{"id":81989,"date":"2024-06-24T12:10:00","date_gmt":"2024-06-24T12:10:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81989"},"modified":"2024-07-01T06:44:36","modified_gmt":"2024-07-01T06:44:36","slug":"decentralized-security-role-of-blockchain-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/","title":{"rendered":"Decentralized Security: Role of Blockchain in Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81989\" class=\"elementor elementor-81989\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7dd3bdf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7dd3bdf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a300025\" data-id=\"a300025\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ce520d5 elementor-widget elementor-widget-text-editor\" data-id=\"ce520d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: June 24, 2024<\/div><div><strong>Time<\/strong>: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST<\/div><div><strong>Topic<\/strong>: Decentralized Security: Role of Blockchain in Cybersecurity<\/div><p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\">Watch Now<\/a><\/p><p><strong><br \/>Abstract: <\/strong>In an age where cyber threats are evolving rapidly, traditional security measures fall short of adequate mitigation capabilities. With digital technologies driving decentralization and related innovations, blockchain emerges as a formidable option to consider as a cybersecurity solution. Known for its immutable ledger and decentralized architecture, blockchain represents a significant innovation in information security. Utilizing a distributed network of nodes and cryptographic techniques, blockchain helps secure access to data and ensure integrity and confidentiality.<\/p><p>Learn about the synergistic relationship between decentralized technology and security and blockchain&#8217;s transformative potential in fortifying defense against cyberattacks in this webinar.<\/p><p>Discover how blockchain safeguards digital assets and networks through its unique consensus mechanisms, and explore its diverse applications in providing a resilient shield against cyber<\/p><p><strong>Key Takeaways:\u00a0<\/strong><\/p><ul><li style=\"list-style-type: none;\"><ul><li>Introduction to blockchain technology<\/li><li>Current information security challenges<\/li><li>Blockchain as a potential cybersecurity solution<\/li><li>Harnessing blockchain to fortify cybersecurity posture.<\/li><li>Case studies showcasing blockchain-based data security solutions<\/li><\/ul><p><strong>Speaker:<\/strong><br \/><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-59682 alignleft\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/05\/Sadri.jpg\" alt=\"Sadri Sali\" width=\"209\" height=\"279\" \/><strong>Sadri Sali<\/strong>, Managing Partner, Sali Blockchain &amp; Crypto Regulations<br \/><strong>Bio:<\/strong> As one of the first Blockchain-focused LL.M. holders (Thesis: The next-generation Regulation on Markets in Crypto-Assets: stablecoins and CASPs in the context of the AML framework) \u2013 Sadri founded Sali Blockchain &amp; Crypto Regulations in order to establish trust in an industry that helped him develop himself as a person, professional and as an investor \u2013 the Cryptocurrency markets. He has extensive experience in working with regulators, such as AFM, AMF, CBI, FCA, CMVM, MFSA, ASF, and other leading watchdogs of the EU, as well as VARA, FCA, offshore regulators in the BVI, Seychelles, and more.<\/p><\/li><li style=\"list-style-type: none;\">With hands-on experience with Euronext (the largest stock exchange in Europe and the fourth largest in the world), various EU regulators, and a Maastricht and Utrecht law education, he is adequately prepared to cater to crypto businesses for the EU regulatory framework. He is equally equipped with the know-how to provide top executives with international solutions recognized by every jurisdiction in blockchain and cryptocurrency matters. He is passionate about creating ethical standards for the adequate decentralization of the emerging blockchain industry, as he considers crypto-assets to be the nearest financial future.<\/li><li style=\"list-style-type: none;\">His final aim is clear: to educate stakeholders and create trust between Crypto Asset Service Providers, regulators, and the general public interested in blockchain technology and crypto assets.<\/li><li style=\"list-style-type: none;\"><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p> <a name=\"attend\"><\/a><br \/>\n<iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Z3eRJQEMA-w?si=hpfKAh68YzCu2gCt\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: June 24, 2024Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM ISTTopic: Decentralized Security: Role of Blockchain in Cybersecurity Watch Now Abstract: In an age where cyber threats are evolving rapidly, traditional security measures fall short of adequate mitigation capabilities. With digital technologies driving decentralization and related innovations, blockchain emerges as a&hellip;<\/p>\n","protected":false},"author":32,"featured_media":82038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":true,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-81989","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Leveraging Blockchain for Enhanced Cybersecurity: A Decentralized Approach<\/title>\n<meta name=\"description\" content=\"Gain a holistic understanding of blockchain technology, its potential to transform cybersecurity defenses, the interplay between decentralized technology and security, and more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Decentralized Security: Role of Blockchain in Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Gain a holistic understanding of blockchain technology, its potential to transform cybersecurity defenses, the interplay between decentralized technology and security, and more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-24T12:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-01T06:44:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"621\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Decentralized Security: Role of Blockchain in Cybersecurity\",\"datePublished\":\"2024-06-24T12:10:00+00:00\",\"dateModified\":\"2024-07-01T06:44:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/\"},\"wordCount\":423,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465-310-1-1-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/\",\"name\":\"Leveraging Blockchain for Enhanced Cybersecurity: A Decentralized Approach\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465-310-1-1-1.jpg\",\"datePublished\":\"2024-06-24T12:10:00+00:00\",\"dateModified\":\"2024-07-01T06:44:36+00:00\",\"description\":\"Gain a holistic understanding of blockchain technology, its potential to transform cybersecurity defenses, the interplay between decentralized technology and security, and more!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465-310-1-1-1.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465-310-1-1-1.jpg\",\"width\":930,\"height\":621},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/decentralized-security-role-of-blockchain-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Decentralized Security: Role of Blockchain in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Leveraging Blockchain for Enhanced Cybersecurity: A Decentralized Approach","description":"Gain a holistic understanding of blockchain technology, its potential to transform cybersecurity defenses, the interplay between decentralized technology and security, and more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Decentralized Security: Role of Blockchain in Cybersecurity","og_description":"Gain a holistic understanding of blockchain technology, its potential to transform cybersecurity defenses, the interplay between decentralized technology and security, and more!","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-06-24T12:10:00+00:00","article_modified_time":"2024-07-01T06:44:36+00:00","og_image":[{"width":930,"height":621,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-1-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Decentralized Security: Role of Blockchain in Cybersecurity","datePublished":"2024-06-24T12:10:00+00:00","dateModified":"2024-07-01T06:44:36+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/"},"wordCount":423,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-1-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/","name":"Leveraging Blockchain for Enhanced Cybersecurity: A Decentralized Approach","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-1-1.jpg","datePublished":"2024-06-24T12:10:00+00:00","dateModified":"2024-07-01T06:44:36+00:00","description":"Gain a holistic understanding of blockchain technology, its potential to transform cybersecurity defenses, the interplay between decentralized technology and security, and more!","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-1-1.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-1-1.jpg","width":930,"height":621},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/decentralized-security-role-of-blockchain-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Decentralized Security: Role of Blockchain in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81989"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81989\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82038"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}