{"id":82465,"date":"2024-11-13T10:18:00","date_gmt":"2024-11-13T10:18:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82465"},"modified":"2024-11-19T06:53:05","modified_gmt":"2024-11-19T06:53:05","slug":"ethical-and-secure-ai-governance-in-ai-driven-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/","title":{"rendered":"Ethical and Secure AI: Governance in AI-Driven Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82465\" class=\"elementor elementor-82465\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e5f8a86 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e5f8a86\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-660af20\" data-id=\"660af20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-083fc71 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"083fc71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: November 13, 2024<\/div>\n<div><strong>Time<\/strong>: 8:00 AM CST | 9:00 AM EST | 7:30 PM IST<\/div>\n<div>\n<p><strong>Topic<\/strong>: Ethical and Secure AI: Governance in AI-Driven Cybersecurity<\/p>\n<\/div>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:&nbsp;<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">The rise of AI-driven technology has rapidly transformed business operations and the digital landscape, and cybersecurity is no exception to its influence. Businesses and security teams increasingly depend on AI-driven solutions to detect, prevent, and respond to diverse cyber threats. However, just as businesses use AI to strengthen defenses, threat actors are also leveraging AI-enabled malware and attack vectors to enhance the complexity and effectiveness of their attacks. Though security teams are utilizing AI-enabled solutions to counter AI-driven threats, the expanding influence of AI highlights the need for ethical governance to ensure these systems are secure, fair, and transparent. This webinar explores the intersection of AI, ethics, and cybersecurity, focusing on governance for AI use in security operations. Additionally, participants will learn about the importance of managing and regulating risks associated with AI-driven decision-making for information security.<\/span><\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ul>\n<li>Importance of AI in current cybersecurity efforts<\/li>\n<li>Role of AI in threat detection and mitigation<\/li>\n<li>Ethical considerations in AI for cybersecurity<\/li>\n<li>Ensuring data privacy and integrity in AI algorithms<\/li>\n<li>Governance frameworks for AI security solutions<\/li>\n<li>Mitigating risks of AI misuse in cybersecurity operations<\/li>\n<li>Best practices for responsible AI implementation<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-90385 alignleft\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/Kimberly.jpg \" alt=\"Kimberly\" width=\"237\" height=\"237\"><strong>Kimberly KJ Haywood, <\/strong>Principal CEO, Nomad Cyber Concepts<br>\n<strong>Bio:&nbsp;<\/strong>With over 25 years of experience across finance, technology, healthcare, and government sectors, Ms. Haywood has established and led management and security practices throughout her career, including her firms: Knowledge Management &amp; Associates, Inc. and Nomad Cyber Concepts, LLC. Her expertise in cybersecurity, governance, risk, and compliance has driven successful collaborations with top organizations like USAA, Google, Bank of America, and Wells Fargo. She currently serves on the Board of AI Connex as the global chief governance and education advisor and is an adjunct cybersecurity professor at Collin College in Frisco, TX. Additionally, she contributed to the IAPP\u2019s (a global privacy and governance organization) Artificial Intelligence Governance Professional (AIGP) Practice Exam. She has published articles on AI and is currently co-authoring a white paper on an AI Governance Framework. Her expertise in cybersecurity and governance has earned her international recognition. This October 2024, she is scheduled to present at a prestigious Global Security Summit in Canada.<\/p>\n<a name=\"attend\"><\/a>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/x1rGgbuhSpo?si=sGpLCzqP9SP17lIP\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 13, 2024 Time: 8:00 AM CST | 9:00 AM EST | 7:30 PM IST Topic: Ethical and Secure AI: Governance in AI-Driven Cybersecurity Watch Now Abstract:&nbsp;The rise of AI-driven technology has rapidly transformed business operations and the digital landscape, and cybersecurity is no exception to its influence. Businesses and security teams increasingly depend&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82466,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82465","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ethical AI and Cybersecurity: Establishing Governance for a Secure Future<\/title>\n<meta name=\"description\" content=\"Discover the importance of governance in AI-driven cybersecurity. Learn the best strategies for AI implementation and mitigating threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethical and Secure AI: Governance in AI-Driven Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Discover the importance of governance in AI-driven cybersecurity. Learn the best strategies for AI implementation and mitigating threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-13T10:18:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-19T06:53:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-29.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Ethical and Secure AI: Governance in AI-Driven Cybersecurity\",\"datePublished\":\"2024-11-13T10:18:00+00:00\",\"dateModified\":\"2024-11-19T06:53:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/\"},\"wordCount\":384,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-29.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/\",\"name\":\"Ethical AI and Cybersecurity: Establishing Governance for a Secure Future\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-29.png\",\"datePublished\":\"2024-11-13T10:18:00+00:00\",\"dateModified\":\"2024-11-19T06:53:05+00:00\",\"description\":\"Discover the importance of governance in AI-driven cybersecurity. Learn the best strategies for AI implementation and mitigating threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-29.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/465-310-1-29.png\",\"width\":1396,\"height\":930,\"caption\":\"Ethical and Secure AI\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Ethical and Secure AI: Governance in AI-Driven Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ethical AI and Cybersecurity: Establishing Governance for a Secure Future","description":"Discover the importance of governance in AI-driven cybersecurity. Learn the best strategies for AI implementation and mitigating threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Ethical and Secure AI: Governance in AI-Driven Cybersecurity","og_description":"Discover the importance of governance in AI-driven cybersecurity. Learn the best strategies for AI implementation and mitigating threats.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-11-13T10:18:00+00:00","article_modified_time":"2024-11-19T06:53:05+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-29.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Ethical and Secure AI: Governance in AI-Driven Cybersecurity","datePublished":"2024-11-13T10:18:00+00:00","dateModified":"2024-11-19T06:53:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/"},"wordCount":384,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-29.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/","name":"Ethical AI and Cybersecurity: Establishing Governance for a Secure Future","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-29.png","datePublished":"2024-11-13T10:18:00+00:00","dateModified":"2024-11-19T06:53:05+00:00","description":"Discover the importance of governance in AI-driven cybersecurity. Learn the best strategies for AI implementation and mitigating threats.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-29.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/10\/465-310-1-29.png","width":1396,"height":930,"caption":"Ethical and Secure AI"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-and-secure-ai-governance-in-ai-driven-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Ethical and Secure AI: Governance in AI-Driven Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82465"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82465\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82466"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}