{"id":85219,"date":"2026-01-03T07:44:00","date_gmt":"2026-01-03T07:44:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=85219"},"modified":"2026-05-19T07:55:28","modified_gmt":"2026-05-19T07:55:28","slug":"reimagining-cybersecurity-in-the-age-of-digital-transformation","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/","title":{"rendered":"Reimagining Cybersecurity in the Age of Digital Transformation\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"85219\" class=\"elementor elementor-85219\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-22c6ed7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"22c6ed7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-11ddaac\" data-id=\"11ddaac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33b51f3 elementor-widget elementor-widget-text-editor\" data-id=\"33b51f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: June 8, 2026<\/div>\n<div><strong>Time<\/strong>: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST<\/div>\n<div>\n<p><strong>Topic: <\/strong>  Reimagining Cybersecurity in the Age of Digital Transformation<\/p>\n<p><a class=\"watch_now_btn elementor-button\" href=\"https:\/\/attendee.gotowebinar.com\/register\/833370895546133595?source=ECC+Webpage\" target=\"_blank\" rel=\"noopener\">Register Now<\/a><\/p>\n<p><strong>Abstract: <\/strong>Digital transformation is demanding more than ever from our security programs, but those demands have exposed cracks in the very functions of the way we\u2019ve been told to organize and deliver them. And those cracks aren&#8217;t something we can paper over with more tools, more automation or even more maturity. <\/p>\n<p>Add to this the shocking statistic that the average delivery delay due to security for major programs driving digital transformation is between 8 and 12 weeks, and it becomes inevitable that we need to take a hard look at how we\u2019re organizing ourselves and whether what we&#8217;re delivering as security to the business is truly fit for purpose. <\/p>\n<p>In this talk, we\u2019ll address what it means to reimagine cybersecurity in a way that finally means security exists as an outcome of integrated and aligned business delivery, not a control afterthought. A security program that can anticipate change and adapt before controls are ever deployed. And a security program that finally breaks down the barriers between functions in a way that focuses on sustained flow and value delivery. <\/p>\n<p>If our organizations are changing themselves through digital transformation, security must do the same. It\u2019s time to reimagine security in a way that makes sense for today and for the future.<\/p>\n<p><strong>Key Takeaways: <\/strong><\/p>\n<ul>\n<li>Why many of the issues we consider \u201cunsolvable\u201d in security are a function of the way we think security should be done<\/li>\n<li>The dangers of premature security automation, including the adoption of LLMs for security assessments and new trends like GRC Engineering<\/li>\n<li>How improving our security metrics actually shows that we\u2019re focusing on exactly the wrong things<\/li>\n<li>Why Zero Trust, continuous monitoring and typical approaches to \u201crisk-based\u201d security are not addressing the real barriers to secure digital transformation<\/li>\n<li>The one thing we must ensure happens every single day that ultimately determines whether security helps or hinders delivery<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-59705 alignleft\" src=\"\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/Andrew.jpg\" width=\"192\" height=\"256\"><strong> Andrew S. Townley,<\/strong> Founder and Chief Executive of\u202fArchistry<\/p><p>\n<strong>Bio: <\/strong> Andrew S. Townley is a global strategist, architect, and thought leader in security, risk, and business execution. With a career spanning three decades, he has led multimillion-dollar projects, founded four companies, and guided executives and security leaders through some of their toughest challenges. As Chief Executive of\u202fArchistry, he helps organizations turn security from a business obstacle into a competitive advantage. Known for his systems-thinking approach and ability to connect disciplines in unexpected ways, Andrew is a sought-after speaker, author of multiple books\u2014including From Invisible Crisis to Competitive Advantage, and publisher of the Security Sanity\u2122 newsletter. His clients describe him as \u201cpart genius, part mad scientist\u201d for his ability to translate ideas into concrete action that drives\u202freal results.