{"id":85089,"date":"2026-01-08T14:09:00","date_gmt":"2026-01-08T14:09:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85089"},"modified":"2026-04-30T14:12:13","modified_gmt":"2026-04-30T14:12:13","slug":"cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/","title":{"rendered":"Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85089\" class=\"elementor elementor-85089\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7b62e16 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7b62e16\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0183bc2\" data-id=\"0183bc2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-018944d elementor-widget elementor-widget-text-editor\" data-id=\"018944d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 22, 2026<\/div>\n<div><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong> Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/684067110591399509?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> Artificial intelligence is rapidly becoming embedded in enterprise decision-making, automation, and analytics. Yet, most organizations are deploying AI faster than they can secure or govern it. Traditional cybersecurity models were not designed for adaptive, learning-based systems that evolve over time, creating a widening gap between AI adoption and enterprise risk management.<\/p>\n<p>This webinar provides a structured approach to designing cybersecure AI systems at scale. It will focus on how the AI attack surface is expanding in nonlinear and often invisible ways, why legacy security and governance models fail in AI-driven environments, and how to implement a secure AI lifecycle from data ingestion through model operation. The session will also examine how governance frameworks must evolve to deliver accountability, transparency, and board-level visibility, and how organizations can operationalize AI security as a governed enterprise capability by integrating technical safeguards with execution models, oversight structures, and measurable risk management practices.<\/p>\n<p>Attendees will leave with a practical AI Security Architecture Model and Risk Integration Blueprint to secure, scale, and govern AI systems with confidence through 2026 and beyond.<\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>Understanding the expanding AI attack surface<\/li>\n<li>A practical architecture model for securing AI systems across the lifecycle<\/li>\n<li>Governance frameworks for enterprise and board-level AI risk oversight<\/li>\n<li>How to operationalize AI security within enterprise execution models<\/li>\n<li>A forward-looking AI security strategy for 2026 readiness<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/Michael-Shost-1.jpg\" width=\"192\" height=\"256\"><strong> Michael Shos,<\/strong> Enterprise AI, Delivery, &amp; Security Executive<\/p>\n<p><strong>Bio:&nbsp;<\/strong> Michael Shost is an executive leader in Enterprise AI, Delivery, and Strategy with more than 25 years of experience designing and operating large-scale, high-impact technology and transformation initiatives.<\/p>\n<p>A former software engineer and globally recognized PMO and portfolio management leader, Michael specializes in integrating artificial intelligence, machine learning, and cybersecurity into enterprise operating models, enabling organizations to execute with greater precision, visibility, and resilience.<\/p>\n<p>He currently serves as a Security Portfolio Leader within the PMO at Group 1001, where he aligns enterprise security initiatives with strategic priorities and has established structured governance frameworks to drive measurable outcomes at scale. Michael is the architect of the Agentic AI-Driven PMO Model, an advanced operating model that embeds AI agents into portfolio, program, and project execution. He is a Certified Chief Information Security Officer (C|CISO), Certified Ethical Hacker (C|EH), and PMI-certified leader (PMP, ACP, RMP). He is also an international bestselling author and a frequent speaker on AI-enabled enterprise leadership and cybersecurity strategy.<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 22, 2026 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape Register Now Abstract: Artificial intelligence is rapidly becoming embedded in enterprise decision-making, automation, and analytics. Yet, most organizations are deploying AI faster than they can secure or govern&hellip;<\/p>\n","protected":false},"author":32,"featured_media":85090,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85089","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI Threat Modeling for Secure and Governed AI Systems<\/title>\n<meta name=\"description\" content=\"Learn AI threat modeling, how to secure the AI lifecycle, and explore governance frameworks to protect enterprise AI and manage risk effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape\" \/>\n<meta property=\"og:description\" content=\"Learn AI threat modeling, how to secure the AI lifecycle, and explore governance frameworks to protect enterprise AI and manage risk effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-08T14:09:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-30T14:12:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/22-May_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape\",\"datePublished\":\"2026-01-08T14:09:00+00:00\",\"dateModified\":\"2026-04-30T14:12:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/\"},\"wordCount\":423,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/22-May_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/\",\"name\":\"AI Threat Modeling for Secure and Governed AI Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/22-May_465x310-Without-RN.png\",\"datePublished\":\"2026-01-08T14:09:00+00:00\",\"dateModified\":\"2026-04-30T14:12:13+00:00\",\"description\":\"Learn AI threat modeling, how to secure the AI lifecycle, and explore governance frameworks to protect enterprise AI and manage risk effectively.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/22-May_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/22-May_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI Threat Modeling for Secure and Governed AI Systems","description":"Learn AI threat modeling, how to secure the AI lifecycle, and explore governance frameworks to protect enterprise AI and manage risk effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape","og_description":"Learn AI threat modeling, how to secure the AI lifecycle, and explore governance frameworks to protect enterprise AI and manage risk effectively.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-08T14:09:00+00:00","article_modified_time":"2026-04-30T14:12:13+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/22-May_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape","datePublished":"2026-01-08T14:09:00+00:00","dateModified":"2026-04-30T14:12:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/"},"wordCount":423,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/22-May_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/","name":"AI Threat Modeling for Secure and Governed AI Systems","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/22-May_465x310-Without-RN.png","datePublished":"2026-01-08T14:09:00+00:00","dateModified":"2026-04-30T14:12:13+00:00","description":"Learn AI threat modeling, how to secure the AI lifecycle, and explore governance frameworks to protect enterprise AI and manage risk effectively.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/22-May_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/04\/22-May_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/cybersecure-ai-designing-resilient-intelligent-systems-in-a-hostile-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Cybersecure AI: Designing Resilient Intelligent Systems in a Hostile Landscape"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85089"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85089\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85090"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}