{"id":493,"date":"2025-11-07T11:58:42","date_gmt":"2025-11-07T11:58:42","guid":{"rendered":"https:\/\/dev.cloudengin.com\/?page_id=493"},"modified":"2026-01-14T14:52:33","modified_gmt":"2026-01-14T14:52:33","slug":"cybersecurity-governance","status":"publish","type":"page","link":"https:\/\/www.cloudengin.com\/?page_id=493","title":{"rendered":"Cybersecurity Governance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"493\" class=\"elementor elementor-493\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7578ab1 e-flex e-con-boxed e-con e-parent\" data-id=\"7578ab1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbf2b16 elementor-widget elementor-widget-heading\" data-id=\"bbf2b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Governance and Risk Management Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-989816a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"989816a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"pb30\">Integrate a pro-active management framework into your organizational cybersecurity governance, information security strategies. Monitor threats, analyze risks, assess infra health, and engage in swift remedies to security threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6d57ba elementor-widget elementor-widget-button\" data-id=\"f6d57ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3246648 e-flex e-con-boxed e-con e-parent\" data-id=\"3246648\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2dc6d5c e-con-full e-flex e-con e-child\" data-id=\"2dc6d5c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9e1f23 elementor-widget elementor-widget-heading\" data-id=\"b9e1f23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">End-to-end Security Governance and Monitoring: Stay one step ahead of cybercriminals with advanced security management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b23d97d elementor-widget elementor-widget-text-editor\" data-id=\"b23d97d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-left col-lg-6\"><p>Embracing advanced security technologies and intelligent automation tools is a critical step toward modernizing enterprise security standards. However, to truly enhance an organization&#8217;s risk posture, these solutions must be supported by proactive people, robust processes, and well-defined frameworks. Without proper oversight and technically empowered governance from roles such as Chief Information Security Officers (CISOs) and security engineers, any long-term security strategy is likely to collapse like a house of cards. This also leaves glaring gaps in overall security awareness.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28a5ee6 e-con-full e-flex e-con e-child\" data-id=\"28a5ee6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2dffe88 e-con-full e-flex e-con e-child\" data-id=\"2dffe88\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2632031 elementor-widget elementor-widget-text-editor\" data-id=\"2632031\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"percentage txt-blue\">60%<\/span>\u00a0of executives agree that cyber and privacy regulations reduce risk in their organization\u2019s ecosystem<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dfad1d4 e-con-full e-flex e-con e-child\" data-id=\"dfad1d4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9061ff elementor-widget elementor-widget-text-editor\" data-id=\"f9061ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-left col-lg-6\"><p><span class=\"percentage txt-blue\">54%<\/span>\u00a0of organizations have an insufficient understanding of cyber vulnerabilities<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33a000e e-con-full e-flex e-con e-child\" data-id=\"33a000e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-02590b8 elementor-widget elementor-widget-text-editor\" data-id=\"02590b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-left col-lg-6\"><p>Only\u00a0<span class=\"percentage txt-blue\">25%<\/span>\u00a0of SME&#8217;s carry a cyber insurance<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d754a7 e-con-full e-flex e-con e-child\" data-id=\"3d754a7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfdeb20 elementor-widget elementor-widget-text-editor\" data-id=\"bfdeb20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-left col-lg-6\"><section class=\"page-section ptb50 bg-gray\"><div class=\"container\"><div class=\"\"><div class=\"card-white--full-height pt50\"><div class=\"row \"><div class=\"col-12\"><div><p>CloudEngin, the world&#8217;s largest application-focused managed cloud services provider and a leading cybersecurity company, ensures end-to-end governance, monitoring, and compliance of an organization&#8217;s security systems, applications, platforms, and workflows. With CloudEngin, embrace and govern cutting-edge MDR solutions, security policies, managed data or information systems, SOC operations for deep threat landscape management, DevSecOps ecosystems, and intelligent cloud security technologies. Ensure complete supervision and monitoring over disparate IT landscapes and workflows in terms of deep threat monitoring, hunting, analysis, and remediation. Avail in-depth security consulting paired with 24\/7 support. Enhance security awareness, action and administration across multiple departments with ease.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"governance-assessment-model\" class=\"pcs-card\">\u00a0<\/div><\/div><\/div><\/section><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ade11d3 e-flex e-con-boxed e-con e-parent\" data-id=\"ade11d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-514705f elementor-widget elementor-widget-heading\" data-id=\"514705f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Governance and Assessment Model\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a433da4 e-con-full e-flex e-con e-child\" data-id=\"a433da4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c6a3d6b e-con-full e-flex e-con e-child\" data-id=\"c6a3d6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-56ffbc5 e-con-full e-flex e-con e-child\" data-id=\"56ffbc5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e38140e elementor-widget elementor-widget-heading\" data-id=\"e38140e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Posture Analysis\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a840e83 elementor-widget elementor-widget-text-editor\" data-id=\"a840e83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Conduct interviews, document the same, and evaluate the existing security infrastructure<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-clarity.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd3279e e-con-full e-flex e-con e-child\" data-id=\"bd3279e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6793bee elementor-widget elementor-widget-heading\" data-id=\"6793bee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Access Control and Management\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99ad9c8 elementor-widget elementor-widget-text-editor\" data-id=\"99ad9c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Analyze user accounts, secrets information, keys, and user behaviour data<\/p><\/div><\/div><\/div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-commitment.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f30c6f3 e-con-full e-flex e-con e-child\" data-id=\"f30c6f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-afcf391 e-con-full e-flex e-con e-child\" data-id=\"afcf391\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e700a37 elementor-widget elementor-widget-heading\" data-id=\"e700a37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Incident Management\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05520c9 elementor-widget elementor-widget-text-editor\" data-id=\"05520c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Evaluate threat incidents affecting the organizational perimeters, conduct root cause analysis<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-clarity.