{"id":84779,"date":"2026-01-21T11:25:00","date_gmt":"2026-01-21T11:25:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84779"},"modified":"2026-03-31T14:08:43","modified_gmt":"2026-03-31T14:08:43","slug":"operational-technology-governance-in-the-age-of-autonomous-systems","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/","title":{"rendered":"Operational Technology Governance in the Age of Autonomous Systems"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84779\" class=\"elementor elementor-84779\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4214e8a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4214e8a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-78c3a2f\" data-id=\"78c3a2f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f38f568 elementor-widget elementor-widget-text-editor\" data-id=\"f38f568\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: April 22, 2026<\/div>\n<div><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Operational Technology Governance in the Age of Autonomous Systems<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/4095234865687320672?source=ECC+webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> The integration of advanced technologies into industrial environments is transforming how operational technology (OT) systems are designed, managed, and secured. The combination of industrial complexity, environmental exposure, rising cyber costs, and emerging technological threats makes this a critical moment for advancing OT cybersecurity resilience. From smart manufacturing and autonomous robotics to AI-assisted energy grids and transportation systems, organizations are increasingly relying on intelligent automation to improve efficiency, safety, and scalability. However, this shift introduces new governance challenges and opportunities across cybersecurity, safety, compliance, and resilience.<\/p>\n<p>This webinar explores how organizations can establish robust governance frameworks for OT environments evolving toward autonomous operations and introduces resilience blueprints particularly relevant to combined weather-related and infrastructure-specific risks. It&nbsp;<span style=\"word-spacing: normal;\">discusses key risks in interconnected industrial systems, including attack surfaces, accountability for AI-driven decisions, system integrity, and supply chain management. The session also highlights best practices for integrating cybersecurity, risk management, and policy oversight into OT governance models. Attendees will learn how to align OT governance with enterprise security strategies, implement lifecycle oversight for autonomous systems, and prepare for evolving regulatory expectations.<\/span><\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Strategies for reducing operational risk in critical infrastructure<\/li>\n<li>The evolving operational technology threat landscape<\/li>\n<li>Emerging governance challenges in OT systems<\/li>\n<li>Approaches to integrating governance across IT, OT, and AI systems<\/li>\n<li>Best practices for overseeing and enhancing resilience across interconnected systems<\/li>\n<li>The impact of evolving policies and standards on OT operations<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/India-Pic.jpg\" width=\"192\" height=\"256\"><strong> India James,<\/strong> Industry Advisor and Lecturer, JIC<br>\n<strong>Bio:&nbsp;<\/strong> India James is a leading voice in security and critical infrastructure in the United States, having served at the helm of the largest investor-owned institutions and working collaboratively with federal agencies, including the FBI, the Department of Homeland Security, and the Department of Energy. Her career spans governance, risk, policy, enterprise execution, and transformation, with expertise in energy alongside real estate, critical operations, and large loads such as data centers.<\/p>\n<p>India currently advises executives, boards, and organizations on integrating land acquisition, energy, and critical infrastructure security, and technology policy into enterprise and infrastructure strategy. Beyond her technical skills, she is a former member of the Security Advisory Board for DistribuTECH International and currently a member of the Board of Directors of the Women&#8217;s Council on Energy and the Environment, representing global entities with interests in the energy and environmental sectors.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 22, 2026 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: Operational Technology Governance in the Age of Autonomous Systems Register Now Abstract: The integration of advanced technologies into industrial environments is transforming how operational technology (OT) systems are designed, managed, and secured. The combination of industrial complexity, environmental&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84780,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-84779","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Autonomous Systems and OT Cybersecurity Governance<\/title>\n<meta name=\"description\" content=\"Explore OT governance in the age of AI, automation, and autonomous systems to strengthen industrial cybersecurity, compliance, and risk management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operational Technology Governance in the Age of Autonomous Systems\" \/>\n<meta property=\"og:description\" content=\"Explore OT governance in the age of AI, automation, and autonomous systems to strengthen industrial cybersecurity, compliance, and risk management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-21T11:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T14:08:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/22-april_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Operational Technology Governance in the Age of Autonomous Systems\",\"datePublished\":\"2026-01-21T11:25:00+00:00\",\"dateModified\":\"2026-03-31T14:08:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/\"},\"wordCount\":413,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/22-april_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/\",\"name\":\"Autonomous Systems and OT Cybersecurity Governance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/22-april_465x310-Without-RN.png\",\"datePublished\":\"2026-01-21T11:25:00+00:00\",\"dateModified\":\"2026-03-31T14:08:43+00:00\",\"description\":\"Explore OT governance in the age of AI, automation, and autonomous systems to strengthen industrial cybersecurity, compliance, and risk management.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/22-april_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/22-april_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/operational-technology-governance-in-the-age-of-autonomous-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Operational Technology Governance in the Age of Autonomous Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Autonomous Systems and OT Cybersecurity Governance","description":"Explore OT governance in the age of AI, automation, and autonomous systems to strengthen industrial cybersecurity, compliance, and risk management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/","og_locale":"en_US","og_type":"article","og_title":"Operational Technology Governance in the Age of Autonomous Systems","og_description":"Explore OT governance in the age of AI, automation, and autonomous systems to strengthen industrial cybersecurity, compliance, and risk management.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-21T11:25:00+00:00","article_modified_time":"2026-03-31T14:08:43+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/22-april_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Operational Technology Governance in the Age of Autonomous Systems","datePublished":"2026-01-21T11:25:00+00:00","dateModified":"2026-03-31T14:08:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/"},"wordCount":413,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/22-april_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/","name":"Autonomous Systems and OT Cybersecurity Governance","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/22-april_465x310-Without-RN.png","datePublished":"2026-01-21T11:25:00+00:00","dateModified":"2026-03-31T14:08:43+00:00","description":"Explore OT governance in the age of AI, automation, and autonomous systems to strengthen industrial cybersecurity, compliance, and risk management.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/22-april_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/22-april_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/operational-technology-governance-in-the-age-of-autonomous-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Operational Technology Governance in the Age of Autonomous Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84779"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84779\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84780"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84779"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}