{"id":85102,"date":"2026-01-06T09:46:54","date_gmt":"2026-01-06T09:46:54","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85102"},"modified":"2026-05-04T10:51:07","modified_gmt":"2026-05-04T10:51:07","slug":"from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/","title":{"rendered":"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85102\" class=\"elementor elementor-85102\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a642ad6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a642ad6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5822d23\" data-id=\"5822d23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c82d959 elementor-widget elementor-widget-text-editor\" data-id=\"c82d959\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 28, 2026<\/div><div><strong>Time<\/strong>: 9:30 AM CDT | 8:30 AM EDT | 7:00 PM IST<\/div><div><p><strong>Topic:<\/strong>From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/1950148153635377758?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p><p><strong>Abstract:<\/strong>Traditional threat detection often focuses on indicators of compromise (IOCs), which offer limited visibility into an attacker&#8217;s intent and long-term behavior. However, as digital infrastructure expands across various environments, large-scale behavior analysis is needed. The current webinar explores how AI is transforming threat intelligence by enabling deeper analysis of persistent threat actors, moving from reactive detection to proactive understanding. The session will examine how AI models can analyze vast datasets, ranging from network telemetry to behavioral patterns, to uncover attacker tactics, techniques, and procedures (TTPs). Join us to gain insights into identifying intent, predicting attacker moves, and strengthening defense strategies against advanced persistent threats (APTs). Also, the webinar will discuss real-world scenarios to illustrate how AI-driven intelligence can enhance threat hunting and strategic decision-making.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li><p>Moving beyond IOCs to behavior- and intent-based threat analysis<\/p><\/li><li><p>Understanding how AI enhances profiling of persistent threat actors<\/p><\/li><li><p>Correlating multi-source security data to uncover hidden attack patterns<\/p><\/li><li><p>Strengthening threat hunting with AI-driven insights<\/p><\/li><li><p>Anticipating attacker behavior and improve defensive strategies<\/p><\/li><li><p>Integrated AI-powered threat intelligence with SOC workflows<\/p><\/li><\/ul><p><strong>Speaker:<\/strong><\/p><p><strong><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft wp-image-85104 size-medium\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Don_Warden-II-2-1-300x273.jpeg\" alt=\"\" width=\"300\" height=\"273\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Don_Warden-II-2-1-300x273.jpeg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Don_Warden-II-2-1-1024x931.jpeg 1024w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Don_Warden-II-2-1-768x698.jpeg 768w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Don_Warden-II-2-1-1536x1397.jpeg 1536w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Don_Warden-II-2-1-2048x1862.jpeg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Don Warden II<\/strong>, Director, Incident Response,\u202fCybolt\u202f\u202f\u202f\u202f\u202f\u202f\u202f\u202f<\/p><p><strong>Bio: <\/strong>Don Warden is a cybersecurity leader with over 30 years of experience in defending and securing complex environments across multiple industries. His extensive background spans digital forensics, cyber threat intelligence, and incident response, wherein he has handled high-stakes cases involving ransomware, insider threats, and cyber extortion. A trusted advisor on cybersecurity strategy, Don has guided organizations through threat mitigation and recovery while ensuring compliance with frameworks like the Cybersecurity Maturity Model Certification (CMMC). Holding advanced certifications, including Certified Ethical Hacker (C|EH) and Certified Cyber Security Analyst (CCSA), along with a Master\u2019s in Cybersecurity and Information Assurance, Don brings a seasoned perspective to AI-powered cybersecurity and ethical hacking innovations.\u202f\u202f<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 28, 2026Time: 9:30 AM CDT | 8:30 AM EDT | 7:00 PM IST Topic:From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors Register Now Abstract:Traditional threat detection often focuses on indicators of compromise (IOCs), which offer limited visibility into an attacker&#8217;s intent and long-term behavior. However, as digital infrastructure expands across various&hellip;<\/p>\n","protected":false},"author":113,"featured_media":85103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85102","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Building a Cloud Security Strategy with AI &amp; Threat Intelligence<\/title>\n<meta name=\"description\" content=\"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors\" \/>\n<meta property=\"og:description\" content=\"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-06T09:46:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T10:51:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/28-may_465x310-With-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dhaval.dev@eccouncil.org\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dhaval.dev@eccouncil.org\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/\"},\"author\":{\"name\":\"dhaval.dev@eccouncil.org\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/46b6101066647f7eeee1ac82b2808268\"},\"headline\":\"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors\",\"datePublished\":\"2026-01-06T09:46:54+00:00\",\"dateModified\":\"2026-05-04T10:51:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/\"},\"wordCount\":325,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/28-may_465x310-With-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/\",\"name\":\"Building a Cloud Security Strategy with AI & Threat Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/28-may_465x310-With-RN.png\",\"datePublished\":\"2026-01-06T09:46:54+00:00\",\"dateModified\":\"2026-05-04T10:51:07+00:00\",\"description\":\"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/28-may_465x310-With-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/28-may_465x310-With-RN.png\",\"width\":969,\"height\":646,\"caption\":\"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Upcoming Cybertalks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/upcoming-cybertalks\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/46b6101066647f7eeee1ac82b2808268\",\"name\":\"dhaval.dev@eccouncil.org\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Building a Cloud Security Strategy with AI & Threat Intelligence","description":"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors","og_description":"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-06T09:46:54+00:00","article_modified_time":"2026-05-04T10:51:07+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/28-may_465x310-With-RN.png","type":"image\/png"}],"author":"dhaval.dev@eccouncil.org","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dhaval.dev@eccouncil.org","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/"},"author":{"name":"dhaval.dev@eccouncil.org","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/46b6101066647f7eeee1ac82b2808268"},"headline":"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors","datePublished":"2026-01-06T09:46:54+00:00","dateModified":"2026-05-04T10:51:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/"},"wordCount":325,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/28-may_465x310-With-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/","name":"Building a Cloud Security Strategy with AI & Threat Intelligence","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/28-may_465x310-With-RN.png","datePublished":"2026-01-06T09:46:54+00:00","dateModified":"2026-05-04T10:51:07+00:00","description":"Learn how AI and threat intelligence enable scalable, resilient cloud security strategies across modern hybrid environments.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/28-may_465x310-With-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/28-may_465x310-With-RN.png","width":969,"height":646,"caption":"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/from-indicators-to-intent-ai-powered-analysis-of-persistent-threat-actors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Upcoming Cybertalks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/upcoming-cybertalks\/"},{"@type":"ListItem","position":5,"name":"From Indicators to Intent: AI-Powered Analysis of Persistent Threat Actors"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/46b6101066647f7eeee1ac82b2808268","name":"dhaval.dev@eccouncil.org"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/113"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85102"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85102\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85103"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}