{"id":83048,"date":"2025-05-28T15:47:00","date_gmt":"2025-05-28T15:47:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83048"},"modified":"2025-06-24T13:59:44","modified_gmt":"2025-06-24T13:59:44","slug":"from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/","title":{"rendered":"From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83048\" class=\"elementor elementor-83048\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-369a15b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"369a15b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f23804c\" data-id=\"f23804c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-149857a elementor-widget elementor-widget-text-editor\" data-id=\"149857a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> May 27, 2025<br \/><strong>Time:<\/strong> 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<br \/><strong>Topic:<\/strong> From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract:<\/strong><br \/>The number of critical vulnerabilities increased by 38% in 2024 (Gamblin, 2025), and the trend doesn&#8217;t appear likely to reverse any time soon. Security has an interesting problem when it comes to planning. On the one hand, cybersecurity professionals are supposed to look into the future and predict what the organization is going to be exposed to from a threat perspective, and yet, in practice, almost everything they do in the day-to-day operations of security is focused on preventing change. Cybersecurity professionals need to have an effective strategic plan to build a security environment that not only protects the organization but also enables it to adapt and thrive in today&#8217;s highly volatile and uncertain threat environment. Doing this in practice will require challenging some of the most fundamental assumptions about what &#8220;strategic planning&#8221; for cybersecurity means and what it produces. In this webinar, attendees will learn an alternative approach to effective strategic planning for cybersecurity. This approach, derived from the work of Russell Ackoff\u2014a pioneer in systems thinking\u2014provides cybersecurity professionals with insights into how to align more closely with their organization and effectively demonstrate the relevance and value of their security program to executive leadership and the board.<br \/><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Why the traditional approach to strategic planning is fundamentally flawed<\/li>\n<li>How a preoccupation with threats and vulnerabilities undermines effective cybersecurity planning<\/li>\n<li>A new way to think about security that enables easier strategic alignment and planning than the traditional view<\/li>\n<li>What cybersecurity professionals misunderstand about cybersecurity risk management<\/li>\n<li>The right focus to support effective strategic planning, no matter what happens in the external threat environment<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Andrew.jpg\" alt=\"Andrew S. Townley\" width=\"200\" \/><strong>Andrew S. Townley<\/strong>,Founder and Chief Executive of Archistry<\/p>\n<p><strong>Bio:<\/strong> Andrew S. Townley is a global strategist, architect, and thought leader in security, risk, and business execution. With a career spanning three decades, he has led multimillion-dollar projects, founded four companies, and guided executives and security leaders through some of their toughest challenges. As Chief Executive of Archistry, he helps organizations turn security from a business obstacle into a competitive advantage. Known for his systems-thinking approach and ability to connect disciplines in unexpected ways, Andrew is a sought-after speaker, author of multiple books\u2014including From Invisible Crisis to Competitive Advantage, and publisher of the Security Sanity\u2122 newsletter. His clients describe him as &#8220;part genius, part mad scientist&#8221; for his ability to translate ideas into concrete action that drives real results.<\/p>\n<p><a name=\"attend\"><\/a><br \/>\n<iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/YMWPGKufUqI?si=A8Zp_My5ZuA7wazm\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 27, 2025Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM ISTTopic: From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning Watch Now Abstract:The number of critical vulnerabilities increased by 38% in 2024 (Gamblin, 2025), and the trend doesn&#8217;t appear likely to reverse any time soon. Security has an interesting problem when it&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83050,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83048","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Strategic Planning for Cybersecurity in the Current Threat Landscape<\/title>\n<meta name=\"description\" content=\"Learn how to build effective strategic planning for a security program that will enable your organization to thrive and which the executive leadership will be on board with.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning\" \/>\n<meta property=\"og:description\" content=\"Learn how to build effective strategic planning for a security program that will enable your organization to thrive and which the executive leadership will be on board with.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-28T15:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T13:59:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning\",\"datePublished\":\"2025-05-28T15:47:00+00:00\",\"dateModified\":\"2025-06-24T13:59:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/\"},\"wordCount\":425,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/\",\"name\":\"Strategic Planning for Cybersecurity in the Current Threat Landscape\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg\",\"datePublished\":\"2025-05-28T15:47:00+00:00\",\"dateModified\":\"2025-06-24T13:59:44+00:00\",\"description\":\"Learn how to build effective strategic planning for a security program that will enable your organization to thrive and which the executive leadership will be on board with.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strategic Planning for Cybersecurity in the Current Threat Landscape","description":"Learn how to build effective strategic planning for a security program that will enable your organization to thrive and which the executive leadership will be on board with.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/","og_locale":"en_US","og_type":"article","og_title":"From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning","og_description":"Learn how to build effective strategic planning for a security program that will enable your organization to thrive and which the executive leadership will be on board with.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-05-28T15:47:00+00:00","article_modified_time":"2025-06-24T13:59:44+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning","datePublished":"2025-05-28T15:47:00+00:00","dateModified":"2025-06-24T13:59:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/"},"wordCount":425,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/","name":"Strategic Planning for Cybersecurity in the Current Threat Landscape","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg","datePublished":"2025-05-28T15:47:00+00:00","dateModified":"2025-06-24T13:59:44+00:00","description":"Learn how to build effective strategic planning for a security program that will enable your organization to thrive and which the executive leadership will be on board with.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Strategic-Planning-for-a-Secure-and-Thriving-Organization.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-reactive-to-resilient-rethinking-strategic-cybersecurity-planning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"From Reactive to Resilient: Rethinking Strategic Cybersecurity Planning"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83048"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83048\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83050"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}