{"id":85139,"date":"2026-01-08T14:05:00","date_gmt":"2026-01-08T14:05:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85139"},"modified":"2026-05-08T10:08:47","modified_gmt":"2026-05-08T10:08:47","slug":"why-security-fails-even-when-doing-everything-right","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/","title":{"rendered":"Why Security Fails Even When \u2018Doing Everything Right\u2019"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85139\" class=\"elementor elementor-85139\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a642ad6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a642ad6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5822d23\" data-id=\"5822d23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c82d959 elementor-widget elementor-widget-text-editor\" data-id=\"c82d959\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p><strong>Date:<\/strong> May 25, 2026<\/p><p><strong>Time:<\/strong> 9:30 AM EDT |\u202f8:30\u202fAM CDT | 7:00 PM IST<\/p><p><strong>Topic:<\/strong> Why Security Fails Even When \u2018Doing Everything Right\u2019<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/8282635840389491808?source=ECC+webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p><p><strong>Abstract:<\/strong><\/p><p>We\u2019ve followed the frameworks. We&#8217;ve bought the tools. We demonstrate compliance every day. But we\u2019re still missing the mark \u2013 we\u2019re still failing security \u2013 no matter what we seem to try. And then, on April 7th this year, Anthropic tossed a live grenade right through the front door of every organization on the planet:<\/p><p>A model reportedly so powerful that it meant every latent cybersecurity vulnerability in every platform underpinning every organization could potentially be found in hours\u2014maybe minutes.<\/p><p>We&#8217;ve been told that proactive security means finding the problems before the bad guys. We already know how hard that is. And now? It&#8217;s become impossible. And that realization has the majority of the industry scared, even if you might not yet be yourself.<\/p><p>If security is to have any hope of dealing with adversaries who can unleash legions of agents to find and exploit holes in our organizations at machine speed, do you really think \u201cdoing everything right\u201d will still be enough?<\/p><p>I don\u2019t. That\u2019s why we need to start thinking about the things we do in security very differently than we are right now. Things like:<\/p><p><strong>Key Takeaways:<\/strong><\/p><ul><li>How the AI cyber arms race is reshaping security team priorities, infrastructure demands, and workforce burnout<\/li><li>Why machine-speed exploits are outpacing traditional controls and what defenders can realistically do<\/li><li>The compounding gap between security advances and the threats that immediately follow<\/li><li>Why organizational buy-in on security keeps failing despite training, policies, and enforcement<\/li><li>Whether meaningful security is achievable when AI agents generate more code than humans can review<\/li><\/ul><p>We are, in fact, at a tipping point for the entire industry, but that doesn\u2019t mean we have to give up. And the only viable way forward is exactly what you\u2019ll discover in this talk.<\/p><p><strong>Speaker:<\/strong><\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-85141 alignleft\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Andrew-225x300.jpg\" alt=\"\" width=\"225\" height=\"300\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Andrew-225x300.jpg 225w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Andrew.jpg 598w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><strong>Andrew S. Townley,<\/strong>\u202fFounder and Chief Executive of\u202fArchistry<br \/><strong>Bio: <\/strong>Andrew S. Townley is a global strategist, architect, and thought leader in security, risk, and business execution. With a career spanning three decades, he has led multimillion-dollar projects, founded four companies, and guided executives and security leaders through some of their toughest challenges. As Chief Executive of Archistry, he helps organizations turn security from a business obstacle into a competitive advantage. Known for his systems-thinking approach and ability to connect disciplines in unexpected ways, Andrew is a sought-after speaker, author of multiple books\u2014including From Invisible Crisis to Competitive Advantage, and publisher of the Security Sanity\u2122 newsletter. His clients describe him as \u201cpart genius, part mad scientist\u201d for his ability to translate ideas into concrete action that drives real results<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 25, 2026 Time: 9:30 AM EDT |\u202f8:30\u202fAM CDT | 7:00 PM IST Topic: Why Security Fails Even When \u2018Doing Everything Right\u2019 Register Now Abstract: We\u2019ve followed the frameworks. We&#8217;ve bought the tools. We demonstrate compliance every day. But we\u2019re still missing the mark \u2013 we\u2019re still failing security \u2013 no matter what we&hellip;<\/p>\n","protected":false},"author":33,"featured_media":85142,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85139","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Security Fails Even When \u2018Doing Everything Right\u2019<\/title>\n<meta name=\"description\" content=\"Why traditional cybersecurity keeps failing despite frameworks, tools, and compliance, and how AI-driven machine-speed threats are forcing organizations to rethink strategy, execution, and survival.