{"id":24765,"date":"2025-01-12T11:11:53","date_gmt":"2025-01-12T10:11:53","guid":{"rendered":"https:\/\/nihoncyberdefence.co.jp\/?p=24765"},"modified":"2025-04-16T06:08:50","modified_gmt":"2025-04-16T05:08:50","slug":"navigating-cyber-incident-response","status":"publish","type":"post","link":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/","title":{"rendered":"Navigating Cyber Incident Response\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24765\" class=\"elementor elementor-24765\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b48f6f5 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"b48f6f5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5e358db\" data-id=\"5e358db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cd6956 wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info\" data-id=\"3cd6956\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"wpr-post-info wpr-post-info-horizontal\"><li class=\"wpr-post-info-taxonomy\"><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/risk-management\/\">Risk Management<\/a><\/li><li class=\"wpr-post-info-date\"><span>January 12, 2025<\/span><\/li><\/ul>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40db7d0 elementor-widget elementor-widget-heading\" data-id=\"40db7d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Navigating Cyber Incident Response<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f9095b elementor-widget elementor-widget-heading\" data-id=\"4f9095b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Actionable Strategies to Help Businesses Strengthen Resilience and Respond Decisively<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4066af elementor-widget elementor-widget-html\" data-id=\"e4066af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"custom-share-buttons\">\r\n    <a class=\"share-btn twitter\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-x-twitter\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn linkedin\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-linkedin-in\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn whatsapp\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-whatsapp\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn copy-link\" href=\"#\" title=\"Copy link\">\r\n        <i class=\"fas fa-link\"><\/i>\r\n    <\/a>\r\n<\/div>\r\n\r\n<!-- Font Awesome -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.5.1\/css\/all.min.css\">\r\n\r\n<script>\r\n    \/\/ Get current URL, title, and featured image\r\n    const postUrl = window.location.href;\r\n    const encodedUrl = encodeURIComponent(postUrl);\r\n    const postTitle = encodeURIComponent(document.title);\r\n    const ogImage = document.querySelector('meta[property=\"og:image\"]');\r\n    const postImage = ogImage ? encodeURIComponent(ogImage.getAttribute('content')) : '';\r\n\r\n    \/\/ Update share buttons\r\n    document.querySelector('.share-btn.twitter').href = `https:\/\/twitter.com\/intent\/tweet?url=${encodedUrl}&text=${postTitle}`;\r\n    document.querySelector('.share-btn.linkedin').href = `https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=${encodedUrl}`;\r\n    document.querySelector('.share-btn.whatsapp').href = `https:\/\/api.whatsapp.com\/send?text=${postTitle}%20${encodedUrl}`;\r\n\r\n    \/\/ Copy link functionality with alert\r\n    document.querySelector('.share-btn.copy-link').addEventListener('click', (e) => {\r\n        e.preventDefault();\r\n        navigator.clipboard.writeText(postUrl).then(() => {\r\n            alert('Link copied!');\r\n        }).catch(err => {\r\n            console.error('Failed to copy: ', err);\r\n            alert('Failed to copy the link!');\r\n        });\r\n    });\r\n<\/script>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09bbd56 elementor-widget elementor-widget-image\" data-id=\"09bbd56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-2.jpg?fit=1200%2C531&#038;ssl=1\" title=\"navigating_cyber_incident-1200&#215;531\" alt=\"navigating_cyber_incident-1200x531\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d0a512c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d0a512c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c3da2ac\" data-id=\"c3da2ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e142ed9 elementor-widget elementor-widget-text-editor\" data-id=\"e142ed9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber threats are escalating, placing companies under immense pressure to improve their incident response capabilities. However, traditional decision-making processes and limited preparedness often hinder these organizations, resulting in prolonged recovery times and increased damage. Based on my experience in cyber security, here are practical strategies to help Japanese business leaders strengthen their response frameworks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfb0522 elementor-widget elementor-widget-heading\" data-id=\"dfb0522\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Build a Proactive Incident Response Plan<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b364bf elementor-widget elementor-widget-text-editor\" data-id=\"1b364bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When a cyber incident occurs, the effects ripple through the entire organization\u2014not just the IT department. A significant portion of crisis management focuses on managing the fallout for the business rather than the technical aspects of recovery. Preparation is essential to avoid confusion and delays. Leaders should:<\/p><ul><li><strong>Clearly Define Roles:<\/strong> Assign specific responsibilities to a crisis management team. Ensure every team member, from executives to IT staff, knows exactly what to do during a crisis.