{"id":81894,"date":"2024-05-23T09:09:00","date_gmt":"2024-05-23T09:09:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81894"},"modified":"2024-05-31T11:27:46","modified_gmt":"2024-05-31T11:27:46","slug":"a-guide-to-incident-response-framework-data-mining-and-managed-review","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/","title":{"rendered":"A Guide to Incident Response Framework: Data Mining and Managed Review"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81894\" class=\"elementor elementor-81894\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8d788e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d788e0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-286de2e\" data-id=\"286de2e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-06fcd81 elementor-widget elementor-widget-text-editor\" data-id=\"06fcd81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 23, 2024<\/div><div><strong>Time<\/strong>: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST<\/div><div><p><strong>Topic<\/strong>: A Guide to Incident Response Framework: Data Mining and Managed Review<\/p><\/div><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> This final session of the Incident Response Framework series highlights a less forensics-focused topic within the realm of incident response that is nonetheless critical to the organization dealing with a cyber incident. This webinar will cover the concepts of data mining (DM) and managed review (MR), explaining why it is common in many IR cases. It will highlight the role of the forensic or IR personnel in this process, how the process works, and where it fits within the IR lifecycle. Additionally, it will help identify the key stakeholders in this two-stage process, highlighting why it is often the costliest and one of the most challenging parts of an IR engagement for all stakeholders involved. Furthermore, it will address what potential complications errors in this phase can bring to your client or organization.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>What is data mining and managed review?<\/li><li>Where does it fit within the IR lifecycle?<\/li><li>Components of the DM and MR phase.<\/li><li>Why can it be a pain point for business?<\/li><li>How to proactively mitigate the causes of pain that may come from a data mining and management review process?<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\" wp-image-81895 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Eder-Ribeiro-2-1-285x300.png\" alt=\"Eder Ribeiro\" width=\"172\" height=\"181\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Eder-Ribeiro-2-1-285x300.png 285w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Eder-Ribeiro-2-1-972x1024.png 972w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Eder-Ribeiro-2-1-768x809.png 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Eder-Ribeiro-2-1-1458x1536.png 1458w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Eder-Ribeiro-2-1.png 1884w\" sizes=\"(max-width: 172px) 100vw, 172px\" \/><strong>Eder Ribeiro<\/strong>, Director, Global Incident Response, TransUnion<br \/><strong>Bio:<\/strong> Eder graduated from Roger Williams University School of Law, earning his Juris Doctor. He has also earned a Master of Science in Cyber Security. He has led TransUnion\u2019s Incident Response Forensics (IRF) team over the last six years. In his \u201cleading from the front\u201d style, Eder has led the IRF team through thousands of cases ranging from unauthorized cryptocurrency mining, ransomware, business e-mail compromises, and much more.<br \/>Eder also has 16 years of experience in the United States Rhode Island Army National Guard, where he led troops as a team leader on a combat deployment in the Kandahar Province in support of Operation Enduring Freedom. Eder is a certified mediator and performs duties at the state headquarters level. Eder\u2019s expertise includes solution\/product creation, program development and expansion, threat assessment, risk mitigation, security process improvement, privacy compliance, and contract drafting. He has worked with over 1,000 organizations in his current capacity, helping them determine and react to the nature of their security incident breaches and determining the best course of action to recover to safe operations and meet compliance obligations.<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/ZMiW2oF3vwo?si=4Ty4Oo4FbGcei6SC\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 23, 2024Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: A Guide to Incident Response Framework: Data Mining and Managed Review Watch Now Abstract: This final session of the Incident Response Framework series highlights a less forensics-focused topic within the realm of incident response that is nonetheless critical to&hellip;<\/p>\n","protected":false},"author":77,"featured_media":81908,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[12946],"class_list":{"0":"post-81894","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks","9":"tag-incident-response"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Incident Response Framework: Insights Into Data Mining and Managed Review<\/title>\n<meta name=\"description\" content=\"In this webinar, you will gain insights into effective approaches for handling incidents and leveraging data mining techniques in the context of managed review processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Guide to Incident Response Framework: Data Mining and Managed Review\" \/>\n<meta property=\"og:description\" content=\"In this webinar, you will gain insights into effective approaches for handling incidents and leveraging data mining techniques in the context of managed review processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-23T09:09:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T11:27:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"621\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"A Guide to Incident Response Framework: Data Mining and Managed Review\",\"datePublished\":\"2024-05-23T09:09:00+00:00\",\"dateModified\":\"2024-05-31T11:27:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/\"},\"wordCount\":409,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg\",\"keywords\":[\"Incident Response\"],\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/\",\"name\":\"Incident Response Framework: Insights Into Data Mining and Managed Review\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg\",\"datePublished\":\"2024-05-23T09:09:00+00:00\",\"dateModified\":\"2024-05-31T11:27:46+00:00\",\"description\":\"In this webinar, you will gain insights into effective approaches for handling incidents and leveraging data mining techniques in the context of managed review processes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg\",\"width\":931,\"height\":621},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/a-guide-to-incident-response-framework-data-mining-and-managed-review\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"A Guide to Incident Response Framework: Data Mining and Managed Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Incident Response Framework: Insights Into Data Mining and Managed Review","description":"In this webinar, you will gain insights into effective approaches for handling incidents and leveraging data mining techniques in the context of managed review processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/","og_locale":"en_US","og_type":"article","og_title":"A Guide to Incident Response Framework: Data Mining and Managed Review","og_description":"In this webinar, you will gain insights into effective approaches for handling incidents and leveraging data mining techniques in the context of managed review processes.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-05-23T09:09:00+00:00","article_modified_time":"2024-05-31T11:27:46+00:00","og_image":[{"width":931,"height":621,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"A Guide to Incident Response Framework: Data Mining and Managed Review","datePublished":"2024-05-23T09:09:00+00:00","dateModified":"2024-05-31T11:27:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/"},"wordCount":409,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg","keywords":["Incident Response"],"articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/","name":"Incident Response Framework: Insights Into Data Mining and Managed Review","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg","datePublished":"2024-05-23T09:09:00+00:00","dateModified":"2024-05-31T11:27:46+00:00","description":"In this webinar, you will gain insights into effective approaches for handling incidents and leveraging data mining techniques in the context of managed review processes.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/A-Guide-to-Incident-Response-Framework-Data-Mining-and-Managed-Review.jpg","width":931,"height":621},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/a-guide-to-incident-response-framework-data-mining-and-managed-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"A Guide to Incident Response Framework: Data Mining and Managed Review"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81894"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81894\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81908"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}