{"id":82868,"date":"2025-03-17T08:42:48","date_gmt":"2025-03-17T08:42:48","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82868"},"modified":"2025-06-23T05:23:59","modified_gmt":"2025-06-23T05:23:59","slug":"ai-threat-intelligence-women-cybersecurity-careers","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/","title":{"rendered":"AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82868\" class=\"elementor elementor-82868\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ec797d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ec797d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-94d0138\" data-id=\"94d0138\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2d6347 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c2d6347\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: March 11, 2025<\/div><div><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<\/div><div><p><strong>Topic:<\/strong> AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong>As AI adoption accelerates, both the threat landscape and cybersecurity strategies are undergoing a profound transformation, making threat intelligence more critical than ever. Effective threat intelligence requires extensive digital resources and a skilled workforce. However, the cybersecurity industry continues to face a significant gender gap, driving global efforts to create more opportunities for women in the field.<\/p><p>This webinar explores how AI enhances threat intelligence capabilities within organizations and its potential to foster greater inclusion of women in cybersecurity. Additionally, it will examine how AI-driven threat intelligence addresses the challenges of an evolving threat landscape and the ongoing cybersecurity talent shortage.<\/p><p>Join us for an insightful session on emerging threat intelligence trends and career pathways for women looking to excel in cybersecurity.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>AI\u2019s Impact on Threat Intelligence and Cybersecurity Operations<\/li><li>AI-Driven Security in Tackling Workforce Shortages<\/li><li>Emerging career opportunities for women in cybersecurity, including roles as threat analysts and researchers<\/li><li>Essential skills and certifications to break into and excel in threat intelligence<\/li><li>Inspiring Success Stories of Women in AI-Driven Security<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"alignleft wp-image-59705\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2025\/02\/Dr.Loveleen.png\" alt=\"Dr. Loveleen Gaur\" width=\"192\" height=\"256\" \/><strong> Dr. Loveleen Gaur,<\/strong> Adjunct Professor at the University of South Pacific, Fiji<\/p><p><strong>Bio:\u00a0<\/strong>Dr. Loveleen Gaur is an Adjunct Professor at the University of South Pacific, Fiji, and a visiting faculty member at IMT CDL, Ghaziabad. Formerly a Professor at Amity University, India, she has mentored numerous PhD and postgraduate students in Artificial Intelligence and Data Analytics, with a focus on business and healthcare applications. Under her leadership, the AI\/Data Analytics research cluster has produced impactful publications and fostered global collaborations.<\/p><p>Recognized as one of the World\u2019s Top 2% Scientists by Elsevier-Stanford in 2024, Dr. Gaur is a Senior Member of IEEE, with numerous high-indexed publications and multiple patents and copyrights.<\/p><p>A sought-after speaker at international conferences, Dr. Gaur frequently delivers webinars and chairs technical sessions. Her areas of expertise include Generative AI, Artificial Intelligence, Machine Learning, Image Processing, and Data Analytics. She also serves as a reviewer for leading academic journals.<\/p><p>Throughout her distinguished career, Dr. Gaur has received several esteemed national and international accolades, recognizing her transformative impact on research and education.<\/p><\/div><p><iframe id=\"attend\" src=\"https:\/\/www.youtube.com\/embed\/XjK3l-eeQOU\" width=\"560\" height=\"400\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: March 11, 2025Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity Watch Now Abstract: As AI adoption accelerates, both the threat landscape and cybersecurity strategies are undergoing a profound transformation, making threat intelligence more critical than ever. Effective threat intelligence requires extensive&hellip;<\/p>\n","protected":false},"author":18,"featured_media":82873,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82868","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI-Driven Threat Intelligence: How Women Can Thrive in Cybersecurity<\/title>\n<meta name=\"description\" content=\"Explore AI-driven threat intelligence, threat hunting, and cybersecurity careers for women. Learn about threat analysis, data protection, and essential skills for success.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore AI-driven threat intelligence, threat hunting, and cybersecurity careers for women. Learn about threat analysis, data protection, and essential skills for success.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-17T08:42:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-23T05:23:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/463x310@2x-100-3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"927\" \/>\n\t<meta property=\"og:image:height\" content=\"621\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\"},\"headline\":\"AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity\u00a0\",\"datePublished\":\"2025-03-17T08:42:48+00:00\",\"dateModified\":\"2025-06-23T05:23:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/\"},\"wordCount\":377,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/463x310@2x-100-3.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/\",\"name\":\"AI-Driven Threat Intelligence: How Women Can Thrive in Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/463x310@2x-100-3.jpg\",\"datePublished\":\"2025-03-17T08:42:48+00:00\",\"dateModified\":\"2025-06-23T05:23:59+00:00\",\"description\":\"Explore AI-driven threat intelligence, threat hunting, and cybersecurity careers for women. Learn about threat analysis, data protection, and essential skills for success.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/463x310@2x-100-3.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/463x310@2x-100-3.jpg\",\"width\":927,\"height\":621,\"caption\":\"Webinar on AI-driven threat intelligence, cybersecurity careers for women\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-threat-intelligence-women-cybersecurity-careers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/67dac0557c3c41795d310561541917bb\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI-Driven Threat Intelligence: How Women Can Thrive in Cybersecurity","description":"Explore AI-driven threat intelligence, threat hunting, and cybersecurity careers for women. Learn about threat analysis, data protection, and essential skills for success.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/","og_locale":"en_US","og_type":"article","og_title":"AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity\u00a0","og_description":"Explore AI-driven threat intelligence, threat hunting, and cybersecurity careers for women. Learn about threat analysis, data protection, and essential skills for success.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-03-17T08:42:48+00:00","article_modified_time":"2025-06-23T05:23:59+00:00","og_image":[{"width":927,"height":621,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/463x310@2x-100-3.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb"},"headline":"AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity\u00a0","datePublished":"2025-03-17T08:42:48+00:00","dateModified":"2025-06-23T05:23:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/"},"wordCount":377,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/463x310@2x-100-3.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/","name":"AI-Driven Threat Intelligence: How Women Can Thrive in Cybersecurity","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/463x310@2x-100-3.jpg","datePublished":"2025-03-17T08:42:48+00:00","dateModified":"2025-06-23T05:23:59+00:00","description":"Explore AI-driven threat intelligence, threat hunting, and cybersecurity careers for women. Learn about threat analysis, data protection, and essential skills for success.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/463x310@2x-100-3.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/12\/463x310@2x-100-3.jpg","width":927,"height":621,"caption":"Webinar on AI-driven threat intelligence, cybersecurity careers for women"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-threat-intelligence-women-cybersecurity-careers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"AI-Driven Threat Intelligence: Opportunities for Women in Cybersecurity\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/67dac0557c3c41795d310561541917bb","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82868"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82868\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82873"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}