{"id":81913,"date":"2024-05-27T09:39:00","date_gmt":"2024-05-27T09:39:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81913"},"modified":"2024-06-03T06:37:52","modified_gmt":"2024-06-03T06:37:52","slug":"blockchain-and-identity-management-building-trust-in-a-digital-world","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/","title":{"rendered":"Blockchain and Identity Management: Building Trust in a Digital World"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81913\" class=\"elementor elementor-81913\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6065d4a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6065d4a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-900d426\" data-id=\"900d426\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-630a197 elementor-widget elementor-widget-text-editor\" data-id=\"630a197\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 27, 2024<\/div><div><strong>Time<\/strong>: 2:30 PM BST | 9:30 AM EDT | 7:00 PM IST<\/div><div><strong>Topic<\/strong>: Blockchain and Identity Management: Building Trust in a Digital World<br \/><br \/><\/div><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> In today&#8217;s interconnected digital landscape, ensuring security based on user behavior, identity, and access management has become significant. However, traditional identity management systems and networks are often vulnerable, raising concerns about data privacy and security. Blockchain technology offers a promising solution to these challenges through its decentralized nature and immutability, making it uniquely suited for identity management. This webinar explores the intersection of blockchain technology and identity management, shedding light on the existing challenges and how blockchain can revolutionize identity authentication and management. It will also highlight the implications of blockchain-based identity management for businesses and demonstrate how blockchain can enhance security, transparency, and privacy. Join us as we unveil the transformative potential of blockchain technology in shaping the future of identity management and building trust in the digital world.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Understanding the challenges of current access management systems<\/li><li>Need for blockchain integration with identity and access management<\/li><li>Benefits of decentralized identity solutions and framework<\/li><li>Best practices for blockchain-based identity solution implementation<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\" wp-image-59590 alignleft\" src=\"https:\/\/www.eccu.edu\/wp-content\/uploads\/2024\/05\/David-Palmer-Headshot-.jpg\" alt=\"David-Palmer\" width=\"169\" height=\"168\" \/><strong>David Palmer<\/strong>, CPO Pairpoint by Vodafone<br \/><strong>Bio:<\/strong> David Palmer is a digital visionary, innovator, and author. He is the Chief Product Officer and Co-Founder of PairPoint by Vodafone IoT and Web3 platform Digital Asset Broker (DAB). David is also a board member of the Asia Web3 Alliance and the author of the book &#8220;The Business of the Metaverse\u2014How Organisations Can Optimize the Opportunities of Web3 and AI.&#8221;<\/p><p>David is recognized as one of the top 20 people to watch in Web3 and one of the top 30 Metaverse industry leaders. Most recently, he has been working on the opportunities associated with AI, Web3, IoT, and Fintech to power a new digital operating system and new business models for digital businesses and enterprises.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/OnjHoKL9F9M?si=31UOv2SNYTApsBj0\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 27, 2024Time: 2:30 PM BST | 9:30 AM EDT | 7:00 PM ISTTopic: Blockchain and Identity Management: Building Trust in a Digital World Watch Now Abstract: In today&#8217;s interconnected digital landscape, ensuring security based on user behavior, identity, and access management has become significant. However, traditional identity management systems and networks are often&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81914,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81913","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Redefining Identity Management with Blockchain Technology<\/title>\n<meta name=\"description\" content=\"Discover the potential of blockchain technology for secure identity management. Learn key insights and best practices for enhanced security and privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Blockchain and Identity Management: Building Trust in a Digital World\" \/>\n<meta property=\"og:description\" content=\"Discover the potential of blockchain technology for secure identity management. Learn key insights and best practices for enhanced security and privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-27T09:39:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T06:37:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Blockchain-and-Identity-Management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"621\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Blockchain and Identity Management: Building Trust in a Digital World\",\"datePublished\":\"2024-05-27T09:39:00+00:00\",\"dateModified\":\"2024-06-03T06:37:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/\"},\"wordCount\":339,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Blockchain-and-Identity-Management.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/\",\"name\":\"Redefining Identity Management with Blockchain Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Blockchain-and-Identity-Management.jpg\",\"datePublished\":\"2024-05-27T09:39:00+00:00\",\"dateModified\":\"2024-06-03T06:37:52+00:00\",\"description\":\"Discover the potential of blockchain technology for secure identity management. Learn key insights and best practices for enhanced security and privacy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Blockchain-and-Identity-Management.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/Blockchain-and-Identity-Management.jpg\",\"width\":931,\"height\":621},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/blockchain-and-identity-management-building-trust-in-a-digital-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Blockchain and Identity Management: Building Trust in a Digital World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Redefining Identity Management with Blockchain Technology","description":"Discover the potential of blockchain technology for secure identity management. Learn key insights and best practices for enhanced security and privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/","og_locale":"en_US","og_type":"article","og_title":"Blockchain and Identity Management: Building Trust in a Digital World","og_description":"Discover the potential of blockchain technology for secure identity management. Learn key insights and best practices for enhanced security and privacy.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-05-27T09:39:00+00:00","article_modified_time":"2024-06-03T06:37:52+00:00","og_image":[{"width":931,"height":621,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Blockchain-and-Identity-Management.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Blockchain and Identity Management: Building Trust in a Digital World","datePublished":"2024-05-27T09:39:00+00:00","dateModified":"2024-06-03T06:37:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/"},"wordCount":339,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Blockchain-and-Identity-Management.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/","name":"Redefining Identity Management with Blockchain Technology","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Blockchain-and-Identity-Management.jpg","datePublished":"2024-05-27T09:39:00+00:00","dateModified":"2024-06-03T06:37:52+00:00","description":"Discover the potential of blockchain technology for secure identity management. Learn key insights and best practices for enhanced security and privacy.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Blockchain-and-Identity-Management.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Blockchain-and-Identity-Management.jpg","width":931,"height":621},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/blockchain-and-identity-management-building-trust-in-a-digital-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Blockchain and Identity Management: Building Trust in a Digital World"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81913"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81913\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81914"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}