{"id":82138,"date":"2024-08-06T10:25:00","date_gmt":"2024-08-06T10:25:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82138"},"modified":"2025-03-11T11:03:03","modified_gmt":"2025-03-11T11:03:03","slug":"combating-ransomware-attacks-strategies-for-detection-prevention-and-response","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/","title":{"rendered":"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82138\" class=\"elementor elementor-82138\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dbadf31 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dbadf31\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4049e29\" data-id=\"4049e29\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fa05c0 elementor-widget elementor-widget-text-editor\" data-id=\"9fa05c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong>August 6, 2024<\/p><p><strong>Time:<\/strong> 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST<br \/><strong>Topic:<\/strong> Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong>\u00a0<\/strong><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> With the evolution of the Information Technology (IT) landscape, new digital avenues and environments have emerged to address data operation and storage demands. In response to this rapid shift, security threat elements such as ransomware attacks have surged in frequency and sophistication, posing significant threats to organizations of all sizes across industries. Thus, the need for understanding and combating ransomware attacks has become eminent. This webinar aims at understanding the critical strategies required to safeguard systems and networks against devastating cyber threats. It will offer valuable insights into the lifecycle of ransomware attacks &#8211; from the initial intrusion to the execution of the ransom demand. Further, the webinar will discuss the latest ransomware Tactics, Techniques, and Procedures (TTPs) employed by cybercriminals, along with the methodology for detecting, preventing, and mitigating these threats. Join us as we explore how industry security professionals view, analyze, and mitigate ransomware trends in the current threat landscape.<br \/><\/span><\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Current ransomware trends across the threat landscape<\/li><li>Understanding ransomware TTP\u2019s and their impact<\/li><li>Ransomware combating strategies: detection, prevention, and response<\/li><li>Developing and implementing ransomware security policies<\/li><li>Security best practices for preventing ransomware attacks<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/GeorgeDobrea.png\" alt=\"George Dobrea\" width=\"200\" \/><strong>George Dobrea,<\/strong>Co-founder and CEO of XEDUCO Institute<\/p><p><strong>Bio:<\/strong> Co-founder and CEO of XEDUCO Institute, George Dobrea, is a cybersecurity expert and a well-known technical instructor with over 35 years of business experience delivering consulting services and training programs to military, commercial, and public organizations in 30+ countries.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/ikrbJ4fw0WQ?si=fHL7xHfMcsX-G1AX\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: August 6, 2024 Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM ISTTopic: Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response Watch Now \u00a0Abstract: With the evolution of the Information Technology (IT) landscape, new digital avenues and environments have emerged to address data operation and storage demands. In response to this&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82139,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82138","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response - Cybersecurity Exchange<\/title>\n<meta name=\"description\" content=\"Discover expert strategies to detect, prevent, and respond to ransomware attacks. Learn how to safeguard your business with cybersecurity best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response\" \/>\n<meta property=\"og:description\" content=\"Discover expert strategies to detect, prevent, and respond to ransomware attacks. Learn how to safeguard your business with cybersecurity best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-06T10:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-11T11:03:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Discover expert strategies to detect, prevent, and respond to ransomware attacks. Learn how to safeguard your business with cybersecurity best practices.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response\",\"datePublished\":\"2024-08-06T10:25:00+00:00\",\"dateModified\":\"2025-03-11T11:03:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/\"},\"wordCount\":287,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-3.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/\",\"name\":\"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response - Cybersecurity Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-3.png\",\"datePublished\":\"2024-08-06T10:25:00+00:00\",\"dateModified\":\"2025-03-11T11:03:03+00:00\",\"description\":\"Discover expert strategies to detect, prevent, and respond to ransomware attacks. Learn how to safeguard your business with cybersecurity best practices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-3.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-3.png\",\"width\":1396,\"height\":930},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response - Cybersecurity Exchange","description":"Discover expert strategies to detect, prevent, and respond to ransomware attacks. Learn how to safeguard your business with cybersecurity best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/","og_locale":"en_US","og_type":"article","og_title":"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response","og_description":"Discover expert strategies to detect, prevent, and respond to ransomware attacks. Learn how to safeguard your business with cybersecurity best practices.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-08-06T10:25:00+00:00","article_modified_time":"2025-03-11T11:03:03+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-3.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_description":"Discover expert strategies to detect, prevent, and respond to ransomware attacks. Learn how to safeguard your business with cybersecurity best practices.","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response","datePublished":"2024-08-06T10:25:00+00:00","dateModified":"2025-03-11T11:03:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/"},"wordCount":287,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-3.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/","name":"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response - Cybersecurity Exchange","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-3.png","datePublished":"2024-08-06T10:25:00+00:00","dateModified":"2025-03-11T11:03:03+00:00","description":"Discover expert strategies to detect, prevent, and respond to ransomware attacks. Learn how to safeguard your business with cybersecurity best practices.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-3.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-3.png","width":1396,"height":930},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/combating-ransomware-attacks-strategies-for-detection-prevention-and-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Combating Ransomware Attacks: Strategies for Detection, Prevention, and Response"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82138"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82138\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82139"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}