{"id":85000,"date":"2026-01-10T07:59:00","date_gmt":"2026-01-10T07:59:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85000"},"modified":"2026-04-24T08:12:31","modified_gmt":"2026-04-24T08:12:31","slug":"cyber-threat-intelligence-in-the-age-of-ai-driven-security","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/","title":{"rendered":"Cyber Threat Intelligence in the Age of AI-Driven Security\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85000\" class=\"elementor elementor-85000\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52af635 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52af635\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a97e752\" data-id=\"a97e752\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4837222 elementor-widget elementor-widget-text-editor\" data-id=\"4837222\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 18, 2026<\/div><div><strong>Time<\/strong>: 9:30 AM EDT |8:30 AM CDT | 7:00 PM IST<\/div><div><p><strong>Topic:<\/strong>Cyber Threat Intelligence in the Age of AI-Driven Security<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/6848352608832133206?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p><p><strong>Abstract: <\/strong>As cyber threats grow in scale, speed, and sophistication, traditional security approach tend to struggle to keep up. The rise of AI-driven security solutions is transforming how organizations collect, analyze, and act on cyber threat intelligence (CTI). The current webinar explores how artificial intelligence and machine learning are reshaping the threat intelligence lifecycle, from automated data collection and real-time threat detection to predictive analytics and proactive defense strategies. It provides practical guidance on integrating AI-driven intelligence into your security operations to build a more resilient defense posture. The webinar will also address emerging challenges, including adversarial AI, data quality concerns, and the balance between automation and human expertise. Join us to gain insights into how modern security teams are leveraging AI to enhance visibility, reduce response times, and stay ahead of adversaries.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Evolution of cyber threat intelligence<\/li><li>Role of AI in enhancing threat intelligence<\/li><li>From reactive to predictive security<\/li><li>Exploring automation vs. human expertise in threat intelligence workflows<\/li><li>Adversarial AI &amp; emerging risks<\/li><li>Operationalizing AI-driven CTI<\/li><li>Data quality &amp; intelligence accuracy<\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-84998 size-medium\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Andria-Delia-201x300.jpeg\" alt=\"Cyber Threat Intelligence in the Age of AI-Driven Security\" width=\"201\" height=\"300\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Andria-Delia-201x300.jpeg 201w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Andria-Delia-686x1024.jpeg 686w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Andria-Delia-768x1146.jpeg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Andria-Delia-1029x1536.jpeg 1029w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Andria-Delia.jpeg 1290w\" sizes=\"(max-width: 201px) 100vw, 201px\" \/><strong><span class=\"TextRun SCXW146747719 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146747719 BCX0\">Prof. Andria Delia,\u202f<\/span><\/span><\/strong><span class=\"TextRun SCXW146747719 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146747719 BCX0\">Cyber Threat\u202fIntelligence\u202f&amp; Digital Forensics Expert, Webheroes.org<\/span><\/span><\/p><p><strong>Bio: Andria Delia<\/strong> is an internationally recognized cybersecurity and digital forensics expert specializing in cyber incident response, ransomware mitigation, and complex digital investigations. She is widely known for uncovering sophisticated intrusions involving advanced persistence, identity compromise, and\u202femerging\u202ftechnologies, often\u202foperating\u202fat the intersection of cybersecurity, law, and digital evidence.<\/p><p>A frequent keynote speaker at global forums,\u202fincluding GITEX Global, Andria was\u202falso\u202fa top nominee for Cellebrite\u2019s Digital Justice Award. Her work focuses on translating highly technical threats into clear, actionable insights\u202ffor decision-makers, legal professionals, and security leaders. Renowned for her adversarial mindset and real-world investigative approach, she brings a unique perspective shaped by frontline experience with modern cyber threats, regulatory challenges, and high-stakes breach scenarios.<\/p><\/div><div id=\"attend\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 18, 2026Time: 9:30 AM EDT |8:30 AM CDT | 7:00 PM IST Topic:Cyber Threat Intelligence in the Age of AI-Driven Security Register Now Abstract: As cyber threats grow in scale, speed, and sophistication, traditional security approach tend to struggle to keep up. The rise of AI-driven security solutions is transforming how organizations collect,&hellip;<\/p>\n","protected":false},"author":105,"featured_media":85004,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85000","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Intelligence in the Age of AI-Driven Security<\/title>\n<meta name=\"description\" content=\"Discover how AI is transforming cyber threat intelligence with predictive analytics, automation, and proactive defense strategies.