{"id":83517,"date":"2025-09-23T07:08:59","date_gmt":"2025-09-23T07:08:59","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83517"},"modified":"2025-10-03T10:06:21","modified_gmt":"2025-10-03T10:06:21","slug":"ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/","title":{"rendered":"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83517\" class=\"elementor elementor-83517\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ee4433 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ee4433\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be4704d\" data-id=\"be4704d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-538ce54 elementor-widget elementor-widget-text-editor\" data-id=\"538ce54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: September 19, 2025<\/div><div><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<\/div><div><p><strong>Topic: <\/strong> CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong> In the current threat landscape, the role of the Chief Information Security Officer (CISO) has evolved far beyond technical oversight. Modern CISOs are required to be strategic leaders capable of aligning cybersecurity initiatives with broader business goals. This webinar explores the roles of CISOs in effectively integrating governance, risk, and compliance (GRC), audit management, and financial planning into their leadership approach. It will cover CISOs\u2019 core competencies, skills, and career approaches to impactful leadership. Attendees will also gain insights into what empowers CISOs to bridge the gap between security and strategy, and drive business value while safeguarding digital assets.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Importance of CISOs<\/li><li>Types of CISOs today: vCISO, Fractional, Field, and more<\/li><li>Operational vs. advisory roles<\/li><li>Work scope and core competencies<\/li><li>Cybersecurity strategic execution<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/Bennie-Cleveland-1.jpg\" width=\"192\" height=\"256\" \/><strong> Bennie Cleveland,<\/strong> AVP, Cyber Incident Management<\/p><p><strong>Bio:\u00a0<\/strong>Bennie Cleveland is a seasoned cybersecurity executive, auditor, and enterprise risk strategist with more than 20 years of experience leading security, compliance, and incident response programs across industries including financial services, healthcare, life sciences, SaaS, higher education, and government.<\/p><p>In his current role as AVP of Cyber Incident Management \u2013 Response &amp; Resolution, he directs enterprise-wide incident response and remediation, ensuring swift containment, resilient recovery, and clear communication to executive leadership. Previously, Bennie served as a vCISO, auditor, and senior advisor, helping organizations achieve readiness for HIPAA, NIST, ISO 27001, SOC 2, HITRUST, and GDPR compliance frameworks.\u202f<\/p><p>He holds a portfolio of credentials\u2014CCISO, CISM, CISA, CRISC, PMP, EDRP, AAIA, and AIGP\u2014that reflect his breadth across governance, risk, incident response, and emerging AI audit practices. Known for translating technical risks into business impact, Bennie has advanced security maturity and organizational resilience at scale.<\/p><p>His driving mission is to help organizations see cybersecurity not merely as a regulatory necessity but as a strategic advantage that supports innovation and business growth.<\/p><\/div><div id=\"attend\">\u00a0<\/div><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/7Ng1h1ZM0iI?si=YfHap5h4pLV5SpsE\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: September 19, 2025Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler Watch Now Abstract: In the current threat landscape, the role of the Chief Information Security Officer (CISO) has evolved far beyond technical oversight. Modern CISOs are required to be strategic&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83518,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83517","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler - Cybersecurity Exchange<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler\" \/>\n<meta property=\"og:description\" content=\"Date: September 19, 2025Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler Watch Now Abstract: In the current threat landscape, the role of the Chief Information Security Officer (CISO) has evolved far beyond technical oversight. Modern CISOs are required to be strategic&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-23T07:08:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-03T10:06:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/19-sept_465x310-Without-RN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler\",\"datePublished\":\"2025-09-23T07:08:59+00:00\",\"dateModified\":\"2025-10-03T10:06:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/\"},\"wordCount\":330,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/19-sept_465x310-Without-RN.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/\",\"name\":\"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler - Cybersecurity Exchange\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/19-sept_465x310-Without-RN.jpg\",\"datePublished\":\"2025-09-23T07:08:59+00:00\",\"dateModified\":\"2025-10-03T10:06:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/19-sept_465x310-Without-RN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/19-sept_465x310-Without-RN.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler - Cybersecurity Exchange","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/","og_locale":"en_US","og_type":"article","og_title":"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler","og_description":"Date: September 19, 2025Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler Watch Now Abstract: In the current threat landscape, the role of the Chief Information Security Officer (CISO) has evolved far beyond technical oversight. Modern CISOs are required to be strategic&hellip;","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-09-23T07:08:59+00:00","article_modified_time":"2025-10-03T10:06:21+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/19-sept_465x310-Without-RN.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler","datePublished":"2025-09-23T07:08:59+00:00","dateModified":"2025-10-03T10:06:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/"},"wordCount":330,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/19-sept_465x310-Without-RN.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/","name":"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler - Cybersecurity Exchange","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/19-sept_465x310-Without-RN.jpg","datePublished":"2025-09-23T07:08:59+00:00","dateModified":"2025-10-03T10:06:21+00:00","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/19-sept_465x310-Without-RN.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/08\/19-sept_465x310-Without-RN.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ciso-leadership-essentials-driving-cybersecurity-as-a-business-enabler\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"CISO Leadership Essentials: Driving Cybersecurity as a Business Enabler"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83517"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83517\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83518"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}