{"id":24746,"date":"2025-01-02T11:11:22","date_gmt":"2025-01-02T10:11:22","guid":{"rendered":"https:\/\/nihoncyberdefence.co.jp\/?p=24746"},"modified":"2025-04-16T06:04:28","modified_gmt":"2025-04-16T05:04:28","slug":"a-strategic-guide-for-building-cyber-resilience","status":"publish","type":"post","link":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/","title":{"rendered":"A Strategic Guide for Building Cyber Resilience"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24746\" class=\"elementor elementor-24746\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b48f6f5 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"b48f6f5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5e358db\" data-id=\"5e358db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cd6956 wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info\" data-id=\"3cd6956\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"wpr-post-info wpr-post-info-horizontal\"><li class=\"wpr-post-info-taxonomy\"><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a><\/li><li class=\"wpr-post-info-date\"><span>January 2, 2025<\/span><\/li><\/ul>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40db7d0 elementor-widget elementor-widget-heading\" data-id=\"40db7d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">A Strategic Guide for Building Cyber Resilience\u200b<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f9095b elementor-widget elementor-widget-heading\" data-id=\"4f9095b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Actionable Strategies to Minimize the Impact of Cyber Incidents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd656f elementor-widget elementor-widget-html\" data-id=\"0dd656f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"custom-share-buttons\">\r\n    <a class=\"share-btn twitter\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-x-twitter\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn linkedin\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-linkedin-in\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn whatsapp\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-whatsapp\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn copy-link\" href=\"#\" title=\"Copy link\">\r\n        <i class=\"fas fa-link\"><\/i>\r\n    <\/a>\r\n<\/div>\r\n\r\n<!-- Font Awesome -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.5.1\/css\/all.min.css\">\r\n\r\n<script>\r\n    \/\/ Get current URL, title, and featured image\r\n    const postUrl = window.location.href;\r\n    const encodedUrl = encodeURIComponent(postUrl);\r\n    const postTitle = encodeURIComponent(document.title);\r\n    const ogImage = document.querySelector('meta[property=\"og:image\"]');\r\n    const postImage = ogImage ? encodeURIComponent(ogImage.getAttribute('content')) : '';\r\n\r\n    \/\/ Update share buttons\r\n    document.querySelector('.share-btn.twitter').href = `https:\/\/twitter.com\/intent\/tweet?url=${encodedUrl}&text=${postTitle}`;\r\n    document.querySelector('.share-btn.linkedin').href = `https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=${encodedUrl}`;\r\n    document.querySelector('.share-btn.whatsapp').href = `https:\/\/api.whatsapp.com\/send?text=${postTitle}%20${encodedUrl}`;\r\n\r\n    \/\/ Copy link functionality with alert\r\n    document.querySelector('.share-btn.copy-link').addEventListener('click', (e) => {\r\n        e.preventDefault();\r\n        navigator.clipboard.writeText(postUrl).then(() => {\r\n            alert('Link copied!');\r\n        }).catch(err => {\r\n            console.error('Failed to copy: ', err);\r\n            alert('Failed to copy the link!');\r\n        });\r\n    });\r\n<\/script>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09bbd56 elementor-widget elementor-widget-image\" data-id=\"09bbd56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&#038;ssl=1\" title=\"pexels-fauxel\" alt=\"pexels-fauxel\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d0a512c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d0a512c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c3da2ac\" data-id=\"c3da2ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e142ed9 elementor-widget elementor-widget-text-editor\" data-id=\"e142ed9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber resilience is essential as global economies become increasingly dependent on digital technologies. Unlike cyber security, which focuses on preventing breaches, cyber resilience emphasizes an organisation\u2019s ability to minimize the impact of significant cyber incidents on its core goals and objectives.<\/p><p>A recent <a href=\"https:\/\/www.weforum.org\/stories\/2024\/11\/cyber-resilience-risk-threat-attack-defence-cybersecurity-cybercrime\/\">World Economic Forum<\/a> post, co-authored by Dr. Jamie Saunders, highlights actionable insights from the report\u00a0<a href=\"https:\/\/www.weforum.org\/publications\/unpacking-cyber-resilience\/\">Unpacking Cyber Resilience\u00a0<\/a>to help organisations enhance their cyber defences. Here, we share five key strategies from the post to support businesses in bolstering their resilience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfb0522 elementor-widget elementor-widget-heading\" data-id=\"dfb0522\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1.