{"id":84122,"date":"2026-01-30T04:59:34","date_gmt":"2026-01-30T04:59:34","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84122"},"modified":"2026-04-23T10:22:21","modified_gmt":"2026-04-23T10:22:21","slug":"ai-powered-security-enhancing-incident-response-with-openai","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/","title":{"rendered":"AI-Powered Security: Enhancing Incident Response with OpenAI\u00a0\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84122\" class=\"elementor elementor-84122\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b9afb6e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b9afb6e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bc708ff\" data-id=\"bc708ff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91c3ec9 elementor-widget elementor-widget-text-editor\" data-id=\"91c3ec9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: January 29, 2026<\/div><div><strong>Time<\/strong>: 10:30 AM WET | 5:30 AM EST | 4:00 PM IST<\/div><div><p><strong>Topic: <\/strong> AI-Powered Security: Enhancing Incident Response with OpenAI<br \/><br \/><\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><br \/><br \/><\/p><p><strong>Abstract: <\/strong> SOC analysts are overwhelmed by alert fatigue and fragmented telemetry as traditional incident response workflows struggle to keep pace with the speed, scale, and complexity of modern attacks. This webinar explores the role of AI in addressing these issues through automation and intelligent incident analysis, enhancing incident response (IR) by augmenting human analysts with advanced reasoning, contextual analysis, and automation.<\/p><p>The session demonstrates how large language models (LLMs) integrated with Security Information and Event Management (SIEM), Extended Detection and Response (XDR), and security operations workflows can accelerate threat detection, triage, investigation, and containment. Attendees will also gain insights into how Azure OpenAI can be applied to correlate signals across XDR platforms, summarize incidents, enrich alerts with threat context, guide response actions, and support SOC analysts during high-pressure investigations.<br \/><br \/><\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Using Azure OpenAI for faster, smarter incident triage<\/li><li>Leveraging AI to improve signal correlation across XDR platforms<\/li><li>Enabling context-enriched alerting with Azure OpenAI<\/li><li>Enhancing AI models with an external source-driven retrieval-augmented generation (RAG)<\/li><li>Fine-tuning pre-trained AI models to adapt them for specific security tasks<br \/><br \/><\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/Sergey-Chubarov.png\" alt=\"Sergey Chubarov\" width=\"192\" height=\"256\" \/><strong> Sergey Chubarov<\/strong>, Security Expert<\/p><p><strong>Bio:\u00a0<\/strong> Sergey\u202fChubarov is a security and cloud expert and instructor with over 15 years of experience in Microsoft technologies. In his day-to-day role, he helps organizations securely adopt cloud technologies. He holds\u202fnumerous\u202fcertifications and recognitions such as Microsoft MVP: Security, OSCP, OSEP,\u202feCPPT,\u202feCPTX, Microsoft Certified Trainer, MCT Regional Lead, C|PSA, C|RT, C|EH, C|PENT, L|PT, C|CSE, C|EI, among others. Sergey is also a frequent speaker at international conferences,\u202fincluding Global Azure, DEF CON, Black Hat Europe, Wild West\u202fHackin\u2019 Fest, Security\u202fBSides, Workplace Ninja, Midwest Management Summit, and Hack in the Box.<br \/><br \/><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a72766 elementor-widget elementor-widget-video\" data-id=\"0a72766\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"attend\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=-1KaIehqCJE&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: January 29, 2026Time: 10:30 AM WET | 5:30 AM EST | 4:00 PM IST Topic: AI-Powered Security: Enhancing Incident Response with OpenAI Watch Now Abstract: SOC analysts are overwhelmed by alert fatigue and fragmented telemetry as traditional incident response workflows struggle to keep pace with the speed, scale, and complexity of modern attacks. This&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84123,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-84122","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Azure OpenAI Improves Incident Response and Threat Mitigation<\/title>\n<meta name=\"description\" content=\"Gain insights into how Azure OpenAI automates incident response by integrating with XDR and SIEM to enhance threat detection, investigation, and mitigation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Powered Security: Enhancing Incident Response with OpenAI\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"Gain insights into how Azure OpenAI automates incident response by integrating with XDR and SIEM to enhance threat detection, investigation, and mitigation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-30T04:59:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-23T10:22:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/29-jan_465x310-Without-RN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"AI-Powered Security: Enhancing Incident Response with OpenAI\u00a0\u00a0\",\"datePublished\":\"2026-01-30T04:59:34+00:00\",\"dateModified\":\"2026-04-23T10:22:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/\"},\"wordCount\":314,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/29-jan_465x310-Without-RN.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/\",\"name\":\"How Azure OpenAI Improves Incident Response and Threat Mitigation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/29-jan_465x310-Without-RN.jpg\",\"datePublished\":\"2026-01-30T04:59:34+00:00\",\"dateModified\":\"2026-04-23T10:22:21+00:00\",\"description\":\"Gain insights into how Azure OpenAI automates incident response by integrating with XDR and SIEM to enhance threat detection, investigation, and mitigation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/29-jan_465x310-Without-RN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/29-jan_465x310-Without-RN.jpg\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-powered-security-enhancing-incident-response-with-openai\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI-Powered Security: Enhancing Incident Response with OpenAI\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Azure OpenAI Improves Incident Response and Threat Mitigation","description":"Gain insights into how Azure OpenAI automates incident response by integrating with XDR and SIEM to enhance threat detection, investigation, and mitigation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/","og_locale":"en_US","og_type":"article","og_title":"AI-Powered Security: Enhancing Incident Response with OpenAI\u00a0\u00a0","og_description":"Gain insights into how Azure OpenAI automates incident response by integrating with XDR and SIEM to enhance threat detection, investigation, and mitigation.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-30T04:59:34+00:00","article_modified_time":"2026-04-23T10:22:21+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/29-jan_465x310-Without-RN.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"AI-Powered Security: Enhancing Incident Response with OpenAI\u00a0\u00a0","datePublished":"2026-01-30T04:59:34+00:00","dateModified":"2026-04-23T10:22:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/"},"wordCount":314,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/29-jan_465x310-Without-RN.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/","name":"How Azure OpenAI Improves Incident Response and Threat Mitigation","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/29-jan_465x310-Without-RN.jpg","datePublished":"2026-01-30T04:59:34+00:00","dateModified":"2026-04-23T10:22:21+00:00","description":"Gain insights into how Azure OpenAI automates incident response by integrating with XDR and SIEM to enhance threat detection, investigation, and mitigation.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/29-jan_465x310-Without-RN.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/29-jan_465x310-Without-RN.jpg","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-powered-security-enhancing-incident-response-with-openai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"AI-Powered Security: Enhancing Incident Response with OpenAI\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84122"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84122\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84123"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}