{"id":1135,"date":"2021-03-28T21:42:24","date_gmt":"2021-03-29T01:42:24","guid":{"rendered":"https:\/\/www.gybernov.com\/new\/?page_id=1135"},"modified":"2021-03-31T22:30:10","modified_gmt":"2021-04-01T02:30:10","slug":"consulting","status":"publish","type":"page","link":"https:\/\/www.gybernov.com\/new\/consulting\/","title":{"rendered":"consulting"},"content":{"rendered":"<h3>\n\t\t\t\t\tnot yet ready<br \/>\n\t\t\t\t<\/h3>\n<p>sorry but we are still wroking on it<\/p>\n<p>                please come back in few days<br \/>\n                    0%<\/p>\n<h4>meanwhile you can check our offering for <a href=\"https:\/\/www.gybernov.com\/new\/vciso\/\">vCISO<\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>not yet ready sorry but we are still wroking on it please come back in few days 0% meanwhile you can check our offering for vCISO<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"hide_page_title":"","footnotes":""},"class_list":["post-1135","page","type-page","status-publish","hentry"],"jetpack-related-posts":[{"id":1140,"url":"https:\/\/www.gybernov.com\/new\/risk\/","url_meta":{"origin":1135,"position":0},"title":"risk","author":"admin","date":"March 28, 2021","format":false,"excerpt":"not yet ready sorry but we are still wroking on it working hard ! please come back in few days 84%","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1093,"url":"https:\/\/www.gybernov.com\/new\/secure-development\/","url_meta":{"origin":1135,"position":1},"title":"Secure development","author":"admin","date":"March 28, 2021","format":false,"excerpt":"We are working to offer this serivce soon Currently we are implementing the service to help companies to fulfill their SDCL process, please keep an eye and we are coming back soonyou can reach us if you need any details related meanwhile on info@gybernov.com ... meanwhile please read the dcumentation\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":954,"url":"https:\/\/www.gybernov.com\/new\/vciso\/","url_meta":{"origin":1135,"position":2},"title":"vCISO","author":"admin","date":"March 24, 2021","format":false,"excerpt":"\"It is important to understand the difference between a policy, a standard and a guideline\"Fractional CISO & vCISOthis exec role tends to be more and more crucial for companies, it used to be a security responsible under directives on CIO,\u00a0 but last years with huge demanding security on companies CISOs\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/02\/dayne-topkin-u5Zt-HoocrM-unsplash-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/02\/dayne-topkin-u5Zt-HoocrM-unsplash-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/02\/dayne-topkin-u5Zt-HoocrM-unsplash-scaled.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":18,"url":"https:\/\/www.gybernov.com\/new\/services\/","url_meta":{"origin":1135,"position":3},"title":"services","author":"admin","date":"February 27, 2021","format":false,"excerpt":"This is an Alert ! Don't panic ! we catch your attention, we are cybersecurity consultancy firm, we support SMB to get better insights on their security vision, we will focus to provide you an accurate governance strategy and needed resources along your business life Governance & Advisory Engineering &\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/vertical-gyb-e1615697877289.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/vertical-gyb-e1615697877289.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/vertical-gyb-e1615697877289.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/vertical-gyb-e1615697877289.jpeg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/vertical-gyb-e1615697877289.jpeg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":940,"url":"https:\/\/www.gybernov.com\/new\/privacy-policy-2\/","url_meta":{"origin":1135,"position":4},"title":"Privacy policy","author":"admin","date":"March 24, 2021","format":false,"excerpt":"Privacy Policy Last updated: March 24, 2021 This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You. We use Your Personal data to provide and\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1125,"url":"https:\/\/www.gybernov.com\/new\/education\/","url_meta":{"origin":1135,"position":5},"title":"cyber education","author":"admin","date":"March 28, 2021","format":false,"excerpt":"we could offer courses on basic, advanced and specialized topics and help you also to plan\u00a0awareness campaign All Gallery Item Full day seminars . Workshops Online catalog Online workshop Adapted training path Awareness sessions","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/PcR73I-ij","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/pages\/1135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/comments?post=1135"}],"version-history":[{"count":12,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/pages\/1135\/revisions"}],"predecessor-version":[{"id":1228,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/pages\/1135\/revisions\/1228"}],"wp:attachment":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/media?parent=1135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}