\u00a0 Recognize Total Cyber Security is Unachievable\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b364bf elementor-widget elementor-widget-text-editor\" data-id=\"1b364bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Achieving 100% cyber security is impossible. Instead, organisations should adopt a broad view of cyber risk, acknowledging the many ways malign actors can disrupt operations, profitability, or reputation.<\/p><ul><li>Investing in resilience reduces the economic and reputational costs of cyber events.<\/li><li>Resilient organisations consistently deliver better shareholder returns\u2014up to 50% higher than their less resilient peers.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abb23d8 elementor-widget elementor-widget-heading\" data-id=\"abb23d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2.\u00a0 Anticipate and Plan for Disruptions\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11d3443 elementor-widget elementor-widget-text-editor\" data-id=\"11d3443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organisations must prepare for inevitable incidents with plans that reflect their strategic, operational, financial, and legal priorities.<\/p><ul><li>Effective resilience plans are based on a clear understanding of threats and potential harms.<\/li><li>These plans should prioritize protecting the organisation\u2019s core functions during disruptions.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7aa422f elementor-widget elementor-widget-heading\" data-id=\"7aa422f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Embed Cyber Resilience in Business Processes\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e2cbec elementor-widget elementor-widget-text-editor\" data-id=\"3e2cbec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber resilience isn\u2019t just about IT\u2014it\u2019s a business-wide effort.<\/p><ul><li>Design business processes to absorb and recover from disruptions.<\/li><li>Establish contingency measures to maintain service standards and protect stakeholders.<\/li><li>Collaborate with external parties to strengthen the resilience of the broader business environment<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab7e588 elementor-widget elementor-widget-heading\" data-id=\"ab7e588\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Safeguard Confidential Information<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fab27e0 elementor-widget elementor-widget-text-editor\" data-id=\"fab27e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Protecting data confidentiality and integrity is fundamental to cyber resilience.<\/p><ul><li>Implement robust information governance practices to limit the impact of breaches.<\/li><li>Ensure data integrity is a priority across all business functions.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-852d527 elementor-widget elementor-widget-heading\" data-id=\"852d527\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Learn from Past Incidents<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41f5759 elementor-widget elementor-widget-text-editor\" data-id=\"41f5759\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Continuous improvement is key to resilience.<\/p><ul><li>Learn from past cyber incidents and adapt processes accordingly.<\/li><li>Leverage the collective experiences of peers to identify successful practices and overcome barriers.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98fc610 elementor-widget elementor-widget-heading\" data-id=\"98fc610\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Collaborating for Systemic Resilience<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2bc817 elementor-widget elementor-widget-text-editor\" data-id=\"d2bc817\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Building resilience extends beyond individual organisations.<\/p><ul><li><strong>Collaboration<\/strong>: Partner with other businesses and public authorities to identify systemic risks, address threats, and disrupt malicious activities.<\/li><li><strong>Talent Development<\/strong>: Invest in addressing the cyber skills gap by building sustainable talent pipelines.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ab7e5e elementor-widget elementor-widget-heading\" data-id=\"7ab7e5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A Strategic Imperative for Resilience<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e18892 elementor-widget elementor-widget-text-editor\" data-id=\"0e18892\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber resilience is not just a defensive measure &#8211; it\u2019s a strategic enabler for innovation, productivity, and economic growth. By adopting these five strategies and fostering collaboration, organisations can navigate the evolving threat landscape and thrive in the digital era.<\/p><p>For more insights, access the full World Economic Forum report:\u00a0<a href=\"https:\/\/www.weforum.org\/publications\/unpacking-cyber-resilience\/\"><em>Unpacking Cyber Resilience<\/em>\u00a0<\/a><\/p><p>Nihon Cyber Defence (NCD) helps organizations transform cyber resilience from a challenge into a strategic advantage by offering tailored solutions that ensure business continuity. Our expertise empowers businesses to implement proactive planning, robust data protection, and continuous improvement frameworks.