{"id":82865,"date":"2025-07-18T04:25:02","date_gmt":"2025-07-18T04:25:02","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82865"},"modified":"2025-07-28T07:03:35","modified_gmt":"2025-07-28T07:03:35","slug":"ethical-hacking-grc-cybersecurity-compliance-webinar","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/","title":{"rendered":"Bridging Ethics and Security: The Impact of Ethical Hacking on GRC\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82865\" class=\"elementor elementor-82865\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7710249 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7710249\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f467ef7\" data-id=\"f467ef7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c36b5e8 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c36b5e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: July 17, 2025<\/div>\n<div><strong>Time<\/strong>: 9:00 AM CDT | 10:00 AM EDT | 7:30 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong>Bridging Ethics and Security: The Impact of Ethical Hacking on GRC<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>Abstract:&nbsp;<\/strong> As organizations navigate an evolving digital landscape, complex cybersecurity measures and infrastructure are required to comply with regulatory norms across the globe. With data security and privacy being primary concerns for individuals and nations worldwide, Governance, Risk, and Compliance (GRC) frameworks play a crucial role in safeguarding data and adhering to regulations. One closely aligned aspect of all risk management mandates is proactive security. Ethical hacking and penetration testing have begun as strategic approaches to strengthen security posture. Ethical hacking enables proactive identification of vulnerabilities and their mitigation before threat actors can exploit them. This webinar aims to explore the impact of ethical hacking practices on GRC metrics and the compliance state of organizations. Join us to understand how leveraging ethical hacking can strengthen cybersecurity posture and maintain ethical compliance.<\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>The role of ethical hacking in risk management<\/li>\n<li>Legal and ethical considerations in ethical hacking<\/li>\n<li>Exploring the GRC landscape across global operations<\/li>\n<li>Integrating ethical hacking into GRC strategies<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\" wp-image-59705 alignleft\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2025\/02\/Kimberly-2.png\" width=\"192\" height=\"256\"><strong> Kimberly KJ Haywood,<\/strong> Governance Risk &amp; Compliance Evangelist | Cybersecurity Adjunct Professor | Author | AI Governance Researcher &amp; Thought Leader | vCAIO<\/p>\n<p><strong>Bio:&nbsp;<\/strong>With over 25 years of experience across finance, technology, healthcare, and government sectors, Ms. Haywood has established and led management and security practices throughout her career, including her firms: Knowledge Management &amp; Associates, Inc. and Nomad Cyber Concepts, LLC. Her expertise in cybersecurity, governance, risk, and compliance has driven successful collaborations with top organizations like USAA, Google, Bank of America, and Wells Fargo. She currently serves on the Board of AI Connex as the global chief governance and education advisor and is an adjunct cybersecurity professor at Collin College in Frisco, TX. Additionally, she contributed to the IAPP\u2019s (a global privacy and governance organization) Artificial Intelligence Governance Professional (AIGP) Practice Exam. She has published articles on AI and is currently co-authoring a white paper on an AI Governance Framework. Her expertise in cybersecurity and governance has earned her international recognition.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/bP3OmgjtOW4?si=Of9h13xAVca6-9le\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: July 17, 2025 Time: 9:00 AM CDT | 10:00 AM EDT | 7:30 PM IST Topic: Bridging Ethics and Security: The Impact of Ethical Hacking on GRC Watch Now Abstract:&nbsp; As organizations navigate an evolving digital landscape, complex cybersecurity measures and infrastructure are required to comply with regulatory norms across the globe. With data&hellip;<\/p>\n","protected":false},"author":18,"featured_media":83302,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82865","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gain Insights into Ethical Hacking &amp; GRC: Strengthening Cybersecurity &amp; Compliance<\/title>\n<meta name=\"description\" content=\"Join our webinar to explore ethical hacking, penetration testing, and GRC strategies for strengthening cybersecurity, risk management, and compliance. Learn how proactive security enhances governance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bridging Ethics and Security: The Impact of Ethical Hacking on GRC\u00a0\" \/>\n<meta property=\"og:description\" content=\"Join our webinar to explore ethical hacking, penetration testing, and GRC strategies for strengthening cybersecurity, risk management, and compliance. Learn how proactive security enhances governance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-18T04:25:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-28T07:03:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/July-17_465x310-Without-RN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"Bridging Ethics and Security: The Impact of Ethical Hacking on GRC\u00a0\",\"datePublished\":\"2025-07-18T04:25:02+00:00\",\"dateModified\":\"2025-07-28T07:03:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/\"},\"wordCount\":359,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/July-17_465x310-Without-RN.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/\",\"name\":\"Gain Insights into Ethical Hacking & GRC: Strengthening Cybersecurity & Compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/July-17_465x310-Without-RN.jpg\",\"datePublished\":\"2025-07-18T04:25:02+00:00\",\"dateModified\":\"2025-07-28T07:03:35+00:00\",\"description\":\"Join our webinar to explore ethical hacking, penetration testing, and GRC strategies for strengthening cybersecurity, risk management, and compliance. Learn how proactive security enhances governance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/July-17_465x310-Without-RN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/July-17_465x310-Without-RN.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ethical-hacking-grc-cybersecurity-compliance-webinar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Bridging Ethics and Security: The Impact of Ethical Hacking on GRC\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gain Insights into Ethical Hacking & GRC: Strengthening Cybersecurity & Compliance","description":"Join our webinar to explore ethical hacking, penetration testing, and GRC strategies for strengthening cybersecurity, risk management, and compliance. Learn how proactive security enhances governance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/","og_locale":"en_US","og_type":"article","og_title":"Bridging Ethics and Security: The Impact of Ethical Hacking on GRC\u00a0","og_description":"Join our webinar to explore ethical hacking, penetration testing, and GRC strategies for strengthening cybersecurity, risk management, and compliance. Learn how proactive security enhances governance.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-07-18T04:25:02+00:00","article_modified_time":"2025-07-28T07:03:35+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/July-17_465x310-Without-RN.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"Bridging Ethics and Security: The Impact of Ethical Hacking on GRC\u00a0","datePublished":"2025-07-18T04:25:02+00:00","dateModified":"2025-07-28T07:03:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/"},"wordCount":359,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/July-17_465x310-Without-RN.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/","name":"Gain Insights into Ethical Hacking & GRC: Strengthening Cybersecurity & Compliance","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/July-17_465x310-Without-RN.jpg","datePublished":"2025-07-18T04:25:02+00:00","dateModified":"2025-07-28T07:03:35+00:00","description":"Join our webinar to explore ethical hacking, penetration testing, and GRC strategies for strengthening cybersecurity, risk management, and compliance. Learn how proactive security enhances governance.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/July-17_465x310-Without-RN.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/July-17_465x310-Without-RN.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ethical-hacking-grc-cybersecurity-compliance-webinar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Bridging Ethics and Security: The Impact of Ethical Hacking on GRC\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82865"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82865\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83302"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}