{"id":15,"date":"2024-09-14T11:56:43","date_gmt":"2024-09-14T11:56:43","guid":{"rendered":"https:\/\/ohv.hsk.mybluehost.me\/website_0e04dfae\/home\/"},"modified":"2024-11-18T08:37:56","modified_gmt":"2024-11-18T08:37:56","slug":"home","status":"publish","type":"page","link":"https:\/\/cyberriskpartners.net\/en_gb\/","title":{"rendered":"Home"},"content":{"rendered":"\n<div class=\"nfd-pt-lg nfd-theme-dark nfd-bg-surface is-style-nfd-theme-dark wp-block-group alignfull nfd-bg-effect-grid-3 is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"nfd-container wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"nfd-gap-2xl nfd-gap-y-lg wp-block-columns is-layout-flex wp-container-core-columns-is-layout-6127943d wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"nfd-text-giga nfd-text-contrast nfd-text-balance wp-block-heading has-huge-font-size\">Reduce your cyber risk with help from our professionals.<\/h2>\n\n\n\n<p class=\"\"><\/p>\n\n\n\n<figure class=\"nfd-rounded-t-xl is-style-default wp-block-image alignleft size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"558\" src=\"https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Risk-reward.png?resize=1024%2C558&#038;ssl=1\" alt=\"\" class=\"wp-image-20\" style=\"width:580px;height:auto\" srcset=\"https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Risk-reward.png?resize=1024%2C558&amp;ssl=1 1024w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Risk-reward.png?resize=300%2C163&amp;ssl=1 300w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Risk-reward.png?resize=768%2C418&amp;ssl=1 768w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Risk-reward.png?resize=1536%2C836&amp;ssl=1 1536w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Risk-reward.png?resize=2048%2C1115&amp;ssl=1 2048w, https:\/\/i0.wp.com\/cyberriskpartners.net\/wp-content\/uploads\/2024\/09\/Risk-reward.png?w=3000&amp;ssl=1 3000w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:300px\">\n<div class=\"nfd-gap-xl wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-ab79abe2 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">\n<p class=\"nfd-text-md nfd-text-balance nfd-text-faded\">We understand the balance between business priorities and security concerns.<\/p>\n\n\n\n<p class=\"\">We can help you create and run the right-sized cyber program for your business.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"nfd-container nfd-p-md nfd-theme-white nfd-bg-surface is-style-nfd-theme-white wp-block-group is-layout-constrained wp-container-core-group-is-layout-1026f38c wp-block-group-is-layout-constrained\">\n<div class=\"nfd-gap-lg wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<h2 class=\"nfd-text-sm wp-block-heading has-text-align-center wp-container-content-9d25eabc\"><\/h2>\n\n\n\n<h2 class=\"nfd-text-xl nfd-text-primary nfd-text-balance wp-block-heading has-text-align-left\">Protect your business with our cybersecurity expertise<\/h2>\n\n\n\n<p class=\"nfd-text-md nfd-text-balance nfd-text-faded has-text-align-left\">Enhance your cybersecurity strategy, get buy-in from the key business stakeholders, communicate to the wider organisation, then execute the cyber risk reduction program.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"nfd-container nfd-p-lg nfd-theme-darker nfd-bg-surface nfd-wb-features__features-4 is-style-nfd-theme-darker wp-block-group nfd-bg-effect-dots is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"nfd-text-base nfd-gap-md nfd-gap-y-xl wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md nfd-theme-dark nfd-bg-surface is-style-nfd-theme-dark wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\" style=\"border-width:1px\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">01<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Virtual CISO<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">Do you need a CISO, but your business doesn&#8217;t warrant a full-time role?<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">02<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Interim CISO<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">Our team of ex-CISOs can bridge the gap and smooth the transition.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md nfd-theme-dark nfd-bg-surface is-style-nfd-theme-dark wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\" style=\"border-width:1px\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">03<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Risk Management<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">Effectively identifying and managing your cybersecurity and operational risks will pay dividends.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"nfd-text-base nfd-gap-md nfd-gap-y-xl wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">04<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Programme Management<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">We can run your cyber security programmes, to quickly and efficiently reduce risk.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md nfd-theme-dark nfd-bg-surface is-style-nfd-theme-dark wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\" style=\"border-width:1px\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">05<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">DORA regulation<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">Are you a financial organisation, or an IT company supporting one?  DORA comes into effect in January 2025.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"nfd-shadow-xs nfd-p-card-square nfd-rounded nfd-gap-md wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-dd225191 wp-block-group-is-layout-flex\">\n<p class=\"nfd-text-xl nfd-text-primary nfd-text-balance has-text-align-left\" style=\"font-style:normal;font-weight:300;letter-spacing:2px\">06<\/p>\n\n\n\n<h3 class=\"nfd-text-md nfd-text-contrast wp-block-heading has-text-align-left\" style=\"font-style:normal;font-weight:500\">Family office<\/h3>\n\n\n\n<p class=\"nfd-text-balance nfd-text-faded  has-text-align-left\">Are you concerned about cyber security and its impact on your wealth management planning?<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"nfd-container nfd-p-md wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"nfd-p-card-md nfd-gap-xl nfd-shadow-xs nfd-bg-surface nfd-theme-white nfd-rounded is-style-nfd-theme-white wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-9366075c wp-block-group-is-layout-flex\">\n<div class=\"nfd-gap-md wp-block-group is-layout-flex wp-block-group-is-layout-flex\">\n<figure class=\"is-style-rounded wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/images.unsplash.com\/photo-1552664730-d307ca884978?ixlib=rb-4.0.3&amp;ixid=MnwxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8&amp;auto=format&amp;fit=crop&amp;w=400&amp;h=400&amp;q=80&amp;w=120&amp;h=120&amp;crop=\" alt=\"\" style=\"object-fit:cover;width:60px;height:60px\"\/><\/figure>\n\n\n\n<div class=\"nfd-gap-0 wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<p class=\"nfd-text-md\" style=\"font-style:normal;font-weight:600\">How can we assist<\/p>\n\n\n\n<p class=\"nfd-text-base nfd-text-faded\">We are here to provide you with the best cybersecurity solutions<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"nfd-btn-wide  wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cyberriskpartners.net\/contact-us\/\">Contact us<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p class=\"\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reduce your cyber risk with help from our professionals. We understand the balance between business priorities and security concerns. We can help you create and run the right-sized cyber program for your business. Protect your business with our cybersecurity expertise Enhance your cybersecurity strategy, get buy-in from the key business stakeholders, communicate to the wider [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":40,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"no-title","meta":{"nf_dc_page":"home","footnotes":""},"class_list":["post-15","page","type-page","status-publish","has-post-thumbnail","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":11,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":120,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/pages\/15\/revisions\/120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/media\/40"}],"wp:attachment":[{"href":"https:\/\/cyberriskpartners.net\/en_gb\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}