<\/p><p>Partner with NCD today to strengthen your resilience and safeguard your organization\u2019s future.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-bea3839\" data-id=\"bea3839\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39c2eef elementor-widget elementor-widget-html\" data-id=\"39c2eef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Load Roboto font from Google Fonts -->\r\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Roboto:wght@400;500;700&display=swap\" rel=\"stylesheet\" \/>\r\n\r\n<div class=\"modern-profile-card\">\r\n  <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-jamie-saunders\/\" target=\"_blank\">\r\n    <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/jamie_new_2024-scaled-1.jpg?ssl=1\" alt=\"Dr. Jamie Saunders\" class=\"profile-image\" \/>\r\n  <\/a>\r\n\r\n  <div class=\"profile-content\">\r\n    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-jamie-saunders\/\" target=\"_blank\" class=\"profile-name-link\">\r\n      Dr. Jamie Saunders\r\n    <\/a>\r\n    <p class=\"profile-title\">\r\n      <em>Senior Executive Advisor @ Nihon Cyber Defence<\/em>\r\n    <\/p>\r\n    <p class=\"profile-description\">\r\n      A renowned global cyber leader, Saunders expanded UK cybercrime capabilities, strengthened public-private collaboration, and advanced global cyber policy initiatives.\r\n    <\/p>\r\n  <\/div>\r\n<\/div>\r\n\r\n<style>\r\n  .modern-profile-card {\r\n    max-width: 580px;\r\n    margin: 0 auto;\r\n    padding: 16px 20px;\r\n    background-color: #ffffff;\r\n    border: 1px solid #e5e7eb;\r\n    border-radius: 2px;\r\n    box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1); \/* \ud83d\udc48 Shadow from #more-services *\/\r\n    font-family: 'Roboto', sans-serif;\r\n    display: flex;\r\n    flex-direction: column;\r\n    align-items: center;\r\n  }\r\n\r\n  .profile-image {\r\n    width: 100%;\r\n    max-width: 260px;\r\n    border-radius: 10px;\r\n    object-fit: cover;\r\n    margin-bottom: 16px;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-image:hover {\r\n    opacity: 0.9;\r\n  }\r\n\r\n  .profile-content {\r\n    text-align: center;\r\n    width: 100%;\r\n  }\r\n\r\n  .profile-name-link {\r\n    display: block;\r\n    font-size: 1.1rem;\r\n    font-weight: 700;\r\n    text-transform: uppercase;\r\n    letter-spacing: 0.4px;\r\n    margin-bottom: 6px;\r\n    text-decoration: none;\r\n    color: #ce0047;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-name-link:hover {\r\n    opacity: 0.85;\r\n  }\r\n\r\n  .profile-title {\r\n    font-size: 0.8rem;\r\n    color: #666;\r\n    margin-bottom: 12px;\r\n    line-height: 1.4;\r\n    font-style: italic;\r\n  }\r\n\r\n  .profile-description {\r\n    font-size: 0.88rem;\r\n    color: #333;\r\n    line-height: 1.6;\r\n  }\r\n\r\n  @media (max-width: 480px) {\r\n    .modern-profile-card {\r\n      padding: 14px 16px;\r\n    }\r\n\r\n    .profile-name-link {\r\n      font-size: 1rem;\r\n    }\r\n\r\n    .profile-title {\r\n      font-size: 0.78rem;\r\n    }\r\n\r\n    .profile-description {\r\n      font-size: 0.85rem;\r\n    }\r\n  }\r\n<\/style>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e09b662 elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"e09b662\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\/* Start custom CSS for html, class: .elementor-element-e56c3b6 *\/\/* Styling for More Services Section *\/\r\n#more-services {\r\n  padding: 20px;\r\n  background-color: #ffffff;\r\n  border-radius: 2px;\r\n  box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1);\r\n}\r\n\r\n#more-services .widget-title {\r\n  font-size: 1.5rem;\r\n  font-weight: bold;\r\n  color: #ce0047;\r\n  margin-bottom: 10px;\r\n  border-bottom: 2px solid #ce0047;\r\n  display: inline-block;\r\n  padding-bottom: 5px;\r\n}\r\n\r\n#more-services nav ul {\r\n  list-style: none;\r\n  padding: 0;\r\n}\r\n\r\n#more-services nav ul li {\r\n  margin: 10px 0;\r\n}\r\n\r\n#more-services nav ul li a {\r\n  text-decoration: none;\r\n  font-size: 1rem;\r\n  color: black;\r\n  transition: color 0.3s ease;\r\n}\r\n\r\n#more-services nav ul li a:hover {\r\n  color: #ce0047;\r\n}\/* End custom CSS *\/<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26192\" class=\"elementor elementor-26192\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e182c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2e182c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f1fdc3d\" data-id=\"f1fdc3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e56c3b6 elementor-widget elementor-widget-html\" data-id=\"e56c3b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-widget-container\">\r\n    <aside id=\"more-services\" class=\"widget widget_more_services\">\r\n        <h2 class=\"widget-title\">Explore NCD Services<\/h2>\r\n        <nav aria-label=\"More Services\">\r\n            <ul>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/services\/#protective-services\">Protective Services<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Security Operations<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">NCD SIEM<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management