{"version":"1.0","provider_name":"Nihon Cyber Defence","provider_url":"https:\/\/nihoncyberdefence.co.jp\/en\/","title":"New Services - Nihon Cyber Defence","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"FOIPllMp80\"><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/new-services\/\">New Services<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/nihoncyberdefence.co.jp\/en\/new-services\/embed\/#?secret=FOIPllMp80\" width=\"600\" height=\"338\" title=\"&#8220;New Services&#8221; &#8212; Nihon Cyber Defence\" data-secret=\"FOIPllMp80\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/nihoncyberdefence.co.jp\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"\/*! elementor &#8211; v3.15.0 &#8211; 09-08-2023 *\/ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]&gt;a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px} Our Services \/*! elementor &#8211; v3.15.0 &#8211; 09-08-2023 *\/ .elementor-widget-divider{&#8211;divider-border-style:none;&#8211;divider-border-width:1px;&#8211;divider-color:#0c0d0e;&#8211;divider-icon-size:20px;&#8211;divider-element-spacing:10px;&#8211;divider-pattern-height:24px;&#8211;divider-pattern-size:20px;&#8211;divider-pattern-url:none;&#8211;divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(&#8211;divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(&#8211;divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider&#8211;view-line_icon .elementor-divider-separator,.elementor-widget-divider&#8211;view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider&#8211;view-line_icon .elementor-divider-separator:after,.elementor-widget-divider&#8211;view-line_icon .elementor-divider-separator:before,.elementor-widget-divider&#8211;view-line_text .elementor-divider-separator:after,.elementor-widget-divider&#8211;view-line_text .elementor-divider-separator:before{display:block;content:&#8221;&#8221;;border-bottom:0;flex-grow:1;border-top:var(&#8211;divider-border-width) var(&#8211;divider-border-style) var(&#8211;divider-color)}.elementor-widget-divider&#8211;element-align-left .elementor-divider .elementor-divider-separator&gt;.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider&#8211;element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider&#8211;element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider&#8211;element-align-right .elementor-divider .elementor-divider-separator&gt;.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider&#8211;element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider&#8211;element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider:not(.elementor-widget-divider&#8211;view-line_text):not(.elementor-widget-divider&#8211;view-line_icon) .elementor-divider-separator{border-top:var(&#8211;divider-border-width) var(&#8211;divider-border-style) var(&#8211;divider-color)}.elementor-widget-divider&#8211;separator-type-pattern{&#8211;divider-border-style:none}.elementor-widget-divider&#8211;separator-type-pattern.elementor-widget-divider&#8211;view-line .elementor-divider-separator,.elementor-widget-divider&#8211;separator-type-pattern:not(.elementor-widget-divider&#8211;view-line) .elementor-divider-separator:after,.elementor-widget-divider&#8211;separator-type-pattern:not(.elementor-widget-divider&#8211;view-line) .elementor-divider-separator:before,.elementor-widget-divider&#8211;separator-type-pattern:not([class*=elementor-widget-divider&#8211;view]) .elementor-divider-separator{width:100%;min-height:var(&#8211;divider-pattern-height);-webkit-mask-size:var(&#8211;divider-pattern-size) 100%;mask-size:var(&#8211;divider-pattern-size) 100%;-webkit-mask-repeat:var(&#8211;divider-pattern-repeat);mask-repeat:var(&#8211;divider-pattern-repeat);background-color:var(&#8211;divider-color);-webkit-mask-image:var(&#8211;divider-pattern-url);mask-image:var(&#8211;divider-pattern-url)}.elementor-widget-divider&#8211;no-spacing{&#8211;divider-pattern-size:auto}.elementor-widget-divider&#8211;bg-round{&#8211;divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner&gt;.elementor-widget-divider,.e-con&gt;.elementor-widget-divider{width:var(&#8211;container-widget-width,100%);&#8211;flex-grow:var(&#8211;container-widget-flex-grow)}The risk of your organisation falling victim to a cyber-attack continues to grow, with government estimates indicating that nearly half of all UK businesses had experienced some form of attack, data breach or system interruption in the last year alone. These incidents can have serious financial, reputational, legal, and regulatory consequences and can no longer be ignored. The Nihon Cyber Defence (NCD) team offers a wide range of cyber security solutions and services to suit our client\u2019s requirements. We work in collaboration with your IT and security teams to deliver robust cyber strategies, vulnerability and security assessments, environment monitoring, incident response capabilities, recovery guidance, and an extensive portfolio of other advisory services to help you defend, detect, and respond when faced with advanced cyber threats. What We Offer Our Services A global defence company headquartered in Japan protecting national infrastructure and organisations against cyber attack Our