{"id":83515,"date":"2025-09-25T15:53:04","date_gmt":"2025-09-25T15:53:04","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83515"},"modified":"2025-10-29T09:55:38","modified_gmt":"2025-10-29T09:55:38","slug":"from-logs-to-evidence-forensic-workflows-in-mobile-devices","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/","title":{"rendered":"From Logs to Evidence: Forensic Workflows in Mobile Devices"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83515\" class=\"elementor elementor-83515\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e277308 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e277308\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ac3e3c1\" data-id=\"ac3e3c1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9845cfa elementor-widget elementor-widget-text-editor\" data-id=\"9845cfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: September 25, 2025<\/div><div><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<\/div><div><p><strong>Topic: <\/strong> From Logs to Evidence: Forensic Workflows in Mobile Devices<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong> In today\u2019s connected world, digital forensics must evolve to meet the complexity of modern environments. This webinar marks the first installment of the &#8220;From Logs to Evidence&#8221; series and focuses on forensic workflows across mobile device environments, from correlating logs and artifacts to reconstructing user activity. As mobile devices are inherently personal, they can serve as critical evidence in associating individuals with specific actions. However, they also present significant challenges, particularly concerning legal authority for device access and data retrieval, especially due to encryption and other security measures. This session will explore aspects of mobile forensics, including tools and techniques, timeline reconstruction, and correlation of artifacts across iOS and Android platforms, among other relevant topics.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Current challenges in <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/computer-forensics\/mobile-device-forensics\/\" target=\"_blank\" rel=\"noopener\">mobile device forensics<\/a><\/li><li>Key standards applicable to mobile device investigations<\/li><li>Tools and techniques used in mobile forensic analysis<\/li><li>Compliance requirements and best practices for handling mobile evidence<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/Amber-Schroader.png\" width=\"192\" height=\"256\" \/><strong> Amber Schroader,<\/strong> CEO &amp; Founder, Paraben Corporation<\/p><p><strong>Bio:\u00a0<\/strong>Over the past three decades, Amber Schroader has been a driving force for innovation in digital forensics. Ms. Schroader has developed many software programs, courses, and guides in the areas of recovering data from smartphones, computer hard drives, cloud, email, and gaming systems. She has established protocols for the seizure and processing of digital evidence that have been used by numerous organizations throughout the world. She has coined the concepts of the \u201c360-degree approach to digital forensics\u201d and \u201cForensics of Everything-FoE,\u201d with her focus on unique problems in digital evidence and solutions. Ms. Schroader has been a significant industry influence in advocating for the big-picture consideration of digital evidence. An accomplished design architect, curriculum developer, and instructor, she has written and taught numerous classes in this specialized field and has earned multiple certifications. She continues to contribute to the field through book contributions and other industry speaking engagements.<\/p><\/div><div id=\"attend\">\u00a0<\/div><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/hwRPlXCYsW8?si=qnKxlt8cdHeLhzmq\" width=\"560\" height=\"415\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: September 25, 2025Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: From Logs to Evidence: Forensic Workflows in Mobile Devices Watch Now Abstract: In today\u2019s connected world, digital forensics must evolve to meet the complexity of modern environments. This webinar marks the first installment of the &#8220;From Logs to Evidence&#8221;&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83516,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83515","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile Forensics Explained: Challenges, Tools, &amp; Strategies You Should Know<\/title>\n<meta name=\"description\" content=\"A digital forensics leader shares insight on mobile forensics, covering evidence workflows, legal risks, cross-platform analysis, and trusted tools, standards, and techniques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Logs to Evidence: Forensic Workflows in Mobile Devices\" \/>\n<meta property=\"og:description\" content=\"A digital forensics leader shares insight on mobile forensics, covering evidence workflows, legal risks, cross-platform analysis, and trusted tools, standards, and techniques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-25T15:53:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T09:55:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/25-sept_465x310-Without-RN-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"From Logs to Evidence: Forensic Workflows in Mobile Devices\",\"datePublished\":\"2025-09-25T15:53:04+00:00\",\"dateModified\":\"2025-10-29T09:55:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/\"},\"wordCount\":336,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/25-sept_465x310-Without-RN-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/\",\"name\":\"Mobile Forensics Explained: Challenges, Tools, & Strategies You Should Know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/25-sept_465x310-Without-RN-1.jpg\",\"datePublished\":\"2025-09-25T15:53:04+00:00\",\"dateModified\":\"2025-10-29T09:55:38+00:00\",\"description\":\"A digital forensics leader shares insight on mobile forensics, covering evidence workflows, legal risks, cross-platform analysis, and trusted tools, standards, and techniques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/25-sept_465x310-Without-RN-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/25-sept_465x310-Without-RN-1.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From Logs to Evidence: Forensic Workflows in Mobile Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile Forensics Explained: Challenges, Tools, & Strategies You Should Know","description":"A digital forensics leader shares insight on mobile forensics, covering evidence workflows, legal risks, cross-platform analysis, and trusted tools, standards, and techniques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/","og_locale":"en_US","og_type":"article","og_title":"From Logs to Evidence: Forensic Workflows in Mobile Devices","og_description":"A digital forensics leader shares insight on mobile forensics, covering evidence workflows, legal risks, cross-platform analysis, and trusted tools, standards, and techniques.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-09-25T15:53:04+00:00","article_modified_time":"2025-10-29T09:55:38+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/25-sept_465x310-Without-RN-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"From Logs to Evidence: Forensic Workflows in Mobile Devices","datePublished":"2025-09-25T15:53:04+00:00","dateModified":"2025-10-29T09:55:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/"},"wordCount":336,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/25-sept_465x310-Without-RN-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/","name":"Mobile Forensics Explained: Challenges, Tools, & Strategies You Should Know","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/25-sept_465x310-Without-RN-1.jpg","datePublished":"2025-09-25T15:53:04+00:00","dateModified":"2025-10-29T09:55:38+00:00","description":"A digital forensics leader shares insight on mobile forensics, covering evidence workflows, legal risks, cross-platform analysis, and trusted tools, standards, and techniques.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/25-sept_465x310-Without-RN-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/25-sept_465x310-Without-RN-1.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-forensic-workflows-in-mobile-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"From Logs to Evidence: Forensic Workflows in Mobile Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83515"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83515\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83516"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}