{"id":81845,"date":"2024-04-19T12:38:51","date_gmt":"2024-04-19T12:38:51","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81845"},"modified":"2024-07-15T07:09:40","modified_gmt":"2024-07-15T07:09:40","slug":"building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/","title":{"rendered":"Strategies for Building Cyber Resilient Organizations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81845\" class=\"elementor elementor-81845\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d27ab53 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d27ab53\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7a907e3\" data-id=\"7a907e3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b707ea3 elementor-widget elementor-widget-text-editor\" data-id=\"b707ea3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> April 19, 2024<br>\n<strong>Time:<\/strong> 9:00 AM CDT | 10:00 AM EDT | 7:30 PM IST<br>\n<strong>Topic:<\/strong> Strategies for Building Cyber Resilient Organizations<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> Cyber resilience has become the need of the hour in the current threat landscape. As cyber threats continue to increase in sophistication and frequency, posing significant risks to businesses of all sizes, businesses must adopt a proactive approach to build a cyber threat-resilient IT network to host and manage their digital assets and data. This webinar will explore the importance of prioritizing cybersecurity measures to build resilience against emerging threats, the latest cyber threat trends, and their impact on businesses across various sectors. Furthermore, it will also outline actionable steps organizations can take to enhance their cybersecurity posture. Attending this webinar will allow participants to gain insights into the evolving threat landscape and cybersecurity&#8217;s essential role in safeguarding organizational resilience. Join us to learn how to prioritize cybersecurity measures and protect your organization effectively.<\/span><br><\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding the current threat landscape<\/li>\n<li>Highlighting the urgency to bolster cybersecurity defenses<\/li>\n<li>Establishing frameworks for risk assessment, incident response, and security training<\/li>\n<li>Establishing frameworks for improving the cybersecurity posture<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\" wp-image-81847 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Heather-Noggle-1-168x300.png\" alt=\"Heather Noggle\" width=\"150\" height=\"268\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Heather-Noggle-1-168x300.png 168w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Heather-Noggle-1-575x1024.png 575w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Heather-Noggle-1-768x1368.png 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Heather-Noggle-1-862x1536.png 862w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Heather-Noggle-1.png 1024w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><strong>Heather Noggle<\/strong>, Owner of Codistac<\/p>\n<p><strong>Bio:<\/strong> Heather is the owner of Codistac, a process solutions company that weaves technology and human experience together to guide customers to find unique answers to their most vexing problems in those areas where people and technology meet. She has over 30 years of experience in software development, project management, human resources, writing, and cybersecurity advocacy. Heather is passionate about helping people protect themselves as well as safeguard their private data. She currently serves as Vice Chair of the Springfield Tech Council and also volunteers with the Missouri Cybersecurity Center of Excellence and Redeemer Lutheran Church.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/yB7mu0PzN18?si=OEjRBE5i4eJh9JBk\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 19, 2024 Time: 9:00 AM CDT | 10:00 AM EDT | 7:30 PM IST Topic: Strategies for Building Cyber Resilient Organizations Watch now Abstract: Cyber resilience has become the need of the hour in the current threat landscape. As cyber threats continue to increase in sophistication and frequency, posing significant risks to businesses&hellip;<\/p>\n","protected":false},"author":77,"featured_media":81846,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[12951,199,12443,12952],"class_list":{"0":"post-81845","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks","9":"tag-cyber-resilience-2","10":"tag-cybersecurity","11":"tag-data-security","12":"tag-security-posture"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Importance of Cyber Resilience in the Modern World<\/title>\n<meta name=\"description\" content=\"Discover actionable strategies to bolster your organization&#039;s cybersecurity posture, mitigate emerging threats, and achieve cyber resilience in this expert-led webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strategies for Building Cyber Resilient Organizations\" \/>\n<meta property=\"og:description\" content=\"Discover actionable strategies to bolster your organization&#039;s cybersecurity posture, mitigate emerging threats, and achieve cyber resilience in this expert-led webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-19T12:38:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-15T07:09:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465X310-2-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"Strategies for Building Cyber Resilient Organizations\",\"datePublished\":\"2024-04-19T12:38:51+00:00\",\"dateModified\":\"2024-07-15T07:09:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/\"},\"wordCount\":313,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465X310-2-8.jpg\",\"keywords\":[\"cyber-resilience\",\"cybersecurity\",\"Data Security\",\"security posture\"],\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/\",\"name\":\"Importance of Cyber Resilience in the Modern World\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465X310-2-8.jpg\",\"datePublished\":\"2024-04-19T12:38:51+00:00\",\"dateModified\":\"2024-07-15T07:09:40+00:00\",\"description\":\"Discover actionable strategies to bolster your organization's cybersecurity posture, mitigate emerging threats, and achieve cyber resilience in this expert-led webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465X310-2-8.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465X310-2-8.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Importance of Cyber Resilience\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Strategies for Building Cyber Resilient Organizations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Importance of Cyber Resilience in the Modern World","description":"Discover actionable strategies to bolster your organization's cybersecurity posture, mitigate emerging threats, and achieve cyber resilience in this expert-led webinar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/","og_locale":"en_US","og_type":"article","og_title":"Strategies for Building Cyber Resilient Organizations","og_description":"Discover actionable strategies to bolster your organization's cybersecurity posture, mitigate emerging threats, and achieve cyber resilience in this expert-led webinar.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-04-19T12:38:51+00:00","article_modified_time":"2024-07-15T07:09:40+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465X310-2-8.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"Strategies for Building Cyber Resilient Organizations","datePublished":"2024-04-19T12:38:51+00:00","dateModified":"2024-07-15T07:09:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/"},"wordCount":313,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465X310-2-8.jpg","keywords":["cyber-resilience","cybersecurity","Data Security","security posture"],"articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/","name":"Importance of Cyber Resilience in the Modern World","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465X310-2-8.jpg","datePublished":"2024-04-19T12:38:51+00:00","dateModified":"2024-07-15T07:09:40+00:00","description":"Discover actionable strategies to bolster your organization's cybersecurity posture, mitigate emerging threats, and achieve cyber resilience in this expert-led webinar.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465X310-2-8.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465X310-2-8.jpg","width":1938,"height":1292,"caption":"Importance of Cyber Resilience"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-cyber-resilient-organizations-why-prioritizing-cybersecurity-is-essential-today\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Strategies for Building Cyber Resilient Organizations"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81845"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81845\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81846"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}