Services<\/a><\/li>\r\n            <\/ul>\r\n        <\/nav>\r\n    <\/aside>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=ncd_service_sidebar_mar25\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba985c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"ba985c9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9ca1bf0\" data-id=\"9ca1bf0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b0e282a elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"b0e282a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-24612 .elementor-element.elementor-element-65c14fa:not(.elementor-motion-effects-element-type-background), .elementor-24612 .elementor-element.elementor-element-65c14fa > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-astglobalcolor5 );}.elementor-24612 .elementor-element.elementor-element-65c14fa{transition:background 0.3s, border 0.3s, border-radius 0.3s, box-shadow 0.3s;padding:40px 0px 0px 0px;}.elementor-24612 .elementor-element.elementor-element-65c14fa > .elementor-background-overlay{transition:background 0.3s, border-radius 0.3s, opacity 0.3s;}.elementor-24612 .elementor-element.elementor-element-20a4c35 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;-webkit-text-stroke-color:#000;stroke:#000;color:var( --e-global-color-3f44114 );}.elementor-24612 .elementor-element.elementor-element-9871ba7{font-family:\"Roboto\", Sans-serif;font-size:18px;}.elementor-24612 .elementor-element.elementor-element-9871ba7 p{margin-block-end:0px;}.elementor-24612 .elementor-element.elementor-element-f2ac74a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-f2ac74a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;color:#CE0047;}.elementor-24612 .elementor-element.elementor-element-7e1fd79{text-align:center;}.elementor-24612 .elementor-element.elementor-element-7e1fd79 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;}.elementor-24612 .elementor-element.elementor-element-bf733a7{--spacer-size:10px;}.elementor-24612 .elementor-element.elementor-element-cad7d3a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-cad7d3a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;color:#CE0047;}.elementor-24612 .elementor-element.elementor-element-93dbb7a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-93dbb7a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;}.elementor-24612 .elementor-element.elementor-element-dbe8c8d > .elementor-widget-container{margin:10px 0px 0px 0px;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"24612\" class=\"elementor elementor-24612\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65c14fa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"65c14fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-951cee2\" data-id=\"951cee2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20a4c35 elementor-widget elementor-widget-heading\" data-id=\"20a4c35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Maturity Assessment<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9871ba7 elementor-widget elementor-widget-text-editor\" data-id=\"9871ba7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nihon Cyber Defence (NCD) offers comprehensive\u00a0<a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Maturity Assessments<\/a>\u00a0designed to evaluate an organisations current cyber security capabilities, identify areas for improvement, and develop a strategic roadmap to enhance overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2ac74a elementor-widget elementor-widget-heading\" data-id=\"f2ac74a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Security Framework (NIST)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e1fd79 elementor-widget elementor-widget-heading\" data-id=\"7e1fd79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">National Institute of Standards and Technology<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3aa09b3 elementor-widget elementor-widget-image\" data-id=\"3aa09b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"404\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?fit=768%2C404&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24616\" alt=\"NIST Framework Graphic\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=300%2C158&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=1024%2C538&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=768%2C404&amp;ssl=1 768w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=1536%2C807&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf733a7 elementor-widget elementor-widget-spacer\" data-id=\"bf733a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cad7d3a elementor-widget elementor-widget-heading\" data-id=\"cad7d3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Assessment Framework (CAF)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93dbb7a elementor-widget elementor-widget-heading\" data-id=\"93dbb7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">National Cyber Security Centre<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe8c8d elementor-widget elementor-widget-image\" data-id=\"dbe8c8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"680\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?fit=768%2C680&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24618\" alt=\"CAF Framework