{"id":84443,"date":"2026-03-27T09:25:41","date_gmt":"2026-03-27T09:25:41","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84443"},"modified":"2026-04-22T13:46:45","modified_gmt":"2026-04-22T13:46:45","slug":"ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/","title":{"rendered":"AI Risk in the Boardroom: Women Driving Responsible AI Decisions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84443\" class=\"elementor elementor-84443\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c8ac7ff elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c8ac7ff\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3ae19d3\" data-id=\"3ae19d3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7501bd elementor-widget elementor-widget-text-editor\" data-id=\"a7501bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> March 26, 2026<br \/><strong>Time:<\/strong> 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST<br \/><strong>Topic:<\/strong> AI Risk in the Boardroom: Women Driving Responsible AI Decisions<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch Now<\/a><\/p>\n<p><strong>Abstract: <\/strong>As artificial intelligence (AI) becomes embedded in core business functions, AI risk has evolved from a technical concern to a board-level governance priority. Regulatory exposure, ethical failures, model opacity, and third-party AI dependencies have increased board accountability for how AI impacts trust, compliance, and enterprise value.<\/p>\n<p>This webinar explores how women leaders across boards, executive leadership, legal, risk, and technology functions are shaping more responsible, resilient, and transparent AI decision-making. Through a governance-first lens, the session examines how diverse leadership strengthens AI oversight, improves risk identification, and aligns AI strategy with organizational values and regulatory expectations. Attendees will also gain practical insights into decision-making for AI risk frameworks, emerging regulations, and the role of inclusive leadership in ensuring secure, long-term business objectives.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Understand why AI risk is now a board responsibility<\/li>\n<li>Explore practical frameworks for board-level AI risk management<\/li>\n<li>Operationalize responsible AI from policy to practice<\/li>\n<li>Understand key global AI regulations and compliance pressures<\/li>\n<li>Recognize the advantages of inclusive leadership in AI governance<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br \/><strong><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-74756 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/Angel-1.jpeg\" alt=\"\" width=\"200\" height=\"300\" \/>Angel Mosley, <\/strong> CEO and vCISO, CyBase Risk Management<br \/><strong>Bio: <\/strong>With over two decades in cybersecurity, Angel Mosley has excelled as a consultant, trainer, and leader in data security, privacy, risk management, and IT audit. In 2024, she founded CyBase Risk Management to help small and medium-sized businesses improve their cyber resilience. She is also the proud founder of CyberSecurity GameChangers, a nonprofit organization that guides middle and high school students toward tech and cybersecurity careers through symposiums, summer camps, and after-school programs.<\/p>\n<p>A versatile speaker, Angel connects with business professionals, industry leaders, and students alike, sharing her deep expertise and passion for education. She makes complex topics relatable, dedicating herself to empowering everyone and nurturing the next generation of tech innovators.<br \/><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/XZfxQ2czfag?si=i64WNUvj9-0LdNrl&amp;enablejsapi=1&amp;origin=https:\/\/www.eccouncil.org\" width=\"560\" height=\"415\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" data-lf-form-tracking-inspected-lynor8xwpxvawqjz=\"true\" data-lf-yt-playback-inspected-lynor8xwpxvawqjz=\"true\" data-lf-vimeo-playback-inspected-lynor8xwpxvawqjz=\"true\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: March 26, 2026Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM ISTTopic: AI Risk in the Boardroom: Women Driving Responsible AI Decisions Watch Now Abstract: As artificial intelligence (AI) becomes embedded in core business functions, AI risk has evolved from a technical concern to a board-level governance priority. Regulatory exposure, ethical failures,&hellip;<\/p>\n","protected":false},"author":33,"featured_media":84445,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-84443","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Artificial Intelligence in Cybersecurity: Managing Risk, Governance, and Threats<\/title>\n<meta name=\"description\" content=\"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Risk in the Boardroom: Women Driving Responsible AI Decisions\" \/>\n<meta property=\"og:description\" content=\"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-27T09:25:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-22T13:46:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"AI Risk in the Boardroom: Women Driving Responsible AI Decisions\",\"datePublished\":\"2026-03-27T09:25:41+00:00\",\"dateModified\":\"2026-04-22T13:46:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/\"},\"wordCount\":319,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/26-march_465x310-Without-RN-1.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/\",\"name\":\"Artificial Intelligence in Cybersecurity: Managing Risk, Governance, and Threats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/26-march_465x310-Without-RN-1.png\",\"datePublished\":\"2026-03-27T09:25:41+00:00\",\"dateModified\":\"2026-04-22T13:46:45+00:00\",\"description\":\"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/26-march_465x310-Without-RN-1.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/26-march_465x310-Without-RN-1.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Recent Cybertalks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/recent-cybertalks\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"AI Risk in the Boardroom: Women Driving Responsible AI Decisions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Artificial Intelligence in Cybersecurity: Managing Risk, Governance, and Threats","description":"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/","og_locale":"en_US","og_type":"article","og_title":"AI Risk in the Boardroom: Women Driving Responsible AI Decisions","og_description":"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-03-27T09:25:41+00:00","article_modified_time":"2026-04-22T13:46:45+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"AI Risk in the Boardroom: Women Driving Responsible AI Decisions","datePublished":"2026-03-27T09:25:41+00:00","dateModified":"2026-04-22T13:46:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/"},"wordCount":319,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/","name":"Artificial Intelligence in Cybersecurity: Managing Risk, Governance, and Threats","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1.png","datePublished":"2026-03-27T09:25:41+00:00","dateModified":"2026-04-22T13:46:45+00:00","description":"Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/02\/26-march_465x310-Without-RN-1.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-risk-in-the-boardroom-women-driving-responsible-ai-decisions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Recent Cybertalks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/recent-cybertalks\/"},{"@type":"ListItem","position":5,"name":"AI Risk in the Boardroom: Women Driving Responsible AI Decisions"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84443"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84443\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84445"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}