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-002b47c e-con-full e-flex e-con e-child\" data-id=\"002b47c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37bef26 elementor-widget elementor-widget-heading\" data-id=\"37bef26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance Governance\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a938cb3 elementor-widget elementor-widget-text-editor\" data-id=\"a938cb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Review security loopholes, regulatory gaps, and compliance issues across the entire IT stack, processes, and workflows<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-commitment.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5d28da e-con-full e-flex e-con e-child\" data-id=\"d5d28da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d8e155a e-con-full e-flex e-con e-child\" data-id=\"d8e155a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b751a17 elementor-widget elementor-widget-heading\" data-id=\"b751a17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network Security Management\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ab06fc elementor-widget elementor-widget-text-editor\" data-id=\"8ab06fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Review segmentation and firewall policies against common misconfigurations<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-clarity.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fee7958 e-con-full e-flex e-con e-child\" data-id=\"fee7958\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-881ecdf elementor-widget elementor-widget-heading\" data-id=\"881ecdf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Security Management\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1957fad elementor-widget elementor-widget-text-editor\" data-id=\"1957fad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-6\"><div class=\"equal-height pcs-card-con no-margin-d\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-7\"><div class=\"equal-height pcs-card-con no-margin-d\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"governance-assessment-model\" class=\"pcs-card\"><div class=\"row\"><div class=\"col-md-6 mb30-d mb15-m equal-height-parent-8\"><div class=\"equal-height pcs-card-con no-margin-d\"><div><p>Assess data security both for static data and dynamic dataflows<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-commitment.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe3eb71 e-flex e-con-boxed e-con e-parent\" data-id=\"fe3eb71\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6af2b3b elementor-widget elementor-widget-heading\" data-id=\"6af2b3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Governance and Monitoring Model<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dbfa109 e-con-full e-flex e-con e-child\" data-id=\"dbfa109\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8186626 e-con-full e-flex e-con e-child\" data-id=\"8186626\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7674ac5 elementor-widget elementor-widget-heading\" data-id=\"7674ac5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat and Risk Detection\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4344bd6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4344bd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c96497 elementor-widget elementor-widget-text-editor\" data-id=\"8c96497\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Instrumented alerting<\/p><p>Threats monitoring<\/p><p>Security analytics<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-81dfd09 e-con-full e-flex e-con e-child\" data-id=\"81dfd09\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1da05a8 elementor-widget elementor-widget-heading\" data-id=\"1da05a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Investigation and Qualification\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7c3ae5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b7c3ae5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-020c335 elementor-widget elementor-widget-text-editor\" data-id=\"020c335\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Security assessment and supervision<\/p><p>Threat hunting<\/p><p>Incident escalation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1eedc15 e-con-full e-flex e-con e-child\" data-id=\"1eedc15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f3c0c0 elementor-widget elementor-widget-heading\" data-id=\"1f3c0c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Response Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a474154 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a474154\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f701de9 elementor-widget elementor-widget-text-editor\" data-id=\"f701de9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Automated response processes<\/p><p>Response planning<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5e7e3c e-flex e-con-boxed e-con e-parent\" data-id=\"e5e7e3c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-efa8302 e-con-full e-flex e-con e-child\" data-id=\"efa8302\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46f2c09 elementor-widget elementor-widget-heading\" data-id=\"46f2c09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Cybersecurity Governance Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa26b0a e-con-full e-flex e-con e-child\" data-id=\"fa26b0a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83ffe07 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"83ffe07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8ff1986 e-flex e-con-boxed e-con e-parent\" data-id=\"8ff1986\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7deabe6 elementor-widget elementor-widget-heading\" data-id=\"7deabe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advanced Managed Detection and Response Governance Framework<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8fffdcd e-con-full e-flex e-con e-child\" data-id=\"8fffdcd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-26a5aa2 e-con-full e-flex e-con e-child\" data-id=\"26a5aa2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a546fc1 elementor-widget elementor-widget-heading\" data-id=\"a546fc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Ingestion\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11f46d2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"11f46d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3997a0 elementor-widget elementor-widget-text-editor\" data-id=\"b3997a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>On-prem enterprise systems<\/li><li>Cloud platforms<\/li><li>Endpoints<\/li><li>Third-party integrations<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce56eed e-con-full e-flex e-con e-child\" data-id=\"ce56eed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ee02ec elementor-widget elementor-widget-heading\" data-id=\"1ee02ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5305110 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5305110\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0524f5 elementor-widget elementor-widget-text-editor\" data-id=\"e0524f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Hunting and query automation<\/li><li>Data analysis<\/li><li>Threat behaviors analysis<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21d738a e-con-full e-flex e-con e-child\" data-id=\"21d738a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d48e9f0 elementor-widget elementor-widget-heading\" data-id=\"d48e9f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Alerts Management\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5947f75 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5947f75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2040095 elementor-widget elementor-widget-text-editor\" data-id=\"2040095\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Breach alerts<\/li><li>Security threat or mal-alerts<\/li><li>Infra health or risk alerts<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bf83efe e-con-full e-flex e-con e-child\" data-id=\"bf83efe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45e18c4 elementor-widget elementor-widget-heading\" data-id=\"45e18c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Investigation and