{"id":83321,"date":"2025-07-31T07:04:20","date_gmt":"2025-07-31T07:04:20","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83321"},"modified":"2025-08-20T14:25:19","modified_gmt":"2025-08-20T14:25:19","slug":"the-trust-trap-why-securing-ai-requires-rethinking-security-itself","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/","title":{"rendered":"The Trust Trap: Why Securing AI Requires Rethinking Security Itself"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83321\" class=\"elementor elementor-83321\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0b5da1e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0b5da1e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3143a94\" data-id=\"3143a94\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17e6c05 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"17e6c05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><strong>Date<\/strong>: July 30, 2025<\/div>\n<div><strong>Time<\/strong>: 9:30 AM EDT | 7:30 AM MDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong>The Trust Trap: Why Securing AI Requires Rethinking Security Itself<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>Abstract:&nbsp;<\/strong><br>\nEveryone\u2019s racing to secure AI, but no one can agree on what that means. Is it about protecting models? Preventing hallucinations? Auditing prompts? Or is it about something deeper\u2014the loss of control we never really had to begin with? This webinar sheds light on what happens when AI becomes part of the system and why traditional security collapses the moment it tries to control something it doesn\u2019t understand. It challenges the hidden assumptions behind \u201cAI governance,\u201d exposes the real trust gaps no policy can fix, and introduces a practical way forward based on what security can control: activity, behavior, and the confidence that critical outcomes will still be delivered\u2014even under collapse. This isn\u2019t about fear\u2014it\u2019s about function, and it starts with one uncomfortable truth: you don\u2019t secure AI; you secure the system it inhabits.<\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ul>\n<li>Why AI responsibility frameworks fail when models make unexpected decisions<\/li>\n<li>The critical question every CISO must answer before deploying AI tools <\/li>\n<li>Why securing systems means protecting them from human habits, assumptions, and awareness gaps <\/li>\n<li>A simple mental model for governing AI deployments under uncertainty<\/li>\n<li>Why \u201ctrust but verify\u201d fails for AI, and what security must be designed to do instead<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\" wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Andrew.jpg\" width=\"192\" height=\"256\"><strong> Andrew S. Townley,<\/strong> Founder and Chief Executive of Archistry<br>\n<strong>Bio:&nbsp;<\/strong>Andrew S. Townley is a global strategist, architect, and thought leader in security, risk, and business execution. With a career spanning three decades, he has led multimillion-dollar projects, founded four companies, and guided executives and security leaders through some of their toughest challenges. As Chief Executive of Archistry, he helps organizations turn security from a business obstacle into a competitive advantage. Known for his systems-thinking approach and ability to connect disciplines in unexpected ways, Andrew is a sought-after speaker, author of multiple books\u2014including From Invisible Crisis to Competitive Advantage, and publisher of the Security Sanity\u2122 newsletter. His clients describe him as &#8220;part genius, part mad scientist&#8221; for his ability to translate ideas into concrete action that drives real results<\/p>\n<\/div>\n<div id=\"attend\">\n<\/div>\n<iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/Oi4gbLRWxiE?si=EvkMJrf_y4uq01q5\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\ufeffDate: July 30, 2025 Time: 9:30 AM EDT | 7:30 AM MDT | 7:00 PM IST Topic: The Trust Trap: Why Securing AI Requires Rethinking Security Itself Watch Now Abstract:&nbsp; Everyone\u2019s racing to secure AI, but no one can agree on what that means. Is it about protecting models? Preventing hallucinations? Auditing prompts? Or is&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83322,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83321","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why AI Security Fails and Why Traditional Approaches Don\u2019t Work<\/title>\n<meta name=\"description\" content=\"Challenge everything you know about artificial intelligence security and explore why protecting systems matters more than controlling models\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Trust Trap: Why Securing AI Requires Rethinking Security Itself\" \/>\n<meta property=\"og:description\" content=\"Challenge everything you know about artificial intelligence security and explore why protecting systems matters more than controlling models\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-31T07:04:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-20T14:25:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/06\/Redefining-Approaches-to-AI-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"The Trust Trap: Why Securing AI Requires Rethinking Security Itself\",\"datePublished\":\"2025-07-31T07:04:20+00:00\",\"dateModified\":\"2025-08-20T14:25:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/\"},\"wordCount\":370,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Redefining-Approaches-to-AI-Security.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/\",\"name\":\"Why AI Security Fails and Why Traditional Approaches Don\u2019t Work\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Redefining-Approaches-to-AI-Security.jpg\",\"datePublished\":\"2025-07-31T07:04:20+00:00\",\"dateModified\":\"2025-08-20T14:25:19+00:00\",\"description\":\"Challenge everything you know about artificial intelligence security and explore why protecting systems matters more than controlling models\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Redefining-Approaches-to-AI-Security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Redefining-Approaches-to-AI-Security.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Trust Trap: Why Securing AI Requires Rethinking Security Itself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why AI Security Fails and Why Traditional Approaches Don\u2019t Work","description":"Challenge everything you know about artificial intelligence security and explore why protecting systems matters more than controlling models","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/","og_locale":"en_US","og_type":"article","og_title":"The Trust Trap: Why Securing AI Requires Rethinking Security Itself","og_description":"Challenge everything you know about artificial intelligence security and explore why protecting systems matters more than controlling models","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-07-31T07:04:20+00:00","article_modified_time":"2025-08-20T14:25:19+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/06\/Redefining-Approaches-to-AI-Security.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"The Trust Trap: Why Securing AI Requires Rethinking Security Itself","datePublished":"2025-07-31T07:04:20+00:00","dateModified":"2025-08-20T14:25:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/"},"wordCount":370,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/06\/Redefining-Approaches-to-AI-Security.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/","name":"Why AI Security Fails and Why Traditional Approaches Don\u2019t Work","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/06\/Redefining-Approaches-to-AI-Security.jpg","datePublished":"2025-07-31T07:04:20+00:00","dateModified":"2025-08-20T14:25:19+00:00","description":"Challenge everything you know about artificial intelligence security and explore why protecting systems matters more than controlling models","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/06\/Redefining-Approaches-to-AI-Security.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/06\/Redefining-Approaches-to-AI-Security.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-trust-trap-why-securing-ai-requires-rethinking-security-itself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"The Trust Trap: Why Securing AI Requires Rethinking Security Itself"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83321"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83321\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83322"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}