{"id":82629,"date":"2024-12-18T09:59:00","date_gmt":"2024-12-18T09:59:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82629"},"modified":"2025-09-04T17:39:52","modified_gmt":"2025-09-04T17:39:52","slug":"anti-forensics-tactics-exposed-countermeasures-for-digital-investigators","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/","title":{"rendered":"Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators\u00a0\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82629\" class=\"elementor elementor-82629\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ebeceee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ebeceee\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d42c8a9\" data-id=\"d42c8a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9560d75 elementor-widget elementor-widget-text-editor\" data-id=\"9560d75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong> December 18, 2024<br \/><strong>Time:<\/strong> 8:30 AM EST | 7:30 AM CST | 7:00 PM IST<br \/><strong>Topic:<\/strong> Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><br \/><strong>\u00a0<\/strong><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> The current threat landscape is evolving constantly, giving rise to more sophisticated threats and attack vectors. Forensic investigations are not exempt from these influences. As cybercriminals further advance their efforts, the increased use of anti-forensic techniques has become evident. These tactics are designed to help attackers cover their tracks, hinder investigations, and evade detection. Furthermore, such tactics pose significant challenges to digital forensic investigators, who must develop strategies to detect and counter anti-forensics efforts to uncover critical evidence. This webinar aims to explore anti-forensics methods and provide strategies to overcome them. It will delve into both common and advanced anti-forensics techniques used by threat actors as well as the essential tools and methodologies required to navigate the evolving digital forensics landscape.<\/span><\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Understanding anti-forensics techniques and types<\/li><li>Impact of anti-forensics on forensic processes<\/li><li>Tools and techniques for detecting, countering, and mitigating anti-forensics efforts<\/li><li>Best practices for implementing anti-forensic capabilities for investigation<\/li><li>Legal and ethical considerations in dealing with manipulated or obfuscated evidence<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Bennie-Cleveland.jpg\" alt=\"Bennie L. Cleveland Jr.\" width=\"200\" \/><strong>Bennie L. Cleveland Jr.<\/strong>, AVP, Cyber Incident Management<\/p><p><strong>Bio:<\/strong> Bennie L. Cleveland Jr. is a distinguished cybersecurity leader with over two decades of experience in cyber incident management, enterprise security, and risk management. Holding certifications such as the C|HFI, C|CISO, CISM, CISA, CRISC, and CIPM, Bennie has demonstrated exemplary leadership in incident response, forensics, and threat intelligence. His strategic oversight ensures robust compliance and comprehensive security measures.\u202fCurrently serving as AVP of Cyber Incident Management at Chubb, he specializes in identifying high-risk vulnerabilities and mitigating ransomware. Bennie has a proven track record of accelerating incident resolution and enhancing business continuity. He is also a cybersecurity adjunct at Valley Forge Military Academy &amp; College, where he teaches <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/what-is-digital-forensics\/\">digital forensics<\/a>.<br \/><a name=\"attend\"><\/a><\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/jvWwiHx87AY?si=kEsEUjmwKYVcnDM5\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 18, 2024Time: 8:30 AM EST | 7:30 AM CST | 7:00 PM ISTTopic: Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators Watch Now\u00a0 Abstract: The current threat landscape is evolving constantly, giving rise to more sophisticated threats and attack vectors. Forensic investigations are not exempt from these influences. As cybercriminals further advance their efforts,&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82630,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Uncovering Anti-Forensics Tactics in Digital Forensics<\/title>\n<meta name=\"description\" content=\"Uncover anti-forensics tactics used by cybercriminals to evade detection. Learn the tools and strategies to counter these techniques in digital investigations\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"Uncover anti-forensics tactics used by cybercriminals to evade detection. Learn the tools and strategies to counter these techniques in digital investigations\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-18T09:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T17:39:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators\u00a0\u00a0\",\"datePublished\":\"2024-12-18T09:59:00+00:00\",\"dateModified\":\"2025-09-04T17:39:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/\"},\"wordCount\":311,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-100.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/\",\"name\":\"Uncovering Anti-Forensics Tactics in Digital Forensics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-100.jpg\",\"datePublished\":\"2024-12-18T09:59:00+00:00\",\"dateModified\":\"2025-09-04T17:39:52+00:00\",\"description\":\"Uncover anti-forensics tactics used by cybercriminals to evade detection. Learn the tools and strategies to counter these techniques in digital investigations\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-100.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-100.jpg\",\"width\":931,\"height\":620,\"caption\":\"Strengthening Investigations Against Anti-Forensics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Uncovering Anti-Forensics Tactics in Digital Forensics","description":"Uncover anti-forensics tactics used by cybercriminals to evade detection. Learn the tools and strategies to counter these techniques in digital investigations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/","og_locale":"en_US","og_type":"article","og_title":"Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators\u00a0\u00a0","og_description":"Uncover anti-forensics tactics used by cybercriminals to evade detection. Learn the tools and strategies to counter these techniques in digital investigations","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-12-18T09:59:00+00:00","article_modified_time":"2025-09-04T17:39:52+00:00","og_image":[{"width":931,"height":620,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators\u00a0\u00a0","datePublished":"2024-12-18T09:59:00+00:00","dateModified":"2025-09-04T17:39:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/"},"wordCount":311,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/","name":"Uncovering Anti-Forensics Tactics in Digital Forensics","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100.jpg","datePublished":"2024-12-18T09:59:00+00:00","dateModified":"2025-09-04T17:39:52+00:00","description":"Uncover anti-forensics tactics used by cybercriminals to evade detection. Learn the tools and strategies to counter these techniques in digital investigations","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100.jpg","width":931,"height":620,"caption":"Strengthening Investigations Against Anti-Forensics"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anti-forensics-tactics-exposed-countermeasures-for-digital-investigators\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82629"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82629\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82630"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}