Response\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7984a1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f7984a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53a521c elementor-widget elementor-widget-text-editor\" data-id=\"53a521c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Incident investigation<\/li><li>Immediate response orchestration<\/li><li>Root-cause analysis and strategic modifications if needed<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ceb5ced e-flex e-con-boxed e-con e-parent\" data-id=\"ceb5ced\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94b438c elementor-widget elementor-widget-heading\" data-id=\"94b438c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Managed Security Operations Center (SOC) and Cybersecurity Governance Model with Information Security Management<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ecb38b6 e-con-full e-flex e-con e-child\" data-id=\"ecb38b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c6e71b7 e-con-full e-flex e-con e-child\" data-id=\"c6e71b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ac69544 e-con-full e-flex e-con e-child\" data-id=\"ac69544\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-927d8f7 elementor-widget elementor-widget-heading\" data-id=\"927d8f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Governance Element\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44f6552 e-con-full e-flex e-con e-child\" data-id=\"44f6552\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ddc4a5 elementor-widget elementor-widget-text-editor\" data-id=\"4ddc4a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Security Risk Management Committee<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35bbb86 e-con-full e-flex e-con e-child\" data-id=\"35bbb86\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af401ad elementor-widget elementor-widget-text-editor\" data-id=\"af401ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Report Frequency<\/p><\/div><div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\">\u00a0<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff49bbf e-con-full e-flex e-con e-child\" data-id=\"ff49bbf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ca6ac7 elementor-widget elementor-widget-text-editor\" data-id=\"2ca6ac7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column radius-bottom-left--d justify-content-start text-left p-25\"><div class=\"col-6 outline-table-mdr-column radius-bottom-left--d text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Meetings Cadence<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e6add1 e-con-full e-flex e-con e-child\" data-id=\"4e6add1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-22a8b99 e-con-full e-flex e-con e-child\" data-id=\"22a8b99\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2900ead elementor-widget elementor-widget-heading\" data-id=\"2900ead\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Details\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90ebb21 e-con-full e-flex e-con e-child\" data-id=\"90ebb21\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db7b921 elementor-widget elementor-widget-text-editor\" data-id=\"db7b921\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Business Compliance, Legal Human Resources, Internal &amp; External Audits, IT, Physical Security, Communication<\/p><\/div><div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db56bfb e-con-full e-flex e-con e-child\" data-id=\"db56bfb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-edd9f11 elementor-widget elementor-widget-text-editor\" data-id=\"edd9f11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Daily, Weekly, Monthly<\/p><\/div><div class=\"col-6 outline-table-mdr-column radius-bottom-left--d text-left equal-height align-items-start bg-gray justify-content-start p-25\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-895f350 e-con-full e-flex e-con e-child\" data-id=\"895f350\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0fb640f elementor-widget elementor-widget-text-editor\" data-id=\"0fb640f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Daily, Weekly, Monthly<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4dbff65 e-con-full e-flex e-con e-parent\" data-id=\"4dbff65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-caa5800 elementor-widget elementor-widget-heading\" data-id=\"caa5800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC Management Committee\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-501f99a e-flex e-con-boxed e-con e-child\" data-id=\"501f99a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-54c7259 e-con-full e-flex e-con e-child\" data-id=\"54c7259\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9241d52 e-con-full e-flex e-con e-child\" data-id=\"9241d52\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b67706e elementor-widget elementor-widget-heading\" data-id=\"b67706e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Detection\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d72733 e-con-full e-flex e-con e-child\" data-id=\"1d72733\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3904f4 elementor-widget elementor-widget-text-editor\" data-id=\"d3904f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column radius-bottom-left--d justify-content-start text-left p-25\"><div class=\"col-6 outline-table-mdr-column radius-bottom-left--d text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Meetings Cadence<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db5c042 e-con-full e-flex e-con e-child\" data-id=\"db5c042\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-942c793 e-con-full e-flex e-con e-child\" data-id=\"942c793\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4839f5 elementor-widget elementor-widget-heading\" data-id=\"e4839f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Response\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52a4257 e-con-full e-flex e-con e-child\" data-id=\"52a4257\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49f1959 elementor-widget elementor-widget-text-editor\" data-id=\"49f1959\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Daily, Weekly, Monthly<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee9ccd3 e-con-full e-flex e-con e-child\" data-id=\"ee9ccd3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7af9f6e e-con-full e-flex e-con e-child\" data-id=\"7af9f6e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf18ee5 elementor-widget elementor-widget-heading\" data-id=\"bf18ee5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Hunting\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e1a6304 e-con-full e-flex e-con e-child\" data-id=\"e1a6304\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d2e3ca elementor-widget elementor-widget-text-editor\" data-id=\"0d2e3ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Daily, Weekly, Monthly<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43f988a e-con-full e-flex e-con e-child\" data-id=\"43f988a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b39bc80 e-con-full e-flex e-con e-child\" data-id=\"b39bc80\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a737f9 elementor-widget elementor-widget-heading\" data-id=\"3a737f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Metrics and Communication\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7bc7a1e e-con-full e-flex e-con e-child\" data-id=\"7bc7a1e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b60f21 elementor-widget elementor-widget-text-editor\" data-id=\"4b60f21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Daily, Weekly, Monthly<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e94b7ea e-con-full e-flex e-con e-child\" data-id=\"e94b7ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3b93f3f e-con-full e-flex e-con e-child\" data-id=\"3b93f3f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18c1eb9 elementor-widget elementor-widget-heading\" data-id=\"18c1eb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b235973 e-con-full e-flex e-con e-child\" data-id=\"b235973\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3617f6e elementor-widget