{"id":83524,"date":"2025-09-26T05:30:04","date_gmt":"2025-09-26T05:30:04","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83524"},"modified":"2026-02-24T13:17:46","modified_gmt":"2026-02-24T13:17:46","slug":"secure-the-future-exploring-the-pillars-of-ztna-architecture","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/","title":{"rendered":"Secure the Future: Exploring the Pillars of ZTNA Architecture\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83524\" class=\"elementor elementor-83524\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-28eb91f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28eb91f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b7770af\" data-id=\"b7770af\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc353b3 elementor-widget elementor-widget-text-editor\" data-id=\"fc353b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: September 26, 2025<\/div>\n<div><strong>Time<\/strong>: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Secure the Future: Exploring the Pillars of ZTNA Architecture<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> In today\u2019s digital environment that is spread across different environments, securing user access has become more critical, complex, than ever. Traditional network security models fall short in defending against modern threats, which is why organizations are increasingly turning to Zero Trust Network Access (ZTNA). As part of our series on ZTNA-driven cybersecurity, this webinar focuses on exploring the core elements involved in designing a Zero Trust Network Access (ZTNA)-centric digital architecture to secure an organization&#8217;s systems and assets. It explores the fundamental concepts of continuous verification, granular access control, etc. to enabling organizations to build a future-ready security model. Join us as we explore how to develop and implement a ZTNA strategy aligned with broader risk governance and compliance objectives.<\/p>\n<p><strong>Key Takeaways:\u00a0<\/strong><\/p>\n<ul>\n<li>Quick recap of ZTNA architecture from the previous webinar<\/li>\n<li>Core pillars of ZTNA: Identity management, least-privilege, micro segmentation, etc.<\/li>\n<li>How these elements help reduces threats and attacks.<\/li>\n<li>How ZTNA pillars help integration with cloud and other environments.<\/li>\n<li>Insights on aligning ZTNA with regulatory and compliance needs.<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Tejas-Shroff.jpg.webp\" width=\"192\" height=\"256\" \/><strong> Tejas Shroff,<\/strong> Senior Director of Managed Security Services, NTT DATA Services\u202f\u202f<\/p>\n<p><strong>Bio:\u00a0<\/strong>\u202fTejas Shroff is the Senior Director of Managed Security Services at NTT DATA, where he leads the identity and access management practice. He is also an adjunct professor at the University of Texas at Dallas (UTD), where he teaches various cybersecurity courses to graduate students at the Jindal School of Management. Tejas is a board member of the FBI-affiliated non-profit InfraGard National,\u202fserves\u202fon the advisory board for Collin College\u2019s cybersecurity program, and mentors the UTD Cybersecurity Club.<\/p>\n<\/div>\n<div id=\"attend\">\u00a0<\/div>\n<iframe width=\"560\" height=\"415\" src=\"https:\/\/www.youtube.com\/embed\/4_GYS4ueeDk?si=bN5ykKLKTsjoJT9G\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: September 26, 2025 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: Secure the Future: Exploring the Pillars of ZTNA Architecture Watch Now Abstract: In today\u2019s digital environment that is spread across different environments, securing user access has become more critical, complex, than ever. Traditional network security models fall short&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83525,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83524","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ZTNA Architecture: Core Pillars for Future Security<\/title>\n<meta name=\"description\" content=\"Explore the pillars of ZTNA architecture\u2014identity, least-privilege, microsegmentation, and how they enable secure, compliant access in modern hybrid environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure the Future: Exploring the Pillars of ZTNA Architecture\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore the pillars of ZTNA architecture\u2014identity, least-privilege, microsegmentation, and how they enable secure, compliant access in modern hybrid environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-26T05:30:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T13:17:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/26-sept_465x310-Without-RN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Secure the Future: Exploring the Pillars of ZTNA Architecture\u00a0\",\"datePublished\":\"2025-09-26T05:30:04+00:00\",\"dateModified\":\"2026-02-24T13:17:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/\"},\"wordCount\":294,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/26-sept_465x310-Without-RN.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/\",\"name\":\"ZTNA Architecture: Core Pillars for Future Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/26-sept_465x310-Without-RN.jpg\",\"datePublished\":\"2025-09-26T05:30:04+00:00\",\"dateModified\":\"2026-02-24T13:17:46+00:00\",\"description\":\"Explore the pillars of ZTNA architecture\u2014identity, least-privilege, microsegmentation, and how they enable secure, compliant access in modern hybrid environments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/26-sept_465x310-Without-RN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/26-sept_465x310-Without-RN.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/secure-the-future-exploring-the-pillars-of-ztna-architecture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Secure the Future: Exploring the Pillars of ZTNA Architecture\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ZTNA Architecture: Core Pillars for Future Security","description":"Explore the pillars of ZTNA architecture\u2014identity, least-privilege, microsegmentation, and how they enable secure, compliant access in modern hybrid environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/","og_locale":"en_US","og_type":"article","og_title":"Secure the Future: Exploring the Pillars of ZTNA Architecture\u00a0","og_description":"Explore the pillars of ZTNA architecture\u2014identity, least-privilege, microsegmentation, and how they enable secure, compliant access in modern hybrid environments.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-09-26T05:30:04+00:00","article_modified_time":"2026-02-24T13:17:46+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/26-sept_465x310-Without-RN.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Secure the Future: Exploring the Pillars of ZTNA Architecture\u00a0","datePublished":"2025-09-26T05:30:04+00:00","dateModified":"2026-02-24T13:17:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/"},"wordCount":294,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/26-sept_465x310-Without-RN.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/","name":"ZTNA Architecture: Core Pillars for Future Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/26-sept_465x310-Without-RN.jpg","datePublished":"2025-09-26T05:30:04+00:00","dateModified":"2026-02-24T13:17:46+00:00","description":"Explore the pillars of ZTNA architecture\u2014identity, least-privilege, microsegmentation, and how they enable secure, compliant access in modern hybrid environments.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/26-sept_465x310-Without-RN.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/26-sept_465x310-Without-RN.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/secure-the-future-exploring-the-pillars-of-ztna-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Secure the Future: Exploring the Pillars of ZTNA Architecture\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83524"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83524\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83525"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}