Graphic\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?w=1342&amp;ssl=1 1342w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=300%2C266&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=1024%2C906&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=768%2C680&amp;ssl=1 768w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09fb82 elementor-widget elementor-widget-text-editor\" data-id=\"b09fb82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore more of the NCD suite: <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/protective-services-2\/\">Protective Services<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Network Monitoring &amp; Security Operations<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">SIEM<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=cma_en\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4fde0eb elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"4fde0eb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8a26fb5\" data-id=\"8a26fb5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d86f6c3 elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"d86f6c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style1 .tpg-widget-heading::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style4::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .entry-title:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-el-image-wrap img{width:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder:hover .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .post-meta-tags a:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a{border-style:solid;border-width:1px 1px 1px 1px;border-color:#D4D4D4;}body .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a:hover{color:#CE0047;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination-wrap{justify-content:center;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover) > a{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover){color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li > a:not(:hover), .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > span{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:hover > a{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn:hover{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:focus,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:focus{color:#FFFFFF !important;background-color:#CE0047 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li.active > a{color:#FFFFFF;background-color:#CE0047;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26442\" class=\"elementor elementor-26442\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-366640da elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"366640da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc744a9\" data-id=\"dc744a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67c9a499 meta-visibility-show section-title-style-style1 title_position_default title_hover_border_default title-default img_hover_animation_default meta_position_default tpg-category-position-default readmore-btn-default-style grid-hover-overlay-type-always tpg-el-box-border-enable tpg-border-bottom-disable elementor-widget elementor-widget-tpg-grid-layout\" data-id=\"67c9a499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tpg-grid-layout.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"rt-container-fluid rt-tpg-container tpg-el-main-wrapper clearfix grid-layout1-main \"\n\t\t\t id=\"rt-tpg-container-2752264644\"\n\t\t\t data-layout=\"grid-layout1\"\n\t\t\t data-grid-style=\"tpg-full-height\"\n\t\t\t data-sc-id=\"elementor\"\n\t\t\t data-el-settings=''\n\t\t\t data-el-query=''\n\t\t\t data-el-path=''\n\t\t>\n\t\t\t\t\t\t<div class='tpg-header-wrapper '>\n\t\t\t\t\n        <div class=\"tpg-widget-heading-wrapper rt-clear heading-style1 \">\n            <span class=\"tpg-widget-heading-line line-left\"><\/span>\n\t\t\t<h2 class='tpg-widget-heading'>\n\t\t\t\n\t\t\t\t                    <span>\n\t\t\t\t\t\tMore from NCD\u200b\t\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h2>            <span class=\"tpg-widget-heading-line line-right\"><\/span>\n\n\t\t\t\n        <\/div>\n\n\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t<div data-title=\"Loading ...\" class=\"rt-row rt-content-loader grid-layout1 grid-behaviour tpg-full-height grid_layout_wrapper\">\n\t\t\t\t<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29266 post type-post status-publish format-standard has-post-thumbnail hentry category-103\"        data-id=\"29266\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">                        <img decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/02\/ncdevent2026_v1.2-1-1.png?fit=768%2C327&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"327\"\n                             alt=\"NCD EVENT 2026\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Understanding Phishing and How to Stop it !!!<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/02\/05\/\">\n\t\t\t\t\tFebruary 5, 2026\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\" href=\"https:\/\/nihoncyberdefence.co.jp\/category\/%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\/\">\u30d7\u30ec\u30b9\u30ea\u30ea\u30fc\u30b9<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) is proud to host a special cybersecurity seminar on Tuesday, February 24, 2026. This exclusive event brings together leading experts from NCD, Netcraft, and the Japan Cyber...