Guide to Optimal Information Security\",\"datePublished\":\"2024-04-26T10:44:16+00:00\",\"dateModified\":\"2024-05-01T14:05:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/\"},\"wordCount\":358,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/CEOs-Guide-to-Optimal-Information-Security.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/\",\"name\":\"A Comprehensive Guide to Optimal Information Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/CEOs-Guide-to-Optimal-Information-Security.jpg\",\"datePublished\":\"2024-04-26T10:44:16+00:00\",\"dateModified\":\"2024-05-01T14:05:30+00:00\",\"description\":\"This webinar guides in strategically adopting information security technologies to safeguard against rising cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/CEOs-Guide-to-Optimal-Information-Security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/CEOs-Guide-to-Optimal-Information-Security.jpg\",\"width\":1943,\"height\":1295},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/guide-to-optimal-information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"CEO\u2019s Guide to Optimal Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Comprehensive Guide to Optimal Information Security","description":"This webinar guides in strategically adopting information security technologies to safeguard against rising cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/","og_locale":"en_US","og_type":"article","og_title":"CEO\u2019s Guide to Optimal Information Security","og_description":"This webinar guides in strategically adopting information security technologies to safeguard against rising cyber threats.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-04-26T10:44:16+00:00","article_modified_time":"2024-05-01T14:05:30+00:00","og_image":[{"width":1943,"height":1295,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/CEOs-Guide-to-Optimal-Information-Security.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"CEO\u2019s Guide to Optimal Information Security","datePublished":"2024-04-26T10:44:16+00:00","dateModified":"2024-05-01T14:05:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/"},"wordCount":358,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/CEOs-Guide-to-Optimal-Information-Security.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/","name":"A Comprehensive Guide to Optimal Information Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/CEOs-Guide-to-Optimal-Information-Security.jpg","datePublished":"2024-04-26T10:44:16+00:00","dateModified":"2024-05-01T14:05:30+00:00","description":"This webinar guides in strategically adopting information security technologies to safeguard against rising cyber threats.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/CEOs-Guide-to-Optimal-Information-Security.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/02\/CEOs-Guide-to-Optimal-Information-Security.jpg","width":1943,"height":1295},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/guide-to-optimal-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"CEO\u2019s Guide to Optimal Information Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81772"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81772\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81806"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}