elementor-widget-text-editor\" data-id=\"3617f6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Daily, Weekly, Monthly<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6fe8852 e-con-full e-flex e-con e-child\" data-id=\"6fe8852\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2f85eb3 e-con-full e-flex e-con e-child\" data-id=\"2f85eb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b4a521 elementor-widget elementor-widget-heading\" data-id=\"4b4a521\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Engineering\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b1eb4fa e-con-full e-flex e-con e-child\" data-id=\"b1eb4fa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a3421c elementor-widget elementor-widget-text-editor\" data-id=\"1a3421c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-6 outline-table-mdr-column text-left equal-height align-items-start bg-gray justify-content-start p-25\"><p>Daily, Weekly, Monthly<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5eccfd4 e-flex e-con-boxed e-con e-parent\" data-id=\"5eccfd4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a55f2d elementor-widget elementor-widget-heading\" data-id=\"2a55f2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud Shared Cybersecurity Governance Model with Information Security Management<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d47ff74 e-con-full e-flex e-con e-child\" data-id=\"d47ff74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e5d3aa3 e-con-full e-flex e-con e-child\" data-id=\"e5d3aa3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7919049 elementor-widget elementor-widget-heading\" data-id=\"7919049\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Layer:\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c97da6a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c97da6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c6fc71 elementor-widget elementor-widget-text-editor\" data-id=\"3c6fc71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>People<\/strong><\/p><p><strong>Data<\/strong><\/p><p><strong>Application<\/strong><\/p><p><strong>Operating System (OS)<\/strong><\/p><p><strong>Virtual Networks<\/strong><\/p><p><strong>Hypervisors<\/strong><\/p><p><strong>Servers and Storage<\/strong><\/p><p><strong>Physical Networks<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-198f55d e-con-full e-flex e-con e-child\" data-id=\"198f55d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6523948 elementor-widget elementor-widget-heading\" data-id=\"6523948\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Infrastructure-as-a-Service\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6364923 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6364923\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81f30f0 elementor-widget elementor-widget-text-editor\" data-id=\"81f30f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Client<\/p><p>Client<\/p><p>Client<\/p><p>Client<\/p><p>Client<\/p><p>CloudEngin<\/p><p>CloudEngjn<\/p><p>CloudEngin<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80837cc e-con-full e-flex e-con e-child\" data-id=\"80837cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0529920 elementor-widget elementor-widget-heading\" data-id=\"0529920\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Platform-as-a-Service\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bebe9b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5bebe9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7373df elementor-widget elementor-widget-text-editor\" data-id=\"a7373df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Client<\/p><p>Client<\/p><p>Client<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-738fa31 e-con-full e-flex e-con e-child\" data-id=\"738fa31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a390b9 elementor-widget elementor-widget-heading\" data-id=\"1a390b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Software-as-a-Service\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20a45c9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"20a45c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c68ec4 elementor-widget elementor-widget-text-editor\" data-id=\"1c68ec4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Client<\/p><p>Client<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p><p>CloudEngin<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b3e4136 e-flex e-con-boxed e-con e-parent\" data-id=\"b3e4136\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bbcb557 elementor-widget elementor-widget-heading\" data-id=\"bbcb557\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Compliance Governance Model\n<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d4036a e-con-full e-flex e-con e-child\" data-id=\"5d4036a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-602c030 e-con-full e-flex e-con e-child\" data-id=\"602c030\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3eadce0 e-con-full e-flex e-con e-child\" data-id=\"3eadce0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e7efc6 elementor-widget elementor-widget-heading\" data-id=\"6e7efc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assessment Services\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84213ba elementor-widget elementor-widget-text-editor\" data-id=\"84213ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Assess compliance loopholes and create strategic compliance roadmaps<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-clarity.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-263f5b9 e-con-full e-flex e-con e-child\" data-id=\"263f5b9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07d01f4 elementor-widget elementor-widget-heading\" data-id=\"07d01f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementation Offerings\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6b619a elementor-widget elementor-widget-text-editor\" data-id=\"f6b619a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><div class=\"col-md-4 mb30-d equal-height-parent-19\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Identify solutions, processes, and resources to bolster the organization\u2019s compliance management<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d equal-height-parent-12\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div>\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-commitment.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d212044 e-con-full e-flex e-con e-child\" data-id=\"d212044\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aff1db1 elementor-widget elementor-widget-heading\" data-id=\"aff1db1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Consulting and advisory\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ac056c elementor-widget elementor-widget-text-editor\" data-id=\"1ac056c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><section class=\"page-section ptb50 bg-white\"><div class=\"container-fluid fullWidthContainer\"><div class=\"\"><div class=\"image-wrapper img-overlay-text\"><div class=\"container\"><div class=\"over-effet-image1\"><div class=\"row\"><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><div class=\"overlay-img-text-2 overlay-xs-1\"><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"aws-security\"><div class=\"row justify-content-center\"><div class=\"col-md-4 mb30-d equal-height-parent-12\"><div class=\"equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Deliver tailored Governance, Compliance, and Risk Assessment Offerings along with adherence to modern security protocols<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"delivery-framework\" class=\"text-center\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><\/div><\/div><\/div><div class=\"col-md-3 col-6\"><div class=\"effect-image-1\"><picture><source srcset=\"\/sites\/default\/files\/inline-images\/cloud4c-consistency.webp\" type=\"image\/webp\" \/><\/picture><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9f43897 e-flex e-con-boxed e-con e-parent\" data-id=\"9f43897\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0af33c0 elementor-widget