{"id":440,"date":"2022-05-18T08:33:58","date_gmt":"2022-05-18T08:33:58","guid":{"rendered":"https:\/\/thesecurityone.com\/?page_id=440"},"modified":"2023-04-06T10:52:25","modified_gmt":"2023-04-06T10:52:25","slug":"cybersecurity-services-4","status":"publish","type":"page","link":"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-4\/","title":{"rendered":"Cybersecurity Services"},"content":{"rendered":"<div  data-label=\"About\" data-id=\"about--1\" data-export-id=\"about-text-image\" data-category=\"about\" class=\"about-text-image content-section content-section-spacing content-relative\" id=\"about-1\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"><div  data-section-title-area=\"true\" class=\"row text-center\">   <div  class=\"section-title-col\" data-type=\"column\">       <h2  class=\"\"><span  style=\"font-weight: 700; color: rgb(3, 169, 244);\">Compliance Assessment<\/span><\/h2>       <p  class=\"lead\" style=\"text-align: justify;\">Compliance with constantly evolving regulation became more of a burden. The cost of running complex processes has increased and the financial and reputational cost of doing it wrong is getting higher.<br >\n\n<br >We combine our regulatory and compliance expertise with operational improvement know-how to help keep you compliant.&nbsp;We will help you&nbsp;identify the gaps between your existing control environment and the compliance requirements.<\/p>   <\/div><\/div> <div  class=\"row\"><div  class=\"col-sm-6 col-padding-small-xs col-sm-padding-large bg-color5 white-text content-col\" data-type=\"column\">   <h3  class=\"\" style=\"text-align: left;\"><span  style=\"font-weight: 700;\">Compliance with:<span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\">\ufeff<\/span><\/span><\/h3><p  class=\"lead\"><span  style=\"font-weight: 600;\">CIS Benchmarks<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">NIST Special Publication 800-series<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">GDPR<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">ISO 9001:2015<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">ISO\/IEC 27001:2022<\/span><\/p><p  class=\"lead\"><span  style=\"font-weight: 600;\">PCI DSS<\/span><\/p><\/div> <div  class=\"col-sm-6 flexbox-strech center-xs middle-xs no-gutter-col\"><div  class=\"shadow-large overlap-left-large flexbox middle-xs center-xs right-img\" data-bg=\"image\"><\/div><\/div> <\/div><\/div> <\/div><div  data-label=\"Cta\" data-id=\"cta--1\" data-export-id=\"cta-blue-section-mc\" data-category=\"cta\" class=\"cta-blue-section-mc content-section content-section-spacing white-text fresh_oasis\" id=\"cta-1\" data-section-ov=\"1\"><div  class=\"gridContainer\"> <div  class=\"row middle-xs\"><div  class=\"col-sm-8 space-bottom-xs\" data-type=\"column\"> <h2  class=\"\"><span  style=\"font-weight: 600;\">Join us! <span  class=\"font-300\">It will only take a minute<span  id=\"_mce_caret\" data-mce-bogus=\"1\" data-mce-type=\"format-caret\">\ufeff<\/span><\/span><\/span><\/h2> <\/div> <div  class=\"col-sm-4 end-sm\" data-type=\"column\"> <a class=\"button color1\" href=\"https:\/\/thesecurityone.com\/index.php\/contact-us\" target=\"_self\" data-cp-link=\"1\" data-icon=\"\" rel=\"noopener\">GET STARTED TODAY<\/a><\/div> <\/div><\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Compliance Assessment Compliance with constantly evolving regulation became more of a burden. The cost of running complex processes has increased and the financial and reputational cost of doing it wrong is getting higher. We combine our regulatory and compliance expertise with operational improvement know-how to help keep you compliant.&nbsp;We will help you&nbsp;identify the gaps between&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/thesecurityone.com\/index.php\/cybersecurity-services-4\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"pro\/page-templates\/full-width-page.php","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-440","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/comments?post=440"}],"version-history":[{"count":1,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/440\/revisions"}],"predecessor-version":[{"id":1041,"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/pages\/440\/revisions\/1041"}],"wp:attachment":[{"href":"https:\/\/thesecurityone.com\/index.php\/wp-json\/wp\/v2\/media?parent=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}