{"id":83677,"date":"2025-10-15T05:16:03","date_gmt":"2025-10-15T05:16:03","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83677"},"modified":"2025-11-24T06:42:44","modified_gmt":"2025-11-24T06:42:44","slug":"red-teaming-for-resilience-how-ethical-hacking-strengthens-ir","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/","title":{"rendered":"Red Teaming for Resilience: How Ethical Hacking Strengthens IR \u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83677\" class=\"elementor elementor-83677\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9d2ad66 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9d2ad66\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-159a0a7\" data-id=\"159a0a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-650757f elementor-widget elementor-widget-text-editor\" data-id=\"650757f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: October 15, 2025<\/div>\n<div><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Red Teaming for Resilience: How Ethical Hacking Strengthens IR<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> In today\u2019s dynamic threat landscape, the surge in both the sophistication and volume of cyberattacks has made proactive defense a strategic necessity. As a result, organizations are shifting their incident response (IR) strategies from reactive approaches to proactive, intelligence-driven models. Central to this transformation are the insights derived from ethical hacking and penetration testing. These offensive security practices generate critical telemetry that helps identify vulnerabilities, simulate real-world attack scenarios, and ultimately reshape IR strategies to be more resilient and responsive. This webinar explores the role of ethical hacking in shaping IR strategies, delving into the lifecycle of a red team engagement, from reconnaissance to exploitation, and examining how these insights translate into actionable improvements in IR planning, threat hunting, and SOC operations.<\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>The role of red teaming in modern cybersecurity<\/li>\n<li>How simulations and telemetry from red teaming integrate into IR strategies<\/li>\n<li>Tools and techniques used by ethical hackers<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/Eder-Ribeiro-2-1.png\" width=\"192\" height=\"256\"><strong> Eder Ribeiro,<\/strong> Director, Global Incident Response<\/p>\n<p><strong>Bio:&nbsp;<\/strong> Eder is a founding member and leader of TransUnion\u2019s Incident Response Forensics (IRF) team. The IRF team focuses on digital forensics and incident response services for the insurance market and law firms. Eder and his team support IRF operations in the US, Canada, Australia, and selected European and Latin American jurisdictions. Eder also leads the U.S. breach notification and fulfillment team, which is a key part of TransUnion\u2019s holistic approach to cybersecurity.<\/p>\n<p>Eder has a background in cybersecurity, privacy, incident response, and leadership. Prior to joining TransUnion, Eder earned a Juris Doctor with a focus on privacy, compliance, contracts, and corporate law from Roger Williams University School of Law. He also earned a Master of Science degree in Cybersecurity from Roger Williams University. Eder continues to serve as a Non-Commissioned Officer in the Rhode Island Army National Guard for 19 years, including a tour of duty in the Kandahar province, Afghanistan, in support of Operation Enduring Freedom.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\n<p><iframe width=\"560\" height=\"415\" src=\"https:\/\/www.youtube.com\/embed\/D-Abr8rmRYE?si=dLcv6P9rucMO0Sg9\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 15, 2025 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: Red Teaming for Resilience: How Ethical Hacking Strengthens IR Watch Now Abstract: In today\u2019s dynamic threat landscape, the surge in both the sophistication and volume of cyberattacks has made proactive defense a strategic necessity. As a result, organizations&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83783,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83677","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Red Teaming and Ethical Hacking: Strengthening Incident Response Strategy<\/title>\n<meta name=\"description\" content=\"Discover how red teaming and ethical hacking insights reshape incident response strategy, strengthen resilience, and enhance SOC effectiveness.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red Teaming and Ethical Hacking: Strengthening Incident Response Strategy\" \/>\n<meta property=\"og:description\" content=\"Discover how red teaming and ethical hacking insights reshape incident response strategy, strengthen resilience, and enhance SOC effectiveness.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-15T05:16:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-24T06:42:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/15-oct_465x310-Without-RN-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Red Teaming and Ethical Hacking: Strengthening Incident Response Strategy\" \/>\n<meta name=\"twitter:description\" content=\"Discover how red teaming and ethical hacking insights reshape incident response strategy, strengthen resilience, and enhance SOC effectiveness.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Red Teaming for Resilience: How Ethical Hacking Strengthens IR \u00a0\",\"datePublished\":\"2025-10-15T05:16:03+00:00\",\"dateModified\":\"2025-11-24T06:42:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/\"},\"wordCount\":351,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/15-oct_465x310-Without-RN-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/\",\"name\":\"Red Teaming and Ethical Hacking: Strengthening Incident Response Strategy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/15-oct_465x310-Without-RN-1.jpg\",\"datePublished\":\"2025-10-15T05:16:03+00:00\",\"dateModified\":\"2025-11-24T06:42:44+00:00\",\"description\":\"Discover how red teaming and ethical hacking insights reshape incident response strategy, strengthen resilience, and enhance SOC effectiveness.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/15-oct_465x310-Without-RN-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/15-oct_465x310-Without-RN-1.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Red Teaming for Resilience: How Ethical Hacking Strengthens IR \u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Red Teaming and Ethical Hacking: Strengthening Incident Response Strategy","description":"Discover how red teaming and ethical hacking insights reshape incident response strategy, strengthen resilience, and enhance SOC effectiveness.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/","og_locale":"en_US","og_type":"article","og_title":"Red Teaming and Ethical Hacking: Strengthening Incident Response Strategy","og_description":"Discover how red teaming and ethical hacking insights reshape incident response strategy, strengthen resilience, and enhance SOC effectiveness.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-10-15T05:16:03+00:00","article_modified_time":"2025-11-24T06:42:44+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/15-oct_465x310-Without-RN-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Red Teaming and Ethical Hacking: Strengthening Incident Response Strategy","twitter_description":"Discover how red teaming and ethical hacking insights reshape incident response strategy, strengthen resilience, and enhance SOC effectiveness.","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Red Teaming for Resilience: How Ethical Hacking Strengthens IR \u00a0","datePublished":"2025-10-15T05:16:03+00:00","dateModified":"2025-11-24T06:42:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/"},"wordCount":351,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/15-oct_465x310-Without-RN-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/","name":"Red Teaming and Ethical Hacking: Strengthening Incident Response Strategy","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/15-oct_465x310-Without-RN-1.jpg","datePublished":"2025-10-15T05:16:03+00:00","dateModified":"2025-11-24T06:42:44+00:00","description":"Discover how red teaming and ethical hacking insights reshape incident response strategy, strengthen resilience, and enhance SOC effectiveness.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/15-oct_465x310-Without-RN-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/15-oct_465x310-Without-RN-1.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/red-teaming-for-resilience-how-ethical-hacking-strengthens-ir\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Red Teaming for Resilience: How Ethical Hacking Strengthens IR \u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83677"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83677\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83783"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}