{"id":84877,"date":"2026-04-17T12:37:00","date_gmt":"2026-04-17T12:37:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=84877"},"modified":"2026-04-29T11:26:52","modified_gmt":"2026-04-29T11:26:52","slug":"navigating-security-in-defi-protecting-decentralized-finance-platforms-2","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/","title":{"rendered":"Navigating Security in DeFi: Protecting Decentralized Finance Platforms\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"84877\" class=\"elementor elementor-84877\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-93ab6e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"93ab6e7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-516ab93\" data-id=\"516ab93\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ad5f4d7 elementor-widget elementor-widget-text-editor\" data-id=\"ad5f4d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: April 17, 2026<\/div><div><strong>Time<\/strong>: 8:30 PM WIB | 9:30 AM EDT | 7:00 PM IST<\/div><div><p><strong>Topic: <\/strong> Navigating Security in DeFi: Protecting Decentralized Finance Platforms<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract: <\/strong> Decentralized finance (DeFi) and the broader cryptocurrency ecosystem aim to revolutionize the global digital financial landscape by promoting transparency and accessibility. However, as cyberthreats and threat actor activity increase, no digital platform is immune to cyberattacks. Evolving blockchain technology also presents unique security challenges, from smart contract vulnerabilities to sophisticated phishing schemes, making robust security measures paramount.<\/p><p>This webinar will uncover the critical threats that DeFi platforms face, including financial losses and erosion of user trust, and outline corresponding mitigation strategies. It will also highlight key security concepts for DeFi, best practices for securing smart contracts, incident response protocols, and threat intelligence for proactive defense. Attendees will learn to navigate the complexities of DeFi security and build a safer, more resilient financial future.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Understanding the unique threat landscape in DeFi<\/li><li>Best practices for secure smart contract design<\/li><li>Proactive defense strategies using threat intelligence<\/li><li>Incident response planning tailored for decentralized platforms<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img decoding=\"async\" class=\"alignleft wp-image-59705\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Goutama-Bachtiar-scaled.jpeg\" alt=\"Goutama Bachtiar\" width=\"192\" height=\"256\" \/><strong> Goutama Bachtiar,<\/strong> EC-Council Global Advisory Board Member and Global Blockchain Business Council Regional Ambassador<\/p><p><strong>Bio:\u00a0<\/strong> Goutama Bachtiar is a certified DeFi and blockchain expert with 25+ years of experience in governance, risk, and compliance across IT, cybersecurity, and artificial intelligence. He is an EC-Council Global Advisory Board Member, a Global Blockchain Business Council Regional Ambassador, a Fellow of the Financial Services Institute of Australasia, a Cloud Security Alliance Research Fellow, and a Thinkers360 Top 10 APAC and Top 100 Thought Leader, recognized across blockchain, cybersecurity, GRC, and finance. He is also a subject matter expert for ISC2, ISACA, CompTIA, and OCEG.<\/p><\/div><div id=\"attend\">\u00a0<\/div><p><iframe title=\"Navigating Security in DeFi: Protecting Decentralized Finance Platforms\" src=\"https:\/\/www.youtube.com\/embed\/KzrPoL2aVi0;origin=https:\/\/www.eccouncil.org\" width=\"1335\" height=\"415\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: April 17, 2026Time: 8:30 PM WIB | 9:30 AM EDT | 7:00 PM IST Topic: Navigating Security in DeFi: Protecting Decentralized Finance Platforms Watch Now Abstract: Decentralized finance (DeFi) and the broader cryptocurrency ecosystem aim to revolutionize the global digital financial landscape by promoting transparency and accessibility. However, as cyberthreats and threat actor activity&hellip;<\/p>\n","protected":false},"author":32,"featured_media":84879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-84877","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing DeFi Platforms: Risks &amp; Protection Strategies<\/title>\n<meta name=\"description\" content=\"Understand the current threat landscape faced by decentralized finance (DeFi) and learn key security concepts and best practices to strengthen DeFi platforms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing DeFi Platforms: Risks &amp; Protection Strategies\" \/>\n<meta property=\"og:description\" content=\"Understand the current threat landscape faced by decentralized finance (DeFi) and learn key security concepts and best practices to strengthen DeFi platforms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-17T12:37:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-29T11:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/17-april_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Securing DeFi Platforms: Risks &amp; Protection Strategies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Navigating Security in DeFi: Protecting Decentralized Finance Platforms\u00a0\",\"datePublished\":\"2026-04-17T12:37:00+00:00\",\"dateModified\":\"2026-04-29T11:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/\"},\"wordCount\":280,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/17-april_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/\",\"name\":\"Securing DeFi Platforms: Risks & Protection Strategies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/17-april_465x310-Without-RN.png\",\"datePublished\":\"2026-04-17T12:37:00+00:00\",\"dateModified\":\"2026-04-29T11:26:52+00:00\",\"description\":\"Understand the current threat landscape faced by decentralized finance (DeFi) and learn key security concepts and best practices to strengthen DeFi platforms.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/17-april_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/17-april_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Navigating Security in DeFi: Protecting Decentralized Finance Platforms\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing DeFi Platforms: Risks & Protection Strategies","description":"Understand the current threat landscape faced by decentralized finance (DeFi) and learn key security concepts and best practices to strengthen DeFi platforms.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/","og_locale":"en_US","og_type":"article","og_title":"Securing DeFi Platforms: Risks & Protection Strategies","og_description":"Understand the current threat landscape faced by decentralized finance (DeFi) and learn key security concepts and best practices to strengthen DeFi platforms.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-04-17T12:37:00+00:00","article_modified_time":"2026-04-29T11:26:52+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/17-april_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Securing DeFi Platforms: Risks & Protection Strategies","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Navigating Security in DeFi: Protecting Decentralized Finance Platforms\u00a0","datePublished":"2026-04-17T12:37:00+00:00","dateModified":"2026-04-29T11:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/"},"wordCount":280,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/17-april_465x310-Without-RN.png","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/","name":"Securing DeFi Platforms: Risks & Protection Strategies","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/17-april_465x310-Without-RN.png","datePublished":"2026-04-17T12:37:00+00:00","dateModified":"2026-04-29T11:26:52+00:00","description":"Understand the current threat landscape faced by decentralized finance (DeFi) and learn key security concepts and best practices to strengthen DeFi platforms.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/17-april_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/17-april_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/navigating-security-in-defi-protecting-decentralized-finance-platforms-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Navigating Security in DeFi: Protecting Decentralized Finance Platforms\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84877","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=84877"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/84877\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/84879"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=84877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=84877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=84877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}