{"id":83733,"date":"2025-10-28T13:36:09","date_gmt":"2025-10-28T13:36:09","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83733"},"modified":"2026-02-24T13:17:17","modified_gmt":"2026-02-24T13:17:17","slug":"pre-breach-recon-thinking-like-an-attacker-before-they-strike","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/","title":{"rendered":"Pre-Breach Recon: Thinking Like an Attacker Before They Strike"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83733\" class=\"elementor elementor-83733\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f378a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f378a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a3f6e0e\" data-id=\"a3f6e0e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e616ddc elementor-widget elementor-widget-text-editor\" data-id=\"e616ddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: October 28, 2025<\/div>\n<div><strong>Time<\/strong>: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Pre-Breach Recon: Thinking Like an Attacker Before They Strike<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> Before an attack ever hits production systems, adversaries spend days or weeks quietly gathering intelligence. Ethical hackers can use the same reconnaissance methods, from open-source intelligence (OSINT) to infrastructure fingerprinting, to uncover weaknesses early. This session will show how to adopt the attacker\u2019s mindset, map out your own digital footprint, and turn reconnaissance insights into prioritized defense actions.<br><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Understand attacker reconnaissance methods<\/li>\n<li>Mapping the corporate attack surface<\/li>\n<li>Move from reconnaissance to defense<\/li>\n<li>Integrate learnings into IR playbooks<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/04\/Don_Warden-II.png\" width=\"192\" height=\"256\"><strong> Don Warden II,<\/strong> Director, Incident\u202fResponse,\u202fCybolt<\/p>\n<p><strong>Bio:&nbsp;<\/strong> Don Warden is a cybersecurity leader with over 30 years of experience in defending and securing complex environments across multiple industries. His extensive background spans digital forensics, cyber threat intelligence, and incident response, wherein he has handled high-stakes cases involving ransomware, insider threats, and cyber extortion. A trusted advisor on cybersecurity strategy, Don has guided organizations through threat mitigation and recovery while ensuring compliance with frameworks like the Cybersecurity Maturity Model Certification (CMMC). Holding advanced certifications, including Certified Ethical Hacker (C|EH) and Certified Cyber Security Analyst (CCSA), along with a Master\u2019s in Cybersecurity and Information Assurance, Don brings a seasoned perspective to AI-powered cybersecurity and ethical hacking innovations.<\/p>\n<\/div>\n<div id=\"attend\">&nbsp;<\/div>\n<p><iframe width=\"560\" height=\"415\" src=\"https:\/\/www.youtube.com\/embed\/nEslzOmbwFo?si=AkhH3gb8Nh_QtRtm\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: October 28, 2025 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: Pre-Breach Recon: Thinking Like an Attacker Before They Strike Watch Now Abstract: Before an attack ever hits production systems, adversaries spend days or weeks quietly gathering intelligence. Ethical hackers can use the same reconnaissance methods, from open-source intelligence&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83779,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83733","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pre-Breach Recon: Think Like a Cyber Attacker<\/title>\n<meta name=\"description\" content=\"Discover how pre-breach recon empowers you to anticipate cyber threats by thinking like an attacker. Enhance your defense strategy before a breach occurs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pre-Breach Recon: Thinking Like an Attacker Before They Strike\" \/>\n<meta property=\"og:description\" content=\"Discover how pre-breach recon empowers you to anticipate cyber threats by thinking like an attacker. Enhance your defense strategy before a breach occurs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T13:36:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-24T13:17:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/28-oct_465x310-Without-RN-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Pre-Breach Recon: Thinking Like an Attacker Before They Strike\" \/>\n<meta name=\"twitter:description\" content=\"Discover how pre-breach recon empowers you to anticipate cyber threats by thinking like an attacker. Enhance your defense strategy before a breach occurs.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Pre-Breach Recon: Thinking Like an Attacker Before They Strike\",\"datePublished\":\"2025-10-28T13:36:09+00:00\",\"dateModified\":\"2026-02-24T13:17:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/\"},\"wordCount\":232,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/28-oct_465x310-Without-RN-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/\",\"name\":\"Pre-Breach Recon: Think Like a Cyber Attacker\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/28-oct_465x310-Without-RN-1.jpg\",\"datePublished\":\"2025-10-28T13:36:09+00:00\",\"dateModified\":\"2026-02-24T13:17:17+00:00\",\"description\":\"Discover how pre-breach recon empowers you to anticipate cyber threats by thinking like an attacker. Enhance your defense strategy before a breach occurs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/28-oct_465x310-Without-RN-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/28-oct_465x310-Without-RN-1.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Pre-Breach Recon: Thinking Like an Attacker Before They Strike\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pre-Breach Recon: Think Like a Cyber Attacker","description":"Discover how pre-breach recon empowers you to anticipate cyber threats by thinking like an attacker. Enhance your defense strategy before a breach occurs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/","og_locale":"en_US","og_type":"article","og_title":"Pre-Breach Recon: Thinking Like an Attacker Before They Strike","og_description":"Discover how pre-breach recon empowers you to anticipate cyber threats by thinking like an attacker. Enhance your defense strategy before a breach occurs.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-10-28T13:36:09+00:00","article_modified_time":"2026-02-24T13:17:17+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/28-oct_465x310-Without-RN-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Pre-Breach Recon: Thinking Like an Attacker Before They Strike","twitter_description":"Discover how pre-breach recon empowers you to anticipate cyber threats by thinking like an attacker. Enhance your defense strategy before a breach occurs.","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Pre-Breach Recon: Thinking Like an Attacker Before They Strike","datePublished":"2025-10-28T13:36:09+00:00","dateModified":"2026-02-24T13:17:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/"},"wordCount":232,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/28-oct_465x310-Without-RN-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/","name":"Pre-Breach Recon: Think Like a Cyber Attacker","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/28-oct_465x310-Without-RN-1.jpg","datePublished":"2025-10-28T13:36:09+00:00","dateModified":"2026-02-24T13:17:17+00:00","description":"Discover how pre-breach recon empowers you to anticipate cyber threats by thinking like an attacker. Enhance your defense strategy before a breach occurs.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/28-oct_465x310-Without-RN-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/09\/28-oct_465x310-Without-RN-1.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pre-breach-recon-thinking-like-an-attacker-before-they-strike\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Pre-Breach Recon: Thinking Like an Attacker Before They Strike"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83733"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83733\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83779"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}