\u202f<\/p>\n<\/div>\n<div id=\"attend\"><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 8, 2026 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: Reimagining Cybersecurity in the Age of Digital Transformation Register Now Abstract: Digital transformation is demanding more than ever from our security programs, but those demands have exposed cracks in the very functions of the way we\u2019ve been told&hellip;<\/p>\n","protected":false},"author":32,"featured_media":85220,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12483],"tags":[],"class_list":{"0":"post-85219","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-upcoming-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Reimagining Cybersecurity in the Age of Digital Transformation<\/title>\n<meta name=\"description\" content=\"Discover why traditional cybersecurity models are failing digital transformation and explore how integrated security strategies, business-aligned execution, and adaptive frameworks can reshape security into a competitive advantage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reimagining Cybersecurity in the Age of Digital Transformation\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover why traditional cybersecurity models are failing digital transformation and explore how integrated security strategies, business-aligned execution, and adaptive frameworks can reshape security into a competitive advantage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-03T07:44:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-19T07:55:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/8-june_465x310-Without-RN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"969\" \/>\n\t<meta property=\"og:image:height\" content=\"646\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Reimagining Cybersecurity in the Age of Digital Transformation\u00a0\",\"datePublished\":\"2026-01-03T07:44:00+00:00\",\"dateModified\":\"2026-05-19T07:55:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/\"},\"wordCount\":472,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/8-june_465x310-Without-RN.png\",\"articleSection\":[\"Cyber Talks\",\"Upcoming Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/\",\"name\":\"Reimagining Cybersecurity in the Age of Digital Transformation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/8-june_465x310-Without-RN.png\",\"datePublished\":\"2026-01-03T07:44:00+00:00\",\"dateModified\":\"2026-05-19T07:55:28+00:00\",\"description\":\"Discover why traditional cybersecurity models are failing digital transformation and explore how integrated security strategies, business-aligned execution, and adaptive frameworks can reshape security into a competitive advantage.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/8-june_465x310-Without-RN.png\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/8-june_465x310-Without-RN.png\",\"width\":969,\"height\":646},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/reimagining-cybersecurity-in-the-age-of-digital-transformation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Reimagining Cybersecurity in the Age of Digital Transformation\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Reimagining Cybersecurity in the Age of Digital Transformation","description":"Discover why traditional cybersecurity models are failing digital transformation and explore how integrated security strategies, business-aligned execution, and adaptive frameworks can reshape security into a competitive advantage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/","og_locale":"en_US","og_type":"article","og_title":"Reimagining Cybersecurity in the Age of Digital Transformation\u00a0","og_description":"Discover why traditional cybersecurity models are failing digital transformation and explore how integrated security strategies, business-aligned execution, and adaptive frameworks can reshape security into a competitive advantage.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2026-01-03T07:44:00+00:00","article_modified_time":"2026-05-19T07:55:28+00:00","og_image":[{"width":969,"height":646,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/8-june_465x310-Without-RN.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Reimagining Cybersecurity in the Age of Digital Transformation\u00a0","datePublished":"2026-01-03T07:44:00+00:00","dateModified":"2026-05-19T07:55:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/"},"wordCount":472,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/8-june_465x310-Without-RN.png","articleSection":["Cyber Talks","Upcoming Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/","name":"Reimagining Cybersecurity in the Age of Digital Transformation","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/8-june_465x310-Without-RN.png","datePublished":"2026-01-03T07:44:00+00:00","dateModified":"2026-05-19T07:55:28+00:00","description":"Discover why traditional cybersecurity models are failing digital transformation and explore how integrated security strategies, business-aligned execution, and adaptive frameworks can reshape security into a competitive advantage.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/8-june_465x310-Without-RN.png","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2026\/05\/8-june_465x310-Without-RN.png","width":969,"height":646},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/reimagining-cybersecurity-in-the-age-of-digital-transformation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Reimagining Cybersecurity in the Age of Digital Transformation\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=85219"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/85219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/85220"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=85219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=85219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=85219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}