{"id":82411,"date":"2024-10-28T05:05:00","date_gmt":"2024-10-28T05:05:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82411"},"modified":"2024-11-05T06:20:35","modified_gmt":"2024-11-05T06:20:35","slug":"strategies-for-mitigating-cyber-risks-in-digital-networks","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/","title":{"rendered":"Strategies for Mitigating Cyber Risks in Digital Networks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82411\" class=\"elementor elementor-82411\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-de01ec7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"de01ec7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a75ae90\" data-id=\"a75ae90\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2db9ce7 elementor-widget elementor-widget-text-editor\" data-id=\"2db9ce7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: October 28, 2024<\/div>\n<div><strong>Time<\/strong>: 12:30 AM AEDT | 9:30 AM EDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic<\/strong>: Strategies for Mitigating Cyber Risks in Digital Networks<\/p>\n<\/div>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract: <\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">In today&#8217;s digital environment, cyber threats have become a primary concern for businesses and individual users. Organizational networks of all sizes and industries are under continuous attack, and the level of sophistication for these threats keeps growing. From ransomware to advanced persistent threats (APTs) and zero-day exploits, the quality and quantity of cyber threats continue to increase exponentially. As businesses expand their digital footprints, safeguarding sensitive data and ensuring network resilience becomes critical.<\/span><\/p><p>\nThis webinar explores the latest trends and strategies for developing and establishing security policies to mitigate such threats. An agile framework for cyber resilience includes proactive defense, access management, zero-trust networks, and data protection tactics, with the webinar offering an in-depth understanding of these strategies. Attendees will also learn how to safeguard digital assets and reduce cyber risks through a comprehensive, layered approach to cybersecurity that addresses their concerns.<\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Overview of current cyber threat landscape and emerging risks<\/li>\n<li>Proactive defense for effective incident response<\/li>\n<li>Role of the zero-trust model in reducing the attack surface<\/li>\n<li>Leveraging cryptographic techniques to secure data<\/li>\n<li>Access management and identity protection<\/li>\n<li>Resilience planning and incident response<\/li>\n<li>Regulatory compliance and governance<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\" wp-image-82413 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Sentil-Head-Shot-1-1-300x268.png\" alt=\"Sentil Head\" width=\"226\" height=\"203\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Sentil-Head-Shot-1-1-300x268.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Sentil-Head-Shot-1-1.png 758w\" sizes=\"(max-width: 226px) 100vw, 226px\" \/><strong>Sentil Velaytham, <\/strong>Staff Solutions Architect, VMware by Broadcom<br>\n<strong>Bio:<\/strong> Sentil Velaytham is an esteemed technical strategist who is celebrated for his adeptness in resolving business challenges and enhancing IT frameworks. Throughout his career, Sentil has effectively supported numerous clients in attaining their objectives. He has cultivated strong collaborations with distinguished technology partners like VMware, Microsoft, Druva, AWS, Commvault, Veeam, Cohesity, Rubrik, EMC, NetApp, CISCO, Juniper Networks, Extreme Networks, HP, Nutanix, and others.\u202fAcknowledged as an advocate for cloud technology, cybersecurity, and data center practice, he staunchly advocates for streamlining technical operations to optimize productivity. Leveraging his profound understanding of these technologies, he addresses complex integration hurdles with refined, efficient, and cost-effective approaches. Driven by a fervent commitment to innovation, Sentil consistently prioritizes team success, establishing himself as a key person of influence in both the technological and business spheres.<\/p>\n<a name=\"attend\"><\/a>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/4hD4yOxi22U?si=ZsNF6XtwS2Uo3qmm\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 28, 2024Time: 12:30 AM AEDT | 9:30 AM EDT | 7:00 PM IST Topic: Strategies for Mitigating Cyber Risks in Digital Networks Register Abstract: In today&#8217;s digital environment, cyber threats have become a primary concern for businesses and individual users. Organizational networks of all sizes and industries are under continuous attack, and the&hellip;<\/p>\n","protected":false},"author":77,"featured_media":82412,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82411","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Effectively Mitigate Cyber Risks in Digital Networks<\/title>\n<meta name=\"description\" content=\"Learn strategies to mitigate growing cyber threats like ransomware, APTs, and zero-day exploits. This webinar covers proactive defense, zero-trust models, and data protection techniques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strategies for Mitigating Cyber Risks in Digital Networks\" \/>\n<meta property=\"og:description\" content=\"Learn strategies to mitigate growing cyber threats like ransomware, APTs, and zero-day exploits. This webinar covers proactive defense, zero-trust models, and data protection techniques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-28T05:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-05T06:20:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/465-310-1-7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"Strategies for Mitigating Cyber Risks in Digital Networks\",\"datePublished\":\"2024-10-28T05:05:00+00:00\",\"dateModified\":\"2024-11-05T06:20:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/\"},\"wordCount\":358,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/465-310-1-7.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/\",\"name\":\"How to Effectively Mitigate Cyber Risks in Digital Networks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/465-310-1-7.png\",\"datePublished\":\"2024-10-28T05:05:00+00:00\",\"dateModified\":\"2024-11-05T06:20:35+00:00\",\"description\":\"Learn strategies to mitigate growing cyber threats like ransomware, APTs, and zero-day exploits. This webinar covers proactive defense, zero-trust models, and data protection techniques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/465-310-1-7.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/465-310-1-7.png\",\"width\":1396,\"height\":930,\"caption\":\"Strategies for Mitigating Cyber Risks in Digital Networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategies-for-mitigating-cyber-risks-in-digital-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Strategies for Mitigating Cyber Risks in Digital Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Effectively Mitigate Cyber Risks in Digital Networks","description":"Learn strategies to mitigate growing cyber threats like ransomware, APTs, and zero-day exploits. This webinar covers proactive defense, zero-trust models, and data protection techniques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/","og_locale":"en_US","og_type":"article","og_title":"Strategies for Mitigating Cyber Risks in Digital Networks","og_description":"Learn strategies to mitigate growing cyber threats like ransomware, APTs, and zero-day exploits. This webinar covers proactive defense, zero-trust models, and data protection techniques.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-10-28T05:05:00+00:00","article_modified_time":"2024-11-05T06:20:35+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/465-310-1-7.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"Strategies for Mitigating Cyber Risks in Digital Networks","datePublished":"2024-10-28T05:05:00+00:00","dateModified":"2024-11-05T06:20:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/"},"wordCount":358,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/465-310-1-7.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/","name":"How to Effectively Mitigate Cyber Risks in Digital Networks","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/465-310-1-7.png","datePublished":"2024-10-28T05:05:00+00:00","dateModified":"2024-11-05T06:20:35+00:00","description":"Learn strategies to mitigate growing cyber threats like ransomware, APTs, and zero-day exploits. This webinar covers proactive defense, zero-trust models, and data protection techniques.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/465-310-1-7.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/465-310-1-7.png","width":1396,"height":930,"caption":"Strategies for Mitigating Cyber Risks in Digital Networks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategies-for-mitigating-cyber-risks-in-digital-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Strategies for Mitigating Cyber Risks in Digital Networks"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82411"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82411\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82412"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}