{"id":82965,"date":"2025-04-23T12:33:00","date_gmt":"2025-04-23T12:33:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82965"},"modified":"2025-07-29T05:03:54","modified_gmt":"2025-07-29T05:03:54","slug":"strategic-insights-from-a-ciso-career-insights-and-strategic-decisions","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/","title":{"rendered":"Strategic Insights from a CISO: Career Insights and Strategic Decisions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82965\" class=\"elementor elementor-82965\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f92cd94 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f92cd94\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ef46c44\" data-id=\"ef46c44\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea24236 elementor-widget elementor-widget-text-editor\" data-id=\"ea24236\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: April 23, 2025<\/div>\n<div><strong>Time<\/strong>: 1:30 PM BST | 8:30 AM EDT | 6:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Strategic Insights from a CISO: Career Insights and Strategic Decisions<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"blank\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong><br \/>As modern threats continue to evolve rapidly, the role of a Chief Information Security Officer (CISO) in protecting an organization&#8217;s information assets has never been more critical. However, the path to a CISO career is filled with challenges, pivotal moments, and valuable lessons. This webinar explores the career path of cybersecurity professionals aspiring to the CISO role and beyond, offering insights from Helen Rabe, a senior CISO ranked among the top 10 in EMEA and the top 100 globally. With a proven track record in designing, implementing, and maturing tailored information security management system (ISMS) strategies, Helen takes a strategic approach to security\u2014aligning it with business objectives to ensure seamless and secure operations. Through Helen&#8217;s experiences, attendees will gain a firsthand understanding of the responsibilities, challenges, and rewards of the CISO role. She will also share her perspectives on the evolving threat landscape and the security capabilities necessary to enable resilient business operations.<\/p>\n<p><strong>Key Takeaways:\u00a0<\/strong><\/p>\n<ul>\n<li>Defining the CISO&#8217;s role within a dynamic and evolving threat landscape<\/li>\n<li>Navigating an atypical CISO journey from IT to cybersecurity<\/li>\n<li>Balancing business objectives with security priorities from a CISO&#8217;s perspective<\/li>\n<li>Strengthening security posture through emerging technologies<\/li>\n<li>Building a culture of security awareness and accountability<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/Helen-Rabe.jpg\" width=\"192\" height=\"256\" \/><strong> Helen Rabe,<\/strong> CISO for BBC<\/p>\n<p><strong>Bio:\u00a0<\/strong>Helen is a seasoned cybersecurity leader known for being a strong advocate for aligning security with business objectives. She emphasizes a forward-thinking perspective, ensuring security strategies support both current business operations and future business goals. A versatile security leader who clearly communicates complex strategies across all levels of the organization\u2014including the Board\u2014Helen has successfully delivered programs that fostered high adoption of security behaviors across organizations.<\/p>\n<p>Helen has successfully developed, implemented, and refined ISMS strategies. She has led high-performing teams in implementing strategic risk mitigation, threat management, and the delivery of world-class security and data privacy solutions across varied industry sectors, including financial services, life sciences, and most recently, broadcasting and media.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\n<iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/UYtFVIkjNho?si=fJN6amZk-ZWLTZKx\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 23, 2025 Time: 1:30 PM BST | 8:30 AM EDT | 6:00 PM IST Topic: Strategic Insights from a CISO: Career Insights and Strategic Decisions Register Abstract: As modern threats continue to evolve rapidly, the role of a Chief Information Security Officer (CISO) in protecting an organization&#8217;s information assets has never been more&hellip;<\/p>\n","protected":false},"author":32,"featured_media":82963,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-82965","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CISO Career: Its Role in Balancing Security with Business Objectives<\/title>\n<meta name=\"description\" content=\"Discover the path to a CISO career with insights from a globally ranked CISO. Learn about implementing security strategies that align with business objectives.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strategic Insights from a CISO: Career Insights and Strategic Decisions\" \/>\n<meta property=\"og:description\" content=\"Discover the path to a CISO career with insights from a globally ranked CISO. Learn about implementing security strategies that align with business objectives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-23T12:33:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T05:03:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/23-April_465x310-03.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Strategic Insights from a CISO: Career Insights and Strategic Decisions\",\"datePublished\":\"2025-04-23T12:33:00+00:00\",\"dateModified\":\"2025-07-29T05:03:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/\"},\"wordCount\":356,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/23-April_465x310-03.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/\",\"name\":\"CISO Career: Its Role in Balancing Security with Business Objectives\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/23-April_465x310-03.jpg\",\"datePublished\":\"2025-04-23T12:33:00+00:00\",\"dateModified\":\"2025-07-29T05:03:54+00:00\",\"description\":\"Discover the path to a CISO career with insights from a globally ranked CISO. Learn about implementing security strategies that align with business objectives.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/23-April_465x310-03.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/23-April_465x310-03.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Strategic Insights from a CISO: Career Insights and Strategic Decisions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO Career: Its Role in Balancing Security with Business Objectives","description":"Discover the path to a CISO career with insights from a globally ranked CISO. Learn about implementing security strategies that align with business objectives.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/","og_locale":"en_US","og_type":"article","og_title":"Strategic Insights from a CISO: Career Insights and Strategic Decisions","og_description":"Discover the path to a CISO career with insights from a globally ranked CISO. Learn about implementing security strategies that align with business objectives.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-04-23T12:33:00+00:00","article_modified_time":"2025-07-29T05:03:54+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/23-April_465x310-03.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Strategic Insights from a CISO: Career Insights and Strategic Decisions","datePublished":"2025-04-23T12:33:00+00:00","dateModified":"2025-07-29T05:03:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/"},"wordCount":356,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/23-April_465x310-03.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/","name":"CISO Career: Its Role in Balancing Security with Business Objectives","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/23-April_465x310-03.jpg","datePublished":"2025-04-23T12:33:00+00:00","dateModified":"2025-07-29T05:03:54+00:00","description":"Discover the path to a CISO career with insights from a globally ranked CISO. Learn about implementing security strategies that align with business objectives.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/23-April_465x310-03.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/03\/23-April_465x310-03.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/strategic-insights-from-a-ciso-career-insights-and-strategic-decisions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Strategic Insights from a CISO: Career Insights and Strategic Decisions"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82965"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82965\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82963"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}