{"id":82183,"date":"2024-08-20T17:31:00","date_gmt":"2024-08-20T17:31:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82183"},"modified":"2024-09-02T08:28:56","modified_gmt":"2024-09-02T08:28:56","slug":"security-audit-essentials","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/","title":{"rendered":"Security Audit Essentials: Tips for Effective Governance and Risk Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82183\" class=\"elementor elementor-82183\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5ed3f4c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5ed3f4c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7e23f70\" data-id=\"7e23f70\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cc4935 elementor-widget elementor-widget-text-editor\" data-id=\"8cc4935\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong>August 20, 2024<\/p>\n<p><strong>Time:<\/strong> 2:30 PM GMT+1 | 9:30 AM CDT | 7:00 PM IST<br>\n<strong>Topic:<\/strong> Security Audit Basics: Tips for Effective Governance and Risk Management<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>&nbsp;<\/strong><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> Data security is paramount for businesses in terms of information security compliance with regulatory requirements. Safeguarding organizational assets and data in compliance with government regulations mandates that organizations implement comprehensive security policies throughout their operations and supply chains. However, the diverse data security and governance standards worldwide necessitate that businesses develop and adopt an agile, flexible security policy framework. This framework should effectively encompass all compliance requirements holistically or through a segmented network approach. This webinar aims to explore the latest trends and challenges in compliance management within information security, along with techniques for implementing compliant policies. Join us as we explore principles and techniques crucial for developing and implementing a compliant security framework and strategies for identifying risks and establishing governance to ensure a robust security posture.<\/span><\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding the importance and approach of security audit<\/li>\n<li>Overview of major security frameworks and their implementation<\/li>\n<li>Audit planning, preparation, and execution<\/li>\n<li>Risk assessment and management<\/li>\n<li>Integrating audit findings into security policies<\/li>\n<li>Security governance and compliance best practices<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/Sami-Rifky.jpg\" alt=\"Sami Rifky\" width=\"200\"><strong>Sami Rifky<\/strong>, Vice-President &amp; Immediate Past President, ISACA Casablanca Chapter<\/p>\n<p><strong>Bio:<\/strong> With over 20 years of experience in auditing, IT governance, and risk management, Sami has earned numerous international certifications, including CISA, CRISC, CDPSE, CSX, CRMA, ITIL, ISO27001LI, C|CISO.<\/p>\n<p>Throughout his professional career, Sami has actively contributed to enhancing IT auditing and governance practices in Morocco and across Africa. He was elected vice-president of the Institute of Internal Auditors (IIA) Morocco and president of the ISACA Casablanca Chapter, where he currently serves as vice-president.<\/p>\n<p>Sami&#8217;s experience is characterized by a collaborative, results-driven approach as an audit and risk business partner, helping organizations achieve measurable and attainable goals while ensuring compliance in the industrial and banking sectors. He has also implemented several digital solutions to increase efficiency and drive digital transformation in GRC activities, including internal audit, risk management, internal control, and data analytics.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/1x-SBUSUHWE?si=2xcS_vD7TCmZEe-e\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: August 20, 2024 Time: 2:30 PM GMT+1 | 9:30 AM CDT | 7:00 PM IST Topic: Security Audit Basics: Tips for Effective Governance and Risk Management Watch Now &nbsp;Abstract: Data security is paramount for businesses in terms of information security compliance with regulatory requirements. Safeguarding organizational assets and data in compliance with government regulations&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82184,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82183","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Optimizing Security Audits: Governance and Risk Management Fundamentals<\/title>\n<meta name=\"description\" content=\"In this webinar gain insights into the best practices of security governance and compliance, and discover how to plan, prepare, and execute audits to conduct an effective risk assessment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Audit Essentials: Tips for Effective Governance and Risk Management\" \/>\n<meta property=\"og:description\" content=\"In this webinar gain insights into the best practices of security governance and compliance, and discover how to plan, prepare, and execute audits to conduct an effective risk assessment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-20T17:31:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T08:28:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Security Audit Essentials: Tips for Effective Governance and Risk Management\",\"datePublished\":\"2024-08-20T17:31:00+00:00\",\"dateModified\":\"2024-09-02T08:28:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/\"},\"wordCount\":368,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-7.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/\",\"name\":\"Optimizing Security Audits: Governance and Risk Management Fundamentals\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-7.png\",\"datePublished\":\"2024-08-20T17:31:00+00:00\",\"dateModified\":\"2024-09-02T08:28:56+00:00\",\"description\":\"In this webinar gain insights into the best practices of security governance and compliance, and discover how to plan, prepare, and execute audits to conduct an effective risk assessment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-7.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/465-310-1-7.png\",\"width\":1396,\"height\":930,\"caption\":\"Security Audit Essentials\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-audit-essentials\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Security Audit Essentials: Tips for Effective Governance and Risk Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Optimizing Security Audits: Governance and Risk Management Fundamentals","description":"In this webinar gain insights into the best practices of security governance and compliance, and discover how to plan, prepare, and execute audits to conduct an effective risk assessment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/","og_locale":"en_US","og_type":"article","og_title":"Security Audit Essentials: Tips for Effective Governance and Risk Management","og_description":"In this webinar gain insights into the best practices of security governance and compliance, and discover how to plan, prepare, and execute audits to conduct an effective risk assessment.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-08-20T17:31:00+00:00","article_modified_time":"2024-09-02T08:28:56+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-7.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Security Audit Essentials: Tips for Effective Governance and Risk Management","datePublished":"2024-08-20T17:31:00+00:00","dateModified":"2024-09-02T08:28:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/"},"wordCount":368,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-7.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/","name":"Optimizing Security Audits: Governance and Risk Management Fundamentals","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-7.png","datePublished":"2024-08-20T17:31:00+00:00","dateModified":"2024-09-02T08:28:56+00:00","description":"In this webinar gain insights into the best practices of security governance and compliance, and discover how to plan, prepare, and execute audits to conduct an effective risk assessment.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-7.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/465-310-1-7.png","width":1396,"height":930,"caption":"Security Audit Essentials"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-audit-essentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Security Audit Essentials: Tips for Effective Governance and Risk Management"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82183"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82183\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82184"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}