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29155 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29155\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/01\/DSC_0361-scaled.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence opens Kyiv office\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence opens Kyiv office<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/01\/20\/\">\n\t\t\t\t\tJanuary 20, 2026\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence Co., Ltd. (NCD) held an official opening reception for the Kyiv office in Kyiv, Ukraine on December 30, 2025, with the presence of His Excellency Ambassador Extraordinary and...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29073 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29073\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/NCSCOE.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/12\/28\/\">\n\t\t\t\t\tDecember 28, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence and Shizuoka City Announce Strategic Cooperation to Establish Nihon Cyber Shizuoka Centre of Excellence (NCSCOE)...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28997 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-ncsc tag-nihon tag-presentation\"        data-id=\"28997\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/11\/edited-photo.jpg?fit=768%2C319&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"319\"\n                             alt=\"Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/11\/18\/\">\n\t\t\t\t\tNovember 18, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tCartan McLaughlin, CEO of Nihon Cyber Defence (NCD)\u2014the first Japanese cybersecurity company to receive certification from the UK\u2019s National Cyber Security Centre (NCSC)\u2014will be speaking at this event...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28930 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-nihon tag-presentation\"        data-id=\"28930\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/08\/econosec-edited-1.png?fit=768%2C438&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"438\"\n                             alt=\"Exhibition and Presentation at ECONOSEC JAPAN 2025\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Exhibition and Presentation at ECONOSEC JAPAN 2025<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/09\/29\/\">\n\t\t\t\t\tSeptember 29, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defense (NCD) will be exhibiting at ECONOSEC Japan 2025, held at Sunshine City, Ikebukuro from September 30 to October 1, 2025, in partnership with Fivecast...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28687 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-cyber-diplomacy tag-cybersecurity-company-tokyo tag-cybersecurity-growth-japan tag-executive-appointment-cybersecurity tag-japan-cyber-defence-platform tag-japan-cybersecurity-leadership tag-japan-ukraine-cyber-security tag-ncd tag-ncd-japan tag-nihon-cyber-defence-en tag-public-private-cyber-cooperation tag-senior-advisor tag-sergiy-korsunsky tag-sovereign-cybersecurity-japan tag-ukrainian-ambassador-japan\"        data-id=\"28687\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/Korsunsky-NCD-EN-2.png?fit=768%2C339&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"339\"\n                             alt=\"Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/07\/09\/\">\n\t\t\t\t\tJuly 9, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) appoints former Ukrainian Ambassador to Japan, Dr. Sergiy Korsunsky, as Senior Advisor. Dr. Korsunsky will enhance NCD\u2019s international strategy and cyber defence leadership...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28732 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-leadership tag-acd-compliance-strategy tag-acd-law-japan tag-blog tag-board-cyber-governance tag-business-continuity-japan tag-critical-infrastructure-cybersecurity-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-executive-cyber-risk tag-japan-active-cyber-defence tag-meti-cybersecurity-guidance tag-ncd tag-ncd-governance-support tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan tag-toshio-nawa-cyber-insights\"        data-id=\"28732\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/what-acd-means-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Japanese train conductor on platform, preparing for departure highlighting metro rail as part of Japan\u2019s critical infrastructure.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">What Japan\u2019s ACD Law Means for Business Leaders<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/16\/\">\n\t\t\t\t\tJune 16, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-security-leadership\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-security-leadership\/\">Cyber Security Leadership<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tJapan\u2019s ACD Law places cyber risk accountability on boards and executives. Learn what leaders in CNI, finance, and manufacturing must now prioritise...