<\/li><li><strong>Run Crisis Simulations:<\/strong> Conduct regular exercises to test and improve your organization\u2019s ability to respond effectively. Cyber incidents are not solely technical problems but business-wide challenges that demand coordinated efforts.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abb23d8 elementor-widget elementor-widget-heading\" data-id=\"abb23d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Act Swiftly and Decisively<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11d3443 elementor-widget elementor-widget-text-editor\" data-id=\"11d3443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The hierarchical structures in many Japanese companies can slow decision-making during a crisis. Speed is critical to minimize the impact of a cyber attack. Here are steps to improve response times:<\/p><ul><li><strong>Use Mission Command Principles:<\/strong> Provide clear objectives and boundaries within which employees can act independently. This approach ensures teams make timely decisions without waiting for approvals from higher levels of the organization.<\/li><li><strong>Secure Communication Channels:<\/strong> Deploy a reliable, private communication platform to maintain control during a crisis. This ensures attackers cannot access sensitive discussions and helps leaders coordinate efforts effectively.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7aa422f elementor-widget elementor-widget-heading\" data-id=\"7aa422f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Steps to Strengthen Security Framework<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e2cbec elementor-widget elementor-widget-text-editor\" data-id=\"3e2cbec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This approach emphasizes structure and clarity:<\/p><ol><li><strong>Prepare:<\/strong> Train personnel and establish clear procedures to ensure readiness before an incident strikes.<\/li><li><strong>Detect:<\/strong> Identify threats quickly to minimize damage.<\/li><li><strong>Contain:<\/strong> Isolate the threat to prevent further spread.<\/li><li><strong>Recover:<\/strong> Restore operations as soon as possible while protecting critical processes.<\/li><li><strong>Review:<\/strong> Evaluate the response to improve future preparedness and identify lessons learned.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-659b3db elementor-widget elementor-widget-heading\" data-id=\"659b3db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Build Long-Term Resilience<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75ae415 elementor-widget elementor-widget-text-editor\" data-id=\"75ae415\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-family: Catamaran; color: #000000;\">A cyber attack, though disruptive, offers an opportunity to strengthen organizational trust and credibility. How your organization handles a crisis will define its reputation. Transparent communication, quick action, and thorough documentation show stakeholders you took the right steps before, during, and after the incident.<\/span><\/p><p><span style=\"font-family: Catamaran; color: #000000;\">By adopting proven strategies like the Nihon Cyber Defence (NCD) \u00a0five-strand response model and fostering a culture of speed and adaptability, Japanese companies can transform their approach to incident response. The effort requires commitment, but the rewards are significant: reduced downtime, stronger defences, and a reputation for resilience.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ab7f97 elementor-widget elementor-widget-heading\" data-id=\"8ab7f97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Incident Response &amp; Five-Strand Methodology<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25a9fb1 elementor-widget elementor-widget-text-editor\" data-id=\"25a9fb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-family: Catamaran; color: #000000;\">NCD\u2019s comprehensive multi-strand response methodology for technical, communication, mitigation, and resolution efforts in parallel.