{"id":83244,"date":"2025-06-23T06:30:30","date_gmt":"2025-06-23T06:30:30","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83244"},"modified":"2025-07-04T05:13:54","modified_gmt":"2025-07-04T05:13:54","slug":"defending-the-digital-perimeter-modern-cybersecurity-for-soc","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/","title":{"rendered":"Defending the Digital Perimeter: Modern Cybersecurity for SOC"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83244\" class=\"elementor elementor-83244\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a7cf6b1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a7cf6b1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-24a8ef8\" data-id=\"24a8ef8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3554996 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"3554996\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: June 20, 2025<\/div>\n<div><strong>Time<\/strong>: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Defending the Digital Perimeter: Modern Cybersecurity for SOC<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong style=\"word-spacing: normal;\">Abstract:<\/strong><span style=\"word-spacing: normal;\"> In the current threat landscape, where cyber threats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents. Blue teaming and cyber defense incorporate how organizations identify, detect, prevent, and mitigate cyber threats and vulnerabilities. While traditional approaches to security operations have been reactive to threats, the ever-changing nature of the threat landscape requires that organizations shift to more proactive methods. This webinar series is dedicated to understanding proactive cyber defense strategies and how to build an effective blue team program. In today\u2019s session, we will dive into the world of the Security Operations Center and learn how organizations can effectively manage cybersecurity incidents and exposures.<\/span><\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Components of an effective Security Operations Center<\/li>\n<li>Techniques and KPIs for ensuring effective monitoring and incident response<\/li>\n<li>Integrating Vulnerability and Exposure Management into the SOC<\/li>\n<li>Strategies for effective response and recovery<\/li>\n<li>Developing effective exercises to ensure continuous improvement<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"alignleft wp-image-59705\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/AJ-Jarrett.png\" alt=\"Andrew Jarrett\" width=\"192\" height=\"256\"><strong> Andrew Jarrett,&nbsp;<\/strong>Director, Cyber Monitoring &amp; Incident Response, Depository Trust &amp; Clearing Corporation (DTCC)<\/p>\n<p><strong>Bio:&nbsp;<\/strong>Andrew Jarrett has over fifteen years of experience in technology, cybersecurity, and incident response in both the public and private sectors. Prior to joining DTCC, Andrew Jarrett launched and led multiple cybersecurity programs in highly regulated environments, including defense and finance. In addition to his work at DTCC, Andrew Jarrett is also an adjunct instructor with the Applied Cybersecurity Program at Texas A&amp;M Engineering Extension Service and a volunteer advisor for multiple high school and college career technology education programs.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\n<p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/M_P_GKjuUZw?si=2kqJ5iqEG5BylIZc\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 20, 2025 Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: Defending the Digital Perimeter: Modern Cybersecurity for SOC Watch Now Abstract: In the current threat landscape, where cyber threats are evolving rapidly, proactive network security is desperately needed to prevent and reduce the impact of cyber incidents. Blue&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83244","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Master Effective Modern Cybersecurity Strategy for SOC<\/title>\n<meta name=\"description\" content=\"Learn proactive cyber defense strategies and how to build an effective SOC for better threat detection, incident response, and continuous improvement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defending the Digital Perimeter: Modern Cybersecurity for SOC\" \/>\n<meta property=\"og:description\" content=\"Learn proactive cyber defense strategies and how to build an effective SOC for better threat detection, incident response, and continuous improvement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-23T06:30:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-04T05:13:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Defending the Digital Perimeter: Modern Cybersecurity for SOC\",\"datePublished\":\"2025-06-23T06:30:30+00:00\",\"dateModified\":\"2025-07-04T05:13:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/\"},\"wordCount\":285,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/\",\"name\":\"Master Effective Modern Cybersecurity Strategy for SOC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg\",\"datePublished\":\"2025-06-23T06:30:30+00:00\",\"dateModified\":\"2025-07-04T05:13:54+00:00\",\"description\":\"Learn proactive cyber defense strategies and how to build an effective SOC for better threat detection, incident response, and continuous improvement.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg\",\"width\":465,\"height\":310,\"caption\":\"Defending the Digital Perimeter Modern Cybersecurity for SOC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Defending the Digital Perimeter: Modern Cybersecurity for SOC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Master Effective Modern Cybersecurity Strategy for SOC","description":"Learn proactive cyber defense strategies and how to build an effective SOC for better threat detection, incident response, and continuous improvement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/","og_locale":"en_US","og_type":"article","og_title":"Defending the Digital Perimeter: Modern Cybersecurity for SOC","og_description":"Learn proactive cyber defense strategies and how to build an effective SOC for better threat detection, incident response, and continuous improvement.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-06-23T06:30:30+00:00","article_modified_time":"2025-07-04T05:13:54+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Defending the Digital Perimeter: Modern Cybersecurity for SOC","datePublished":"2025-06-23T06:30:30+00:00","dateModified":"2025-07-04T05:13:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/"},"wordCount":285,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/","name":"Master Effective Modern Cybersecurity Strategy for SOC","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg","datePublished":"2025-06-23T06:30:30+00:00","dateModified":"2025-07-04T05:13:54+00:00","description":"Learn proactive cyber defense strategies and how to build an effective SOC for better threat detection, incident response, and continuous improvement.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/05\/Defending-the-Digital-Perimeter-Modern-Cybersecurity-for-SOC.jpg","width":465,"height":310,"caption":"Defending the Digital Perimeter Modern Cybersecurity for SOC"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/defending-the-digital-perimeter-modern-cybersecurity-for-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Defending the Digital Perimeter: Modern Cybersecurity for SOC"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83244"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83244\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83245"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}