{"id":84790,"date":"2026-01-21T09:13:00","date_gmt":"2026-01-21T09:13:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84790"},"modified":"2026-03-26T09:25:45","modified_gmt":"2026-03-26T09:25:45","slug":"beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/","title":{"rendered":"Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84790\" class=\"elementor elementor-84790\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-194b469 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"194b469\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2f824c8\" data-id=\"2f824c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e7e66c elementor-widget elementor-widget-text-editor\" data-id=\"5e7e66c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div ><strong>Date<\/strong>: April 24, 2026 <\/div>\n<div ><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST <\/div>\n<div >\n<p><strong>Topic: <\/strong> Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture <\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/1302431350540976730?source=ECCU+webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> For decades, cybersecurity has operated largely as a reactive function centered on the security operations center (SOC). However, in today\u2019s AI-accelerated threat landscape, this model is no longer sufficient. Cybersecurity must evolve from an operational response mechanism into a governed enterprise architecture that supports business value creation.  <\/p>\n<p>This webinar explores how organizations can reposition security as a structured protection portfolio that integrates governance maturity, risk visibility, and measurable outcomes across the enterprise. The session will examine the limitations of siloed defense models and discuss how to design a scalable, value-driven security architecture aligned with executive priorities. Attendees will also gain insights into reframing cybersecurity as a strategic enabler rather than a cost center, helping leaders build measurable resilience and align technical defense, business strategy, and board-level oversight. <\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Transitioning from a reactive, SOC-centered model to an enterprise-wide security architecture <\/li>\n<li>Using a governance maturity lens to structure cybersecurity programs <\/li>\n<li>Adopting a portfolio-based approach to measurable protection outcomes <\/li>\n<li>Aligning cybersecurity with enterprise value <\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/eccweb.s3.ap-south-1.amazonaws.com\/wp-content\/uploads\/2026\/03\/25185435\/Michael-Shost.jpg\" width=\"192\" height=\"288\" loading=\"lazy\" data-src=\"https:\/\/eccweb.s3.ap-south-1.amazonaws.com\/wp-content\/uploads\/2026\/03\/25185435\/Michael-Shost.jpg\"><strong> Michael Shost,<\/strong> Executive Leader in Enterprise Delivery, Cybersecurity Strategy, and AI-Driven Organizational Transformation<br>\n<strong>Bio:&nbsp;<\/strong> Michael Shost is an executive leader in enterprise delivery, AI strategy, and cybersecurity, with more than 25 years of experience helping organizations design, govern, and execute technology initiatives. A former software engineer and globally recognized PMO and portfolio management leader, he specializes in integrating AI, machine learning, and deep learning into enterprise delivery and cybersecurity operations, helping organizations build intelligent, data-driven operating models that improve strategic execution and resilience.<\/p>\n<p>Michael currently serves as a Security Portfolio Leader within the PgMO at Group 1001, where he aligns enterprise security initiatives with strategic priorities and builds advanced portfolio governance frameworks. He is the architect of the Agentic AI-Driven PMO Model, an emerging approach that embeds AI agents into portfolio, program, and project management operations. Michael is a Certified Chief Information Security Officer (C|CISO), Certified Ethical Hacker (C|EH), and PMI-certified leader (PMP, ACP, RMP); he is also an international best-selling author and a frequent speaker on the future of AI-enabled enterprise leadership and cybersecurity strategy. <\/p>\n<\/div>\n<div id=\"attend\" ><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 24, 2026 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture Register Now Abstract: For decades, cybersecurity has operated largely as a reactive function centered on the security operations center (SOC). However, in today\u2019s AI-accelerated threat landscape, this model&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84791,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-84790","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Beyond the SOC: From Reactive Security to Strategic Enterprise Security<\/title>\n<meta name=\"description\" content=\"Move beyond reactive SOC models with an enterprise security architecture built on cyber governance, portfolio-driven protection outcomes, and business-aligned cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture\" \/>\n<meta property=\"og:description\" content=\"Move beyond reactive SOC models with an enterprise security architecture built on cyber governance, portfolio-driven protection outcomes, and business-aligned cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-21T09:13:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T09:25:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/24-april_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture\",\"datePublished\":\"2026-01-21T09:13:00+00:00\",\"dateModified\":\"2026-03-26T09:25:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/\"},\"wordCount\":375,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/24-april_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/\",\"name\":\"Beyond the SOC: From Reactive Security to Strategic Enterprise Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/24-april_465x310-Without-RN.png\",\"datePublished\":\"2026-01-21T09:13:00+00:00\",\"dateModified\":\"2026-03-26T09:25:45+00:00\",\"description\":\"Move beyond reactive SOC models with an enterprise security architecture built on cyber governance, portfolio-driven protection outcomes, and business-aligned cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/24-april_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/24-april_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Beyond the SOC: From Reactive Security to Strategic Enterprise Security","description":"Move beyond reactive SOC models with an enterprise security architecture built on cyber governance, portfolio-driven protection outcomes, and business-aligned cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/","og_locale":"en_US","og_type":"article","og_title":"Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture","og_description":"Move beyond reactive SOC models with an enterprise security architecture built on cyber governance, portfolio-driven protection outcomes, and business-aligned cybersecurity.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-21T09:13:00+00:00","article_modified_time":"2026-03-26T09:25:45+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/24-april_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture","datePublished":"2026-01-21T09:13:00+00:00","dateModified":"2026-03-26T09:25:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/"},"wordCount":375,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/24-april_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/","name":"Beyond the SOC: From Reactive Security to Strategic Enterprise Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/24-april_465x310-Without-RN.png","datePublished":"2026-01-21T09:13:00+00:00","dateModified":"2026-03-26T09:25:45+00:00","description":"Move beyond reactive SOC models with an enterprise security architecture built on cyber governance, portfolio-driven protection outcomes, and business-aligned cybersecurity.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/24-april_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/03\/24-april_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/beyond-the-soc-reframing-cybersecurity-as-an-enterprise-value-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Beyond the SOC: Reframing Cybersecurity as an Enterprise Value Architecture"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84790"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84790\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84791"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}