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0aaa02e elementor-widget elementor-widget-image\" data-id=\"0aaa02e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"936\" height=\"404\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2024\/11\/5_strand_strategies.png?fit=936%2C404&amp;ssl=1\" class=\"attachment-full size-full wp-image-24672\" alt=\"Incident Response &amp; Five-Strand Methodology\u200b\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2024\/11\/5_strand_strategies.png?w=936&amp;ssl=1 936w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2024\/11\/5_strand_strategies.png?resize=300%2C129&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2024\/11\/5_strand_strategies.png?resize=768%2C331&amp;ssl=1 768w\" sizes=\"(max-width: 936px) 100vw, 936px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2423f4 elementor-widget elementor-widget-text-editor\" data-id=\"a2423f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore more of the NCD suite: <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/protective-services-2\/\">Protective Services<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Network Monitoring &amp; Security Operations<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">SIEM<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-bea3839\" data-id=\"bea3839\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80df7b4 elementor-widget elementor-widget-html\" data-id=\"80df7b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Load Roboto font from Google Fonts -->\r\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Roboto:wght@400;500;700&display=swap\" rel=\"stylesheet\" \/>\r\n\r\n<div class=\"modern-profile-card\">\r\n  <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-jamie-saunders\/\" target=\"_blank\">\r\n    <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/jamie_new_2024-scaled-1.jpg?ssl=1\" alt=\"Dr. Jamie Saunders\" class=\"profile-image\" \/>\r\n  <\/a>\r\n\r\n  <div class=\"profile-content\">\r\n    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-jamie-saunders\/\" target=\"_blank\" class=\"profile-name-link\">\r\n      Dr. Jamie Saunders\r\n    <\/a>\r\n    <p class=\"profile-title\">\r\n      <em>Senior Executive Advisor @ Nihon Cyber Defence<\/em>\r\n    <\/p>\r\n    <p class=\"profile-description\">\r\n      A renowned global cyber leader, Saunders expanded UK cybercrime capabilities, strengthened public-private collaboration, and advanced global cyber policy initiatives.\r\n    <\/p>\r\n  <\/div>\r\n<\/div>\r\n\r\n<style>\r\n  .modern-profile-card {\r\n    max-width: 580px;\r\n    margin: 0 auto;\r\n    padding: 16px 20px;\r\n    background-color: #ffffff;\r\n    border: 1px solid #e5e7eb;\r\n    border-radius: 2px;\r\n    box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1); \/* \ud83d\udc48 Shadow from #more-services *\/\r\n    font-family: 'Roboto', sans-serif;\r\n    display: flex;\r\n    flex-direction: column;\r\n    align-items: center;\r\n  }\r\n\r\n  .profile-image {\r\n    width: 100%;\r\n    max-width: 260px;\r\n    border-radius: 10px;\r\n    object-fit: cover;\r\n    margin-bottom: 16px;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-image:hover {\r\n    opacity: 0.9;\r\n  }\r\n\r\n  .profile-content {\r\n    text-align: center;\r\n    width: 100%;\r\n  }\r\n\r\n  .profile-name-link {\r\n    display: block;\r\n    font-size: 1.1rem;\r\n    font-weight: 700;\r\n    text-transform: uppercase;\r\n    letter-spacing: 0.4px;\r\n    margin-bottom: 6px;\r\n    text-decoration: none;\r\n    color: #ce0047;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-name-link:hover {\r\n    opacity: 0.85;\r\n  }\r\n\r\n  .profile-title {\r\n    font-size: 0.8rem;\r\n    color: #666;\r\n    margin-bottom: 12px;\r\n    line-height: 1.4;\r\n    font-style: italic;\r\n  }\r\n\r\n  .profile-description {\r\n    font-size: 0.88rem;\r\n    color: #333;\r\n    line-height: 1.6;\r\n  }\r\n\r\n  @media (max-width: 480px) {\r\n    .modern-profile-card {\r\n      padding: 14px 16px;\r\n    }\r\n\r\n    .profile-name-link {\r\n      font-size: 1rem;\r\n    }\r\n\r\n    .profile-title {\r\n      font-size: 0.78rem;\r\n    }\r\n\r\n    .profile-description {\r\n      font-size: 0.85rem;\r\n    }\r\n  }\r\n<\/style>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cfac1f elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"3cfac1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\/* Start custom CSS for html, class: .elementor-element-e56c3b6 *\/\/* Styling for More Services Section *\/\r\n#more-services {\r\n  padding: 20px;\r\n  background-color: #ffffff;\r\n  border-radius: 2px;\r\n  box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1);\r\n}\r\n\r\n#more-services .widget-title {\r\n  font-size: 1.5rem;\r\n  font-weight: bold;\r\n  color: #ce0047;\r\n  margin-bottom: 10px;\r\n  border-bottom: 2px solid #ce0047;\r\n  display: inline-block;\r\n  padding-bottom: 5px;\r\n}\r\n\r\n#more-services nav ul {\r\n  list-style: none;\r\n  padding: 0;\r\n}\r\n\r\n#more-services nav ul li {\r\n  margin: 10px 0;\r\n}\r\n\r\n#more-services nav ul li a {\r\n  text-decoration: none;\r\n  font-size: 1rem;\r\n  color: black;\r\n  transition: color 0.3s ease;\r\n}\r\n\r\n#more-services nav ul li a:hover {\r\n  color: #ce0047;\r\n}\/* End custom CSS *\/<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26192\" class=\"elementor elementor-26192\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e182c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2e182c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f1fdc3d\" data-id=\"f1fdc3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e56c3b6 elementor-widget elementor-widget-html\" data-id=\"e56c3b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-widget-container\">\r\n    <aside id=\"more-services\" class=\"widget widget_more_services\">\r\n        <h2 class=\"widget-title\">Explore NCD Services<\/h2>\r\n        <nav aria-label=\"More Services\">\r\n            <ul>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/services\/#protective-services\">Protective