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28665 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-crisis-communications-cyber-attack tag-critical-infrastructure-cybersecurity-japan tag-cyber-incident-response tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-services-cyber-resilience-japan tag-incident-management-service-japan tag-leadership-cyber-crisis-communications tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28665\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/crisis_communication.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Microphones at press conference, symbolising leadership communications during a cyber incident.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Crisis Communications in Cyber Incidents<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/12\/\">\n\t\t\t\t\tJune 12, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow leadership teams in Japan\u2019s CNI, Finance, and Manufacturing sectors can strengthen crisis communications in cyber incident response...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28638 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-acd-law-japan tag-blog tag-critical-infrastructure-cybersecurity-japan tag-cti-integration tag-cti-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-sector-cybersecurity-japan tag-japan-cyber-threat-intelligence tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28638\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/CTI-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Business leader analysing cyber threat intelligence data visualisation on large digital display in cyber security operations centre, Japan.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">Integrating a Strategic CTI Function in Japan<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/10\/\">\n\t\t\t\t\tJune 10, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow Japanese enterprises can integrate Cyber Threat Intelligence (CTI) to strengthen cyber resilience, meet compliance, and protect critical sectors...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t\t<div class='rt-pagination-wrap' data-total-pages='4' data-posts-per-page='' data-type='pagination'><div class=\"rt-pagination\"><ul class=\"pagination-list\"><li class=\"active\"><span>1<\/span><\/li><li><a data-paged='2' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24746\/page\/2\/'>2<\/a><\/li><li><a data-paged='3' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24746\/page\/3\/'>3<\/a><\/li><li><a data-paged='4' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24746\/page\/4\/'>4<\/a><\/li><\/ul><\/div><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=more_from_ncd_english\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cyber resilience is a strategic necessity. Discover five key strategies to minimize cyber incident impacts and strengthen long-term security, based on insights from Dr. Jamie Saunders and the World Economic Forum.<\/p>\n","protected":false},"author":1,"featured_media":24749,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[68],"tags":[88,89,90],"class_list":["post-24746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience","tag-building-resilient-cyber-defenses","tag-cyber-resilience-guide","tag-it-security-best-practices"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Strategic Guide for Building Cyber Resilience - Nihon Cyber Defence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Strategic Guide for Building Cyber Resilience - Nihon Cyber Defence\" \/>\n<meta property=\"og:description\" content=\"Cyber resilience is a strategic necessity. Discover five key strategies to minimize cyber incident impacts and strengthen long-term security, based on insights from Dr. Jamie Saunders and the World Economic Forum.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/\" \/>\n<meta property=\"og:site_name\" content=\"Nihon Cyber Defence\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-02T10:11:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T05:04:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\"},\"headline\":\"A Strategic Guide for Building Cyber Resilience\",\"datePublished\":\"2025-01-02T10:11:22+00:00\",\"dateModified\":\"2025-04-16T05:04:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/\"},\"wordCount\":942,\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1\",\"keywords\":[\"Building Resilient Cyber Defenses\",\"Cyber Resilience Guide\",\"IT Security Best Practices\"],\"articleSection\":[\"Cyber Resilience\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/\",\"name\":\"A Strategic Guide for Building Cyber Resilience - Nihon Cyber Defence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1\",\"datePublished\":\"2025-01-02T10:11:22+00:00\",\"dateModified\":\"2025-04-16T05:04:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1\",\"width\":1200,\"height\":531},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/a-strategic-guide-for-building-cyber-resilience\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Strategic Guide for Building Cyber Resilience\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"name\":\"Nihon Cyber Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\",\"name\":\"Nihon Cyber Defence\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"width\":424,\"height\":164,\"caption\":\"Nihon