{"id":84360,"date":"2026-02-25T05:15:00","date_gmt":"2026-02-25T05:15:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84360"},"modified":"2026-03-16T11:46:38","modified_gmt":"2026-03-16T11:46:38","slug":"human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/","title":{"rendered":"Human\u00a0in\u00a0the\u00a0Loop IR: Balancing AI Automation with Control and Compliance\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84360\" class=\"elementor elementor-84360\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4fb0302 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4fb0302\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11e445d\" data-id=\"11e445d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7c17b26 elementor-widget elementor-widget-text-editor\" data-id=\"7c17b26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> February 25, 2026<br \/><strong>Time:<\/strong> 9:00 AM EST \/ 8:00 AM CST \/ 7:30 PM IST<br \/><strong>Topic:<\/strong> Human-in-the-Loop IR: Balancing AI Automation with Control and Compliance<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong>As AI-driven automation becomes central to modern Incident Response (IR), organizations face a critical challenge associated to lack of human oversight and control. Over-automated response can introduce compliance risks, opaque decision-making, and unintended business impact. The current webinar explores Human-in-the-Loop (HITL) Incident Response as a pragmatic operating model that balances AI-powered speed with human oversight. It aims to understand as to where AI excels in IR workflows i.e., detection, triage, enrichment, and response orchestration, and where human intervention remains essential for risk acceptance, escalation, evidence handling, and regulatory alignment. Join us to gain insights into designing HITL IR playbooks, mapping AI decisions to governance and audit requirements, and aligning automation with existing security frameworks, and SOC operating models.<\/p><p><strong>Key takeaways:<\/strong><\/p><ul><li>Defining Human-in-the loop HITL IR and its scope<\/li><li>How to integrate accountability in automation and AI-driven IR<\/li><li>Role of HITL in improving compliance posture<\/li><li>Combining AI insights with human context for agile IR<\/li><li>Operationalizing HITL by design in IR playbook<\/li><li>Future-ready SOC by blending AI and expertise<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><strong><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-74756 alignleft\" src=\"https:\/\/eccweb.s3.ap-south-1.amazonaws.com\/wp-content\/uploads\/2024\/07\/26104204\/Eder-Ribeiro-2-1-285x300.png\" alt=\"\" width=\"200\" height=\"300\" \/>Eder Ribeiro, <\/strong> Director, Global Incident Response, TransUnion<br \/><strong>Bio: <\/strong>Eder is a founding member and leader of Cyberscout\u2019s (A TransUnion Company) Incident Response Forensics (IRF) team. The IRF team focuses on Digital Forensics Incident Response services to the insurance market and law firms. Eder and his team support IRF operations in the US, Canada, Australia, some European and LATAM jurisdictions. Eder also leads the US breach notification\/fulfillment team which is part of TransUnion\u2019s uniquely holistic approach to cyber. Eder has a background in cybersecurity, privacy, incident response and leadership. Prior to joining TransUnion, Eder earned a Juris Doctor with a focus on privacy, compliance, contracts, and corporate law from Roger Williams University School of Law. Eder also earned a Master of Science degree in Cybersecurity from Roger Williams University. Eder has and continues to serve as a Non-Commissioned Officer in the Rhode Island Army National Guard for twenty (20) years, including a tour of duty in the Kandahar province, Afghanistan, in support of Operation enduring Freedom.<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/LAya7KPVkq4?si=KCGtVNiRywkGJG7w\" width=\"560\" height=\"415\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: February 25, 2026Time: 9:00 AM EST \/ 8:00 AM CST \/ 7:30 PM ISTTopic: Human-in-the-Loop IR: Balancing AI Automation with Control and Compliance Watch Now Abstract: As AI-driven automation becomes central to modern Incident Response (IR), organizations face a critical challenge associated to lack of human oversight and control. Over-automated response can introduce compliance&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-84360","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Human-in-the-Loop IR: AI, Control &amp; Compliance<\/title>\n<meta name=\"description\" content=\"Explore how Human-in-the-Loop Incident Response balances AI automation with human control to improve security, compliance, and decision-making.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Human\u00a0in\u00a0the\u00a0Loop IR: Balancing AI Automation with Control and Compliance\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore how Human-in-the-Loop Incident Response balances AI automation with human control to improve security, compliance, and decision-making.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-25T05:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-16T11:46:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Human\u00a0in\u00a0the\u00a0Loop IR: Balancing AI Automation with Control and Compliance\u00a0\",\"datePublished\":\"2026-02-25T05:15:00+00:00\",\"dateModified\":\"2026-03-16T11:46:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/\"},\"wordCount\":370,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/\",\"name\":\"Human-in-the-Loop IR: AI, Control & Compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png\",\"datePublished\":\"2026-02-25T05:15:00+00:00\",\"dateModified\":\"2026-03-16T11:46:38+00:00\",\"description\":\"Explore how Human-in-the-Loop Incident Response balances AI automation with human control to improve security, compliance, and decision-making.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Human\u00a0in\u00a0the\u00a0Loop IR: Balancing AI Automation with Control and Compliance\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Human-in-the-Loop IR: AI, Control & Compliance","description":"Explore how Human-in-the-Loop Incident Response balances AI automation with human control to improve security, compliance, and decision-making.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Human\u00a0in\u00a0the\u00a0Loop IR: Balancing AI Automation with Control and Compliance\u00a0","og_description":"Explore how Human-in-the-Loop Incident Response balances AI automation with human control to improve security, compliance, and decision-making.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-02-25T05:15:00+00:00","article_modified_time":"2026-03-16T11:46:38+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Human\u00a0in\u00a0the\u00a0Loop IR: Balancing AI Automation with Control and Compliance\u00a0","datePublished":"2026-02-25T05:15:00+00:00","dateModified":"2026-03-16T11:46:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/"},"wordCount":370,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/","name":"Human-in-the-Loop IR: AI, Control & Compliance","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png","datePublished":"2026-02-25T05:15:00+00:00","dateModified":"2026-03-16T11:46:38+00:00","description":"Explore how Human-in-the-Loop Incident Response balances AI automation with human control to improve security, compliance, and decision-making.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/Human-in-the-Loop-IR-Balancing-AI-Automation-with-Control-and-Compliance.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/human-in-the-loop-ir-balancing-ai-automation-with-control-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Human\u00a0in\u00a0the\u00a0Loop IR: Balancing AI Automation with Control and Compliance\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84360"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84360\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84361"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}