{"id":81917,"date":"2024-05-28T17:45:00","date_gmt":"2024-05-28T17:45:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81917"},"modified":"2024-06-11T10:27:13","modified_gmt":"2024-06-11T10:27:13","slug":"the-human-element-understanding-social-engineering-tactics","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/","title":{"rendered":"The Human Element: Understanding Social Engineering Tactics"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81917\" class=\"elementor elementor-81917\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9456441 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9456441\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fa0f051\" data-id=\"fa0f051\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-269d209 elementor-widget elementor-widget-text-editor\" data-id=\"269d209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: May 28, 2024<\/div><div><strong>Time<\/strong>: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST<\/div><div><p><strong>Topic<\/strong>: The Human Element: Understanding Social Engineering Tactics<\/p><\/div><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" rel=\"noopener\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong> In today&#8217;s dynamic threat landscape, the one constant element persistently targeted is the human link, often because it is the weakest link in the security chain. Attackers constantly and relentlessly focus on exploiting this vulnerability to gather information and launch their assaults. Social engineering relies on psychological tactics to gain unauthorized access to data or systems, posing significant risks to individuals and organizations. This webinar aims to understand the significance and impact of social engineering on security, examining how attackers exploit psychological principles to manipulate people and gain access. It also highlights the common techniques, tactics, and procedures (TTPs) used in social engineering and the crucial role a well-rounded security culture plays in defense. Join us for an informative session to deepen your understanding of the human factor in cybersecurity and discover how to protect yourself against these threats!<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li>Understanding the significance and impact of social engineering<\/li><li>Psychological principles in social engineering<\/li><li>Social engineering tactics and techniques<\/li><li>Defensive strategies and best practices<\/li><li>The significance of security culture<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img decoding=\"async\" class=\" wp-image-81919 alignleft\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/David-Pereira-3-209x300.jpeg\" alt=\"David Pereira\" width=\"183\" height=\"263\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/David-Pereira-3-209x300.jpeg 209w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/David-Pereira-3-714x1024.jpeg 714w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/David-Pereira-3-768x1101.jpeg 768w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/David-Pereira-3.jpeg 893w\" sizes=\"(max-width: 183px) 100vw, 183px\" \/><strong>David Pereira<\/strong>, Ph.D. Candidate, Digital Transformation &amp; Founder and CEO of SecPro<br \/><strong>Bio:<\/strong> David Pereira, founder and CEO of SecPro, is a Published Author, International Speaker, Trainer, Digital Researcher, and Consultant with over 27 years of experience in the field of Cybersecurity and Computer Forensics. He has developed consultant activities in Ethical Hacking, Malware Analysis, Penetration Testing, and Forensic Analysis for various national and international companies. David is also an International Instructor for Law Enforcement Agencies and Companies around the world, including the FBI, Department of Defense USA, Homeland Security, Secret Service USA, USAF, US Marines, NAVY Seals, CBP, and many more.<\/p><p><a name=\"attend\"><\/a><br \/><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/LfYLRryrrL8?si=XUEaq8FaPIf38YdI\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: May 28, 2024Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: The Human Element: Understanding Social Engineering Tactics Watch Now Abstract: In today&#8217;s dynamic threat landscape, the one constant element persistently targeted is the human link, often because it is the weakest link in the security chain. Attackers constantly and&hellip;<\/p>\n","protected":false},"author":77,"featured_media":81918,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[199,12443,12277,439,12959,451,12958],"class_list":{"0":"post-81917","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks","9":"tag-cybersecurity","10":"tag-data-security","11":"tag-datasecurity","12":"tag-phishing","13":"tag-pretexting","14":"tag-social-engineering","15":"tag-vishing"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Decoding Social Engineering Considering the Human Factor<\/title>\n<meta name=\"description\" content=\"Understand the role of the human element in cybersecurity, sophisticated social engineering tactics used by threat actors, and how to defend yourself from them!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Human Element: Understanding Social Engineering Tactics\" \/>\n<meta property=\"og:description\" content=\"Understand the role of the human element in cybersecurity, sophisticated social engineering tactics used by threat actors, and how to defend yourself from them!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-28T17:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-11T10:27:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"931\" \/>\n\t<meta property=\"og:image:height\" content=\"621\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"The Human Element: Understanding Social Engineering Tactics\",\"datePublished\":\"2024-05-28T17:45:00+00:00\",\"dateModified\":\"2024-06-11T10:27:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/\"},\"wordCount\":300,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/465-310-1-2.jpg\",\"keywords\":[\"cybersecurity\",\"Data Security\",\"datasecurity\",\"phishing\",\"pretexting\",\"social engineering\",\"vishing\"],\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/\",\"name\":\"Decoding Social Engineering Considering the Human Factor\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/465-310-1-2.jpg\",\"datePublished\":\"2024-05-28T17:45:00+00:00\",\"dateModified\":\"2024-06-11T10:27:13+00:00\",\"description\":\"Understand the role of the human element in cybersecurity, sophisticated social engineering tactics used by threat actors, and how to defend yourself from them!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/465-310-1-2.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/465-310-1-2.jpg\",\"width\":931,\"height\":621,\"caption\":\"Social Engineering Tactics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/the-human-element-understanding-social-engineering-tactics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Human Element: Understanding Social Engineering Tactics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Decoding Social Engineering Considering the Human Factor","description":"Understand the role of the human element in cybersecurity, sophisticated social engineering tactics used by threat actors, and how to defend yourself from them!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/","og_locale":"en_US","og_type":"article","og_title":"The Human Element: Understanding Social Engineering Tactics","og_description":"Understand the role of the human element in cybersecurity, sophisticated social engineering tactics used by threat actors, and how to defend yourself from them!","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-05-28T17:45:00+00:00","article_modified_time":"2024-06-11T10:27:13+00:00","og_image":[{"width":931,"height":621,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1-2.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"The Human Element: Understanding Social Engineering Tactics","datePublished":"2024-05-28T17:45:00+00:00","dateModified":"2024-06-11T10:27:13+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/"},"wordCount":300,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1-2.jpg","keywords":["cybersecurity","Data Security","datasecurity","phishing","pretexting","social engineering","vishing"],"articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/","name":"Decoding Social Engineering Considering the Human Factor","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1-2.jpg","datePublished":"2024-05-28T17:45:00+00:00","dateModified":"2024-06-11T10:27:13+00:00","description":"Understand the role of the human element in cybersecurity, sophisticated social engineering tactics used by threat actors, and how to defend yourself from them!","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1-2.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/465-310-1-2.jpg","width":931,"height":621,"caption":"Social Engineering Tactics"},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/the-human-element-understanding-social-engineering-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"The Human Element: Understanding Social Engineering Tactics"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81917"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81917\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81918"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}