Services<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Security Operations<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">NCD SIEM<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management Services<\/a><\/li>\r\n            <\/ul>\r\n        <\/nav>\r\n    <\/aside>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=ncd_service_sidebar_mar25\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b9cb707 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"b9cb707\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8013cc2\" data-id=\"8013cc2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9cc5634 elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"9cc5634\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style1 .tpg-widget-heading::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style4::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .entry-title:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-el-image-wrap img{width:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder:hover .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .post-meta-tags a:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a{border-style:solid;border-width:1px 1px 1px 1px;border-color:#D4D4D4;}body .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a:hover{color:#CE0047;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination-wrap{justify-content:center;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover) > a{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover){color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li > a:not(:hover), .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > span{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:hover > a{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn:hover{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:focus,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:focus{color:#FFFFFF !important;background-color:#CE0047 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li.active > a{color:#FFFFFF;background-color:#CE0047;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26442\" class=\"elementor elementor-26442\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-366640da elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"366640da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc744a9\" data-id=\"dc744a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67c9a499 meta-visibility-show section-title-style-style1 title_position_default title_hover_border_default title-default img_hover_animation_default meta_position_default tpg-category-position-default readmore-btn-default-style grid-hover-overlay-type-always tpg-el-box-border-enable tpg-border-bottom-disable elementor-widget elementor-widget-tpg-grid-layout\" data-id=\"67c9a499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tpg-grid-layout.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"rt-container-fluid rt-tpg-container tpg-el-main-wrapper clearfix grid-layout1-main \"\n\t\t\t id=\"rt-tpg-container-3313941793\"\n\t\t\t data-layout=\"grid-layout1\"\n\t\t\t data-grid-style=\"tpg-full-height\"\n\t\t\t data-sc-id=\"elementor\"\n\t\t\t data-el-settings=''\n\t\t\t data-el-query=''\n\t\t\t data-el-path=''\n\t\t>\n\t\t\t\t\t\t<div class='tpg-header-wrapper '>\n\t\t\t\t\n        <div class=\"tpg-widget-heading-wrapper rt-clear heading-style1 \">\n            <span class=\"tpg-widget-heading-line line-left\"><\/span>\n            <h2 class='tpg-widget-heading'>\n            \n                                    <span>\n\t\t\t\t\t\tMore from NCD\u200b\t\t\t\t\t<\/span>\n                    \n                            <\/h2>            <span class=\"tpg-widget-heading-line line-right\"><\/span>\n\n            \n        <\/div>\n\n        \n        \t\t\t<\/div>\n\n\t\t\t<div data-title=\"Loading ...\" class=\"rt-row rt-content-loader grid-layout1 grid-behaviour tpg-full-height grid_layout_wrapper\">\n\t\t\t\t<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29374 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29374\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29374\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/insider-threats-in-the-era-of-economic-security\/\" class=\"tpg-post-link\" target=\"_self\">                        <img decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/04\/NIHON-1.png?fit=768%2C432&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"432\"\n                             alt=\"Insider Threats in the Era of Economic Security\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29374\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/insider-threats-in-the-era-of-economic-security\/\" class=\"tpg-post-link\" target=\"_self\">Insider Threats in the Era of Economic Security<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/04\/24\/\">\n\t\t\t\t\tApril 24, 2026\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tAs economic security becomes a growing priority in Japan, risks to technology, R&amp;D data, and critical infrastructure are no longer limited to external cyberattacks.\r\n\r\nRecent cases include North...