{"id":84281,"date":"2026-02-24T08:06:26","date_gmt":"2026-02-24T08:06:26","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84281"},"modified":"2026-03-18T12:35:37","modified_gmt":"2026-03-18T12:35:37","slug":"ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/","title":{"rendered":"AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84281\" class=\"elementor elementor-84281\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c8ac7ff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c8ac7ff\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ae19d3\" data-id=\"3ae19d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7501bd elementor-widget elementor-widget-text-editor\" data-id=\"a7501bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> February 24, 2026<br>\n<strong>Time:<\/strong> 9:00 AM EST | 8:00 AM CST | 7:30 PM IST<br>\n<strong>Topic:<\/strong> AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong>As artificial intelligence becomes deeply embedded in enterprise technology stacks, it is reshaping both cyber defense capabilities and the threat landscape itself. Adversaries are increasingly weaponizing AI to automate attacks, manipulate models, and exploit data dependencies, while organizations are racing to deploy AI-driven security tools at scale. This convergence creates a critical governance challenge: how to adopt AI in cybersecurity without amplifying risk or eroding trust.<\/p>\n<p>This session examines practical, real-world best practices for deploying AI-enabled cybersecurity capabilities through a governance-first lens. Drawing on leadership experience and operational insights, the discussion highlights how AI expands the attack surface through adversarial AI, model compromise, data poisoning, and opaque decision-making, while also enabling more adaptive and resilient security defenses.<\/p>\n<p>Using the Commitment\u2013Preparedness\u2013Discipline (CPD) governance framework, the session provides actionable guidance for aligning executive leadership, cybersecurity strategy, and enterprise risk management. Attendees will also learn how to establish clear ownership and accountability for AI initiatives (Commitment), architect secure and resilient AI-enabled systems (Preparedness), and operationalize continuous risk assessment, monitoring, and oversight across the AI lifecycle (Discipline).<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>How AI is reshaping the cybersecurity threat landscape and expanding the enterprise attack surface<\/li>\n<li>Why governance, not technology alone, is the critical enabler of trustworthy AI adoption<\/li>\n<li>Applying the CPD framework to align leadership accountability, cybersecurity strategy, and AI risk management<\/li>\n<li>Best practices for designing and deploying AI-enabled security capabilities without increasing organizational exposure<\/li>\n<li>Operationalizing continuous monitoring, model oversight, and risk discipline across the AI lifecycle<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<strong><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-74756 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/Dr.-Dave-Chatterjee-4.jpeg\" alt=\"\" width=\"200\" height=\"300\">Dave Chatterjee, <\/strong> Adjunct Associate Professor, Duke University, and\u202fCreator of the Commitment\u2013Preparedness\u2013Discipline (CPD) framework<br>\n<strong>Bio: <\/strong>Dave Chatterjee, Ph.D., is a cybersecurity and technology strategist and Adjunct Associate Professor at Duke University, and a former tenured Associate Professor at the University of Georgia. He is the creator of the empirically grounded Commitment\u2013Preparedness\u2013Discipline (CPD) framework, which helps organizations translate cybersecurity strategy into resilient execution under real-world pressure. Dr. Chatterjee advises global enterprises on cybersecurity governance, AI risk, and operational resilience, and has participated in CISO SWAT teams and advisory boards. He is the author of Cybersecurity Readiness: A Holistic and High-Performance Approach and the techno-thriller The DeepFake Conspiracy (an Amazon bests Seller). He also hosts the Cybersecurity Readiness Podcast Series and contributes to the RSA Conference Expert Portal<\/p>\n<p><a name=\"attend\"><\/a><\/p>\n<p><iframe width=\"560\" height=\"415\" src=\"https:\/\/www.youtube.com\/embed\/JNLQd_M0Mr8?si=yGphSrg0qAXpF2xV&amp;enablejsapi=1&amp;origin=https:\/\/www.eccouncil.org\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen=\"\" data-lf-form-tracking-inspected-lynor8xwpxvawqjz=\"true\" data-lf-yt-playback-inspected-lynor8xwpxvawqjz=\"true\" data-lf-vimeo-playback-inspected-lynor8xwpxvawqjz=\"true\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 24, 2026 Time: 9:00 AM EST | 8:00 AM CST | 7:30 PM IST Topic: AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt Watch Now Abstract: As artificial intelligence becomes deeply embedded in enterprise technology stacks, it is reshaping both cyber defense capabilities and the threat landscape itself. Adversaries are increasingly weaponizing&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-84281","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Artificial Intelligence in Cybersecurity: Managing Risk, Governance, and Threats<\/title>\n<meta name=\"description\" content=\"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt\" \/>\n<meta property=\"og:description\" content=\"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-24T08:06:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T12:35:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/24-feb_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt\",\"datePublished\":\"2026-02-24T08:06:26+00:00\",\"dateModified\":\"2026-03-18T12:35:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/\"},\"wordCount\":406,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/24-feb_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/\",\"name\":\"Artificial Intelligence in Cybersecurity: Managing Risk, Governance, and Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/24-feb_465x310-Without-RN.png\",\"datePublished\":\"2026-02-24T08:06:26+00:00\",\"dateModified\":\"2026-03-18T12:35:37+00:00\",\"description\":\"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/24-feb_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/24-feb_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Artificial Intelligence in Cybersecurity: Managing Risk, Governance, and Threats","description":"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/","og_locale":"en_US","og_type":"article","og_title":"AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt","og_description":"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-02-24T08:06:26+00:00","article_modified_time":"2026-03-18T12:35:37+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/24-feb_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt","datePublished":"2026-02-24T08:06:26+00:00","dateModified":"2026-03-18T12:35:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/"},"wordCount":406,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/24-feb_465x310-Without-RN.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/","name":"Artificial Intelligence in Cybersecurity: Managing Risk, Governance, and Threats","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/24-feb_465x310-Without-RN.png","datePublished":"2026-02-24T08:06:26+00:00","dateModified":"2026-03-18T12:35:37+00:00","description":"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/24-feb_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/24-feb_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"AI-Enabled Cybersecurity Best Practices: What Security Leaders Must Adopt"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84281"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84281\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84282"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}