{"id":81909,"date":"2024-05-21T10:11:00","date_gmt":"2024-05-21T10:11:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81909"},"modified":"2024-05-29T04:48:01","modified_gmt":"2024-05-29T04:48:01","slug":"devsecops-bridging-the-gap-between-development-security-and-operations","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/","title":{"rendered":"DevSecOps: Bridging the Gap Between Development, Security, and Operations"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81909\" class=\"elementor elementor-81909\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-83c70f6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"83c70f6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-17f6671\" data-id=\"17f6671\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ca4ab8 elementor-widget elementor-widget-text-editor\" data-id=\"3ca4ab8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 21, 2024<\/div><div><strong>Time<\/strong>: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST<\/div><div><strong>Topic<\/strong>: DevSecOps: Bridging the Gap Between Development, Security, and Operations<\/div><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> In the current digital landscape, increasing reliance on applications has expanded the threat landscape, thus increasing the risk of cybersecurity breaches. DevSecOps emerges as a response to application security challenges, aiming to integrate security practices into the software development and deployment pipeline. With threat actors intensifying their efforts, application security must shift left toward DevSecOps. This webinar aims to explore this seamless security integration in the Software Development Life Cycle (SDLC) process, bridging the gap between development, security, and operations. It also discusses key principles, best practices, and examples of implementing DevSecOps. From automating security testing and integrating security controls in the early stages of the CI\/CD process to automated compliance, the webinar will explore practical strategies to enhance application agility and security. Join us as we explore the potential of DevSecOps in delivering secure software at speed by bridging the gap between development and security.<br \/><\/span><\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li style=\"list-style-type: none;\"><ul><li>Understanding the principles and benefits of DevSecOps.<\/li><li>Overcoming challenges in implementing DevSecOps practices.<\/li><li>Leveraging automation and tooling to streamline security integration.<\/li><li>Introducing automated compliance to security standards in application development and delivery.<\/li><li>Cultivating a culture of security across development, security, and operations teams.<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\" wp-image-59590 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Manuel-Schuller-NEW.jpg\" alt=\"Manuel Schuller\" width=\"169\" height=\"168\" \/><strong>Manuel Schuller<\/strong>, DevOps Industry Expert<br \/><strong>Bio:<\/strong> Manuel is a senior DevOps evangelist with 25+ years of international experience in both Dev and Ops solutions. He is a DevOps Institute Ambassador, CD Foundation Community Builder, Public Speaker (in events like DevOps World, DevOps Enterprise Summit, and BrightTalk&#8217;s and TechStrong&#8217;s programs and broadcasts), and Business and Technical Challenges Solver. Loving the terms &#8220;DevOps-ifier&#8221; and &#8220;DevOps-ologist,&#8221; Manuel has extensive knowledge of both technologies and markets. He helps people practice DevOps principles in real-world organizations and achieve results in big DevOps transition projects.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/rP9VGC6ru4o?si=I8-JWF1z2BDrmXPc\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 21, 2024Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM ISTTopic: DevSecOps: Bridging the Gap Between Development, Security, and Operations Watch Now Abstract: In the current digital landscape, increasing reliance on applications has expanded the threat landscape, thus increasing the risk of cybersecurity breaches. DevSecOps emerges as a response to application&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81910,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81909","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Integrating Development, Security, and Operations through DevSecOps<\/title>\n<meta name=\"description\" content=\"Learn the best practices of implementing DevSecOps and explore the potential of DevSecOps in delivering secure software by bridging the gap between development, security, and operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DevSecOps: Bridging the Gap Between Development, Security, and Operations\" \/>\n<meta property=\"og:description\" content=\"Learn the best practices of implementing DevSecOps and explore the potential of DevSecOps in delivering secure software by bridging the gap between development, security, and operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-21T10:11:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-29T04:48:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"621\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"DevSecOps: Bridging the Gap Between Development, Security, and Operations\",\"datePublished\":\"2024-05-21T10:11:00+00:00\",\"dateModified\":\"2024-05-29T04:48:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/\"},\"wordCount\":334,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/\",\"name\":\"Integrating Development, Security, and Operations through DevSecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp\",\"datePublished\":\"2024-05-21T10:11:00+00:00\",\"dateModified\":\"2024-05-29T04:48:01+00:00\",\"description\":\"Learn the best practices of implementing DevSecOps and explore the potential of DevSecOps in delivering secure software by bridging the gap between development, security, and operations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp\",\"width\":931,\"height\":621},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/devsecops-bridging-the-gap-between-development-security-and-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"DevSecOps: Bridging the Gap Between Development, Security, and Operations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Integrating Development, Security, and Operations through DevSecOps","description":"Learn the best practices of implementing DevSecOps and explore the potential of DevSecOps in delivering secure software by bridging the gap between development, security, and operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/","og_locale":"en_US","og_type":"article","og_title":"DevSecOps: Bridging the Gap Between Development, Security, and Operations","og_description":"Learn the best practices of implementing DevSecOps and explore the potential of DevSecOps in delivering secure software by bridging the gap between development, security, and operations.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-05-21T10:11:00+00:00","article_modified_time":"2024-05-29T04:48:01+00:00","og_image":[{"width":931,"height":621,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp","type":"image\/webp"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"DevSecOps: Bridging the Gap Between Development, Security, and Operations","datePublished":"2024-05-21T10:11:00+00:00","dateModified":"2024-05-29T04:48:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/"},"wordCount":334,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/","name":"Integrating Development, Security, and Operations through DevSecOps","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp","datePublished":"2024-05-21T10:11:00+00:00","dateModified":"2024-05-29T04:48:01+00:00","description":"Learn the best practices of implementing DevSecOps and explore the potential of DevSecOps in delivering secure software by bridging the gap between development, security, and operations.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Integrating-Development-Security-and-Operations-through-DevSecOps.webp","width":931,"height":621},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/devsecops-bridging-the-gap-between-development-security-and-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"DevSecOps: Bridging the Gap Between Development, Security, and Operations"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81909"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81909\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81910"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}