{"id":84378,"date":"2026-03-11T04:51:30","date_gmt":"2026-03-11T04:51:30","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84378"},"modified":"2026-04-16T10:05:00","modified_gmt":"2026-04-16T10:05:00","slug":"from-risk-to-resilience-women-shaping-modern-cybersecurity-operations","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/","title":{"rendered":"From Risk to Resilience: Women Shaping Modern Cybersecurity Operations\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84378\" class=\"elementor elementor-84378\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c100b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c100b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd5d384\" data-id=\"fd5d384\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b2395f elementor-widget elementor-widget-text-editor\" data-id=\"5b2395f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: March 10, 2026<\/div><div><strong>Time<\/strong>: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST<\/div><div><p><strong>Topic: <\/strong> From Risk to Resilience: Women Shaping Modern Cybersecurity Operations<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong> Modern cybersecurity operations are evolving from reactive defense models to proactive, risk-driven resilience strategies. With expanding attack surfaces, AI-enabled threats, and increasing regulatory pressure, organizations must integrate risk intelligence, governance, and operational execution across the security lifecycle. The current webinar explores how women leaders are shaping the next generation of cybersecurity operations, driving transformation across Security Operations Centers (SOC), incident response, threat intelligence, and cyber risk management. Drawing from real-world experience, the session highlights how women practitioners are operationalizing risk into measurable security outcomes\u2014moving beyond alert-centric security toward resilient, business-aligned defense models.<br \/><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Translating cyber risk into operational priorities and resilience metrics<\/li><li>The evolution of SOCs in an AI-driven threat landscape<\/li><li>Integrating governance, automation, and human expertise in security operations<\/li><li>Leadership perspectives on building inclusive, high-performing cyber teams<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"alignleft wp-image-59705\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/HeatherNoggle.jpg\" alt=\"Heather Noggle\" width=\"192\" height=\"256\" \/><strong> Heather Noggle,<\/strong> Owner, Codistac<\/p><p><strong>Bio:\u00a0<\/strong> Heather Noggle is the owner of Codistac, a consulting and technology-writing firm focused on the intersection of people, software, and cybersecurity. Her work centers on governance, risk, and compliance (GRC), CMMC readiness, data-flow clarity, and turning messy technical realities into documentation that actually reflects how organizations operate.\u202f<\/p><p>She\u2019s building a reputation for \u201cdata-aware compliance\u201d work by interrogating systems, policies, and processes to surface gaps between what organizations say they do and what they actually do. Writing and speaking focus on effective policies, security requirements, frameworks, and translating technical complexity into usable language.\u202f<\/p><p>Heather holds the CSSLP and Security+ certifications and brings 30 years of experience spanning software development, requirements, HR, project management, cybersecurity, and professional writing. She\u2019s known for structured thinking, pattern recognition, and an insistence on operational truth over compliance fiction.\u202f<\/p><p>Heather serves on the Advisory Board of the Missouri Cybersecurity Center of Excellence and as the Vice Chair of the Springfield Tech Council. She speaks regularly on cybersecurity, communication, and compliance.\u202f\u202f<\/p><\/div><div id=\"attend\">\u00a0<\/div><p><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/KPe_PgzBAjY?si=5e44uOQnO6SL2a9U\" width=\"560\" height=\"415\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: March 10, 2026Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: From Risk to Resilience: Women Shaping Modern Cybersecurity Operations Watch Now Abstract: Modern cybersecurity operations are evolving from reactive defense models to proactive, risk-driven resilience strategies. With expanding attack surfaces, AI-enabled threats, and increasing regulatory pressure, organizations must integrate&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84394,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-84378","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>From Risk to Resilience: Women Driving Modern Cybersecurity Resilience<\/title>\n<meta name=\"description\" content=\"Discover how women leaders are transforming cybersecurity operations from managing risk to building resilient, future-ready security strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Risk to Resilience: Women Shaping Modern Cybersecurity Operations\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover how women leaders are transforming cybersecurity operations from managing risk to building resilient, future-ready security strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-11T04:51:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-16T10:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/10-march_465x310-Without-RN-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"From Risk to Resilience: Women Shaping Modern Cybersecurity Operations\u00a0\",\"datePublished\":\"2026-03-11T04:51:30+00:00\",\"dateModified\":\"2026-04-16T10:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/\"},\"wordCount\":331,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/10-march_465x310-Without-RN-1.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/\",\"name\":\"From Risk to Resilience: Women Driving Modern Cybersecurity Resilience\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/10-march_465x310-Without-RN-1.png\",\"datePublished\":\"2026-03-11T04:51:30+00:00\",\"dateModified\":\"2026-04-16T10:05:00+00:00\",\"description\":\"Discover how women leaders are transforming cybersecurity operations from managing risk to building resilient, future-ready security strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/10-march_465x310-Without-RN-1.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/10-march_465x310-Without-RN-1.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"From Risk to Resilience: Women Shaping Modern Cybersecurity Operations\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"From Risk to Resilience: Women Driving Modern Cybersecurity Resilience","description":"Discover how women leaders are transforming cybersecurity operations from managing risk to building resilient, future-ready security strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/","og_locale":"en_US","og_type":"article","og_title":"From Risk to Resilience: Women Shaping Modern Cybersecurity Operations\u00a0","og_description":"Discover how women leaders are transforming cybersecurity operations from managing risk to building resilient, future-ready security strategies.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-03-11T04:51:30+00:00","article_modified_time":"2026-04-16T10:05:00+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/10-march_465x310-Without-RN-1.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"From Risk to Resilience: Women Shaping Modern Cybersecurity Operations\u00a0","datePublished":"2026-03-11T04:51:30+00:00","dateModified":"2026-04-16T10:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/"},"wordCount":331,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/10-march_465x310-Without-RN-1.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/","name":"From Risk to Resilience: Women Driving Modern Cybersecurity Resilience","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/10-march_465x310-Without-RN-1.png","datePublished":"2026-03-11T04:51:30+00:00","dateModified":"2026-04-16T10:05:00+00:00","description":"Discover how women leaders are transforming cybersecurity operations from managing risk to building resilient, future-ready security strategies.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/10-march_465x310-Without-RN-1.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/10-march_465x310-Without-RN-1.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-risk-to-resilience-women-shaping-modern-cybersecurity-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"From Risk to Resilience: Women Shaping Modern Cybersecurity Operations\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84378"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84394"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}