{"id":82543,"date":"2024-12-09T10:21:00","date_gmt":"2024-12-09T10:21:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82543"},"modified":"2025-09-05T17:25:38","modified_gmt":"2025-09-05T17:25:38","slug":"building-a-cloud-security-strategy-with-actionable-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/","title":{"rendered":"Building a Cloud Security Strategy with Actionable Threat Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82543\" class=\"elementor elementor-82543\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f4246d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f4246d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f168ef\" data-id=\"1f168ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a845d99 elementor-widget elementor-widget-text-editor\" data-id=\"a845d99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong> December 9, 2024<br \/><strong>Time:<\/strong> 12:30 AM AEDT | 8:30 AM EST | 7:00 PM IST<br \/><strong>Topic:<\/strong> Building a Cloud Security Strategy with Actionable Threat Intelligence<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><strong>\u00a0<\/strong><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:\u00a0<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">With the increased migration of business processes to cloud solutions, cloud environments have become prime targets for cybercriminals, making cloud security paramount. Enhancing security in the cloud demands robust, adaptive, and proactive security measures, which are complemented by actionable threat intelligence. Real-time threat intelligence-driven security capabilities allow businesses to detect trending and sophisticated threats more effectively and implement appropriate protection and response strategies.<\/span><\/p><p>This webinar is designed to provide practical insights into developing and implementing proactive threat intelligence for the cloud, as well as the key components of a comprehensive security strategy for virtual environments. Attendees will also learn how a well-structured <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cloud-security\/best-cloud-security-certifications\/\">cloud security<\/a> strategy, guided by actionable threat intelligence, can provide businesses with a competitive edge in the fight against cyber threats and safeguard their critical assets in the virtual realm.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Understanding key cloud security challenges<\/li><li>Role of threat intelligence in strengthening cloud security posture<\/li><li>Integrating real-time threat intelligence into the cloud incident response framework<\/li><li>Leveraging automation and advanced analytics for improved threat detection in the cloud<\/li><li>Proactive threat intelligence best practices for cloud<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Sentil-Head-Shot-1-1.png\" alt=\"Sentil Velaytham\" width=\"200\" \/><strong>Sentil Velaytham<\/strong>, Staff Solutions Architect, VMware by Broadcom<\/p><p><strong>Bio:<\/strong> Sentil Velaytham is an esteemed technical strategist who is celebrated for his adeptness in resolving business challenges and enhancing IT frameworks. Throughout his career, Sentil has effectively supported numerous clients in attaining their objectives. He has cultivated strong collaborations with distinguished technology partners like VMware, Microsoft, Druva, AWS, Commvault, Veeam, Cohesity, Rubrik, EMC, NetApp, CISCO, Juniper Networks, Extreme Networks, HP, Nutanix, and others. Acknowledged as an advocate for cloud technology, cybersecurity, and data center practice, he staunchly advocates streamlining technical operations to optimize productivity. Leveraging his profound understanding of these technologies, he addresses complex integration hurdles with refined, efficient, and cost-effective approaches. Driven by a fervent commitment to innovation, Sentil consistently prioritizes team success, establishing himself as a key person of influence in both the technological and business spheres.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/lElzPW0hw4Y?si=r9McoMFOda1EXybL\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 9, 2024Time: 12:30 AM AEDT | 8:30 AM EST | 7:00 PM ISTTopic: Building a Cloud Security Strategy with Actionable Threat Intelligence Watch Now\u00a0 Abstract:\u00a0With the increased migration of business processes to cloud solutions, cloud environments have become prime targets for cybercriminals, making cloud security paramount. Enhancing security in the cloud demands robust,&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82544,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82543","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Leveraging Threat Intelligence for Strengthening Cloud Security<\/title>\n<meta name=\"description\" content=\"Learn to build a robust cloud security strategy with actionable threat intelligence. Explore proactive measures, real-time insights, and best practices to safeguard assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building a Cloud Security Strategy with Actionable Threat Intelligence\" \/>\n<meta property=\"og:description\" content=\"Learn to build a robust cloud security strategy with actionable threat intelligence. Explore proactive measures, real-time insights, and best practices to safeguard assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-09T10:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-05T17:25:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/465-310-1-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Building a Cloud Security Strategy with Actionable Threat Intelligence\",\"datePublished\":\"2024-12-09T10:21:00+00:00\",\"dateModified\":\"2025-09-05T17:25:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/\"},\"wordCount\":368,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/465-310-1-2.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/\",\"name\":\"Leveraging Threat Intelligence for Strengthening Cloud Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/465-310-1-2.png\",\"datePublished\":\"2024-12-09T10:21:00+00:00\",\"dateModified\":\"2025-09-05T17:25:38+00:00\",\"description\":\"Learn to build a robust cloud security strategy with actionable threat intelligence. Explore proactive measures, real-time insights, and best practices to safeguard assets.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/465-310-1-2.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/465-310-1-2.png\",\"width\":1000,\"height\":666,\"caption\":\"Cloud Security Strategy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Building a Cloud Security Strategy with Actionable Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Leveraging Threat Intelligence for Strengthening Cloud Security","description":"Learn to build a robust cloud security strategy with actionable threat intelligence. Explore proactive measures, real-time insights, and best practices to safeguard assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Building a Cloud Security Strategy with Actionable Threat Intelligence","og_description":"Learn to build a robust cloud security strategy with actionable threat intelligence. Explore proactive measures, real-time insights, and best practices to safeguard assets.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-12-09T10:21:00+00:00","article_modified_time":"2025-09-05T17:25:38+00:00","og_image":[{"width":1000,"height":666,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/465-310-1-2.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Building a Cloud Security Strategy with Actionable Threat Intelligence","datePublished":"2024-12-09T10:21:00+00:00","dateModified":"2025-09-05T17:25:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/"},"wordCount":368,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/465-310-1-2.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/","name":"Leveraging Threat Intelligence for Strengthening Cloud Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/465-310-1-2.png","datePublished":"2024-12-09T10:21:00+00:00","dateModified":"2025-09-05T17:25:38+00:00","description":"Learn to build a robust cloud security strategy with actionable threat intelligence. Explore proactive measures, real-time insights, and best practices to safeguard assets.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/465-310-1-2.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/11\/465-310-1-2.png","width":1000,"height":666,"caption":"Cloud Security Strategy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/building-a-cloud-security-strategy-with-actionable-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Building a Cloud Security Strategy with Actionable Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82543"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82543\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82544"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82543"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82543"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}