Services https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/08\/Logo60FPSTestv3.mp4 Cyber Security Consultancy Our risk and governance services allow you to set up strong frameworks to minimise your risk of cyber-attack. They include. Advisory Services Virtual CISO Virtual CISO services Senior Executive Cyber Mentoring Programmes Risk assessments NCSC CAF Implementation NIST Foundation &amp; NIST Practitioner COBIT5 Foundation COBIT5 Practitioner ISO 27001 Foundation ISO 27001 Practitioner European GDPR Foundation European GDPR Practitioner Five Key Business Benefits Reduces your business cyber risk Data Protection Authority Enhances your business reputation ISO 27001 Practitioner Ensures compliance with contractual obligations. Cyber Security Consultancy Our risk and governance services allow you to set up strong frameworks to minimise your risk of cyber-attack. They include. Advisory &amp; Consultancy Service OR Advisory &amp; Security Framework services Virtual CISO and its services Senior Executive Cyber Mentoring Programmes Security Architect services NCSC CAF Implementation NIST Foundation &amp; NIST Practitioner COBIT5 Foundation &amp; COBIT5 Practitioner ISO 27001 Foundation &amp; ISO 27001 Practitioner European GDPR Foundation &amp; European GDPR Practitioner Five Key Business Benefits Reduces your business cyber risk Data Protection Authority Enhances your business reputation ISO 27001 Practitioner Ensures compliance with contractual obligations. Protective Services Our security testing enables you to find weak points in your systems, enabling you to remedy shortcomings before attackers exploit them. It covers the following areas Vulnerability Assessment Maturity Assessment Penetration Testing Policy &amp; Governance Incident Response Planning Cloud Security Review User \/ Responder Training C-Suite Training Threat Intelligence Privileged Access Cyber Exercising O365 Security Configuration Five Key Business Benefits Reduces your attack surface Reduces the impact of impacts Increases your response readiness Increases your security posture Provides reassurance to clients Network Monitoring and Security Operations Our security testing enables you to find weak points in your systems, enabling you to remedy shortcomings before attackers exploit them. It covers the following areas: External Penetration Tests Internal Vulnerability Assessment Wireless Networks Web Applications Mobile Applications Digital Forensics Incident Response (DFIR) Management Cybersecurity Assessment Credential Risk Assessment Red Team Assessment Social Engineering Breach Assessment Specific Subject Matter Expertise Support (Cyber Engineering, Cyber Software) Data Acquisition (SCADA) systems Tailored Threat Intelligence (TI) Systems (ISC)\/Supervisory Control portions of the services listed above Customized cyber solutions integrating all Development, Secure Software Review, HUNT, Five Key Business Benefits Ensures early detection of an attack Enables rapid containment Provides visibility of attacker access Prevents escaltion Ensure compliance and reassurance for obligations Network Monitoring and Security Operations Network Monitoring and Security Operations Our security testing enables you to find weak points in your systems, enabling you to remedy shortcomings before attackers exploit them. It covers the following areas: Wireless Networks and Web &amp; Mobile Applications Digital Forensics Incident Response (DFIR) Management Cybersecurity, Credential Risk, Red Team, and Breach Assessments Social Engineering &amp;Specific Subject Matter Expertise Support Data Acquisition (SCADA) systems Tailored Threat Intelligence (TI) Systems (ISC)\/Supervisory Control Development, Secure Software Review, HUNT, Five Key Business Benefits Ensures early detection of an attack Enables rapid containment Provides visibility of attacker access Prevents escaltion Ensure compliance and reassurance for obligations Incident Management Services The incident management service provided by Nihon Cyber Defence provides the client with immediate response, support and reassurance in a confidential and trusted environment. The client and Nihon Cyber Defence integrate as a cohesive, dynamic and agile team. Nihon Cyber Defence helps a client to understand. The technical nature of an attack. How to manage and reduce the impact of an attack. Their legal and statutory obligations. Those responsible for the attack. Communicating the significance of the incident. Five Key Business Benefits Effective response to attacks to enable recovery Assesses impact on suppliers and clients Assists in mitigating data protection authority investigations Available on-Premise or as a Cloud service Supports protection of business interests Nihon Cyber defence will provide a holistic, cradle to grave solution for clients that become the victim of a cyberattack or its repercussions. The customisable service pack includes access to an extensive range of specialists providing the full suite of overt and covert services necessary to mitigate, manage and recover from a cyber-attack. The above solutions can be customized and combined to meet your organisation\u2019s specific needs. Get in Touch"}