{"id":83774,"date":"2025-11-12T17:07:18","date_gmt":"2025-11-12T17:07:18","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83774"},"modified":"2025-12-31T06:02:08","modified_gmt":"2025-12-31T06:02:08","slug":"ai-enhanced-devsecops-automating-security-from-code-to-cloud","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/","title":{"rendered":"AI-Enhanced DevSecOps: Automating Security from Code to Cloud\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83774\" class=\"elementor elementor-83774\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0bc0858 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0bc0858\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-586f0b2\" data-id=\"586f0b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-200186e elementor-widget elementor-widget-text-editor\" data-id=\"200186e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: November 12, 2025<\/div>\n<div><strong>Time<\/strong>: 7:00 PM IST\u202f| 8:30 AM EST | 7:30 AM CST<\/div>\n<div>\n<p><strong>Topic: <\/strong> AI-Enhanced DevSecOps: Automating Security from Code to Cloud<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><br>\n<!--<a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/5756563944936267095?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a>--><\/p>\n<p><strong>Abstract: <\/strong> As organizations rapidly develop applications tailored for cloud environments, security must evolve in parallel. However, the fast-paced and expansive nature of modern ecosystems, such as the cloud, often overwhelms traditional security approaches, leaving teams struggling to keep up. This webinar explores how artificial intelligence transforms DevSecOps by embedding intelligent, automated security checks throughout the software development lifecycle, from code commit to cloud deployment. It also examines how AI enhances threat detection, accelerates responses to vulnerabilities, ensures continuous compliance, and strengthens secure development practices. The session will provide actionable insights for building a resilient, AI-powered DevSecOps pipeline.<\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>The role of AI in modern DevSecOps<\/li>\n<li>Integrating AI capabilities with DevSecOps for vulnerability management and cloud security<\/li>\n<li>AI-driven threat detection and response in cloud-native DevSecOps<\/li>\n<li>Intelligent automation strategies for continuous compliance and policy enforcement<\/li>\n<li>AI-enhanced workflows that improve collaboration across the SDLC<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/vandana_headshot.jpg\" alt=\"Vandana Verma\" width=\"192\" height=\"256\"><strong> Vandana Verma,<\/strong> Security Leader at Snyk<\/p>\n<p><strong>Bio:&nbsp;<\/strong> Vandana Verma Sehgal is a globally recognized cybersecurity leader, community builder, and advocate for diversity in technology. She currently serves as a Security Leader at Snyk, where she focuses on helping developers and organizations build secure applications from the ground up.<\/p>\n<p>With over 17 years of experience in application security, cloud security, and DevSecOps, Vandana has been instrumental in advancing security practices worldwide. She is a long-standing board member of the OWASP Foundation, leading initiatives such as OWASP AppSec Days India.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\n<p><iframe id=\"attend\" src=\"https:\/\/www.youtube.com\/embed\/mhF_i6itpPA?si=4Pb7XRIIoCsBw2xo&amp;enablejsapi=1&amp;origin=https:\/\/www.eccouncil.org\" width=\"560\" height=\"400\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-lf-form-tracking-inspected-lynor8xwpxvawqjz=\"true\" data-lf-yt-playback-inspected-lynor8xwpxvawqjz=\"true\" data-lf-vimeo-playback-inspected-lynor8xwpxvawqjz=\"true\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: November 12, 2025 Time: 7:00 PM IST\u202f| 8:30 AM EST | 7:30 AM CST Topic: AI-Enhanced DevSecOps: Automating Security from Code to Cloud Watch Now Abstract: As organizations rapidly develop applications tailored for cloud environments, security must evolve in parallel. However, the fast-paced and expansive nature of modern ecosystems, such as the cloud, often&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83775,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83774","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How AI Transforms DevSecOps and Cloud Security<\/title>\n<meta name=\"description\" content=\"Discover how AI enhances DevSecOps through intelligent automation, continuous compliance, and faster threat detection from code to cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Enhanced DevSecOps: Automating Security from Code to Cloud\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover how AI enhances DevSecOps through intelligent automation, continuous compliance, and faster threat detection from code to cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-12T17:07:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-31T06:02:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"AI-Enhanced DevSecOps: Automating Security from Code to Cloud\u00a0\",\"datePublished\":\"2025-11-12T17:07:18+00:00\",\"dateModified\":\"2025-12-31T06:02:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/\"},\"wordCount\":260,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/\",\"name\":\"How AI Transforms DevSecOps and Cloud Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg\",\"datePublished\":\"2025-11-12T17:07:18+00:00\",\"dateModified\":\"2025-12-31T06:02:08+00:00\",\"description\":\"Discover how AI enhances DevSecOps through intelligent automation, continuous compliance, and faster threat detection from code to cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI-Enhanced DevSecOps: Automating Security from Code to Cloud\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How AI Transforms DevSecOps and Cloud Security","description":"Discover how AI enhances DevSecOps through intelligent automation, continuous compliance, and faster threat detection from code to cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/","og_locale":"en_US","og_type":"article","og_title":"AI-Enhanced DevSecOps: Automating Security from Code to Cloud\u00a0","og_description":"Discover how AI enhances DevSecOps through intelligent automation, continuous compliance, and faster threat detection from code to cloud.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-11-12T17:07:18+00:00","article_modified_time":"2025-12-31T06:02:08+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"AI-Enhanced DevSecOps: Automating Security from Code to Cloud\u00a0","datePublished":"2025-11-12T17:07:18+00:00","dateModified":"2025-12-31T06:02:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/"},"wordCount":260,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/","name":"How AI Transforms DevSecOps and Cloud Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg","datePublished":"2025-11-12T17:07:18+00:00","dateModified":"2025-12-31T06:02:08+00:00","description":"Discover how AI enhances DevSecOps through intelligent automation, continuous compliance, and faster threat detection from code to cloud.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/10\/Discover-how-AI-enhances-DevSecOps-through-intelligent-automation-continuous-compliance-and-faster-threat-detection-from-code-to-cloud.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enhanced-devsecops-automating-security-from-code-to-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"AI-Enhanced DevSecOps: Automating Security from Code to Cloud\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83774"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83774\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83775"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}