{"id":80099,"date":"2023-09-27T13:15:00","date_gmt":"2023-09-27T13:15:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80099"},"modified":"2023-10-04T09:26:07","modified_gmt":"2023-10-04T09:26:07","slug":"future-trends-in-identity-and-access-management-iam","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/","title":{"rendered":"Future Trends in Identity and Access Management (IAM)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80099\" class=\"elementor elementor-80099\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-81fef4e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"81fef4e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc9317c\" data-id=\"cc9317c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ac75220 elementor-widget elementor-widget-text-editor\" data-id=\"ac75220\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> September 27, 2023<br>\n<strong>Time:<\/strong> 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST<br>\n<strong>Topic:<\/strong> Future Trends in Identity and Access Management (IAM)<br>\n<a class=\"watch_now_btn elementor-button\" href=\"#attend\">Watch now<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Abstract:<\/strong> Identity is the new perimeter. Identity and access management (IAM) emerged as the focal point of cyber security during the COVID-19 pandemic, where an individual&#8217;s identity is transmitted as networks become obsolete. The increased emphasis on IAM has resulted in increased vulnerabilities, threats, and risks, thus placing IAM in the spotlight. IAM focuses on access management, identity governance, single sign-on, and privileged access management and is needed by enterprises everywhere to improve user provisioning and managing their lifecycle. This discussion will focus on trends in IAM, where the focus is no longer on user<\/p>\n<p>identities but also machine\/device identities as IoT proliferation increases. IAM solutions are increasingly integrated, as converged IAM platforms are developed. This discussion will feature various aspects of IAM for the upcoming years, careers in IAM, and how you can get involved and build a career in this space.<\/p>\n<p><strong>Key takeaways:<\/strong><\/p>\n<ul>\n<li>Identity and Remote Work<\/li>\n<li>IAM ecosystem and provisioning and cyber insurance<\/li>\n<li>IAM and user experience<\/li>\n<li>Identities &#8211; user\/machine and IoT<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br>\n<img decoding=\"async\" class=\"size-full wp-image-2265 alignleft\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Tejas-Shroff.jpg.webp\" alt=\"tejas\" width=\"200\"><strong>Tejas Shroff<\/strong>, Senior Director of Managed Security Services, NTT DATA Services<\/p>\n<p><strong>Bio:<\/strong> Tejas is currently the Senior Director of Managed Security Services at NTT DATA, managing the identity and access management practice. He is also an adjunct professor at the University of Texas at Dallas (UTD), where he teaches various cyber security courses to graduate students at the Jindal School of Management. He is a board member of FBI-affiliated non-profit InfraGard National, serves on the advisory board for Collin College\u2019s cyber security program, and mentors the UTD Cybersecurity Club.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/6dmMkMNnhG4\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: September 27, 2023 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: Future Trends in Identity and Access Management (IAM) Watch now &nbsp; Abstract: Identity is the new perimeter. Identity and access management (IAM) emerged as the focal point of cyber security during the COVID-19 pandemic, where an individual&#8217;s identity&hellip;<\/p>\n","protected":false},"author":32,"featured_media":80100,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-80099","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Emerging Identity and Access Management (IAM) Trends<\/title>\n<meta name=\"description\" content=\"Learn how an increased emphasis on identity and access management (IAM) during COVID-19 led to greater vulnerabilities, threats, and risks in our upcoming webinar.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Identity and Access Management (IAM) Trends\" \/>\n<meta property=\"og:description\" content=\"Learn how an increased emphasis on identity and access management (IAM) during COVID-19 led to greater vulnerabilities, threats, and risks in our upcoming webinar.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-27T13:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-04T09:26:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/tejas.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1938\" \/>\n\t<meta property=\"og:image:height\" content=\"1292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Emerging Identity and Access Management (IAM) Trends\" \/>\n<meta name=\"twitter:description\" content=\"Learn how an increased emphasis on identity and access management (IAM) during COVID-19 led to greater vulnerabilities, threats, and risks in our upcoming webinar.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Future Trends in Identity and Access Management (IAM)\",\"datePublished\":\"2023-09-27T13:15:00+00:00\",\"dateModified\":\"2023-10-04T09:26:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/\"},\"wordCount\":309,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/tejas.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/\",\"name\":\"Emerging Identity and Access Management (IAM) Trends\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/tejas.jpg\",\"datePublished\":\"2023-09-27T13:15:00+00:00\",\"dateModified\":\"2023-10-04T09:26:07+00:00\",\"description\":\"Learn how an increased emphasis on identity and access management (IAM) during COVID-19 led to greater vulnerabilities, threats, and risks in our upcoming webinar.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/tejas.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/tejas.jpg\",\"width\":1938,\"height\":1292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/future-trends-in-identity-and-access-management-iam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Future Trends in Identity and Access Management (IAM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Emerging Identity and Access Management (IAM) Trends","description":"Learn how an increased emphasis on identity and access management (IAM) during COVID-19 led to greater vulnerabilities, threats, and risks in our upcoming webinar.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Identity and Access Management (IAM) Trends","og_description":"Learn how an increased emphasis on identity and access management (IAM) during COVID-19 led to greater vulnerabilities, threats, and risks in our upcoming webinar.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-09-27T13:15:00+00:00","article_modified_time":"2023-10-04T09:26:07+00:00","og_image":[{"width":1938,"height":1292,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/tejas.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"Emerging Identity and Access Management (IAM) Trends","twitter_description":"Learn how an increased emphasis on identity and access management (IAM) during COVID-19 led to greater vulnerabilities, threats, and risks in our upcoming webinar.","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Future Trends in Identity and Access Management (IAM)","datePublished":"2023-09-27T13:15:00+00:00","dateModified":"2023-10-04T09:26:07+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/"},"wordCount":309,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/tejas.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/","name":"Emerging Identity and Access Management (IAM) Trends","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/tejas.jpg","datePublished":"2023-09-27T13:15:00+00:00","dateModified":"2023-10-04T09:26:07+00:00","description":"Learn how an increased emphasis on identity and access management (IAM) during COVID-19 led to greater vulnerabilities, threats, and risks in our upcoming webinar.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/tejas.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/tejas.jpg","width":1938,"height":1292},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/future-trends-in-identity-and-access-management-iam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Future Trends in Identity and Access Management (IAM)"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80099"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80099\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80100"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}