{"id":82757,"date":"2025-02-12T13:16:00","date_gmt":"2025-02-12T13:16:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82757"},"modified":"2025-02-19T10:18:14","modified_gmt":"2025-02-19T10:18:14","slug":"fundamentals-of-information-security-protecting-data","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/","title":{"rendered":"Fundamentals of Information Security: Protecting Data in the Digital Age"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82757\" class=\"elementor elementor-82757\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0845a59 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0845a59\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5583d24\" data-id=\"5583d24\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59d7e60 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"59d7e60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: February 12, 2025<\/div><div><strong>Time<\/strong>: 12:00 AM ACDT | 7:30 AM CST | 7:00 PM IST<\/div><div><p><strong>Topic<\/strong>: Fundamentals of Information Security: Protecting Data in the Digital Age<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:\u00a0<\/strong><span style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Today\u2019s digital information and online data are amongst the most valuable digital assets for businesses operating digitally. This makes digital information a prime target for threat actors who understand its importance for business organizations. The current webinar aims to discuss the current threat landscape and various aspects that pose a threat to data security across the globe. The webinar will highlight various common and trending vulnerabilities within the data storage infrastructure of businesses across various industries and discuss the means to secure it. The webinar will also cover the essential information security concepts, including data protection techniques, authentication, access management, cryptography, incident response, compliance, and regulation. Join us as we discuss the foundational understanding of information security practices and aim to learn actionable steps to strengthen an organization\u2019s data protection framework. <\/span><\/p><p>\u00a0<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Understanding the need to secure digital data<\/li><li>Current vulnerability impacting data and storage security<\/li><li>Information security key concepts and strategies<\/li><li>Regulations, compliance and best practices for digital security<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\" wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/09\/Sentil-Head-Shot-1-1.png\" alt=\" Sentil Velaytham\" width=\"192\" height=\"256\" \/><\/p><p><strong>Sentil Velaytham,<\/strong> Staff Solutions Architect, VMware by Broadcom<\/p><p><strong>Bio:<\/strong> Sentil Velaytham is an esteemed technical strategist who is celebrated for his adeptness in resolving business challenges and enhancing IT frameworks. Throughout his career, Sentil has effectively supported numerous clients in attaining their objectives. He has cultivated strong collaborations with distinguished technology partners like VMware, Microsoft, Druva, AWS, Commvault, Veeam, Cohesity, Rubrik, EMC, NetApp, CISCO, Juniper Networks, Extreme Networks, HP, Nutanix, and others. Acknowledged as an advocate for cloud technology, cybersecurity, and data center practice, he staunchly advocates streamlining technical operations to optimize productivity. Leveraging his profound understanding of these technologies, he addresses complex integration hurdles with refined, efficient, and cost-effective approaches. Driven by a fervent commitment to innovation, Sentil consistently prioritizes team success, establishing himself as a key person of influence in both the technological and business spheres.<\/p><\/div><p><a name=\"attend\"><\/a><\/p><p><iframe src=\"https:\/\/www.youtube.com\/embed\/EBAzFMOWMbw?si=pqlyHAIT27Glf3UD\" width=\"560\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><br \/><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 12, 2025Time: 12:00 AM ACDT | 7:30 AM CST | 7:00 PM IST Topic: Fundamentals of Information Security: Protecting Data in the Digital Age Watch Now Abstract:\u00a0Today\u2019s digital information and online data are amongst the most valuable digital assets for businesses operating digitally. This makes digital information a prime target for threat actors&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82765,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82757","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protecting Data: Fundamentals of Information Security and Cybersecurity<\/title>\n<meta name=\"description\" content=\"Join our webinar to explore the fundamentals of information security, including data protection, access management, cryptography, and incident response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fundamentals of Information Security: Protecting Data in the Digital Age\" \/>\n<meta property=\"og:description\" content=\"Join our webinar to explore the fundamentals of information security, including data protection, access management, cryptography, and incident response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-12T13:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-19T10:18:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Fundamentals of Information Security: Protecting Data in the Digital Age\",\"datePublished\":\"2025-02-12T13:16:00+00:00\",\"dateModified\":\"2025-02-19T10:18:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/\"},\"wordCount\":335,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/465-310-1@2x-100-4.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/\",\"name\":\"Protecting Data: Fundamentals of Information Security and Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/465-310-1@2x-100-4.jpg\",\"datePublished\":\"2025-02-12T13:16:00+00:00\",\"dateModified\":\"2025-02-19T10:18:14+00:00\",\"description\":\"Join our webinar to explore the fundamentals of information security, including data protection, access management, cryptography, and incident response.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/465-310-1@2x-100-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/465-310-1@2x-100-4.jpg\",\"width\":931,\"height\":620,\"caption\":\"Information Security Webinar: Protecting Data and Ensuring Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/fundamentals-of-information-security-protecting-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Fundamentals of Information Security: Protecting Data in the Digital Age\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Data: Fundamentals of Information Security and Cybersecurity","description":"Join our webinar to explore the fundamentals of information security, including data protection, access management, cryptography, and incident response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/","og_locale":"en_US","og_type":"article","og_title":"Fundamentals of Information Security: Protecting Data in the Digital Age","og_description":"Join our webinar to explore the fundamentals of information security, including data protection, access management, cryptography, and incident response.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-02-12T13:16:00+00:00","article_modified_time":"2025-02-19T10:18:14+00:00","og_image":[{"width":931,"height":620,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-4.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Fundamentals of Information Security: Protecting Data in the Digital Age","datePublished":"2025-02-12T13:16:00+00:00","dateModified":"2025-02-19T10:18:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/"},"wordCount":335,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-4.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/","name":"Protecting Data: Fundamentals of Information Security and Cybersecurity","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-4.jpg","datePublished":"2025-02-12T13:16:00+00:00","dateModified":"2025-02-19T10:18:14+00:00","description":"Join our webinar to explore the fundamentals of information security, including data protection, access management, cryptography, and incident response.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-4.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/465-310-1@2x-100-4.jpg","width":931,"height":620,"caption":"Information Security Webinar: Protecting Data and Ensuring Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/fundamentals-of-information-security-protecting-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Fundamentals of Information Security: Protecting Data in the Digital Age"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82757"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82757\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82765"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}