{"id":82697,"date":"2025-01-17T10:10:00","date_gmt":"2025-01-17T10:10:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82697"},"modified":"2025-01-22T12:04:42","modified_gmt":"2025-01-22T12:04:42","slug":"modern-threat-intelligence-proactive-threat-hunting-incident-response","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/","title":{"rendered":"Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82697\" class=\"elementor elementor-82697\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a145ffe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a145ffe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a252727\" data-id=\"a252727\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4c8b749 elementor-widget elementor-widget-text-editor\" data-id=\"4c8b749\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date<\/strong>: January 17, 2025<br>\n<strong>Time<\/strong>: 3:30 PM EET | 7:30 AM CST | 7:00 PM IST<br>\n<strong>Topic<\/strong>: Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract: <\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\"> Technological advancements in the digital landscape have brought immense benefits to businesses but have simultaneously enabled threat actors to increase the sophistication and scale of cyberattacks. To combat these evolving risks, organizations must leverage cutting-edge threat intelligence that focuses on mitigating risks through proactive threat hunting and advanced identification techniques. This webinar will delve into current trends in the threat landscape and explore how modern threat intelligence has evolved to support proactive risk mitigation and incident response. Attendees will learn strategies to operationalize threat intelligence across multifaceted security operations, effectively leveraging tools like AI and ML to enhance threat detection and prediction. Gain actionable insights into building a robust threat intelligence program and defending against adversaries with the latest strategies and technologies.<\/span><\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>The state of the current threat landscape and emerging attack vectors<\/li>\n<li>Industry standards and methods for integrating threat intelligence<\/li>\n<li>Steps to develop a robust and advanced threat intelligence program<\/li>\n<li>Operationalizing threat intelligence across various security operation capabilities<\/li>\n<li>The role of AI and ML in enhancing threat detection and prediction<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\" wp-image-59705 alignleft\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2024\/07\/GeorgeDobrea.png\" alt=\" George Dobrea\" width=\"192\" height=\"256\"><strong> George Dobrea,<\/strong>Co-founder and CEO of XEDUCO Institute<\/p>\n<p><strong>Bio:&nbsp;<\/strong>George Dobrea, the Co-founder and CEO of XEDUCO Institute, is a renowned cybersecurity expert and a highly respected technical instructor. With over 35 years of experience, he has delivered consulting services and training programs to military, commercial, and public organizations in more than 30+ countries.<br>\n<a name=\"attend\"><\/a><\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/wcdC6ZbWr8w?si=NZP-4oFoceDxNpMM\" width=\"560\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><br \/>\n<\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: January 17, 2025 Time: 3:30 PM EET | 7:30 AM CST | 7:00 PM IST Topic: Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence Watch Now Abstract: Technological advancements in the digital landscape have brought immense benefits to businesses but have simultaneously enabled threat actors to increase the sophistication and scale of&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82698,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82697","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Master Threat Intelligence, Threat Hunting, and Incident Response to Secure Data<\/title>\n<meta name=\"description\" content=\"Explore modern threat intelligence, proactive threat hunting, and incident response strategies to enhance information security and data protection in evolving cyber landscapes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence\" \/>\n<meta property=\"og:description\" content=\"Explore modern threat intelligence, proactive threat hunting, and incident response strategies to enhance information security and data protection in evolving cyber landscapes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-17T10:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-22T12:04:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence\",\"datePublished\":\"2025-01-17T10:10:00+00:00\",\"dateModified\":\"2025-01-22T12:04:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/\"},\"wordCount\":261,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-100-2.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/\",\"name\":\"Master Threat Intelligence, Threat Hunting, and Incident Response to Secure Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-100-2.jpg\",\"datePublished\":\"2025-01-17T10:10:00+00:00\",\"dateModified\":\"2025-01-22T12:04:42+00:00\",\"description\":\"Explore modern threat intelligence, proactive threat hunting, and incident response strategies to enhance information security and data protection in evolving cyber landscapes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-100-2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/465-310-1@2x-100-2.jpg\",\"width\":931,\"height\":620,\"caption\":\"Cybersecurity webinar on threat intelligence, threat hunting, and incident response\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/modern-threat-intelligence-proactive-threat-hunting-incident-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Master Threat Intelligence, Threat Hunting, and Incident Response to Secure Data","description":"Explore modern threat intelligence, proactive threat hunting, and incident response strategies to enhance information security and data protection in evolving cyber landscapes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/","og_locale":"en_US","og_type":"article","og_title":"Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence","og_description":"Explore modern threat intelligence, proactive threat hunting, and incident response strategies to enhance information security and data protection in evolving cyber landscapes.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-01-17T10:10:00+00:00","article_modified_time":"2025-01-22T12:04:42+00:00","og_image":[{"width":931,"height":620,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100-2.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence","datePublished":"2025-01-17T10:10:00+00:00","dateModified":"2025-01-22T12:04:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/"},"wordCount":261,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100-2.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/","name":"Master Threat Intelligence, Threat Hunting, and Incident Response to Secure Data","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100-2.jpg","datePublished":"2025-01-17T10:10:00+00:00","dateModified":"2025-01-22T12:04:42+00:00","description":"Explore modern threat intelligence, proactive threat hunting, and incident response strategies to enhance information security and data protection in evolving cyber landscapes.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100-2.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/12\/465-310-1@2x-100-2.jpg","width":931,"height":620,"caption":"Cybersecurity webinar on threat intelligence, threat hunting, and incident response"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/modern-threat-intelligence-proactive-threat-hunting-incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Decoding Cyber Threats: A Deep Dive into Modern Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82697"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82697\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82698"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}