elementor-widget-heading\" data-id=\"0af33c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud Shared Cybersecurity Governance Model with Information Security Management<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9338b20 e-con-full e-flex e-con e-child\" data-id=\"9338b20\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3657695 e-con-full e-flex e-con e-child\" data-id=\"3657695\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d2d478e e-con-full e-flex e-con e-child\" data-id=\"d2d478e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-69a6c71 elementor-widget elementor-widget-heading\" data-id=\"69a6c71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phase\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9457ae e-con-full e-flex e-con e-child\" data-id=\"c9457ae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56bed1e elementor-widget elementor-widget-text-editor\" data-id=\"56bed1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">Initial Kick-off<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-91dce21 e-con-full e-flex e-con e-child\" data-id=\"91dce21\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37e36fe elementor-widget elementor-widget-text-editor\" data-id=\"37e36fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">Communications<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78ce31b e-con-full e-flex e-con e-child\" data-id=\"78ce31b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d461088 elementor-widget elementor-widget-text-editor\" data-id=\"d461088\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">As-Is\/To-Be Business Alignment<\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ef7020 e-con-full e-flex e-con e-child\" data-id=\"7ef7020\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d04a90f elementor-widget elementor-widget-text-editor\" data-id=\"d04a90f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">Project Initiation<\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fcf4fea e-con-full e-flex e-con e-child\" data-id=\"fcf4fea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f18a9fb elementor-widget elementor-widget-text-editor\" data-id=\"f18a9fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">PMO Alignment<\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4204fb e-con-full e-flex e-con e-child\" data-id=\"d4204fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f6abe9 elementor-widget elementor-widget-text-editor\" data-id=\"6f6abe9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">Delivery Alignment<\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01d6897 e-con-full e-flex e-con e-child\" data-id=\"01d6897\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7fae7b elementor-widget elementor-widget-text-editor\" data-id=\"b7fae7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">Design and Solution Adoptions<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c97014f e-con-full e-flex e-con e-child\" data-id=\"c97014f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a40866 elementor-widget elementor-widget-text-editor\" data-id=\"4a40866\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">Delivery Checks and Quality Control<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79d56ff e-con-full e-flex e-con e-child\" data-id=\"79d56ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-afb0f93 elementor-widget elementor-widget-text-editor\" data-id=\"afb0f93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">Governance and Control<\/div><div class=\"col-md-6 col-6 outline-table-mdr-column   radius-bottom-right--m images-group justify-content-start text-left p-25\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f19c224 e-con-full e-flex e-con e-child\" data-id=\"f19c224\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-956cb19 elementor-widget elementor-widget-text-editor\" data-id=\"956cb19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\">Knowledge Management<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-189d8cf e-con-full e-flex e-con e-child\" data-id=\"189d8cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9d0c68 elementor-widget elementor-widget-text-editor\" data-id=\"c9d0c68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column justify-content-start text-left p-25\"><div class=\"col-md-6 col-6 outline-table-mdr-column  radius-bottom-left--d justify-content-start text-left p-25\">Feedback and Improvement<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-766b934 e-con-full e-flex e-con e-child\" data-id=\"766b934\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1331f55 e-con-full e-flex e-con e-child\" data-id=\"1331f55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c2d90b4 elementor-widget elementor-widget-heading\" data-id=\"c2d90b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Services\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06fca3a e-con-full e-flex e-con e-child\" data-id=\"06fca3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8fd2889 elementor-widget elementor-widget-text-editor\" data-id=\"8fd2889\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Requirements Analysis<\/li><li>Scope analysis<\/li><li>Kick-off meeting<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eacd2ac e-con-full e-flex e-con e-child\" data-id=\"eacd2ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-86000bc elementor-widget elementor-widget-text-editor\" data-id=\"86000bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Expectations assessment<\/li><li>Escalation Matrix sharing<\/li><li>Stakeholders Involvement Mapping<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9943d9e e-con-full e-flex e-con e-child\" data-id=\"9943d9e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c06c99b elementor-widget elementor-widget-text-editor\" data-id=\"c06c99b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Process Understanding<\/li><li>Detailed Scoping<\/li><li>Gap Analysis<\/li><li>Final Roadmap<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bae209c e-con-full e-flex e-con e-child\" data-id=\"bae209c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb70490 elementor-widget elementor-widget-text-editor\" data-id=\"fb70490\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Strategic go-ahead<\/li><li>PRC\/OPF Closure<\/li><li>High-level project planning<\/li><li>Team Alignment<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a58a4d e-con-full e-flex e-con e-child\" data-id=\"2a58a4d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1572a38 elementor-widget elementor-widget-text-editor\" data-id=\"1572a38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Specifications Matching<\/li><li>Solutions Design<\/li><li>Delivery Alignment<\/li><li>D2R Process<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d339d4 e-con-full e-flex e-con e-child\" data-id=\"9d339d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3c4d8f elementor-widget elementor-widget-text-editor\" data-id=\"f3c4d8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>PMO Assignment<\/li><li>Solution Testing<\/li><li>D2R Transition<\/li><li>Delivery Handover<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce20734 e-con-full e-flex e-con e-child\" data-id=\"ce20734\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9868454 elementor-widget elementor-widget-text-editor\" data-id=\"9868454\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>HLD\/LLD Sign-offs<\/li><li>SOP, CSA Closures<\/li><li>Security D2R<\/li><li>SOC Ops Blueprint<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-561ee60 e-con-full e-flex e-con e-child\" data-id=\"561ee60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-acd70ac elementor-widget elementor-widget-text-editor\" data-id=\"acd70ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>QC, SOC Checks<\/li><li>Delivery Sign-offs and Ops Handovers<\/li><li>Continual Improvement<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05f7e7f e-con-full e-flex e-con e-child\" data-id=\"05f7e7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a3d170 elementor-widget elementor-widget-text-editor\" data-id=\"2a3d170\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>G|SOC