{"id":81871,"date":"2024-05-14T10:27:18","date_gmt":"2024-05-14T10:27:18","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81871"},"modified":"2024-05-17T05:12:24","modified_gmt":"2024-05-17T05:12:24","slug":"harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/","title":{"rendered":"Harnessing Risk Analysis Capabilities to Drive Business Resilience\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81871\" class=\"elementor elementor-81871\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ce50369 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce50369\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73b947c\" data-id=\"73b947c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b79478 elementor-widget elementor-widget-text-editor\" data-id=\"5b79478\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 14, 2024<\/div><div><strong>Time<\/strong>: 4:30 PM GMT+3 | 9:30 AM EDT | 7:00 PM IST<\/div><div><p><strong>Topic<\/strong>: Harnessing Risk Analysis Capabilities to Drive Business Resilience<\/p><\/div><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> Managing and mitigating threats in the current security landscape demands insights into real-time and continuous risk analysis capabilities. Leveraging these capabilities is pivotal in bolstering threat resilience and security innovation in the face of emerging cybersecurity challenges. Organizations can proactively mitigate potential threats by identifying risks, assessing them, and developing robust strategies. This webinar aims to exemplify how harnessing risk analysis can empower businesses to adapt, innovate, and thrive in an increasingly dynamic digital landscape. It also shares insights on strategies for integrating risk into business operations and exploring methods to create and implement a robust risk analysis framework. Drawing from real-life examples and case studies of successful risk analysis implementation, it aims to provide a rich foundation for discussion, enabling the speaker to cover various facets of cybersecurity and digital strategy that are crucial for today&#8217;s digital landscape.<\/span><\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Understanding the importance of proactive risk analysis in the evolving threat landscape<\/li><li>Establishing a framework for developing and integrating risk analysis into the heart of business operations<\/li><li>Case studies demonstrating the successful application of risk analysis in driving innovation and securing competitive advantage<\/li><li>Practical guidance on implementing robust risk analysis frameworks within organizations<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\" wp-image-59709 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Faysal-jpg.jpg\" alt=\"Faysal A. Ghauri\" width=\"179\" height=\"257\" \/><strong>Faysal A. Ghauri<\/strong>, Ph.D. Candidate, Digital Transformation &amp; Cybersecurity Expert | Fintech Innovator | Author | Speaker<br \/><strong>Bio:<\/strong> ith a pioneering career spanning over two decades, Faysal A. Ghauri stands at the forefront of the cybersecurity and digital transformation sectors. His journey, marked by innovation and leadership, has profoundly impacted the fintech, cybersecurity, and digital landscape across global markets, including significant contributions in Saudi Arabia.<\/p><p>Faysal is currently enriching the academic and professional realms as a Ph.D. candidate in Cybersecurity Leadership at Capitol Technology University, Maryland, USA. This endeavor adds to his rich educational portfolio, which includes a master&#8217;s degree in cybersecurity from EC-Council University. His thought leadership is well documented through his authorship of several publications and books on cybersecurity, AI, LEGO\u00ae SERIOUS PLAY\u00ae, Halal finance, and project management.<\/p><p>Throughout his illustrious career, Faysal has led transformative projects with a portfolio exceeding USD 3 billion. He has demonstrated unparalleled expertise in areas such as digital payments, cloud solutions, technology governance, and data center management. His roles at industry giants, including Saudi Payments, Al Rajhi Bank, and Cisco Systems, underscore his ability to navigate and lead in complex technological ecosystems.<\/p><p>As a speaker, Faysal shares his insight on global stages, advocating for strategic cybersecurity measures, innovative fintech solutions, and leadership in digital transformation. His upcoming presentation on &#8220;Harnessing Risk Analysis Capabilities to Drive Business Resilience and Innovation&#8221; at the EC-Council University Cyber Talks further exemplifies his commitment to educating and leading in the face of evolving digital threats.<\/p><p>Faysal&#8217;s dedication to fostering organizational excellence through technology is evident in his contributions to creating resilient and innovative ecosystems. His work not only ensures security and compliance but also paves the way for cutting-edge innovations that drive business growth and operational efficiency.<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Y2X3XmYw__Q?si=5LMoLhF5H0RtqAhg\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 14, 2024Time: 4:30 PM GMT+3 | 9:30 AM EDT | 7:00 PM IST Topic: Harnessing Risk Analysis Capabilities to Drive Business Resilience Watch Now Abstract: Managing and mitigating threats in the current security landscape demands insights into real-time and continuous risk analysis capabilities. Leveraging these capabilities is pivotal in bolstering threat resilience and&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81871","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Leveraging Risk Analysis Skills to Foster Organizational\u202fResilience<\/title>\n<meta name=\"description\" content=\"Get valuable insights into risk analysis and discover proactive strategies\u202fwith real-life case studies to improve an organization&#039;s cybersecurity resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Harnessing Risk Analysis Capabilities to Drive Business Resilience\u00a0\" \/>\n<meta property=\"og:description\" content=\"Get valuable insights into risk analysis and discover proactive strategies\u202fwith real-life case studies to improve an organization&#039;s cybersecurity resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-14T10:27:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-17T05:12:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Risk-Analysis.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Harnessing Risk Analysis Capabilities to Drive Business Resilience\u00a0\",\"datePublished\":\"2024-05-14T10:27:18+00:00\",\"dateModified\":\"2024-05-17T05:12:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/\"},\"wordCount\":515,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Risk-Analysis.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/\",\"name\":\"Leveraging Risk Analysis Skills to Foster Organizational\u202fResilience\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Risk-Analysis.jpg\",\"datePublished\":\"2024-05-14T10:27:18+00:00\",\"dateModified\":\"2024-05-17T05:12:24+00:00\",\"description\":\"Get valuable insights into risk analysis and discover proactive strategies\u202fwith real-life case studies to improve an organization's cybersecurity resilience.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Risk-Analysis.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Risk-Analysis.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Harnessing Risk Analysis Capabilities to Drive Business Resilience\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Leveraging Risk Analysis Skills to Foster Organizational\u202fResilience","description":"Get valuable insights into risk analysis and discover proactive strategies\u202fwith real-life case studies to improve an organization's cybersecurity resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/","og_locale":"en_US","og_type":"article","og_title":"Harnessing Risk Analysis Capabilities to Drive Business Resilience\u00a0","og_description":"Get valuable insights into risk analysis and discover proactive strategies\u202fwith real-life case studies to improve an organization's cybersecurity resilience.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-05-14T10:27:18+00:00","article_modified_time":"2024-05-17T05:12:24+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Risk-Analysis.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Harnessing Risk Analysis Capabilities to Drive Business Resilience\u00a0","datePublished":"2024-05-14T10:27:18+00:00","dateModified":"2024-05-17T05:12:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/"},"wordCount":515,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Risk-Analysis.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/","name":"Leveraging Risk Analysis Skills to Foster Organizational\u202fResilience","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Risk-Analysis.jpg","datePublished":"2024-05-14T10:27:18+00:00","dateModified":"2024-05-17T05:12:24+00:00","description":"Get valuable insights into risk analysis and discover proactive strategies\u202fwith real-life case studies to improve an organization's cybersecurity resilience.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Risk-Analysis.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Risk-Analysis.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/harnessing-risk-analysis-capabilities-to-drive-business-resilience-and-innovation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Harnessing Risk Analysis Capabilities to Drive Business Resilience\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81871"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81872"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}