{"id":85213,"date":"2026-01-04T06:40:00","date_gmt":"2026-01-04T06:40:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85213"},"modified":"2026-05-19T06:59:46","modified_gmt":"2026-05-19T06:59:46","slug":"ais-impact-on-security-operations-building-the-intelligent-soc","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/","title":{"rendered":"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85213\" class=\"elementor elementor-85213\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-093c7c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"093c7c1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f00956\" data-id=\"4f00956\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-403d636 elementor-widget elementor-widget-text-editor\" data-id=\"403d636\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: June 5, 2026<\/div>\n<div><strong>Time<\/strong>:  9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST    <\/div>\n<div>\n<p><strong>Topic: <\/strong>  AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/6721152308074311512?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p>\n<p><strong>Abstract: <\/strong> As cyber threats continue to grow in complexity and scale, traditional SOC is under increasing pressure to detect, analyze, and respond to threats faster than ever before. AI is rapidly transforming security operations infrastructure, enabling organizations to move from reactive monitoring toward more intelligent, adaptive, and automated defense models. The current webinar will explore how AI is reshaping the modern SOC and redefining how security teams operate. The session will examine the evolution of security operations infrastructure, from manual workflows to AI-enabled ecosystems capable of delivering real-time visibility, predictive insights, and faster incident response. The discussion will also highlight how AI enhances visibility across increasingly complex environments, improves threat detection accuracy, and streamlines triage processes. Join us to gain insight into the foundational components of an intelligent SOC, including data pipelines, analytics platforms, threat intelligence integration, automation frameworks, and AI-driven detection and response capabilities. <\/p>\n<p><strong>Key Takeaways: <\/strong><\/p>\n<ul>\n<li>Understanding how AI is transforming modern security operations infrastructure<\/li>\n<li>Core components of an AI-enabled SOC and how it improves visibility and triage<\/li>\n<li>Reducing alert fatigue and improving operational efficiency with AI<\/li>\n<li>Key challenges in building an intelligent SOC<\/li>\n<li>Best practices for integrating AI into existing security operations workflows<\/li>\n<li>Balancing automation with human oversight in AI-driven security environments<\/li>\n<li>Building scalable and resilient SOC capabilities for the future of cybersecurity<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/shervinevans.webp\" width=\"192\" height=\"256\"><strong> Shervin Evans,<\/strong> Founder &amp; CEO, 21st Century Cybersecurity<\/p>\n<p><strong>Bio: <\/strong> \u202fShervin Evans is a seasoned ICT expert with 30 years of experience in the financial services sector. He\u202fspecializes\u202fin programming, infrastructure design, cybersecurity, ethical hacking, incident management, disaster recovery, and digital forensics.\u202fWith\u202fa\u202fmaster\u2019s\u202fdegree\u202fin\u202fcybersecurity and multiple ICT certifications,\u202fShervin serves as\u202fan executive member of\u202fCyberEdBoard, the CISO Society, the BFSB Fintech\u202fWorking\u202fGroup, and the Cybersecurity Breakfast Club Florida Chapter. As a\u202fdistinguished Toastmaster and Rotarian,\u202fhe\u202fis dedicated to advancing ICT risk management and promoting thought leadership in cybersecurity,\u202fall\u202fwhile\u202factively contributing to industry innovation<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 5, 2026 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC Register Now Abstract: As cyber threats continue to grow in complexity and scale, traditional SOC is under increasing pressure to detect, analyze, and respond to threats faster than&hellip;<\/p>\n","protected":false},"author":32,"featured_media":85215,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85213","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC<\/title>\n<meta name=\"description\" content=\"Explore how AI is transforming modern Security Operations Centers (SOC) through intelligent automation, advanced threat detection, predictive analytics, and scalable cybersecurity infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC\u00a0\" \/>\n<meta property=\"og:description\" content=\"Explore how AI is transforming modern Security Operations Centers (SOC) through intelligent automation, advanced threat detection, predictive analytics, and scalable cybersecurity infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-04T06:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-19T06:59:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/5-june_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC\u00a0\",\"datePublished\":\"2026-01-04T06:40:00+00:00\",\"dateModified\":\"2026-05-19T06:59:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/\"},\"wordCount\":350,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/5-june_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/\",\"name\":\"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/5-june_465x310-Without-RN.png\",\"datePublished\":\"2026-01-04T06:40:00+00:00\",\"dateModified\":\"2026-05-19T06:59:46+00:00\",\"description\":\"Explore how AI is transforming modern Security Operations Centers (SOC) through intelligent automation, advanced threat detection, predictive analytics, and scalable cybersecurity infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/5-june_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/5-june_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ais-impact-on-security-operations-building-the-intelligent-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC","description":"Explore how AI is transforming modern Security Operations Centers (SOC) through intelligent automation, advanced threat detection, predictive analytics, and scalable cybersecurity infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/","og_locale":"en_US","og_type":"article","og_title":"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC\u00a0","og_description":"Explore how AI is transforming modern Security Operations Centers (SOC) through intelligent automation, advanced threat detection, predictive analytics, and scalable cybersecurity infrastructure.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-04T06:40:00+00:00","article_modified_time":"2026-05-19T06:59:46+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/5-june_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC\u00a0","datePublished":"2026-01-04T06:40:00+00:00","dateModified":"2026-05-19T06:59:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/"},"wordCount":350,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/5-june_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/","name":"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/5-june_465x310-Without-RN.png","datePublished":"2026-01-04T06:40:00+00:00","dateModified":"2026-05-19T06:59:46+00:00","description":"Explore how AI is transforming modern Security Operations Centers (SOC) through intelligent automation, advanced threat detection, predictive analytics, and scalable cybersecurity infrastructure.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/5-june_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/5-june_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ais-impact-on-security-operations-building-the-intelligent-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"AI\u2019s Impact on Security Operations \u2013 Building the Intelligent SOC\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85213"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85213\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85215"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}