{"id":82689,"date":"2025-01-16T13:43:00","date_gmt":"2025-01-16T13:43:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82689"},"modified":"2025-01-22T05:48:10","modified_gmt":"2025-01-22T05:48:10","slug":"generative-ai-threat-intelligence-incident-response","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/","title":{"rendered":"Generative AI for Proactive Threat Intelligence and Swift Incident Response\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82689\" class=\"elementor elementor-82689\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e754838 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e754838\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f59bec9\" data-id=\"f59bec9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-416a02a elementor-widget elementor-widget-text-editor\" data-id=\"416a02a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date<\/strong>: January 16, 2025<br>\n<strong>Time<\/strong>: 8:30 AM EST | 7:30 AM CST | 7:00 PM IST<br>\n<strong>Topic<\/strong>: Generative AI for Proactive Threat Intelligence and Swift Incident Response<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract: <\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> While browsing the internet recently, I came across a story about a security breach in a corporate system involving a well-known tech company that unknowingly fell victim to a sophisticated cyberattack, where attackers used advanced AI tools to generate fake access credentials and bypass security protocols with startling precision. This incident underscores a sobering reality: malicious actors can also weaponize the same technologies designed to protect us. As generative AI evolves, the line between defender and attacker is increasingly blurred, with AI capable of both predicting and preventing cyberattacks while being exploited to orchestrate complex, hard-to-detect assaults. This webinar explores the transformative role of generative AI in cybersecurity, focusing on its ability to predict and prevent threats, automate detection, and streamline response, while also addressing risks such as vulnerabilities within AI models and the critical need for ethical and regulatory oversight. Through practical examples and real-world case studies, attendees will learn how to leverage AI to outpace adversaries, secure AI systems, adhere to evolving regulations, and integrate generative AI into their defence strategies, gaining actionable insights and understanding of its ethical implications.<\/span><\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Learn how generative AI simulates attack scenarios to predict and mitigate cyber threats.<\/li>\n<li>Understand AI&#8217;s role in enhancing anomaly detection, automating threat hunting, and speeding up incident response.<\/li>\n<li>Explore challenges posed by generative AI and best practices for securing sensitive data.<\/li>\n<li>Examine ethical and regulatory considerations for AI in cybersecurity.<\/li>\n<li>Discover case studies showing how businesses use AI to improve security.<\/li>\n<li>Gain actionable insights for integrating generative AI into your strategies.<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\" wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/Loveleen.png\" alt=\" Dr. Loveleen Gaur\" width=\"192\" height=\"256\"><strong> Dr. Loveleen Gaur,<\/strong>Adjunct Professor at the University of South Pacific, Fiji<\/p>\n<p><strong>Bio:<\/strong> Dr. Loveleen Gaur is an Adjunct Professor at the University of South Pacific, Fiji, and serves as visiting faculty at IMT CDL, Ghaziabad. Previously a Professor at Amity University, India, she has mentored numerous PhD and postgraduate students in Artificial Intelligence and Data Analytics for business and healthcare. Under her leadership, the AI\/Data Analytics research cluster has produced impactful publications and fostered global collaborations.<\/p>\n<p>Recognized among the <strong>World\u2019s Top 2% Scientists by Elsevier-Stanford in 2024<\/strong>, Dr. Gaur is a Senior Member of IEEE, boasting numerous high-indexed publications and holding multiple patents and copyrights.<\/p>\n<p>A sought-after speaker at international conferences, Dr. Gaur frequently delivers webinars and chairs technical sessions. Her expertise spans Generative AI, Artificial Intelligence, Machine Learning, Image Processing, and Data Analytics. Additionally, she serves as a reviewer for leading academic journals.<\/p>\n<p>Throughout her distinguished career, Dr. Gaur has been honored with several esteemed national and international accolades, recognizing her transformative impact on research and education.<\/p>\n<p>&nbsp;<\/p>\n<a name=\"attend\"><\/a>\n\n<iframe src=\"https:\/\/www.youtube.com\/embed\/vEgWBHxonjg?si=_4s2LpQ2ZN9dZOSH\" width=\"560\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\">\n<\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: January 16, 2025 Time: 8:30 AM EST | 7:30 AM CST | 7:00 PM IST Topic: Generative AI for Proactive Threat Intelligence and Swift Incident Response Watch Now Abstract: While browsing the internet recently, I came across a story about a security breach in a corporate system involving a well-known tech company that unknowingly&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82690,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82689","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strengthening Cybersecurity with Generative AI: Threat Hunting, Incident Response, and Data Protection<\/title>\n<meta name=\"description\" content=\"Discover how generative AI enhances threat intelligence, automates threat hunting, and accelerates incident response, offering robust strategies for data protection and security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Generative AI for Proactive Threat Intelligence and Swift Incident Response\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover how generative AI enhances threat intelligence, automates threat hunting, and accelerates incident response, offering robust strategies for data protection and security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-16T13:43:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-22T05:48:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Generative AI for Proactive Threat Intelligence and Swift Incident Response\u00a0\",\"datePublished\":\"2025-01-16T13:43:00+00:00\",\"dateModified\":\"2025-01-22T05:48:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/\"},\"wordCount\":461,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-2.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/\",\"name\":\"Strengthening Cybersecurity with Generative AI: Threat Hunting, Incident Response, and Data Protection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-2.png\",\"datePublished\":\"2025-01-16T13:43:00+00:00\",\"dateModified\":\"2025-01-22T05:48:10+00:00\",\"description\":\"Discover how generative AI enhances threat intelligence, automates threat hunting, and accelerates incident response, offering robust strategies for data protection and security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-2.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-2.png\",\"width\":931,\"height\":620,\"caption\":\"Generative AI improving threat intelligence and incident response through predictive insights\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/generative-ai-threat-intelligence-incident-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Generative AI for Proactive Threat Intelligence and Swift Incident Response\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthening Cybersecurity with Generative AI: Threat Hunting, Incident Response, and Data Protection","description":"Discover how generative AI enhances threat intelligence, automates threat hunting, and accelerates incident response, offering robust strategies for data protection and security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/","og_locale":"en_US","og_type":"article","og_title":"Generative AI for Proactive Threat Intelligence and Swift Incident Response\u00a0","og_description":"Discover how generative AI enhances threat intelligence, automates threat hunting, and accelerates incident response, offering robust strategies for data protection and security.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-01-16T13:43:00+00:00","article_modified_time":"2025-01-22T05:48:10+00:00","og_image":[{"width":931,"height":620,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-2.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Generative AI for Proactive Threat Intelligence and Swift Incident Response\u00a0","datePublished":"2025-01-16T13:43:00+00:00","dateModified":"2025-01-22T05:48:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/"},"wordCount":461,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-2.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/","name":"Strengthening Cybersecurity with Generative AI: Threat Hunting, Incident Response, and Data Protection","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-2.png","datePublished":"2025-01-16T13:43:00+00:00","dateModified":"2025-01-22T05:48:10+00:00","description":"Discover how generative AI enhances threat intelligence, automates threat hunting, and accelerates incident response, offering robust strategies for data protection and security.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-2.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-2.png","width":931,"height":620,"caption":"Generative AI improving threat intelligence and incident response through predictive insights"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/generative-ai-threat-intelligence-incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Generative AI for Proactive Threat Intelligence and Swift Incident Response\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82689"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82689\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82690"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}