Delivery<\/li><li>Status Reporting<\/li><li>Periodic Meetings<\/li><li>ITSM Delivery<\/li><li>CR Process<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f3e58c e-con-full e-flex e-con e-child\" data-id=\"4f3e58c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a94325 elementor-widget elementor-widget-text-editor\" data-id=\"4a94325\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>Research and Content Development<\/li><li>Competence Building<\/li><li>SOPs, Training<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4844089 e-con-full e-flex e-con e-child\" data-id=\"4844089\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6fc13ad elementor-widget elementor-widget-text-editor\" data-id=\"6fc13ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul class=\"bulleted-list\"><li>CSAT Surveys<\/li><li>Periodic Alignment<\/li><li>SIP Projects<\/li><li>CRM Excellence<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a1ffecf e-flex e-con-boxed e-con e-parent\" data-id=\"a1ffecf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f86209 elementor-widget elementor-widget-heading\" data-id=\"0f86209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">An Impact with Difference: Why Partner with CloudEngin for Enterprise Cybersecurity Transformation?<\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a906dc0 e-con-full e-flex e-con e-child\" data-id=\"a906dc0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1f618f7 e-con-full e-flex e-con e-child\" data-id=\"1f618f7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1004c2 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"a1004c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392.png\" class=\"attachment-large size-large wp-image-959\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/classic_infrastructure_icon_216392-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e52204 elementor-widget elementor-widget-text-editor\" data-id=\"9e52204\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d \"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>World\u2019s largest Application-focused Managed Cloud Services Provider and one of the leading managed cybersecurity companies. Dedicated cybersecurity assessment services.<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae2b78 e-con-full e-flex e-con e-child\" data-id=\"fae2b78\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4021e04 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"4021e04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159.png\" class=\"attachment-large size-large wp-image-1063\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/globe_hemisphere_west_icon_175159-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59a7dbc elementor-widget elementor-widget-text-editor\" data-id=\"59a7dbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Serving 2500+ enterprises including 50+ Global Fortune 1000 Companies in 29 countries across Americas, Europe, Middle East, and APAC for 12+ years<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-136c8e1 e-con-full e-flex e-con e-child\" data-id=\"136c8e1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a07965d elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"a07965d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-12_13-29-38.jpg\" class=\"attachment-large size-large wp-image-967\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-12_13-29-38.jpg 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-12_13-29-38-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-12_13-29-38-150x150.jpg 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85952a6 elementor-widget elementor-widget-text-editor\" data-id=\"85952a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>40+ Security Controls, 20+ Centres of Excellence, 1600+ global cloud experts<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6541ae8 e-con-full e-flex e-con e-child\" data-id=\"6541ae8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-59e64d7 e-con-full e-flex e-con e-child\" data-id=\"59e64d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e65693b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"e65693b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png\" class=\"attachment-large size-large wp-image-1051\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ab38d2 elementor-widget elementor-widget-text-editor\" data-id=\"2ab38d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Pre-met compliance needs for local, national, and global compliance requirements including IRAP, GDPR, HIPAA, SAMA, CSA, GXP, and ISO Certifications<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9fa9e5 e-con-full e-flex e-con e-child\" data-id=\"a9fa9e5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2b7f58 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"e2b7f58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23.jpg\" class=\"attachment-large size-large wp-image-1048\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23.jpg 500w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23-300x300.jpg 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/photo_2025-11-13_15-30-23-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-506c443 elementor-widget elementor-widget-text-editor\" data-id=\"506c443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>3200 UTMs, 13000 HBSS, 800000 EPS<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47f6301 e-con-full e-flex e-con e-child\" data-id=\"47f6301\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48a3f62 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"48a3f62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/08dbb3cd-17cb-44fc-8013-f7705d93bf3f.svg\" class=\"attachment-large size-large wp-image-970\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-658a24d elementor-widget elementor-widget-text-editor\" data-id=\"658a24d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>7 Security frameworks utilizing the MITRE ATT&amp;CK, CIS Critical Security Controls, and more<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f62535 e-con-full e-flex e-con e-child\" data-id=\"1f62535\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-60b4c29 e-con-full e-flex e-con e-child\" data-id=\"60b4c29\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-acf32d5 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"acf32d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"222\" height=\"227\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/25.jpg\" class=\"attachment-large size-large wp-image-1006\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4ef1d30 elementor-widget elementor-widget-text-editor\" data-id=\"4ef1d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Comprehensive 24&#215;7 cybersecurity monitoring program<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d0fb0e e-con-full e-flex e-con e-child\" data-id=\"5d0fb0e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26ddca6 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"26ddca6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7kp8jmDB8u93NNKUrrFFJpEZwMlqFwYeq5ATHCMjusmoLfcvrJYzR1MK5F0Wjj0eCPBjpRLQZ0zOxmS-3ZU27Wy.jpg\" class=\"attachment-large size-large wp-image-1008\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7kp8jmDB8u93NNKUrrFFJpEZwMlqFwYeq5ATHCMjusmoLfcvrJYzR1MK5F0Wjj0eCPBjpRLQZ0zOxmS-3ZU27Wy.jpg 200w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/7kp8jmDB8u93NNKUrrFFJpEZwMlqFwYeq5ATHCMjusmoLfcvrJYzR1MK5F0Wjj0eCPBjpRLQZ0zOxmS-3ZU27Wy-150x150.jpg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e256453 elementor-widget elementor-widget-text-editor\" data-id=\"e256453\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><p>Advanced CloudEmgin Cybersecurity Incident and Response (CSIRT) team<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5e76377 e-con-full e-flex e-con e-child\" data-id=\"5e76377\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32dd824 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"32dd824\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf.png\" class=\"attachment-large size-large wp-image-1050\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/analiz-ve-raporlama-607cb1a2-c7c7-41c3-9ef3-bd7c9dc1a8cf-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77c53c3 