{"id":85006,"date":"2026-01-09T08:47:00","date_gmt":"2026-01-09T08:47:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85006"},"modified":"2026-04-24T09:23:42","modified_gmt":"2026-04-24T09:23:42","slug":"pen-testing-in-the-age-of-ai","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/","title":{"rendered":"Pen Testing\u00a0in the Age of AI\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85006\" class=\"elementor elementor-85006\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52af635 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52af635\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a97e752\" data-id=\"a97e752\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4837222 elementor-widget elementor-widget-text-editor\" data-id=\"4837222\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 20, 2026<\/div>\n<div><strong>Time<\/strong>: 5:30 PM GMT+4 | 9:30 AM EDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong>Pen Testing in the Age of AI<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/5807163475331453789?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p>\n<p><strong>Abstract: <\/strong>Artificial intelligence is rapidly transforming the cybersecurity landscape, not only strengthening defensive capabilities but also empowering offensive security practices. As threat actors increasingly leverage AI to automate reconnaissance, craft sophisticated phishing campaigns, bypass detection systems, and exploit vulnerabilities faster than ever, security professionals must rethink how they approach offensive security.<\/p>\n<p>This webinar explores how AI is reshaping penetration testing, red teaming, vulnerability assessment, and adversary simulation. It will examine how ethical hackers are using AI-driven tools to identify attack paths, simulate real-world adversary behavior, and proactively test organizational resilience. At the same time, it will highlight the risks associated with AI-augmented cyberattacks and how organizations can prepare for this new threat paradigm. Attendees will also gain insights into practical offensive security use cases, emerging AI-powered attack techniques, ethical considerations, and strategies to stay ahead in an era where attackers are increasingly augmented by intelligent automation.<\/p>\n<p><strong>Key Takeaways:\u00a0<\/strong><\/p>\n<ul>\n<li>\n<p>AI is changing the pen testing playbook<\/p>\n<\/li>\n<li>\n<p>Emerging AI-driven attack techniques<\/p>\n<\/li>\n<li>\n<p>AI for ethical hackers and red teams<\/p>\n<\/li>\n<li>\n<p>Risks of AI-powered adversaries<\/p>\n<\/li>\n<li>\n<p>Responsible use of AI in pen testing<\/p>\n<\/li>\n<li>\n<p>Preparing organizations for AI-driven threats<\/p>\n<p>\u00a0<\/p>\n<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-85008 size-medium\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/IMG_5536-199x300.jpeg\" alt=\"\" width=\"199\" height=\"300\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/IMG_5536-199x300.jpeg 199w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/IMG_5536-680x1024.jpeg 680w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/IMG_5536-768x1156.jpeg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/IMG_5536-1021x1536.jpeg 1021w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/IMG_5536-1361x2048.jpeg 1361w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/IMG_5536-scaled.jpeg 1701w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/><strong><span class=\"TextRun SCXW146747719 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146747719 BCX0\"> Waqar Ahmed, <\/span><\/span><\/strong><span class=\"TextRun SCXW146747719 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146747719 BCX0\">CEO Securitanium<\/span><\/span><\/p>\n<p><strong>Bio: <\/strong><strong>Waqar Ahmed<\/strong> is a distinguished cybersecurity specialist with over 15 years of experience developing and revamping security programs for global companies in multiple countries, including the UAE and Qatar. He is the CEO of Securitanium, where he has spearheaded the development of specialized AI-driven threat detection solutions. His extensive career includes securing critical infrastructure and managing data security for over 70 business units at Constellation Software.<\/p>\n<p>A recognized thought leader, he has shared his insights as a speaker at Black Hat Europe, GISEC Dubai, and SANS Hackfest. With multiple certifications, including ISO 27001 LA, CEH, and ECIH, he has served as visiting faculty at several universities and is also the technical reviewer of the book Ultimate Guide to Blockchain Security.<\/p>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 20, 2026 Time: 5:30 PM GMT+4 | 9:30 AM EDT | 7:00 PM IST Topic: Pen Testing in the Age of AI Register Now Abstract: Artificial intelligence is rapidly transforming the cybersecurity landscape, not only strengthening defensive capabilities but also empowering offensive security practices. As threat actors increasingly leverage AI to automate reconnaissance,&hellip;<\/p>\n","protected":false},"author":105,"featured_media":85012,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85006","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI in Pen Testing | Cybersecurity Webinar<\/title>\n<meta name=\"description\" content=\"Learn how AI is transforming penetration testing, red teaming, vulnerability assessment, and adversary simulation in this expert-led cybersecurity webinar.