{"id":83717,"date":"2025-10-24T10:08:00","date_gmt":"2025-10-24T10:08:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83717"},"modified":"2025-11-04T04:59:19","modified_gmt":"2025-11-04T04:59:19","slug":"when-ransomware-strikes-ethical-hacking-for-enterprise-defense","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/","title":{"rendered":"When Ransomware Strikes: Ethical Hacking for Enterprise Defense\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83717\" class=\"elementor elementor-83717\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5c177f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5c177f8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-01a9d7c\" data-id=\"01a9d7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3f5a1a0 elementor-widget elementor-widget-text-editor\" data-id=\"3f5a1a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: October 24, 2025<\/div>\n<div><strong>Time<\/strong>: 7:00 PM IST | 9:30 AM EDT | 8:30 AM CDT<\/div>\n<div>\n<p><strong>Topic: <\/strong> When Ransomware Strikes: Ethical Hacking for Enterprise Defense<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> Ransomware continues to be one of the most disruptive and costly threats to organizations across the globe. As security priorities shift from reactive to proactive, the need to leverage ethical hacking techniques to identify vulnerabilities, simulate real-world attack scenarios, and strengthen defenses against ransomware has become imperative. This webinar provides an understanding of how ethical hacking can be used to uncover vulnerabilities before adversaries do and how it aligns with incident response planning, threat modeling, and Zero Trust principles to build a resilient enterprise security posture.<\/p>\n<p><strong>Key Takeaways:\u00a0<\/strong><\/p>\n<ul>\n<li>Understand ransomware attacks and how ethical hacking knowledge can help safeguard organizations.<\/li>\n<li>Learn to simulate ransomware attacks using ethical hacking tools and techniques.<\/li>\n<li>Discover common TTPs used by ransomware actors.<\/li>\n<li>Explore how red teaming supports ransomware readiness and response.<\/li>\n<li>Gain insights into integrating offensive tactics into your broader security strategy.<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/20250902_1214203.jpg\" width=\"192\" height=\"256\" \/><strong> Harinderjeet Singh Walia,<\/strong> Senior Regional Manager, Critical Incident Response, Forcepoint<\/p>\n<p><strong>Bio:\u00a0<\/strong> Harinderjeet Singh Walia is an Indian Air Force veteran and accomplished cybersecurity leader with more than 25 years of experience safeguarding high-security environments. He has a distinguished record of protecting critical information infrastructure, leading incident response operations, and driving enterprise-wide cybersecurity transformation initiatives.<\/p>\n<p>His expertise includes penetration testing, digital forensics, threat intelligence, and enterprise security architecture design, enabling robust defense against evolving cyber threats. Harinderjeet is also passionate about mentoring professionals, with a focus on aligning security strategies with business objectives and regulatory requirements.<\/p>\n<\/div>\n<div id=\"attend\">\u00a0<\/div>\n<iframe width=\"560\" height=\"415\" src=\"https:\/\/www.youtube.com\/embed\/wRzC__pWZd0?si=GdTiPz6o508wliEP\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 24, 2025 Time: 7:00 PM IST | 9:30 AM EDT | 8:30 AM CDT Topic: When Ransomware Strikes: Ethical Hacking for Enterprise Defense Watch Now Abstract: Ransomware continues to be one of the most disruptive and costly threats to organizations across the globe. As security priorities shift from reactive to proactive, the need&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83780,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83717","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Stop Ransomware Attacks: Ethical Hacking for Enterprise Defense<\/title>\n<meta name=\"description\" content=\"Ransomware attacks are rising. Learn how ethical hacking equips enterprises to identify risks, simulate attacks, and strengthen security posture before it\u2019s too late.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stop Ransomware Attacks: Ethical Hacking for Enterprise Defense\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks are rising. Learn how ethical hacking equips enterprises to identify risks, simulate attacks, and strengthen security posture before it\u2019s too late.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-24T10:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-04T04:59:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/24-oct_465x310-Without-RN-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Stop Ransomware Attacks: Ethical Hacking for Enterprise Defense\" \/>\n<meta name=\"twitter:description\" content=\"Ransomware attacks are rising. Learn how ethical hacking equips enterprises to identify risks, simulate attacks, and strengthen security posture before it\u2019s too late.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"When Ransomware Strikes: Ethical Hacking for Enterprise Defense\u00a0\",\"datePublished\":\"2025-10-24T10:08:00+00:00\",\"dateModified\":\"2025-11-04T04:59:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/\"},\"wordCount\":262,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/24-oct_465x310-Without-RN-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/\",\"name\":\"Stop Ransomware Attacks: Ethical Hacking for Enterprise Defense\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/24-oct_465x310-Without-RN-1.jpg\",\"datePublished\":\"2025-10-24T10:08:00+00:00\",\"dateModified\":\"2025-11-04T04:59:19+00:00\",\"description\":\"Ransomware attacks are rising. Learn how ethical hacking equips enterprises to identify risks, simulate attacks, and strengthen security posture before it\u2019s too late.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/24-oct_465x310-Without-RN-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/24-oct_465x310-Without-RN-1.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"When Ransomware Strikes: Ethical Hacking for Enterprise Defense\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Stop Ransomware Attacks: Ethical Hacking for Enterprise Defense","description":"Ransomware attacks are rising. Learn how ethical hacking equips enterprises to identify risks, simulate attacks, and strengthen security posture before it\u2019s too late.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/","og_locale":"en_US","og_type":"article","og_title":"Stop Ransomware Attacks: Ethical Hacking for Enterprise Defense","og_description":"Ransomware attacks are rising. Learn how ethical hacking equips enterprises to identify risks, simulate attacks, and strengthen security posture before it\u2019s too late.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-10-24T10:08:00+00:00","article_modified_time":"2025-11-04T04:59:19+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/24-oct_465x310-Without-RN-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Stop Ransomware Attacks: Ethical Hacking for Enterprise Defense","twitter_description":"Ransomware attacks are rising. Learn how ethical hacking equips enterprises to identify risks, simulate attacks, and strengthen security posture before it\u2019s too late.","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"When Ransomware Strikes: Ethical Hacking for Enterprise Defense\u00a0","datePublished":"2025-10-24T10:08:00+00:00","dateModified":"2025-11-04T04:59:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/"},"wordCount":262,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/24-oct_465x310-Without-RN-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/","name":"Stop Ransomware Attacks: Ethical Hacking for Enterprise Defense","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/24-oct_465x310-Without-RN-1.jpg","datePublished":"2025-10-24T10:08:00+00:00","dateModified":"2025-11-04T04:59:19+00:00","description":"Ransomware attacks are rising. Learn how ethical hacking equips enterprises to identify risks, simulate attacks, and strengthen security posture before it\u2019s too late.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/24-oct_465x310-Without-RN-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/24-oct_465x310-Without-RN-1.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/when-ransomware-strikes-ethical-hacking-for-enterprise-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"When Ransomware Strikes: Ethical Hacking for Enterprise Defense\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83717"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83717\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83780"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}