Cyber Defence\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\"],\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Strategic Guide for Building Cyber Resilience - Nihon Cyber Defence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/","og_locale":"en_US","og_type":"article","og_title":"A Strategic Guide for Building Cyber Resilience - Nihon Cyber Defence","og_description":"Cyber resilience is a strategic necessity. Discover five key strategies to minimize cyber incident impacts and strengthen long-term security, based on insights from Dr. Jamie Saunders and the World Economic Forum.","og_url":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/","og_site_name":"Nihon Cyber Defence","article_published_time":"2025-01-02T10:11:22+00:00","article_modified_time":"2025-04-16T05:04:28+00:00","og_image":[{"width":1200,"height":531,"url":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":false,"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/#article","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/"},"author":{"name":"admin","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43"},"headline":"A Strategic Guide for Building Cyber Resilience","datePublished":"2025-01-02T10:11:22+00:00","dateModified":"2025-04-16T05:04:28+00:00","mainEntityOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/"},"wordCount":942,"publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1","keywords":["Building Resilient Cyber Defenses","Cyber Resilience Guide","IT Security Best Practices"],"articleSection":["Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/","url":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/","name":"A Strategic Guide for Building Cyber Resilience - Nihon Cyber Defence","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/#primaryimage"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1","datePublished":"2025-01-02T10:11:22+00:00","dateModified":"2025-04-16T05:04:28+00:00","breadcrumb":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/#primaryimage","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1","width":1200,"height":531},{"@type":"BreadcrumbList","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/a-strategic-guide-for-building-cyber-resilience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/nihoncyberdefence.co.jp\/en\/"},{"@type":"ListItem","position":2,"name":"A Strategic Guide for Building Cyber Resilience"}]},{"@type":"WebSite","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","name":"Nihon Cyber Defence","description":"","publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nihoncyberdefence.co.jp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization","name":"Nihon Cyber Defence","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","width":424,"height":164,"caption":"Nihon Cyber Defence"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nihoncyberdefence.co.jp"],"url":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1",1200,531,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=300%2C133&ssl=1",300,133,true],"medium_large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=768%2C340&ssl=1",768,340,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1024%2C453&ssl=1",1024,453,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1",1200,531,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1",1200,531,true]},"uagb_author_info":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Cyber resilience is a strategic necessity. Discover five key strategies to minimize cyber incident impacts and strengthen long-term security, based on insights from Dr. Jamie Saunders and the World Economic Forum.","jetpack_sharing_enabled":true,"rttpg_featured_image_url":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1",1200,531,false],"landscape":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg",1200,531,false],"portraits":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg",1200,531,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=300%2C133&ssl=1",300,133,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1024%2C453&ssl=1",1024,453,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1",1200,531,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/pexels-fauxel.jpg?fit=1200%2C531&ssl=1",1200,531,true]},"rttpg_author":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\" rel=\"category tag\">Cyber Resilience<\/a>","rttpg_excerpt":"Cyber resilience is a strategic necessity. Discover five key strategies to minimize cyber incident impacts and strengthen long-term security, based on insights from Dr. Jamie Saunders and the World Economic Forum.","_links":{"self":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/comments?post=24746"}],"version-history":[{"count":10,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24746\/revisions"}],"predecessor-version":[{"id":27309,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24746\/revisions\/27309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media\/24749"}],"wp:attachment":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media?parent=24746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/categories?post=24746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/tags?post=24746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}