{"id":85114,"date":"2026-05-06T11:28:17","date_gmt":"2026-05-06T11:28:17","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85114"},"modified":"2026-05-06T11:32:16","modified_gmt":"2026-05-06T11:32:16","slug":"adaptive-security-architecture-integrating-ai-into-enterprise-defense-models","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/","title":{"rendered":"Adaptive Security Architecture: Integrating AI into Enterprise Defense Models"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85114\" class=\"elementor elementor-85114\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a642ad6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a642ad6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5822d23\" data-id=\"5822d23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c82d959 elementor-widget elementor-widget-text-editor\" data-id=\"c82d959\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 13, 2026<\/div><div><strong>Time<\/strong>: 3:30 PM CAT | 9:30 AM EDT | 7:00 PM IST<\/div><div><p><strong>Topic: <\/strong>Adaptive Security Architecture: Integrating AI into Enterprise Defense Models<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/3195727701358315616?source=ECC+webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p><p><strong>Abstract:<\/strong><\/p><p>As cyber threats grow in sophistication, scale, and speed, traditional perimeter-based and static security models are no longer sufficient. Organizations must transition toward adaptive security architectures that leverage Artificial Intelligence (AI) to enable continuous monitoring, real-time risk assessment, and dynamic threat response. The current webinar explores how enterprises can strategically integrate AI-driven capabilities into their defense frameworks\u2014across detection, response, identity management, governance, and compliance. It examines the architectural shift from reactive security to predictive and self-learning models, while addressing the operational, governance, and regulatory challenges that accompany AI adoption. Join us to gain insight into building resilient, scalable, and intelligence-driven defence ecosystems that align with enterprise risk management, zero-trust principles, and emerging regulatory expectations.<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ol><li>Understanding Adaptive Security Architecture<\/li><li>AI in Enterprise Defense: Detection, Analysis, and Response<\/li><li>Integrating AI Across Security Layers: IAM and Cloud<\/li><li>Governance, Risk &amp; Compliance Considerations for AI<\/li><li>Operational &amp; Organizational Readiness: Scalability and ROI<\/li><li>Future Outlook for AI in Security<\/li><\/ol><p><strong>Speaker:<br \/><br \/><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-85115 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Happy-300x300.jpg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Happy-300x300.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Happy-150x150.jpg 150w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Happy.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/strong><strong><span class=\"NormalTextRun SpellingErrorV2Themed SCXW20773025 BCX0\">Mikini<\/span><span class=\"NormalTextRun SCXW20773025 BCX0\"> Williams,<\/span><\/strong> Happy Amon, Data Protection Officer, Sir Ketumile Masire Teaching Hospital<\/p><p><strong>Bio:\u00a0 <\/strong>Ms. Happy Amon, is a seasoned leader with over 18 years of experience across Information Technology, Data Privacy, Cyber Security, Digital Forensics, and Regulatory Compliance. She has vast experience in building national-level governance frameworks, leading digital transformation securely, deploying modern GRC platforms, creating sustainable privacy cultures and managing regulatory exposure at executive level. She has served in senior roles within international Cyber Security Consulting Firms and Botswana Office of the President. With a Master of Science in Cyber Security (Executive Leadership in Information Assurance) and globally recognized certifications including CIPM, CISSP, CCSP, CLP, and CHFI, Ms. Amon brings a rare blend of technical depth and executive-level governance insight.<\/p><\/div><div id=\"attend\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 13, 2026Time: 3:30 PM CAT | 9:30 AM EDT | 7:00 PM IST Topic: Adaptive Security Architecture: Integrating AI into Enterprise Defense Models Register Now Abstract: As cyber threats grow in sophistication, scale, and speed, traditional perimeter-based and static security models are no longer sufficient. Organizations must transition toward adaptive security architectures that&hellip;<\/p>\n","protected":false},"author":33,"featured_media":85116,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85114","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Generative AI and Business Email Compromise | Cybersecurity Webinar<\/title>\n<meta name=\"description\" content=\"Learn how generative AI is changing business email compromise, including phishing, deepfakes, and AI-driven fraud, and how organizations can strengthen detection and defense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adaptive Security Architecture: Integrating AI into Enterprise Defense Models\" \/>\n<meta property=\"og:description\" content=\"Learn how generative AI is changing business email compromise, including phishing, deepfakes, and AI-driven fraud, and how organizations can strengthen detection and defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-06T11:28:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-06T11:32:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Adaptive-Security-Architecture.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"Adaptive Security Architecture: Integrating AI into Enterprise Defense Models\",\"datePublished\":\"2026-05-06T11:28:17+00:00\",\"dateModified\":\"2026-05-06T11:32:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/\"},\"wordCount\":309,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Adaptive-Security-Architecture.webp\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/\",\"name\":\"Generative AI and Business Email Compromise | Cybersecurity Webinar\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Adaptive-Security-Architecture.webp\",\"datePublished\":\"2026-05-06T11:28:17+00:00\",\"dateModified\":\"2026-05-06T11:32:16+00:00\",\"description\":\"Learn how generative AI is changing business email compromise, including phishing, deepfakes, and AI-driven fraud, and how organizations can strengthen detection and defense.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Adaptive-Security-Architecture.webp\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/Adaptive-Security-Architecture.webp\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Adaptive Security Architecture: Integrating AI into Enterprise Defense Models\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Generative AI and Business Email Compromise | Cybersecurity Webinar","description":"Learn how generative AI is changing business email compromise, including phishing, deepfakes, and AI-driven fraud, and how organizations can strengthen detection and defense.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/","og_locale":"en_US","og_type":"article","og_title":"Adaptive Security Architecture: Integrating AI into Enterprise Defense Models","og_description":"Learn how generative AI is changing business email compromise, including phishing, deepfakes, and AI-driven fraud, and how organizations can strengthen detection and defense.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-05-06T11:28:17+00:00","article_modified_time":"2026-05-06T11:32:16+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Adaptive-Security-Architecture.webp","type":"image\/webp"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"Adaptive Security Architecture: Integrating AI into Enterprise Defense Models","datePublished":"2026-05-06T11:28:17+00:00","dateModified":"2026-05-06T11:32:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/"},"wordCount":309,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Adaptive-Security-Architecture.webp","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/","name":"Generative AI and Business Email Compromise | Cybersecurity Webinar","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Adaptive-Security-Architecture.webp","datePublished":"2026-05-06T11:28:17+00:00","dateModified":"2026-05-06T11:32:16+00:00","description":"Learn how generative AI is changing business email compromise, including phishing, deepfakes, and AI-driven fraud, and how organizations can strengthen detection and defense.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Adaptive-Security-Architecture.webp","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Adaptive-Security-Architecture.webp","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/adaptive-security-architecture-integrating-ai-into-enterprise-defense-models\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Adaptive Security Architecture: Integrating AI into Enterprise Defense Models"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85114"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85116"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}