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI in Pen Testing | Cybersecurity Webinar\" \/>\n<meta property=\"og:description\" content=\"Learn how AI is transforming penetration testing, red teaming, vulnerability assessment, and adversary simulation in this expert-led cybersecurity webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-09T08:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T09:23:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/20-May-ECC_465x310-Without-RN-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"tarun.mistri.ctr@eccouncil.org\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"AI in Pen Testing | Cybersecurity Webinar\" \/>\n<meta name=\"twitter:description\" content=\"Learn how AI is transforming penetration testing, red teaming, vulnerability assessment, and adversary simulation in this expert-led cybersecurity webinar.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tarun.mistri.ctr@eccouncil.org\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/\"},\"author\":{\"name\":\"tarun.mistri.ctr@eccouncil.org\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/fb288aee9360720ce8ff940ce73fb837\"},\"headline\":\"Pen Testing\u00a0in the Age of AI\u00a0\",\"datePublished\":\"2026-01-09T08:47:00+00:00\",\"dateModified\":\"2026-04-24T09:23:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/\"},\"wordCount\":331,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/20-May-ECC_465x310-Without-RN-1.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/\",\"name\":\"AI in Pen Testing | Cybersecurity Webinar\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/20-May-ECC_465x310-Without-RN-1.png\",\"datePublished\":\"2026-01-09T08:47:00+00:00\",\"dateModified\":\"2026-04-24T09:23:42+00:00\",\"description\":\"Learn how AI is transforming penetration testing, red teaming, vulnerability assessment, and adversary simulation in this expert-led cybersecurity webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/20-May-ECC_465x310-Without-RN-1.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/20-May-ECC_465x310-Without-RN-1.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/pen-testing-in-the-age-of-ai\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Pen Testing\u00a0in the Age of AI\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/fb288aee9360720ce8ff940ce73fb837\",\"name\":\"tarun.mistri.ctr@eccouncil.org\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI in Pen Testing | Cybersecurity Webinar","description":"Learn how AI is transforming penetration testing, red teaming, vulnerability assessment, and adversary simulation in this expert-led cybersecurity webinar.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"AI in Pen Testing | Cybersecurity Webinar","og_description":"Learn how AI is transforming penetration testing, red teaming, vulnerability assessment, and adversary simulation in this expert-led cybersecurity webinar.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-09T08:47:00+00:00","article_modified_time":"2026-04-24T09:23:42+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/20-May-ECC_465x310-Without-RN-1.png","type":"image\/png"}],"author":"tarun.mistri.ctr@eccouncil.org","twitter_card":"summary_large_image","twitter_title":"AI in Pen Testing | Cybersecurity Webinar","twitter_description":"Learn how AI is transforming penetration testing, red teaming, vulnerability assessment, and adversary simulation in this expert-led cybersecurity webinar.","twitter_misc":{"Written by":"tarun.mistri.ctr@eccouncil.org","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/"},"author":{"name":"tarun.mistri.ctr@eccouncil.org","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/fb288aee9360720ce8ff940ce73fb837"},"headline":"Pen Testing\u00a0in the Age of AI\u00a0","datePublished":"2026-01-09T08:47:00+00:00","dateModified":"2026-04-24T09:23:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/"},"wordCount":331,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/20-May-ECC_465x310-Without-RN-1.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/","name":"AI in Pen Testing | Cybersecurity Webinar","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/20-May-ECC_465x310-Without-RN-1.png","datePublished":"2026-01-09T08:47:00+00:00","dateModified":"2026-04-24T09:23:42+00:00","description":"Learn how AI is transforming penetration testing, red teaming, vulnerability assessment, and adversary simulation in this expert-led cybersecurity webinar.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/20-May-ECC_465x310-Without-RN-1.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/01\/20-May-ECC_465x310-Without-RN-1.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/pen-testing-in-the-age-of-ai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Pen Testing\u00a0in the Age of AI\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/fb288aee9360720ce8ff940ce73fb837","name":"tarun.mistri.ctr@eccouncil.org"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85006"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85006\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85012"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}