{"id":82456,"date":"2024-12-13T10:56:00","date_gmt":"2024-12-13T10:56:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82456"},"modified":"2024-12-19T12:15:08","modified_gmt":"2024-12-19T12:15:08","slug":"cloud-threat-hunting-tactics-for-enhanced-azure-security","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/","title":{"rendered":"Cloud Threat Hunting: Tactics for Enhanced Azure Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82456\" class=\"elementor elementor-82456\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1446440 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1446440\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d4976a6\" data-id=\"d4976a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32fc47e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"32fc47e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: December 13, 2024<\/div>\n<div><strong>Time<\/strong>: 11:30 PM AEDT | 7:30 AM EST | 6:00 PM IST<\/div>\n<div>\n<p><strong>Topic<\/strong>: Cloud Threat Hunting: Tactics for Enhanced Azure Security<\/p>\n<\/div>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:&nbsp;<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">As businesses increasingly migrate to the cloud, the virtual environment&#8217;s corresponding threat landscape has also expanded. This necessitates the development and deployment of threat hunting strategies for the cloud environment. With multiple assets and vendors holding an organization&#8217;s data and infrastructure in a virtual landscape, the threat hunting strategies for the cloud differ significantly as they present their unique challenges and require novel solutions. This webinar sheds light on cloud threat-hunting tactics and frameworks for Microsoft Azure. Additionally, it will explore threat identification and mitigation techniques and challenges unique to cloud-based threat hunting, such as the<\/span><\/p>\n<p>detection complexities with lateral movement, privilege escalation, unique cloud-native logs, telemetry, etc.<\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ul>\n<li>Understanding Azure security and common threat vectors<\/li>\n<li>Threat hunting tools and tactics for cloud<\/li>\n<li>Azure threat hunting techniques: Role of Azure Security Center, Sentinel, and other cloud-native tools<\/li>\n<li>Azure logic apps and integrated solutions for threat hunting automation<\/li>\n<li>Best practices for threat hunting process in Azure<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-90385 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/Poonam-Kodag.jpg\" alt=\"Poonam Kodag\" width=\"237\" height=\"237\"><strong>Poonam Kodag<\/strong>, Senior Cybersecurity Professional<br>\n<strong>Bio:&nbsp;<\/strong>Poonam Kodag is an accomplished cybersecurity professional with 17 years of experience across India, Singapore, and Australia. Her career is marked by a proven track record of innovating and developing advanced security products and technologies. Holding a Bachelor of Engineering degree in Computer Science and a Certified Ethical Hacker (C|EH) credential, she excels in reverse engineering, threat hunting, threat intelligence, and leading incident response.<\/p>\n<p>As a cybersecurity leader, she has extensive experience in managing and mentoring security teams, establishing comprehensive security policies, and driving significant improvements in incident management. Her career is distinguished by her leadership in global-scale security projects, including securing major sporting events and delivering security services worldwide.<\/p>\n<p>As an innovative and strategic thinker, she has contributed to the field by releasing multiple inventions. As a mentor for the Australian Women in Security Network, she is dedicated to nurturing local talent and advancing cybersecurity excellence globally.<\/p>\n\n<a name=\"attend\"><\/a>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/JYi3L6oTAsM?si=lR6YuaeV2Bgyy_AB\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 13, 2024 Time: 11:30 PM AEDT | 7:30 AM EST | 6:00 PM IST Topic: Cloud Threat Hunting: Tactics for Enhanced Azure Security Watch Now Abstract:&nbsp;As businesses increasingly migrate to the cloud, the virtual environment&#8217;s corresponding threat landscape has also expanded. This necessitates the development and deployment of threat hunting strategies for the&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82457,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82456","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cloud Threat Hunting: Advanced Strategies for Securing Azure<\/title>\n<meta name=\"description\" content=\"Discover effective tactics, advanced strategies, best practices, and tools to proactively identify and mitigate threats while performing effective cloud threat hunting in Azure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Threat Hunting: Tactics for Enhanced Azure Security\" \/>\n<meta property=\"og:description\" content=\"Discover effective tactics, advanced strategies, best practices, and tools to proactively identify and mitigate threats while performing effective cloud threat hunting in Azure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-13T10:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-19T12:15:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/13-dec-poonam_465-310.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Cloud Threat Hunting: Tactics for Enhanced Azure Security\",\"datePublished\":\"2024-12-13T10:56:00+00:00\",\"dateModified\":\"2024-12-19T12:15:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/\"},\"wordCount\":344,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/13-dec-poonam_465-310.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/\",\"name\":\"Cloud Threat Hunting: Advanced Strategies for Securing Azure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/13-dec-poonam_465-310.jpg\",\"datePublished\":\"2024-12-13T10:56:00+00:00\",\"dateModified\":\"2024-12-19T12:15:08+00:00\",\"description\":\"Discover effective tactics, advanced strategies, best practices, and tools to proactively identify and mitigate threats while performing effective cloud threat hunting in Azure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/13-dec-poonam_465-310.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/13-dec-poonam_465-310.jpg\",\"width\":1938,\"height\":1292,\"caption\":\"Cloud Threat Hunting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cloud-threat-hunting-tactics-for-enhanced-azure-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cloud Threat Hunting: Tactics for Enhanced Azure Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud Threat Hunting: Advanced Strategies for Securing Azure","description":"Discover effective tactics, advanced strategies, best practices, and tools to proactively identify and mitigate threats while performing effective cloud threat hunting in Azure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Threat Hunting: Tactics for Enhanced Azure Security","og_description":"Discover effective tactics, advanced strategies, best practices, and tools to proactively identify and mitigate threats while performing effective cloud threat hunting in Azure.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-12-13T10:56:00+00:00","article_modified_time":"2024-12-19T12:15:08+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/13-dec-poonam_465-310.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Cloud Threat Hunting: Tactics for Enhanced Azure Security","datePublished":"2024-12-13T10:56:00+00:00","dateModified":"2024-12-19T12:15:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/"},"wordCount":344,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/13-dec-poonam_465-310.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/","name":"Cloud Threat Hunting: Advanced Strategies for Securing Azure","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/13-dec-poonam_465-310.jpg","datePublished":"2024-12-13T10:56:00+00:00","dateModified":"2024-12-19T12:15:08+00:00","description":"Discover effective tactics, advanced strategies, best practices, and tools to proactively identify and mitigate threats while performing effective cloud threat hunting in Azure.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/13-dec-poonam_465-310.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/13-dec-poonam_465-310.jpg","width":1938,"height":1292,"caption":"Cloud Threat Hunting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cloud-threat-hunting-tactics-for-enhanced-azure-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cloud Threat Hunting: Tactics for Enhanced Azure Security"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82456"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82456\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82457"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}