{"id":85107,"date":"2026-01-06T09:46:00","date_gmt":"2026-01-06T09:46:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85107"},"modified":"2026-05-05T13:07:58","modified_gmt":"2026-05-05T13:07:58","slug":"how-ai-is-reshaping-cybersecurity-infrastructure","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/","title":{"rendered":"How AI is Reshaping Cybersecurity Infrastructure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85107\" class=\"elementor elementor-85107\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a642ad6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a642ad6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5822d23\" data-id=\"5822d23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c82d959 elementor-widget elementor-widget-text-editor\" data-id=\"c82d959\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p><strong>Date:<\/strong> May 29, 2026<\/p><p><strong>Time:<\/strong> 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<\/p><p><strong>Topic:<\/strong> How AI is Reshaping Cybersecurity Infrastructure<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/5617449341314985053?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p><p><strong>Abstract:<\/strong><br \/>AI is rapidly redefining the foundations of cybersecurity infrastructure, shifting it from static, rule-based systems to adaptive, intelligence-driven ecosystems. The current webinar explores how AI is transforming core security components, including detection systems, identity management, network security, and incident response. The webinar will also discuss as to how AI can be embedded into security tools and platforms to enable real-time decision-making, automation, and predictive defence. The session will also address architectural considerations, integration challenges, and governance requirements associated with AI adoption. By examining emerging trends and practical use cases, this webinar provides a roadmap for organizations looking to modernize their cybersecurity infrastructure in an AI-driven era.<\/p><p><strong>Key Takeaways:<\/strong><\/p><ul><li>Understand how AI is transforming core cybersecurity infrastructure components<\/li><li>Enable real-time threat detection and response through intelligent automation<\/li><li>Integrate AI across identity, network, endpoint, and data security layers<\/li><li>Address challenges such as model trust, explainability, and integration complexity<\/li><li>Design scalable, AI-enabled security architecture<\/li><li>Prepare for the future of autonomous and predictive cybersecurity systems<\/li><\/ul><p><strong>Speaker:<br \/><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-85108 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/shervinevans-200x300.webp\" alt=\"\" width=\"200\" height=\"300\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/shervinevans-200x300.webp 200w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/shervinevans.webp 500w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/strong><strong>Shervin Evans<\/strong>, Founder &amp; CEO, 21st Century Cybersecurity<br \/><strong><br \/>Bio: <\/strong>Shervin Evans is a seasoned ICT expert with 30 years of experience in the financial services sector. He\u202fspecializes\u202fin programming, infrastructure design, cybersecurity, ethical hacking, incident management, disaster recovery, and digital forensics.\u202fWith\u202fa\u202fmaster\u2019s\u202fdegree\u202fin\u202fcybersecurity and multiple ICT certifications,\u202fShervin serves as\u202fan executive member of\u202fCyberEdBoard, the CISO Society, the BFSB Fintech\u202fWorking\u202fGroup, and the Cybersecurity Breakfast Club Florida Chapter. As a\u202fdistinguished Toastmaster and Rotarian,\u202fhe\u202fis dedicated to advancing ICT risk management and promoting thought leadership in cybersecurity,\u202fall\u202fwhile\u202factively contributing to industry innovation and resilience.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 29, 2026 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: How AI is Reshaping Cybersecurity Infrastructure Register Now Abstract:AI is rapidly redefining the foundations of cybersecurity infrastructure, shifting it from static, rule-based systems to adaptive, intelligence-driven ecosystems. The current webinar explores how AI is transforming core security components,&hellip;<\/p>\n","protected":false},"author":115,"featured_media":85110,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85107","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How AI is Reshaping Cybersecurity Infrastructure<\/title>\n<meta name=\"description\" content=\"Discover how AI is transforming cybersecurity infrastructure through automation, real-time threat detection, and intelligent security architecture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How AI is Reshaping Cybersecurity Infrastructure\" \/>\n<meta property=\"og:description\" content=\"Discover how AI is transforming cybersecurity infrastructure through automation, real-time threat detection, and intelligent security architecture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-06T09:46:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T13:07:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"udit.dev@eccouncil.org\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How AI is Reshaping Cybersecurity Infrastructure\" \/>\n<meta name=\"twitter:description\" content=\"Discover how AI is transforming cybersecurity infrastructure through automation, real-time threat detection, and intelligent security architecture.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"udit.dev@eccouncil.org\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/\"},\"author\":{\"name\":\"udit.dev@eccouncil.org\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/59d15be9ca358468a9d293f357a437d3\"},\"headline\":\"How AI is Reshaping Cybersecurity Infrastructure\",\"datePublished\":\"2026-01-06T09:46:00+00:00\",\"dateModified\":\"2026-05-05T13:07:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/\"},\"wordCount\":291,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/\",\"name\":\"How AI is Reshaping Cybersecurity Infrastructure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp\",\"datePublished\":\"2026-01-06T09:46:00+00:00\",\"dateModified\":\"2026-05-05T13:07:58+00:00\",\"description\":\"Discover how AI is transforming cybersecurity infrastructure through automation, real-time threat detection, and intelligent security architecture.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/how-ai-is-reshaping-cybersecurity-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How AI is Reshaping Cybersecurity Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/59d15be9ca358468a9d293f357a437d3\",\"name\":\"udit.dev@eccouncil.org\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How AI is Reshaping Cybersecurity Infrastructure","description":"Discover how AI is transforming cybersecurity infrastructure through automation, real-time threat detection, and intelligent security architecture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"How AI is Reshaping Cybersecurity Infrastructure","og_description":"Discover how AI is transforming cybersecurity infrastructure through automation, real-time threat detection, and intelligent security architecture.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-06T09:46:00+00:00","article_modified_time":"2026-05-05T13:07:58+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp","type":"image\/webp"}],"author":"udit.dev@eccouncil.org","twitter_card":"summary_large_image","twitter_title":"How AI is Reshaping Cybersecurity Infrastructure","twitter_description":"Discover how AI is transforming cybersecurity infrastructure through automation, real-time threat detection, and intelligent security architecture.","twitter_misc":{"Written by":"udit.dev@eccouncil.org","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/"},"author":{"name":"udit.dev@eccouncil.org","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/59d15be9ca358468a9d293f357a437d3"},"headline":"How AI is Reshaping Cybersecurity Infrastructure","datePublished":"2026-01-06T09:46:00+00:00","dateModified":"2026-05-05T13:07:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/"},"wordCount":291,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/","name":"How AI is Reshaping Cybersecurity Infrastructure","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp","datePublished":"2026-01-06T09:46:00+00:00","dateModified":"2026-05-05T13:07:58+00:00","description":"Discover how AI is transforming cybersecurity infrastructure through automation, real-time threat detection, and intelligent security architecture.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/How-AI-is-Reshaping-Cybersecurity-Infrastructure.webp","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/how-ai-is-reshaping-cybersecurity-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"How AI is Reshaping Cybersecurity Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/59d15be9ca358468a9d293f357a437d3","name":"udit.dev@eccouncil.org"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85107"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85107\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85110"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}