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"29374\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/insider-threats-in-the-era-of-economic-security\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29266 post type-post status-publish format-standard has-post-thumbnail hentry category-103\"        data-id=\"29266\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">                        <img decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/02\/ncdevent2026_v1.2-1-1.png?fit=768%2C327&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"327\"\n                             alt=\"NCD EVENT 2026\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Understanding Phishing and How to Stop it !!!<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/02\/05\/\">\n\t\t\t\t\tFebruary 5, 2026\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\" href=\"https:\/\/nihoncyberdefence.co.jp\/category\/%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\/\">\u30d7\u30ec\u30b9\u30ea\u30ea\u30fc\u30b9<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) is proud to host a special cybersecurity seminar on Tuesday, February 24, 2026. This exclusive event brings together leading experts from NCD, Netcraft, and the Japan Cyber...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29155 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29155\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/01\/DSC_0361-scaled.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence opens Kyiv office\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence opens Kyiv office<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/01\/20\/\">\n\t\t\t\t\tJanuary 20, 2026\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence Co., Ltd. (NCD) held an official opening reception for the Kyiv office in Kyiv, Ukraine on December 30, 2025, with the presence of His Excellency Ambassador Extraordinary and...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29073 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29073\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/NCSCOE.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/12\/28\/\">\n\t\t\t\t\tDecember 28, 2025\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence and Shizuoka City Announce Strategic Cooperation to Establish Nihon Cyber Shizuoka Centre of Excellence (NCSCOE)...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28997 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-ncsc tag-nihon tag-presentation\"        data-id=\"28997\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/11\/edited-photo.jpg?fit=768%2C319&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"319\"\n                             alt=\"Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/11\/18\/\">\n\t\t\t\t\tNovember 18, 2025\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tCartan McLaughlin, CEO of Nihon Cyber Defence (NCD)\u2014the first Japanese cybersecurity company to receive certification from the UK\u2019s National Cyber Security Centre (NCSC)\u2014will be speaking at this event...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28930 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-nihon tag-presentation\"        data-id=\"28930\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/08\/econosec-edited-1.png?fit=768%2C438&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"438\"\n                             alt=\"Exhibition and Presentation at ECONOSEC JAPAN 2025\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Exhibition and Presentation at ECONOSEC JAPAN 2025<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/09\/29\/\">\n\t\t\t\t\tSeptember 29, 2025\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defense (NCD) will be exhibiting at ECONOSEC Japan 2025, held at Sunshine City, Ikebukuro from September 30 to October 1, 2025, in partnership with Fivecast...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28687 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-cyber-diplomacy tag-cybersecurity-company-tokyo tag-cybersecurity-growth-japan tag-executive-appointment-cybersecurity tag-japan-cyber-defence-platform tag-japan-cybersecurity-leadership tag-japan-ukraine-cyber-security tag-ncd tag-ncd-japan tag-nihon-cyber-defence-en tag-public-private-cyber-cooperation tag-senior-advisor tag-sergiy-korsunsky tag-sovereign-cybersecurity-japan tag-ukrainian-ambassador-japan\"        data-id=\"28687\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/Korsunsky-NCD-EN-2.png?fit=768%2C339&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"339\"\n                             alt=\"Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/07\/09\/\">\n\t\t\t\t\tJuly 9, 2025\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) appoints former Ukrainian Ambassador to Japan, Dr. Sergiy Korsunsky, as Senior Advisor. Dr. Korsunsky will enhance NCD\u2019s international strategy and cyber defence leadership...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28732 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-leadership tag-acd-compliance-strategy tag-acd-law-japan tag-blog tag-board-cyber-governance tag-business-continuity-japan tag-critical-infrastructure-cybersecurity-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-executive-cyber-risk tag-japan-active-cyber-defence tag-meti-cybersecurity-guidance tag-ncd tag-ncd-governance-support tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan tag-toshio-nawa-cyber-insights\"        data-id=\"28732\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/what-acd-means-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Japanese train conductor on platform, preparing for departure highlighting metro rail as part of Japan\u2019s critical infrastructure.