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence in the Age of AI-Driven Security\" \/>\n<meta property=\"og:description\" content=\"Discover how AI is transforming cyber threat intelligence with predictive analytics, automation, and proactive defense strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-10T07:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T08:12:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/18-May-ECCU_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"tarun.mistri.ctr@eccouncil.org\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Cyber Threat Intelligence in the Age of AI-Driven Security\" \/>\n<meta name=\"twitter:description\" content=\"Discover how AI is transforming cyber threat intelligence with predictive analytics, automation, and proactive defense strategies.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tarun.mistri.ctr@eccouncil.org\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/\"},\"author\":{\"name\":\"tarun.mistri.ctr@eccouncil.org\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/fb288aee9360720ce8ff940ce73fb837\"},\"headline\":\"Cyber Threat Intelligence in the Age of AI-Driven Security\u00a0\",\"datePublished\":\"2026-01-10T07:59:00+00:00\",\"dateModified\":\"2026-04-24T08:12:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/\"},\"wordCount\":336,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/18-May-ECCU_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/\",\"name\":\"Cyber Threat Intelligence in the Age of AI-Driven Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/18-May-ECCU_465x310-Without-RN.png\",\"datePublished\":\"2026-01-10T07:59:00+00:00\",\"dateModified\":\"2026-04-24T08:12:31+00:00\",\"description\":\"Discover how AI is transforming cyber threat intelligence with predictive analytics, automation, and proactive defense strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/18-May-ECCU_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/18-May-ECCU_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Intelligence in the Age of AI-Driven Security\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/fb288aee9360720ce8ff940ce73fb837\",\"name\":\"tarun.mistri.ctr@eccouncil.org\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence in the Age of AI-Driven Security","description":"Discover how AI is transforming cyber threat intelligence with predictive analytics, automation, and proactive defense strategies.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Intelligence in the Age of AI-Driven Security","og_description":"Discover how AI is transforming cyber threat intelligence with predictive analytics, automation, and proactive defense strategies.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-10T07:59:00+00:00","article_modified_time":"2026-04-24T08:12:31+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/18-May-ECCU_465x310-Without-RN.png","type":"image\/png"}],"author":"tarun.mistri.ctr@eccouncil.org","twitter_card":"summary_large_image","twitter_title":"Cyber Threat Intelligence in the Age of AI-Driven Security","twitter_description":"Discover how AI is transforming cyber threat intelligence with predictive analytics, automation, and proactive defense strategies.","twitter_misc":{"Written by":"tarun.mistri.ctr@eccouncil.org","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/"},"author":{"name":"tarun.mistri.ctr@eccouncil.org","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/fb288aee9360720ce8ff940ce73fb837"},"headline":"Cyber Threat Intelligence in the Age of AI-Driven Security\u00a0","datePublished":"2026-01-10T07:59:00+00:00","dateModified":"2026-04-24T08:12:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/"},"wordCount":336,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/18-May-ECCU_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/","name":"Cyber Threat Intelligence in the Age of AI-Driven Security","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/18-May-ECCU_465x310-Without-RN.png","datePublished":"2026-01-10T07:59:00+00:00","dateModified":"2026-04-24T08:12:31+00:00","description":"Discover how AI is transforming cyber threat intelligence with predictive analytics, automation, and proactive defense strategies.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/18-May-ECCU_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/18-May-ECCU_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cyber-threat-intelligence-in-the-age-of-ai-driven-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Intelligence in the Age of AI-Driven Security\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/fb288aee9360720ce8ff940ce73fb837","name":"tarun.mistri.ctr@eccouncil.org"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85000"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85000\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85004"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}