elementor-widget elementor-widget-text-editor\" data-id=\"77c53c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Automated Security Solutions for threat prediction, detection, and response: Advanced Managed Detection and Response Solutions (MDR) including Endpoint Detection and Response (EDR) for deep data security purposes<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-121bd2a e-con-full e-flex e-con e-child\" data-id=\"121bd2a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9fd1cbf e-con-full e-flex e-con e-child\" data-id=\"9fd1cbf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03f5191 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"03f5191\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384.png\" class=\"attachment-large size-large wp-image-1041\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/4496384-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab31d06 elementor-widget elementor-widget-text-editor\" data-id=\"ab31d06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Global expertise in managed SOC (Security Operations Center) services and solutions dedicated to Data Security Management<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61b0a39 e-con-full e-flex e-con e-child\" data-id=\"61b0a39\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b6d59e elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"3b6d59e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png\" class=\"attachment-large size-large wp-image-1051\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6972023-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b86098 elementor-widget elementor-widget-text-editor\" data-id=\"9b86098\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Dedicated Cybersecurity Consulting, Cybersecurity Assessment, and Audit Reporting offerings<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a355c5 e-con-full e-flex e-con e-child\" data-id=\"8a355c5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bde6bf5 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"bde6bf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940.png\" class=\"attachment-large size-large wp-image-1052\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/6277940-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc5e63d elementor-widget elementor-widget-text-editor\" data-id=\"dc5e63d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Advanced CloudEngin Cybersecurity Incident and Response (CSIRT) team<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-408f804 e-con-full e-flex e-con e-child\" data-id=\"408f804\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-433311b e-con-full e-flex e-con e-child\" data-id=\"433311b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e45eeb elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5e45eeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205.png\" class=\"attachment-large size-large wp-image-1053\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/artificial-intelligence-1743104-1482205-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-542fa49 elementor-widget elementor-widget-text-editor\" data-id=\"542fa49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"blue-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Threat Intelligence powered by Industry-leading platforms such as Microsoft, OSINT, STIX&amp;TAXI, MISP, etc. and CloudEngin Threat experts<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3328927 e-con-full e-flex e-con e-child\" data-id=\"3328927\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-38a244b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"38a244b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png\" class=\"attachment-large size-large wp-image-1054\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146.png 1024w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-150x150.png 150w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/5021146-768x768.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4712469 elementor-widget elementor-widget-text-editor\" data-id=\"4712469\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Considerable data threat and vulnerability management experience in securing large and complex environments with leading industry tools, proprietary Self-Healing Operations Platform, and cloud-native tools<\/p><\/div><\/div><\/div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-320f1a9 e-con-full e-flex e-con e-child\" data-id=\"320f1a9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6d9572 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"e6d9572\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png\" class=\"attachment-large size-large wp-image-1056\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/9751169-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f262a04 elementor-widget elementor-widget-text-editor\" data-id=\"f262a04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Experience in deploying and managing robust SIEM \u2013 helping enterprises to proactively assess vulnerabilities and automate, accelerate incident response<\/p><\/div><\/div><\/div><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"card-white--img\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e7205de e-con-full e-flex e-con e-child\" data-id=\"e7205de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a83a177 e-con-full e-flex e-con e-child\" data-id=\"a83a177\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a84f21c elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"a84f21c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"512\" src=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon.png\" class=\"attachment-large size-large wp-image-1057\" alt=\"\" srcset=\"https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon.png 512w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon-300x300.png 300w, https:\/\/www.cloudengin.com\/wp-content\/uploads\/2025\/11\/sistem-icon-150x150.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8aaa171 elementor-widget elementor-widget-text-editor\" data-id=\"8aaa171\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4\"><div class=\"col-md-6 col-sm-6 col-xs-12 p-4\"><div class=\"darkgray-bg simple-box text-center radius-10\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"row\"><div class=\"col-md-4 col-xs-6 mb-4\"><div class=\"dotted-bg text-center nor-heading\"><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><div class=\"col-md-4 mb30-d\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><section class=\"page-section ptb50 bg-blue\"><div class=\"container\"><div class=\"\"><div id=\"differentiators\"><div class=\"row justify-content-center equal-height-parent-11\"><div class=\"col-md-4\"><div class=\"text-align-center equal-height verticlally-middle card-white__wrapper no-margin-d align-items-start\"><div><p>Comprehensive expertise in the public cloud, hybrid, private, multi-cloud data security management services especially powered by AWS, Azure, GCP, Oracle Cloud, IBM Cloud<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\">\u00a0<\/div><\/div><\/div><\/section><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36ff70b e-flex e-con-boxed e-con e-parent\" data-id=\"36ff70b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6170ed3 e-con-full e-flex e-con e-child\" data-id=\"6170ed3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfd6cfd elementor-widget elementor-widget-heading\" data-id=\"bfd6cfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connect with our Cybersecurity Governance Experts\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c52de63 e-con-full e-flex e-con e-child\" data-id=\"c52de63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3639509 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3639509\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6eb2c3f e-flex e-con-boxed e-con e-parent\" data-id=\"6eb2c3f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3194dc6 elementor-widget elementor-widget-heading\" data-id=\"3194dc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Audit and Reporting - FAQS\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-893c93a elementor-widget elementor-widget-n-accordion\" data-id=\"893c93a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1430\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1430\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What does security governance mean? