{"id":81817,"date":"2024-04-23T12:34:00","date_gmt":"2024-04-23T12:34:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81817"},"modified":"2025-10-29T09:48:56","modified_gmt":"2025-10-29T09:48:56","slug":"challenges-and-solutions-in-mobile-device-forensics","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/","title":{"rendered":"Mobile Device Forensics: Challenges and Solutions\u00a0\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81817\" class=\"elementor elementor-81817\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d2daf39 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d2daf39\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-999f934\" data-id=\"999f934\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f8161c6 elementor-widget elementor-widget-text-editor\" data-id=\"f8161c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> April 23, 2024<br \/><strong>Time:<\/strong> 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST<br \/><strong>Topic:<\/strong> Mobile Device Forensics: Challenges and Solutions<br \/><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong><br \/>Abstract:<\/strong> As mobile technology continues to improve and deepen connectivity across the globe, the importance of mobile security has become more prominent. With mobile devices evolving into high capability devices for data processing and application hosting, they have become prime targets for malicious actors seeking to exploit vulnerabilities on a massive scale. Consequently, the rising tide of attacks on mobile devices underscores the urgent need for bolstered security measures and enhanced forensic capabilities to effectively handle incident response and disaster recovery.<\/p><p><a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/mobile-device-forensics\/\" target=\"_blank\" rel=\"noopener\">Mobile device forensics<\/a> poses various challenges, ranging from complex technological intricacies to thorny legal and ethical dilemmas. This webinar aims to demystify mobile device forensics, delving into challenges and exploring potential solutions. Further, it will highlight the technical challenges that impede forensic investigations, including data extraction and legal obligations, and provide strategies for overcoming them.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Introduction to mobile device forensics<\/li><li>Challenges associated with mobile forensics<\/li><li>Impact of emerging technologies and threat on mobile forensics<\/li><li>Mitigating emerging challenges in forensics<\/li><li>Skills and tools necessary to overcome forensics challenges<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Mike-Saylor.jpeg\" alt=\"Mike Saylor\" width=\"200\" \/><strong>Dr. Mike Saylor<\/strong>, CEO at Blackswan Cybersecurity and Lecturer at the University<\/p><p><strong>Bio:<\/strong> Dr. Mike Saylor is a 30-year IT\/Cyber veteran and has spent 24 years serving as a University Professor of Cyber and Digital Forensics &amp; Incident Response (DFIR). He has 20 years of experience in providing digital forensics expertise and services to law enforcement, litigation support, and expert testimony. Dr. Saylor is a member of the FBI InfraGard, the U.S. Secret Service Electronic Crimes Taskforce, and the North Texas Crime Commission. He serves as a Fusion Liaison officer for the North Texas Fusion Center. Further, he has co-authored the renowned book &#8220;Cyber Crime and Cyber Terrorism.&#8221;<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/1nk10-xCJis?si=2bejXRAi1b5P3xYp\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 23, 2024Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM ISTTopic: Mobile Device Forensics: Challenges and SolutionsWatch Now Abstract: As mobile technology continues to improve and deepen connectivity across the globe, the importance of mobile security has become more prominent. With mobile devices evolving into high capability devices for data processing&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81819,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81817","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strategies to Overcome Challenges in Mobile Device Forensics<\/title>\n<meta name=\"description\" content=\"Learn how to tackle challenges in mobile device forensics and enhance cybersecurity in our webinar. Explore solutions and strategies for effective investigations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Device Forensics: Challenges and Solutions\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"Learn how to tackle challenges in mobile device forensics and enhance cybersecurity in our webinar. Explore solutions and strategies for effective investigations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-23T12:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T09:48:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Mobile-Device-Forensics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1943\" \/>\n\t<meta property=\"og:image:height\" content=\"1295\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Mobile Device Forensics: Challenges and Solutions\u00a0\u00a0\",\"datePublished\":\"2024-04-23T12:34:00+00:00\",\"dateModified\":\"2025-10-29T09:48:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/\"},\"wordCount\":324,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Mobile-Device-Forensics.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/\",\"name\":\"Strategies to Overcome Challenges in Mobile Device Forensics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Mobile-Device-Forensics.jpg\",\"datePublished\":\"2024-04-23T12:34:00+00:00\",\"dateModified\":\"2025-10-29T09:48:56+00:00\",\"description\":\"Learn how to tackle challenges in mobile device forensics and enhance cybersecurity in our webinar. Explore solutions and strategies for effective investigations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Mobile-Device-Forensics.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Mobile-Device-Forensics.jpg\",\"width\":1943,\"height\":1295},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/challenges-and-solutions-in-mobile-device-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Mobile Device Forensics: Challenges and Solutions\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strategies to Overcome Challenges in Mobile Device Forensics","description":"Learn how to tackle challenges in mobile device forensics and enhance cybersecurity in our webinar. Explore solutions and strategies for effective investigations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Device Forensics: Challenges and Solutions\u00a0\u00a0","og_description":"Learn how to tackle challenges in mobile device forensics and enhance cybersecurity in our webinar. Explore solutions and strategies for effective investigations.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-04-23T12:34:00+00:00","article_modified_time":"2025-10-29T09:48:56+00:00","og_image":[{"width":1943,"height":1295,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Mobile-Device-Forensics.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Mobile Device Forensics: Challenges and Solutions\u00a0\u00a0","datePublished":"2024-04-23T12:34:00+00:00","dateModified":"2025-10-29T09:48:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/"},"wordCount":324,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Mobile-Device-Forensics.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/","name":"Strategies to Overcome Challenges in Mobile Device Forensics","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Mobile-Device-Forensics.jpg","datePublished":"2024-04-23T12:34:00+00:00","dateModified":"2025-10-29T09:48:56+00:00","description":"Learn how to tackle challenges in mobile device forensics and enhance cybersecurity in our webinar. Explore solutions and strategies for effective investigations.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Mobile-Device-Forensics.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Mobile-Device-Forensics.jpg","width":1943,"height":1295},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/challenges-and-solutions-in-mobile-device-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Mobile Device Forensics: Challenges and Solutions\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81817"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81817\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81819"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}