{"id":83044,"date":"2025-05-26T07:43:43","date_gmt":"2025-05-26T07:43:43","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83044"},"modified":"2026-01-27T08:59:29","modified_gmt":"2026-01-27T08:59:29","slug":"from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/","title":{"rendered":"From Reactive to Proactive: Using AI to Strengthen Ethical Hacking Strategies\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83044\" class=\"elementor elementor-83044\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08ccf41 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"08ccf41\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9181085\" data-id=\"9181085\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-759cf7d elementor-widget elementor-widget-text-editor\" data-id=\"759cf7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> May 22, 2025<br \/><strong>Time:<\/strong>8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST<br \/><strong>Topic:<\/strong> From Reactive to Proactive: Using AI to Strengthen Ethical Hacking<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> As cyberattackers incorporate advanced technologies for their hacking efforts, security strategies must evolve from reactive to proactive to keep pace. With current cybersecurity capabilities struggling to defend against sophisticated attack vectors, AI-driven proactive security offers a viable path to advance security capabilities. This fourth session of the CEH webinar series will explore how AI-driven strategies elevate ethical hacking from reactive to proactive\u2014empowering ethical hackers to identify, detect, and mitigate vulnerabilities before they can be exploited. The webinar will also focus on the role of AI-driven ethical hacking techniques in uncovering hidden risks, improving accuracy in penetration testing, and enabling adaptation against dynamic threats. Attendees will also learn about the latest advancements in AI-driven threat detection, vulnerability scanning, and attack surface management.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Challenges of reactive security approaches<\/li><li>Role of AI-driven tools in streamlining vulnerability assessments<\/li><li>Role of AI in identifying potential threats in real-time<\/li><li>Best practices for integrating AI into ethical hacking workflows<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Don_Warden-II.png\" alt=\"Irene Corpuz\" width=\"200\" \/><strong>Don Warden II<\/strong>,Director of Incident Response, Cyber Guards<\/p><p><strong>Bio:<\/strong>Don Warden is a cybersecurity leader with over 30 years of experience in defending and securing complex environments across multiple industries. His extensive background spans digital forensics, cyber threat intelligence, and incident response, wherein he has handled high-stakes cases involving ransomware, insider threats, and cyber extortion. A trusted advisor on cybersecurity strategy, Don has guided organizations through threat mitigation and recovery while ensuring compliance with frameworks like the Cybersecurity Maturity Model Certification (CMMC). Holding advanced certifications, including Certified Ethical Hacker (C|EH) and <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/\">Certified Cyber Security Analyst (CCSA)<\/a>, along with a Master\u2019s in Cybersecurity and Information Assurance, Don brings a seasoned perspective to AI-powered cybersecurity and ethical hacking innovations.<br \/><a name=\"attend\"><\/a><br \/><iframe title=\"Integrating Security in the CI\/CD Pipeline\" src=\"https:\/\/www.youtube.com\/embed\/yo4Aeu731IM?si=jadWTHvevEAdMQZy\" width=\"825\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 22, 2025Time:8:30 AM CDT | 9:30 AM EDT | 7:00 PM ISTTopic: From Reactive to Proactive: Using AI to Strengthen Ethical Hacking Watch Now Abstract: As cyberattackers incorporate advanced technologies for their hacking efforts, security strategies must evolve from reactive to proactive to keep pace. With current cybersecurity capabilities struggling to defend against&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83045,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83044","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>From Reactive to Proactive: Enhance Ethical Hacking Strategies with A<\/title>\n<meta name=\"description\" content=\"Learn how AI-driven strategies transform ethical hacking, enhance proactive threat detection, vulnerability scanning, and penetration testing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Reactive to Proactive: Using AI to Strengthen Ethical Hacking Strategies\u00a0\" \/>\n<meta property=\"og:description\" content=\"Learn how AI-driven strategies transform ethical hacking, enhance proactive threat detection, vulnerability scanning, and penetration testing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-26T07:43:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T08:59:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"From Reactive to Proactive: Using AI to Strengthen Ethical Hacking Strategies\u00a0\",\"datePublished\":\"2025-05-26T07:43:43+00:00\",\"dateModified\":\"2026-01-27T08:59:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/\"},\"wordCount\":309,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/\",\"name\":\"From Reactive to Proactive: Enhance Ethical Hacking Strategies with A\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg\",\"datePublished\":\"2025-05-26T07:43:43+00:00\",\"dateModified\":\"2026-01-27T08:59:29+00:00\",\"description\":\"Learn how AI-driven strategies transform ethical hacking, enhance proactive threat detection, vulnerability scanning, and penetration testing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From Reactive to Proactive: Using AI to Strengthen Ethical Hacking Strategies\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"From Reactive to Proactive: Enhance Ethical Hacking Strategies with A","description":"Learn how AI-driven strategies transform ethical hacking, enhance proactive threat detection, vulnerability scanning, and penetration testing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/","og_locale":"en_US","og_type":"article","og_title":"From Reactive to Proactive: Using AI to Strengthen Ethical Hacking Strategies\u00a0","og_description":"Learn how AI-driven strategies transform ethical hacking, enhance proactive threat detection, vulnerability scanning, and penetration testing.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-05-26T07:43:43+00:00","article_modified_time":"2026-01-27T08:59:29+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"From Reactive to Proactive: Using AI to Strengthen Ethical Hacking Strategies\u00a0","datePublished":"2025-05-26T07:43:43+00:00","dateModified":"2026-01-27T08:59:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/"},"wordCount":309,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/","name":"From Reactive to Proactive: Enhance Ethical Hacking Strategies with A","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg","datePublished":"2025-05-26T07:43:43+00:00","dateModified":"2026-01-27T08:59:29+00:00","description":"Learn how AI-driven strategies transform ethical hacking, enhance proactive threat detection, vulnerability scanning, and penetration testing.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/AI-powered-ethical-hacking-strategies-for-proactive-cybersecurity.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-proactive-using-ai-to-strengthen-ethical-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"From Reactive to Proactive: Using AI to Strengthen Ethical Hacking Strategies\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83044"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83044\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83045"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}