\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">What Japan\u2019s ACD Law Means for Business Leaders<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/16\/\">\n\t\t\t\t\tJune 16, 2025\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-security-leadership\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-security-leadership\/\">Cyber Security Leadership<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tJapan\u2019s ACD Law places cyber risk accountability on boards and executives. Learn what leaders in CNI, finance, and manufacturing must now prioritise...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28665 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-crisis-communications-cyber-attack tag-critical-infrastructure-cybersecurity-japan tag-cyber-incident-response tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-services-cyber-resilience-japan tag-incident-management-service-japan tag-leadership-cyber-crisis-communications tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28665\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/crisis_communication.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Microphones at press conference, symbolising leadership communications during a cyber incident.\">\n                        \n                            \n        <\/a>\n                <div class=\"overlay grid-hover-content\"><\/div>\n                        <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Crisis Communications in Cyber Incidents<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>                                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/12\/\">\n\t\t\t\t\tJune 12, 2025\t\t\t\t<\/a>\n                \t\t\t<\/span>\n                        <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n                            <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow leadership teams in Japan\u2019s CNI, Finance, and Manufacturing sectors can strengthen crisis communications in cyber incident response...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n                    <a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n                <\/div>\n    <\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t\t<div class='rt-pagination-wrap' data-total-pages='5' data-posts-per-page='10' data-type='pagination'><div class=\"rt-pagination\"><ul class=\"pagination-list\"><li class=\"active\"><span>1<\/span><\/li><li><a data-paged='2' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24765\/page\/2\/'>2<\/a><\/li><li><a data-paged='3' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24765\/page\/3\/'>3<\/a><\/li><li><a data-paged='4' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24765\/page\/4\/'>4<\/a><\/li><li><a data-paged='5' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24765\/page\/5\/'>5<\/a><\/li><\/ul><\/div><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=more_from_ncd_english\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.<\/p>\n","protected":false},"author":1,"featured_media":24767,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[77],"tags":[96,97,98],"class_list":["post-24765","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risk-management","tag-cyberattack-recovery","tag-incident-management-guide","tag-incident-response-planning"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Navigating Cyber Incident Response\u00a0 - Nihon Cyber Defence<\/title>\n<meta name=\"description\" content=\"Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating Cyber Incident Response\u00a0 - Nihon Cyber Defence\" \/>\n<meta property=\"og:description\" content=\"Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Nihon Cyber Defence\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-12T10:11:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T05:08:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\"},\"headline\":\"Navigating Cyber Incident Response\u00a0\",\"datePublished\":\"2025-01-12T10:11:53+00:00\",\"dateModified\":\"2025-04-16T05:08:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/\"},\"wordCount\":858,\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1\",\"keywords\":[\"Cyberattack Recovery\",\"Incident Management Guide\",\"Incident Response Planning\"],\"articleSection\":[\"Risk Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/\",\"name\":\"Navigating Cyber Incident Response\u00a0 - Nihon Cyber Defence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1\",\"datePublished\":\"2025-01-12T10:11:53+00:00\",\"dateModified\":\"2025-04-16T05:08:50+00:00\",\"description\":\"Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1\",\"width\":1200,\"height\":531},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/navigating-cyber-incident-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating Cyber Incident Response\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"name\":\"Nihon