{"id":82069,"date":"2024-07-09T20:34:00","date_gmt":"2024-07-09T20:34:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=82069"},"modified":"2024-08-30T16:35:17","modified_gmt":"2024-08-30T16:35:17","slug":"ai-in-cyber-warfare","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/","title":{"rendered":"AI in Cyber Warfare: AI-Powered Attacks and Defense"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"82069\" class=\"elementor elementor-82069\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ac19641 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ac19641\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f790813\" data-id=\"f790813\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79f2f64 elementor-widget elementor-widget-text-editor\" data-id=\"79f2f64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><strong>Date<\/strong>: July 9, 2024<\/div>\n<div><strong>Time<\/strong>: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST<\/div>\n<div><strong>Topic<\/strong>: AI in Cyber Warfare: AI-Powered Attacks and Defense<\/div>\n<div><\/div>\n<p><a class=\"watch_now_btn elementor-button\" href=\"#attend\" target=\"_self\" rel=\"noopener\">Watch now<\/a><\/p>\n<p><strong style=\"color: var(--the7-base-color); letter-spacing: var(--the7-base-letter-spacing); text-transform: var(--the7-base-text-transform); word-spacing: normal;\">Abstract:<\/strong><br><\/p>\n<p>The sophistication of cyberattacks is evolving rapidly across the threat landscape, compelling security professionals to seek out innovative technologies and approaches to counter these threats. Artificial Intelligence (AI), standing at the forefront of evolving technologies, acts as a dual blade aiding security and cyberattack efforts. AI-driven technologies can be harnessed to launch sophisticated attacks, enabling security bypass and automating vulnerability detection and the exploitation process. Conversely, innovative AI applications can greatly aid threat detection, event analysis, and incident response. Hence, the current webinar aims to understand AI&#8217;s role in shaping modern cyber conflict. The webinar will explore AI-enhanced cyber threats, from malware and ransomware to phishing<\/p>\n<p>and social engineering attacks, alongside AI\u2019s impact on advanced defense mechanisms to combat evolving threats and revolutionize cybersecurity. Join us as we explore how AI is reshaping cyberspace, offering both unprecedented challenges and groundbreaking solutions.<\/p>\n<p><strong>Key Takeaways:&nbsp;<\/strong><\/p>\n<ul>\n<li>The role and evolution of&nbsp;<a href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/ethical-hacking\/exploring-ai-and-cybersecurity\/\" target=\"_blank\">AI in cybersecurity<\/a><\/li>\n<li>AI-powered attacks: Tools, techniques, and case studies<\/li>\n<li>AI-driven security: Strategies for leveraging AI in threat detection and response<\/li>\n<li>Ethical considerations and Regulating AI-based security policies<\/li>\n<\/ul>\n<p><strong>Speaker:<\/strong><br><strong><img decoding=\"async\" class=\" wp-image-82071 alignleft\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/GeorgeDobrea-300x300.png\" alt=\"George Dobrea\" width=\"172\" height=\"172\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/GeorgeDobrea-300x300.png 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/GeorgeDobrea-1024x1024.png 1024w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/GeorgeDobrea-150x150.png 150w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/GeorgeDobrea-768x768.png 768w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/GeorgeDobrea-1536x1536.png 1536w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/06\/GeorgeDobrea-2048x2048.png 2048w\" sizes=\"(max-width: 172px) 100vw, 172px\" \/>George Dobrea<\/strong>, Co-founder and CEO of XEDUCO Institute<br><strong>Bio:<\/strong> Co-founder and CEO of XEDUCO Institute, George Dobrea is a cybersecurity expert and a well-known technical instructor with over 35 years of business experience delivering consulting services and training programs to military, commercial, and public organizations in 30+ countries.<\/p>\n<p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p>\n<p><a name=\"attend\"><\/a><br><iframe title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/xrVV79aibtk?si=l7CpGSJAYuYN4eV9\" width=\"100%\" height=\"450\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: July 9, 2024 Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST Topic: AI in Cyber Warfare: AI-Powered Attacks and Defense Watch now Abstract: The sophistication of cyberattacks is evolving rapidly across the threat landscape, compelling security professionals to seek out innovative technologies and approaches to counter these threats. Artificial