{"id":82012,"date":"2024-06-19T05:49:24","date_gmt":"2024-06-19T05:49:24","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82012"},"modified":"2025-09-04T13:04:36","modified_gmt":"2025-09-04T13:04:36","slug":"leveraging-threat-intelligence-for-security-a-beginners-guide","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/","title":{"rendered":"Leveraging Threat Intelligence for Security: A Beginner&#8217;s Guide"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82012\" class=\"elementor elementor-82012\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8e7945a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8e7945a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30cc3fc\" data-id=\"30cc3fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3d45d0 elementor-widget elementor-widget-text-editor\" data-id=\"f3d45d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: June 18, 2024<\/div><div><strong>Time<\/strong>: 7:00 AM PDT | 10:00 AM EDT | 7:30 PM IST<\/div><div><p><strong>Topic<\/strong>: Leveraging Threat Intelligence for Security: A Beginner&#8217;s Guide<\/p><\/div><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> In the current threat landscape, threat intelligence is a crucial tool against evolving risks. Leveraging threat intelligence involves gathering security intelligence from various sources, including open-source feeds to commercial platforms, to gain insights into threat patterns and incorporate this data into the organization&#8217;s defense strategies. From threat detection and incident response to proactive risk mitigation, organizations can utilize threat intelligence capabilities to fortify their defenses against cyber threats. However, navigating the threat intelligence domain can be challenging for beginners in the field. This webinar aims to simplify the concept of threat intelligence for beginners, offering a comprehensive understanding of the processes, technologies, and tactics involved. Additionally, it will cover the fundamentals of threat intelligence and explore practical strategies for leveraging it effectively. The webinar will also address common challenges beginners face in implementing threat intelligence solutions while offering valuable tips and best practices guidelines to overcome these obstacles.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>The importance of threat intelligence in modern security frameworks<\/li><li>The role of threat intelligence in enhancing cybersecurity strategies<\/li><li>How to harness the power of threat intelligence to fortify security defenses<\/li><li>Common challenges faced in implementing threat intelligence solutions<\/li><li>Best practices for threat intelligence implementation<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-82014 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Mark-Mackensen-225x300.jpg\" alt=\"Mark Mackensen\" width=\"213\" height=\"284\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Mark-Mackensen-225x300.jpg 225w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Mark-Mackensen-768x1024.jpg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Mark-Mackensen-1152x1536.jpg 1152w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Mark-Mackensen-1536x2048.jpg 1536w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Mark-Mackensen-scaled.jpg 1920w\" sizes=\"(max-width: 213px) 100vw, 213px\" \/><strong>Mark Mackensen<\/strong>, Senior Cyber Threat Analyst, Paylocity<\/p><p><strong>Bio: <\/strong>Senior Cyber Threat Analyst at Paylocity, Mark Mackensen brings over a decade of cybersecurity expertise, with a specific focus on <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-threat-intelligence\/\">Cyber Threat Intelligence (CTI)<\/a> and Threat Hunting. Currently leading Paylocity&#8217;s CTI and Threat Hunting programs, Mark has been pivotal in developing these initiatives from inception to operational maturity. This includes crafting tailored methodologies, frameworks, and protocols that enhance incident response capabilities and fortify overall security posture. Prior to Paylocity, Mark managed a global team of threat intelligence analysts at General Dynamics Information Technology for the Department of Defense. There, he focused on leveraging the MITRE ATT&amp;CK framework, improving intelligence sharing, and guiding a team through comprehensive threat intelligence cycles\u2014ultimately delivering actionable intelligence critical for security operations. Mark&#8217;s leadership extended to managing the West Coast threat intelligence team, emphasizing operational excellence and strategic mentorship.<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/fLMQEbdly74?si=wzEDVQHN8X_dwUUl\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 18, 2024Time: 7:00 AM PDT | 10:00 AM EDT | 7:30 PM IST Topic: Leveraging Threat Intelligence for Security: A Beginner&#8217;s Guide Watch Now Abstract: In the current threat landscape, threat intelligence is a crucial tool against evolving risks. Leveraging threat intelligence involves gathering security intelligence from various sources, including open-source feeds to&hellip;<\/p>\n","protected":false},"author":77,"featured_media":82013,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82012","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>A Beginner&#039;s Guide to Using Threat Intelligence for Security<\/title>\n<meta name=\"description\" content=\"Gain a fundamental grasp of threat intelligence, discover how to use it to enhance cybersecurity strategies, and overcome common challenges with expert tips and best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leveraging Threat Intelligence for Security: A Beginner&#039;s Guide\" \/>\n<meta property=\"og:description\" content=\"Gain a fundamental grasp of threat intelligence, discover how to use it to enhance cybersecurity strategies, and overcome common challenges with expert tips and best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-19T05:49:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T13:04:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"Leveraging Threat Intelligence for Security: A Beginner&#8217;s Guide\",\"datePublished\":\"2024-06-19T05:49:24+00:00\",\"dateModified\":\"2025-09-04T13:04:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/\"},\"wordCount\":373,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/465-310-1.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/\",\"name\":\"A Beginner's Guide to Using Threat Intelligence for Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/465-310-1.png\",\"datePublished\":\"2024-06-19T05:49:24+00:00\",\"dateModified\":\"2025-09-04T13:04:36+00:00\",\"description\":\"Gain a fundamental grasp of threat intelligence, discover how to use it to enhance cybersecurity strategies, and overcome common challenges with expert tips and best practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/465-310-1.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/465-310-1.png\",\"width\":969,\"height\":646,\"caption\":\"Threat Intelligence for Beginners\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/leveraging-threat-intelligence-for-security-a-beginners-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Leveraging Threat Intelligence for Security: A Beginner&#8217;s Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"A Beginner's Guide to Using Threat Intelligence for Security","description":"Gain a fundamental grasp of threat intelligence, discover how to use it to enhance cybersecurity strategies, and overcome common challenges with expert tips and best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/","og_locale":"en_US","og_type":"article","og_title":"Leveraging Threat Intelligence for Security: A Beginner's Guide","og_description":"Gain a fundamental grasp of threat intelligence, discover how to use it to enhance cybersecurity strategies, and overcome common challenges with expert tips and best practices.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-06-19T05:49:24+00:00","article_modified_time":"2025-09-04T13:04:36+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"Leveraging Threat Intelligence for Security: A Beginner&#8217;s Guide","datePublished":"2024-06-19T05:49:24+00:00","dateModified":"2025-09-04T13:04:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/"},"wordCount":373,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/","name":"A Beginner's Guide to Using Threat Intelligence for Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1.png","datePublished":"2024-06-19T05:49:24+00:00","dateModified":"2025-09-04T13:04:36+00:00","description":"Gain a fundamental grasp of threat intelligence, discover how to use it to enhance cybersecurity strategies, and overcome common challenges with expert tips and best practices.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1.png","width":969,"height":646,"caption":"Threat Intelligence for Beginners"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/leveraging-threat-intelligence-for-security-a-beginners-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Leveraging Threat Intelligence for Security: A Beginner&#8217;s Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82012"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82012\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82013"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}