{"id":83915,"date":"2025-12-16T06:46:08","date_gmt":"2025-12-16T06:46:08","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=83915"},"modified":"2026-04-16T10:04:03","modified_gmt":"2026-04-16T10:04:03","slug":"from-logs-to-evidence-embedded-and-iot-forensics","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/","title":{"rendered":"From Logs to Evidence: Embedded and IoT Forensics\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"83915\" class=\"elementor elementor-83915\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cea405d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cea405d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-73c4053\" data-id=\"73c4053\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6b76dd1 elementor-widget elementor-widget-text-editor\" data-id=\"6b76dd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: December 15, 2025<\/div><div><strong>Time<\/strong>: 8:30 AM EST | 7:30 AM CST | 7:00 PM IST<\/div><div><p><strong>Topic: <\/strong> From Logs to Evidence: Embedded and IoT Forensics<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong> With the rapid global adoption of embedded and IoT devices, threat actors are increasingly targeting these technologies to launch sophisticated cyberattacks. The third installment of the &#8220;From Logs to Evidence&#8221; webinar series focuses on forensic workflows tailored to the unique challenges of investigating smart and embedded systems\u2014environments where traditional forensic methods often fall short. Participants will learn how to identify, extract, and analyze logs from resource-constrained devices that typically feature limited storage, proprietary protocols, and nonstandard architectures. The session also highlights real-world examples and practical approaches to uncovering forensic evidence in embedded and IoT ecosystems, emphasizing ongoing developments and opportunities in securing the next generation of connected devices.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Threat landscape of embedded and IoT devices<\/li><li>Challenges in embedded and IoT forensics<\/li><li>Reimagining forensic workflows for embedded and IoT ecosystems<\/li><li>Forensic acquisition and analysis techniques<\/li><li>Case studies and opportunities for innovation<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"alignleft wp-image-59705\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/Amber-Schroader.png\" alt=\"Amber Schroader\" width=\"192\" height=\"256\" \/><strong> Amber Schroader,<\/strong> CEO &amp; Founder, Paraben Corporation<\/p><p><strong>Bio:\u00a0<\/strong> Over the past three decades, Amber Schroader has been a driving force for innovation in digital forensics. Ms. Schroader has developed many software programs, courses, and guides in the areas of recovering data from smartphones, computer hard drives, cloud, email, and gaming systems. She has established protocols for the seizure and processing of digital evidence that have been used by numerous organizations throughout the world. She has coined the concepts of the \u201c360-degree approach to digital forensics\u201d and \u201cForensics of Everything-FoE,\u201d with her focus on unique problems in digital evidence and solutions. Ms. Schroader has been a significant industry influence in advocating for the big-picture consideration of digital evidence. An accomplished design architect, curriculum developer, and instructor, she has written and taught numerous classes in this specialized field and has earned multiple certifications. She continues to contribute to the field through book contributions and other industry speaking engagements.<\/p><\/div><div id=\"attend\">\u00a0<\/div><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Ib8jUWvINBw?si=YWvERMpb22r6FED1\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 15, 2025Time: 8:30 AM EST | 7:30 AM CST | 7:00 PM IST Topic: From Logs to Evidence: Embedded and IoT Forensics Watch Now Abstract: With the rapid global adoption of embedded and IoT devices, threat actors are increasingly targeting these technologies to launch sophisticated cyberattacks. The third installment of the &#8220;From Logs&hellip;<\/p>\n","protected":false},"author":32,"featured_media":83916,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-83915","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Embedded &amp; IoT Forensics: Challenges, Techniques, &amp; Emerging Threats<\/title>\n<meta name=\"description\" content=\"Learn how to identify, extract, and analyze forensic data from embedded and IoT devices. Explore log analysis workflows, real-world case studies, and emerging trends.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Logs to Evidence: Embedded and IoT Forensics\u00a0\" \/>\n<meta property=\"og:description\" content=\"Learn how to identify, extract, and analyze forensic data from embedded and IoT devices. Explore log analysis workflows, real-world case studies, and emerging trends.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-16T06:46:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T10:04:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/11\/15-dec_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"From Logs to Evidence: Embedded and IoT Forensics\u00a0\",\"datePublished\":\"2025-12-16T06:46:08+00:00\",\"dateModified\":\"2026-04-16T10:04:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/\"},\"wordCount\":329,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/15-dec_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/\",\"name\":\"Embedded & IoT Forensics: Challenges, Techniques, & Emerging Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/15-dec_465x310-Without-RN.png\",\"datePublished\":\"2025-12-16T06:46:08+00:00\",\"dateModified\":\"2026-04-16T10:04:03+00:00\",\"description\":\"Learn how to identify, extract, and analyze forensic data from embedded and IoT devices. Explore log analysis workflows, real-world case studies, and emerging trends.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/15-dec_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/15-dec_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-logs-to-evidence-embedded-and-iot-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From Logs to Evidence: Embedded and IoT Forensics\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Embedded & IoT Forensics: Challenges, Techniques, & Emerging Threats","description":"Learn how to identify, extract, and analyze forensic data from embedded and IoT devices. Explore log analysis workflows, real-world case studies, and emerging trends.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/","og_locale":"en_US","og_type":"article","og_title":"From Logs to Evidence: Embedded and IoT Forensics\u00a0","og_description":"Learn how to identify, extract, and analyze forensic data from embedded and IoT devices. Explore log analysis workflows, real-world case studies, and emerging trends.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2025-12-16T06:46:08+00:00","article_modified_time":"2026-04-16T10:04:03+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/11\/15-dec_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"From Logs to Evidence: Embedded and IoT Forensics\u00a0","datePublished":"2025-12-16T06:46:08+00:00","dateModified":"2026-04-16T10:04:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/"},"wordCount":329,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/11\/15-dec_465x310-Without-RN.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/","name":"Embedded & IoT Forensics: Challenges, Techniques, & Emerging Threats","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/11\/15-dec_465x310-Without-RN.png","datePublished":"2025-12-16T06:46:08+00:00","dateModified":"2026-04-16T10:04:03+00:00","description":"Learn how to identify, extract, and analyze forensic data from embedded and IoT devices. Explore log analysis workflows, real-world case studies, and emerging trends.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/11\/15-dec_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2025\/11\/15-dec_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-logs-to-evidence-embedded-and-iot-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"From Logs to Evidence: Embedded and IoT Forensics\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=83915"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/83915\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/83916"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=83915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=83915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=83915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}