{"id":84253,"date":"2026-02-18T13:11:27","date_gmt":"2026-02-18T13:11:27","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84253"},"modified":"2026-03-06T13:06:51","modified_gmt":"2026-03-06T13:06:51","slug":"incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/","title":{"rendered":"Incident Response with AI &amp; ML for OT\/IOT\/IIOT Attack Detection &amp; Prevention\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84253\" class=\"elementor elementor-84253\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e559e3e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e559e3e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b35175d\" data-id=\"b35175d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f326086 elementor-widget elementor-widget-text-editor\" data-id=\"f326086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: February 18, 2026<\/div><div><strong>Time<\/strong>: 6:00 AM EST | 5:00 AM CST | 4:30 PM IST<\/div><div><p><strong>Topic: <\/strong> Incident Response with AI &amp; ML for OT\/IOT\/IIOT Attack Detection &amp; Prevention<\/p><p><!--<a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/7818029503384539741?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a>--><\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong> As cyber threats progressively target Operational Technology (OT), Internet of Things (IoT), and Industrial IoT (IIoT) systems, traditional defenses struggle to keep pace. This talk introduces how artificial intelligence (AI) and machine learning (ML) can redefine incident response in these domains by enabling predictive detection and rapid response. Through portrayals of applied research and real-world datasets from the Global Cyber Alliance (GCA), I will demonstrate how the Data Science Lifecycle can be applied to build predictive ML models that identify anomalies, patterns, and attack trends over IIoT networks. The session introduces the IIoT Guardian prototype, a device-level cybersecurity solution that integrates ML\/AI for real-time anomaly detection.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Why Traditional IR Fails in OT\/IoT\/IIoT<\/li><li>Learn how to apply AI and ML to modern incident response<\/li><li>Discover how ML boosts detection, prioritization, and response speed<\/li><li>Explore how Data science lifecycle solves real IIoT security challenges.<\/li><li>Deployment of research and ML models in SOC and industrial operations<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/AB_thumbnail-8_blue.png\" width=\"192\" height=\"256\" \/><strong> Prof. Atdhe Buja,<\/strong> Assistant Professor, Commonwealth University of Pennsylvania<\/p><p><strong>Bio:\u00a0<\/strong> Atdhe Buja is an Assistant Professor of Computer Science, Digital Forensics, and Cybersecurity at the Commonwealth University of Pennsylvania, USA (Bloomsburg University). Atdhe is a world-renowned cybersecurity expert with decades of experience. As PM, Atdhe has established andcc. He is an EC-Council Instructor (CEI) and CEH, Microsoft IT Professional, and Oracle Administrator for RDMBS, and a leading authority on information technology, Industrial IoT, and ICS\/SCADA cybersecurity. His research work focuses on cybersecurity countermeasures for Industrial IoT, IoT security, ICS\/SCADA infrastructures, wireless sensor networks WSN, cybersecurity of ML and artificial intelligence, and database management systems. Author of multiple books, including &#8216;Cybersecurity of Industrial Internet of Things (IIoT)&#8217; and &#8216;AI and ML-Driven Cybersecurity: Industrial IoT and WSN with Python Scripting&#8217;.<\/p><\/div><div id=\"attend\"><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/OHIYqEw1ks4?si=njCwEhDjOlHunuz_\" width=\"560\" height=\"415\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 18, 2026Time: 6:00 AM EST | 5:00 AM CST | 4:30 PM IST Topic: Incident Response with AI &amp; ML for OT\/IOT\/IIOT Attack Detection &amp; Prevention Watch Now Abstract: As cyber threats progressively target Operational Technology (OT), Internet of Things (IoT), and Industrial IoT (IIoT) systems, traditional defenses struggle to keep pace. This&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84259,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-84253","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Incident Response with AI-Powered IR for OT, IoT &amp; IIoT Security<\/title>\n<meta name=\"description\" content=\"Discover AI &amp; ML\u2013powered incident response strategies for detecting, analyzing, and preventing OT, IoT, and IIoT cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Incident Response with AI &amp; ML for OT\/IOT\/IIOT Attack Detection &amp; Prevention\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover AI &amp; ML\u2013powered incident response strategies for detecting, analyzing, and preventing OT, IoT, and IIoT cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-18T13:11:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-06T13:06:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/18-feb_465x310-Without-RN-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Incident Response with AI &amp; ML for OT\\\/IOT\\\/IIOT Attack Detection &amp; Prevention\u00a0\",\"datePublished\":\"2026-02-18T13:11:27+00:00\",\"dateModified\":\"2026-03-06T13:06:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/\"},\"wordCount\":330,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/18-feb_465x310-Without-RN-1.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/\",\"name\":\"Incident Response with AI-Powered IR for OT, IoT & IIoT Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/18-feb_465x310-Without-RN-1.png\",\"datePublished\":\"2026-02-18T13:11:27+00:00\",\"dateModified\":\"2026-03-06T13:06:51+00:00\",\"description\":\"Discover AI & ML\u2013powered incident response strategies for detecting, analyzing, and preventing OT, IoT, and IIoT cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/18-feb_465x310-Without-RN-1.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/18-feb_465x310-Without-RN-1.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Incident Response with AI &amp; ML for OT\\\/IOT\\\/IIOT Attack Detection &amp; Prevention\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Incident Response with AI-Powered IR for OT, IoT & IIoT Security","description":"Discover AI & ML\u2013powered incident response strategies for detecting, analyzing, and preventing OT, IoT, and IIoT cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/","og_locale":"en_US","og_type":"article","og_title":"Incident Response with AI &amp; ML for OT\/IOT\/IIOT Attack Detection &amp; Prevention\u00a0","og_description":"Discover AI & ML\u2013powered incident response strategies for detecting, analyzing, and preventing OT, IoT, and IIoT cyber threats.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-02-18T13:11:27+00:00","article_modified_time":"2026-03-06T13:06:51+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/18-feb_465x310-Without-RN-1.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Incident Response with AI &amp; ML for OT\/IOT\/IIOT Attack Detection &amp; Prevention\u00a0","datePublished":"2026-02-18T13:11:27+00:00","dateModified":"2026-03-06T13:06:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/"},"wordCount":330,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/18-feb_465x310-Without-RN-1.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/","name":"Incident Response with AI-Powered IR for OT, IoT & IIoT Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/18-feb_465x310-Without-RN-1.png","datePublished":"2026-02-18T13:11:27+00:00","dateModified":"2026-03-06T13:06:51+00:00","description":"Discover AI & ML\u2013powered incident response strategies for detecting, analyzing, and preventing OT, IoT, and IIoT cyber threats.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/18-feb_465x310-Without-RN-1.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/18-feb_465x310-Without-RN-1.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/incident-response-with-ai-ml-for-ot-iot-iiot-attack-detection-prevention\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Incident Response with AI &amp; ML for OT\/IOT\/IIOT Attack Detection &amp; Prevention\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84253"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84253\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84259"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}