{"id":83069,"date":"2025-05-19T06:23:07","date_gmt":"2025-05-19T06:23:07","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83069"},"modified":"2025-05-29T08:48:29","modified_gmt":"2025-05-29T08:48:29","slug":"defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/","title":{"rendered":"Defending the Digital Perimeter with Effective Blue Teaming Tactics\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83069\" class=\"elementor elementor-83069\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a06e879 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a06e879\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-47ae3b2\" data-id=\"47ae3b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-baaa835 elementor-widget elementor-widget-text-editor\" data-id=\"baaa835\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date: <\/strong> May 16, 2025<br>\n<strong>Time:<\/strong> 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<br>\n<strong>Topic:<\/strong> How Defending the Digital Perimeter with Effective Blue Teaming Tactics<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract:&nbsp;<\/strong>In the current threat landscape, where cyber threats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents. Blue teaming and cyber defense incorporate how organizations identify, detect, prevent, and mitigate cyber threats and vulnerabilities. While traditional approaches to security operations have been reactive to threats, the ever-changing nature of the threat landscape requires that organizations shift to more proactive methods. This webinar series is dedicated to understanding proactive cyber defense strategies and how to build an effective blue team program. In today\u2019s session, we will understand the fundamental elements of a cyber defense program, learn the difference between detective and preventative controls and how they function together, learn how Governance, Risk, and Compliance (GRC) can guide program objectives, and learn how to gain critical buy-in and support from senior leadership when establishing a security program.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Fundamental Components of a Cyber Defense Program<\/li>\n<li>People, Process, and Technology \u2013 Program Pillars<\/li>\n<li>Understanding Security Controls<\/li>\n<li>Determining when to use Detective vs Preventative Controls<\/li>\n<li>Using Governance, Risk and Compliance (GRC) Requirements to Scope the Security Program<\/li>\n<li>How to Gain Executive Buy-In and Support<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/AJ-Jarrett.png\" alt=\"Andrew  Jarrett\" width=\"192\" height=\"256\"><strong>Andrew  Jarrett<\/strong>, Director, Cyber Monitoring &amp; Incident Response, Depository Trust &amp; Clearing Corporation (DTCC)<\/p>\n<p><strong>Bio:<\/strong> Andrew Jarrett has over fifteen years of experience in technology, cybersecurity, and incident response in both the public and private sectors. Prior to joining DTCC, Andrew Jarrett launched and led multiple cybersecurity programs in highly regulated environments, including defense and finance. In addition to his work at DTCC, Andrew Jarrett is also an adjunct instructor with the Applied Cybersecurity Program at Texas A&amp;M Engineering Extension Service and a volunteer advisor for multiple high school and college career technology education programs.<\/p>\n<div id=\"attend\"><\/div>\n<p><iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/Vsy6CvNDzY4?si=LIjJtFoLLIfj9B45\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 16, 2025 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: How Defending the Digital Perimeter with Effective Blue Teaming Tactics Watch Now Abstract:&nbsp;In the current threat landscape, where cyber threats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents.&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83071,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83069","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Explore the Effective Blue Teaming and Network Defense Tactics<\/title>\n<meta name=\"description\" content=\"Discover the proven blue teaming strategies and defense tactics that can secure your digital perimeter and help you counter cyber threats effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defending the Digital Perimeter with Effective Blue Teaming Tactics\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover the proven blue teaming strategies and defense tactics that can secure your digital perimeter and help you counter cyber threats effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-19T06:23:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T08:48:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Defending the Digital Perimeter with Effective Blue Teaming Tactics\u00a0\",\"datePublished\":\"2025-05-19T06:23:07+00:00\",\"dateModified\":\"2025-05-29T08:48:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/\"},\"wordCount\":321,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/\",\"name\":\"Explore the Effective Blue Teaming and Network Defense Tactics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg\",\"datePublished\":\"2025-05-19T06:23:07+00:00\",\"dateModified\":\"2025-05-29T08:48:29+00:00\",\"description\":\"Discover the proven blue teaming strategies and defense tactics that can secure your digital perimeter and help you counter cyber threats effectively.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Defending the Digital Perimeter with Effective Blue Teaming Tactics\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Explore the Effective Blue Teaming and Network Defense Tactics","description":"Discover the proven blue teaming strategies and defense tactics that can secure your digital perimeter and help you counter cyber threats effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/","og_locale":"en_US","og_type":"article","og_title":"Defending the Digital Perimeter with Effective Blue Teaming Tactics\u00a0","og_description":"Discover the proven blue teaming strategies and defense tactics that can secure your digital perimeter and help you counter cyber threats effectively.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-05-19T06:23:07+00:00","article_modified_time":"2025-05-29T08:48:29+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Defending the Digital Perimeter with Effective Blue Teaming Tactics\u00a0","datePublished":"2025-05-19T06:23:07+00:00","dateModified":"2025-05-29T08:48:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/"},"wordCount":321,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/","name":"Explore the Effective Blue Teaming and Network Defense Tactics","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg","datePublished":"2025-05-19T06:23:07+00:00","dateModified":"2025-05-29T08:48:29+00:00","description":"Discover the proven blue teaming strategies and defense tactics that can secure your digital perimeter and help you counter cyber threats effectively.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Webinar-on-Defending-the-Digital-Perimeter-Effective-Blue-Teaming-and-Network-Defense-Tactics.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-effective-blue-teaming-and-network-defense-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Defending the Digital Perimeter with Effective Blue Teaming Tactics\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83069"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83069\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83071"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}