Cyber Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\",\"name\":\"Nihon Cyber Defence\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"width\":424,\"height\":164,\"caption\":\"Nihon Cyber Defence\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\"],\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Navigating Cyber Incident Response\u00a0 - Nihon Cyber Defence","description":"Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/","og_locale":"en_US","og_type":"article","og_title":"Navigating Cyber Incident Response\u00a0 - Nihon Cyber Defence","og_description":"Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.","og_url":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/","og_site_name":"Nihon Cyber Defence","article_published_time":"2025-01-12T10:11:53+00:00","article_modified_time":"2025-04-16T05:08:50+00:00","og_image":[{"width":1200,"height":531,"url":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":false,"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/#article","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/"},"author":{"name":"admin","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43"},"headline":"Navigating Cyber Incident Response\u00a0","datePublished":"2025-01-12T10:11:53+00:00","dateModified":"2025-04-16T05:08:50+00:00","mainEntityOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/"},"wordCount":858,"publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1","keywords":["Cyberattack Recovery","Incident Management Guide","Incident Response Planning"],"articleSection":["Risk Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/","url":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/","name":"Navigating Cyber Incident Response\u00a0 - Nihon Cyber Defence","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/#primaryimage"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1","datePublished":"2025-01-12T10:11:53+00:00","dateModified":"2025-04-16T05:08:50+00:00","description":"Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.","breadcrumb":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/#primaryimage","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1","width":1200,"height":531},{"@type":"BreadcrumbList","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/navigating-cyber-incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/nihoncyberdefence.co.jp\/en\/"},{"@type":"ListItem","position":2,"name":"Navigating Cyber Incident Response\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","name":"Nihon Cyber Defence","description":"","publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nihoncyberdefence.co.jp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization","name":"Nihon Cyber Defence","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","width":424,"height":164,"caption":"Nihon Cyber Defence"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nihoncyberdefence.co.jp"],"url":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1",1200,531,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=300%2C133&ssl=1",300,133,true],"medium_large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=768%2C340&ssl=1",768,340,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1024%2C453&ssl=1",1024,453,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1",1200,531,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1",1200,531,true]},"uagb_author_info":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"uagb_comment_info":1,"uagb_excerpt":"Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.","jetpack_sharing_enabled":true,"rttpg_featured_image_url":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1",1200,531,false],"landscape":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg",1200,531,false],"portraits":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg",1200,531,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=300%2C133&ssl=1",300,133,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1024%2C453&ssl=1",1024,453,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1",1200,531,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/navigating_cyber_incident-1200x531-1.jpg?fit=1200%2C531&ssl=1",1200,531,true]},"rttpg_author":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"rttpg_comment":1,"rttpg_category":"<a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/risk-management\/\" rel=\"category tag\">Risk Management<\/a>","rttpg_excerpt":"Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this expert guide by Dr. Jamie Saunders.","_links":{"self":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24765","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/comments?post=24765"}],"version-history":[{"count":10,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24765\/revisions"}],"predecessor-version":[{"id":27318,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24765\/revisions\/27318"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media\/24767"}],"wp:attachment":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media?parent=24765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/categories?post=24765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/tags?post=24765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}