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Security Fails Even When \u2018Doing Everything Right\u2019\" \/>\n<meta property=\"og:description\" content=\"Why traditional cybersecurity keeps failing despite frameworks, tools, and compliance, and how AI-driven machine-speed threats are forcing organizations to rethink strategy, execution, and survival.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-08T14:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-08T10:08:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/25-may_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Why Security Fails Even When \u2018Doing Everything Right\u2019\" \/>\n<meta name=\"twitter:description\" content=\"Why traditional cybersecurity keeps failing despite frameworks, tools, and compliance, and how AI-driven machine-speed threats are forcing organizations to rethink strategy, execution, and survival.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"Why Security Fails Even When \u2018Doing Everything Right\u2019\",\"datePublished\":\"2026-01-08T14:05:00+00:00\",\"dateModified\":\"2026-05-08T10:08:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/\"},\"wordCount\":462,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/25-may_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/\",\"name\":\"Why Security Fails Even When \u2018Doing Everything Right\u2019\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/25-may_465x310-Without-RN.png\",\"datePublished\":\"2026-01-08T14:05:00+00:00\",\"dateModified\":\"2026-05-08T10:08:47+00:00\",\"description\":\"Why traditional cybersecurity keeps failing despite frameworks, tools, and compliance, and how AI-driven machine-speed threats are forcing organizations to rethink strategy, execution, and survival.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/25-may_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/25-may_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/why-security-fails-even-when-doing-everything-right\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Upcoming Cybertalks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/upcoming-cybertalks\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Why Security Fails Even When \u2018Doing Everything Right\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Security Fails Even When \u2018Doing Everything Right\u2019","description":"Why traditional cybersecurity keeps failing despite frameworks, tools, and compliance, and how AI-driven machine-speed threats are forcing organizations to rethink strategy, execution, and survival.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/","og_locale":"en_US","og_type":"article","og_title":"Why Security Fails Even When \u2018Doing Everything Right\u2019","og_description":"Why traditional cybersecurity keeps failing despite frameworks, tools, and compliance, and how AI-driven machine-speed threats are forcing organizations to rethink strategy, execution, and survival.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-08T14:05:00+00:00","article_modified_time":"2026-05-08T10:08:47+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/25-may_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Why Security Fails Even When \u2018Doing Everything Right\u2019","twitter_description":"Why traditional cybersecurity keeps failing despite frameworks, tools, and compliance, and how AI-driven machine-speed threats are forcing organizations to rethink strategy, execution, and survival.","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"Why Security Fails Even When \u2018Doing Everything Right\u2019","datePublished":"2026-01-08T14:05:00+00:00","dateModified":"2026-05-08T10:08:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/"},"wordCount":462,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/25-may_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/","name":"Why Security Fails Even When \u2018Doing Everything Right\u2019","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/25-may_465x310-Without-RN.png","datePublished":"2026-01-08T14:05:00+00:00","dateModified":"2026-05-08T10:08:47+00:00","description":"Why traditional cybersecurity keeps failing despite frameworks, tools, and compliance, and how AI-driven machine-speed threats are forcing organizations to rethink strategy, execution, and survival.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/25-may_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/25-may_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/why-security-fails-even-when-doing-everything-right\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Upcoming Cybertalks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/upcoming-cybertalks\/"},{"@type":"ListItem","position":5,"name":"Why Security Fails Even When \u2018Doing Everything Right\u2019"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85139"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85139\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85142"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}