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1430\" class=\"elementor-element elementor-element-ac792a2 e-con-full e-flex e-con e-child\" data-id=\"ac792a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-937a976 elementor-widget elementor-widget-text-editor\" data-id=\"937a976\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><p>Cybersecurity governance is the administration of all security activities, processes, workflows, and data flows across an organization, at all levels. The same also involves monitoring of risks, escalating\/de-escalating security tasks, and ensuring due compliance of existing systems with local-national-international regulations.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1431\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1431\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why is cybersecurity governance important? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1431\" class=\"elementor-element elementor-element-dbcf0dc e-con-full e-flex e-con e-child\" data-id=\"dbcf0dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d0dfe4 elementor-widget elementor-widget-text-editor\" data-id=\"6d0dfe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><p>Cybersecurity governance is important owing to multiple reasons. Current enterprise security operations are overwhelmingly complex, integrated to a complicated set of landscapes, and boggled multiple tailored systems and solutions across different internal verticals. With a proper governance system in place, a framework is assigned to this complicated security mix with compliant processes, due standardization, and management diligence.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1432\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1432\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are the major components of cyber security governance? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1432\" class=\"elementor-element elementor-element-e42986a e-con-full e-flex e-con e-child\" data-id=\"e42986a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-183a332 elementor-widget elementor-widget-text-editor\" data-id=\"183a332\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><div class=\"coll-pos\"><p>Cybersecurity governance includes a security management board headed by the Chief Information Security Officer (CISO) or the Chief Security Officer (CSO). The team includes compliance experts, security engineers, threat management specialists, and more. The team evaluates multiple security technologies, regulations, and processes to ensure advanced organizational security at all times.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1433\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1433\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are the principles of information security governance? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1433\" class=\"elementor-element elementor-element-7c679e3 e-con-full e-flex e-con e-child\" data-id=\"7c679e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-052ae04 elementor-widget elementor-widget-text-editor\" data-id=\"052ae04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"coll-pos\"><section class=\"page-section ptb50 bg-white\"><div class=\"container\"><div class=\"\"><div id=\"faq\" class=\"faq-wrapper\"><div class=\"coll-pos\"><p>An organization\u2019s cybersecurity governance are based on certain principles that dictate whether the governance methods are following the correct goals or not. The principles include no compromise to data security and integrity, adoption of business goal-based approaches, easy unison with internal and external operations, a strict review-based methodology to ensure highest security standards for the enterprise at all times.<\/p><\/div><\/div><\/div><\/div><\/section><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6bf5ac8 e-flex e-con-boxed e-con e-parent\" data-id=\"6bf5ac8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-88907b7 e-con-full e-flex e-con e-child\" data-id=\"88907b7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-594a917 e-con-full e-flex e-con e-child\" data-id=\"594a917\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f89ed1 elementor-widget elementor-widget-heading\" data-id=\"5f89ed1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rise and Transform with CloudEngin<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1881de e-con-full e-flex e-con e-child\" data-id=\"f1881de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb541ac elementor-widget elementor-widget-text-editor\" data-id=\"cb541ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Schedule a consultation with our Cloud experts and get answers for any specific queries you may have. You can also schedule a visit to our Datacenters, or share feedback on our website and services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cb858e e-con-full e-flex e-con e-child\" data-id=\"4cb858e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4924c59 elementor-widget elementor-widget-heading\" data-id=\"4924c59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in Touch<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-446fea8 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"446fea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"New Form\" aria-label=\"New Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"493\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"446fea8\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Cybersecurity Governance\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"493\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tName\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-field_815e145 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_815e145\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tTel\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[field_815e145]\" id=\"form-field-field_815e145\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Tel\" required=\"required\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_169bf39 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_169bf39\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCompany\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_169bf39]\" id=\"form-field-field_169bf39\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Company\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"5\" placeholder=\"Your Message...\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_2c751e3 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_2c751e3]\" id=\"form-field-field_2c751e3\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_2c751e3\">I\u2019d like to receive more information from CloudEngin. By submitting this form, I am providing consent to receive marketing communications and I understand and agree to the usage of my corporate contact information in accordance with CloudEngin privacy statement.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97320f3 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"97320f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"form\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Governance and Risk Management Services Integrate a pro-active management framework into your organizational cybersecurity governance, information security strategies. Monitor [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-493","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=493"}],"version-history":[{"count":22,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/493\/revisions"}],"predecessor-version":[{"id":4157,"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=\/wp\/v2\/pages\/493\/revisions\/4157"}],"wp:attachment":[{"href":"https:\/\/www.cloudengin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}