Intelligence&hellip;<\/p>\n","protected":false},"author":77,"featured_media":82137,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[12967,12966,12526,199,12407,439,12411],"class_list":{"0":"post-82069","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks","9":"tag-ai-based-security","10":"tag-ai-driven-threats","11":"tag-artificial-intelligence","12":"tag-cybersecurity","13":"tag-information-security","14":"tag-phishing","15":"tag-threat-intelligence"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI in Cybersecurity: Cyberattacks and Defense<\/title>\n<meta name=\"description\" content=\"Explore how cyberattackers leverage the power AI to bypass security and how AI-powered technology can help defense against these threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI in Cyber Warfare: AI-Powered Attacks and Defense\" \/>\n<meta property=\"og:description\" content=\"Explore how cyberattackers leverage the power AI to bypass security and how AI-powered technology can help defense against these threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-09T20:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-30T16:35:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1396\" \/>\n\t<meta property=\"og:image:height\" content=\"930\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\"},\"headline\":\"AI in Cyber Warfare: AI-Powered Attacks and Defense\",\"datePublished\":\"2024-07-09T20:34:00+00:00\",\"dateModified\":\"2024-08-30T16:35:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/\"},\"wordCount\":277,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465-310-1-2.png\",\"keywords\":[\"AI-based security\",\"AI-driven threats\",\"Artificial Intelligence\",\"cybersecurity\",\"Information Security\",\"phishing\",\"Threat Intelligence\"],\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/\",\"name\":\"AI in Cybersecurity: Cyberattacks and Defense\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465-310-1-2.png\",\"datePublished\":\"2024-07-09T20:34:00+00:00\",\"dateModified\":\"2024-08-30T16:35:17+00:00\",\"description\":\"Explore how cyberattackers leverage the power AI to bypass security and how AI-powered technology can help defense against these threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465-310-1-2.png\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/465-310-1-2.png\",\"width\":1396,\"height\":930},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/ai-in-cyber-warfare\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AI in Cyber Warfare: AI-Powered Attacks and Defense\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/bf00e50e3662b198f520ff05402bf17f\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI in Cybersecurity: Cyberattacks and Defense","description":"Explore how cyberattackers leverage the power AI to bypass security and how AI-powered technology can help defense against these threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/","og_locale":"en_US","og_type":"article","og_title":"AI in Cyber Warfare: AI-Powered Attacks and Defense","og_description":"Explore how cyberattackers leverage the power AI to bypass security and how AI-powered technology can help defense against these threats.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-07-09T20:34:00+00:00","article_modified_time":"2024-08-30T16:35:17+00:00","og_image":[{"width":1396,"height":930,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-2.png","type":"image\/png"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f"},"headline":"AI in Cyber Warfare: AI-Powered Attacks and Defense","datePublished":"2024-07-09T20:34:00+00:00","dateModified":"2024-08-30T16:35:17+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/"},"wordCount":277,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-2.png","keywords":["AI-based security","AI-driven threats","Artificial Intelligence","cybersecurity","Information Security","phishing","Threat Intelligence"],"articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/","name":"AI in Cybersecurity: Cyberattacks and Defense","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-2.png","datePublished":"2024-07-09T20:34:00+00:00","dateModified":"2024-08-30T16:35:17+00:00","description":"Explore how cyberattackers leverage the power AI to bypass security and how AI-powered technology can help defense against these threats.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-2.png","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/04\/465-310-1-2.png","width":1396,"height":930},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/ai-in-cyber-warfare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"AI in Cyber Warfare: AI-Powered Attacks and Defense"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/bf00e50e3662b198f520ff05402bf17f","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=82069"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/82069\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/82137"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=82069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=82069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=82069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}