{"id":83033,"date":"2025-05-13T09:53:54","date_gmt":"2025-05-13T09:53:54","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83033"},"modified":"2025-06-23T05:39:34","modified_gmt":"2025-06-23T05:39:34","slug":"security-first-culture-with-effective-threat-modeling","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/","title":{"rendered":"Security-First Culture with Effective Threat Modeling"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83033\" class=\"elementor elementor-83033\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c336535 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c336535\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-012887d\" data-id=\"012887d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6079f54 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"6079f54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 9, 2025<\/div><div><strong>Time<\/strong>: 9:00 AM EDT | 8:00 AM CDT | 6:30 PM IST<\/div><div><p><strong>Topic: <\/strong> Security-First Culture with Effective Threat Modeling<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong><\/p><p>Threat modeling provides organizations with a structured methodology to identify, assess, and mitigate threats across digital infrastructures. As an ongoing and collaborative practice, organizations integrate it into security policies and management processes to foster a culture of shared security responsibility across teams and operational units. As the threat landscape continues to evolve, organizations must move beyond checklist-based approaches<\/p><p>and adopt proactive strategies that enable early identification and mitigation of risks before they escalate into security incidents. This webinar explores how to build an effective threat modeling framework that not only integrates with existing security policies but also fosters a security-first work culture across the organization. Attendees will also gain actionable insights to develop a sustainable and effective threat modeling framework for an organization.<br \/><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Impact of the evolving threat landscape on current threat analysis<\/li><li>Best practices to develop a proactive threat modeling framework<\/li><li>Key principles to ensure a security-first mindset across team<\/li><li>Practical strategies to make threat modeling intuitive and repeatable<\/li><li>Real-world examples of scaling threat modeling capabilities<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"alignleft wp-image-59705\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/shervinevans-1029802-scaled.jpg\" alt=\"Shervin Evans, Founder &amp; CEO of 21st Century Cybersecurity\" width=\"192\" height=\"256\" \/><strong> Shervin Evans,<\/strong> Founder &amp; CEO of 21st Century Cybersecurity<\/p><p><strong>Bio:\u00a0<\/strong>Shervin Evans is a seasoned ICT expert with 30 years of experience in the financial services sector. He specializes in programming, infrastructure design, cybersecurity, ethical hacking, incident management, disaster recovery, and digital forensics. With a master\u2019s degree in cybersecurity and multiple ICT certifications, Shervin serves as an executive member of CyberEdBoard, the CISO Society, the BFSB Fintech Working Group, and the Cybersecurity Breakfast Club Florida Chapter. As a distinguished Toastmaster and Rotarian, he is dedicated to advancing ICT risk management and promoting thought leadership in cybersecurity, all while actively contributing to industry innovation and resilience.<\/p><\/div><div id=\"attend\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Y830jUh17UQ?si=RMh66gXDDuoN8cBh\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 9, 2025Time: 9:00 AM EDT | 8:00 AM CDT | 6:30 PM IST Topic: Security-First Culture with Effective Threat Modeling Watch Now Abstract: Threat modeling provides organizations with a structured methodology to identify, assess, and mitigate threats across digital infrastructures. As an ongoing and collaborative practice, organizations integrate it into security policies and&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83033","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Build a Strong Threat Modeling Culture for Enhanced Cybersecurity<\/title>\n<meta name=\"description\" content=\"Discover how to build an effective threat modeling framework, enable a security-first culture, and gain actionable insights for proactive, scalable security strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security-First Culture with Effective Threat Modeling\" \/>\n<meta property=\"og:description\" content=\"Discover how to build an effective threat modeling framework, enable a security-first culture, and gain actionable insights for proactive, scalable security strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-13T09:53:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-23T05:39:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Security-First Culture with Effective Threat Modeling\",\"datePublished\":\"2025-05-13T09:53:54+00:00\",\"dateModified\":\"2025-06-23T05:39:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/\"},\"wordCount\":300,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/\",\"name\":\"Build a Strong Threat Modeling Culture for Enhanced Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg\",\"datePublished\":\"2025-05-13T09:53:54+00:00\",\"dateModified\":\"2025-06-23T05:39:34+00:00\",\"description\":\"Discover how to build an effective threat modeling framework, enable a security-first culture, and gain actionable insights for proactive, scalable security strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/security-first-culture-with-effective-threat-modeling\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Security-First Culture with Effective Threat Modeling\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Build a Strong Threat Modeling Culture for Enhanced Cybersecurity","description":"Discover how to build an effective threat modeling framework, enable a security-first culture, and gain actionable insights for proactive, scalable security strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/","og_locale":"en_US","og_type":"article","og_title":"Security-First Culture with Effective Threat Modeling","og_description":"Discover how to build an effective threat modeling framework, enable a security-first culture, and gain actionable insights for proactive, scalable security strategies.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-05-13T09:53:54+00:00","article_modified_time":"2025-06-23T05:39:34+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Security-First Culture with Effective Threat Modeling","datePublished":"2025-05-13T09:53:54+00:00","dateModified":"2025-06-23T05:39:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/"},"wordCount":300,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/","name":"Build a Strong Threat Modeling Culture for Enhanced Cybersecurity","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg","datePublished":"2025-05-13T09:53:54+00:00","dateModified":"2025-06-23T05:39:34+00:00","description":"Discover how to build an effective threat modeling framework, enable a security-first culture, and gain actionable insights for proactive, scalable security strategies.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Create-a-proactive-threat-modeling-culture-for-stronger-cybersecurity.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/security-first-culture-with-effective-threat-modeling\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Security-First Culture with Effective Threat Modeling"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83033"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83033\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83034"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}