{"id":24775,"date":"2025-01-31T11:11:51","date_gmt":"2025-01-31T10:11:51","guid":{"rendered":"https:\/\/nihoncyberdefence.co.jp\/?p=24775"},"modified":"2025-04-23T01:58:51","modified_gmt":"2025-04-23T00:58:51","slug":"preparing-for-active-cyber-defense-acd","status":"publish","type":"post","link":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/","title":{"rendered":"Preparing for Active Cyber Defense (ACD)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24775\" class=\"elementor elementor-24775\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b48f6f5 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"b48f6f5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5e358db\" data-id=\"5e358db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3cd6956 wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info\" data-id=\"3cd6956\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"wpr-post-info wpr-post-info-horizontal\"><li class=\"wpr-post-info-taxonomy\"><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/risk-management\/\">Risk Management<\/a><\/li><li class=\"wpr-post-info-date\"><span>January 31, 2025<\/span><\/li><\/ul>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40db7d0 elementor-widget elementor-widget-heading\" data-id=\"40db7d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Preparing for Active Cyber Defense (ACD)<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f9095b elementor-widget elementor-widget-heading\" data-id=\"4f9095b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ret. Adm. Ichida\u2019s Insights for Japanese Businesses<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4436db1 elementor-widget elementor-widget-html\" data-id=\"4436db1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"custom-share-buttons\">\r\n    <a class=\"share-btn twitter\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-x-twitter\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn linkedin\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-linkedin-in\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn whatsapp\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-whatsapp\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn copy-link\" href=\"#\" title=\"Copy link\">\r\n        <i class=\"fas fa-link\"><\/i>\r\n    <\/a>\r\n<\/div>\r\n\r\n<!-- Font Awesome -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.5.1\/css\/all.min.css\">\r\n\r\n<script>\r\n    \/\/ Get current URL, title, and featured image\r\n    const postUrl = window.location.href;\r\n    const encodedUrl = encodeURIComponent(postUrl);\r\n    const postTitle = encodeURIComponent(document.title);\r\n    const ogImage = document.querySelector('meta[property=\"og:image\"]');\r\n    const postImage = ogImage ? encodeURIComponent(ogImage.getAttribute('content')) : '';\r\n\r\n    \/\/ Update share buttons\r\n    document.querySelector('.share-btn.twitter').href = `https:\/\/twitter.com\/intent\/tweet?url=${encodedUrl}&text=${postTitle}`;\r\n    document.querySelector('.share-btn.linkedin').href = `https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=${encodedUrl}`;\r\n    document.querySelector('.share-btn.whatsapp').href = `https:\/\/api.whatsapp.com\/send?text=${postTitle}%20${encodedUrl}`;\r\n\r\n    \/\/ Copy link functionality with alert\r\n    document.querySelector('.share-btn.copy-link').addEventListener('click', (e) => {\r\n        e.preventDefault();\r\n        navigator.clipboard.writeText(postUrl).then(() => {\r\n            alert('Link copied!');\r\n        }).catch(err => {\r\n            console.error('Failed to copy: ', err);\r\n            alert('Failed to copy the link!');\r\n        });\r\n    });\r\n<\/script>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09bbd56 elementor-widget elementor-widget-image\" data-id=\"09bbd56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"531\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image.webp?fit=1200%2C531&amp;ssl=1\" class=\"attachment-full size-full wp-image-26094\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image.webp?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image.webp?resize=300%2C133&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image.webp?resize=1024%2C453&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image.webp?resize=768%2C340&amp;ssl=1 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d0a512c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d0a512c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c3da2ac\" data-id=\"c3da2ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-94d5820 elementor-widget elementor-widget-heading\" data-id=\"94d5820\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Active Cyber Defense?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e142ed9 elementor-widget elementor-widget-text-editor\" data-id=\"e142ed9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Japan\u2019s Active Cyber Defense (ACD) policy introduces substantial changes to the way businesses approach cyber security, particularly for those in critical infrastructure sectors. Retired Admiral Akira Ichida\u2019s analysis highlights both the opportunities and challenges of this transformative initiative, providing businesses with key considerations as they prepare for its implementation.<\/p><p><strong><br \/>Disclaimer:<\/strong> NCD defines &#8220;Active Cyber Defense\u201d in accordance with the <a href=\"https:\/\/www.ncsc.gov.uk\/report\/acd-the-sixth-year\">UK National Cyber Security Centre (NCSC)<\/a> definition &#8211; \u00a0\u201c\u2026 services that are designed to reduce high-volume commodity cyber attacks.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b364bf elementor-widget elementor-widget-text-editor\" data-id=\"1b364bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This initiative aims to prevent cyber intrusions from spreading on a large scale by establishing a collaborative framework between the government and the private sector for sharing threat intelligence. With a proposed legal framework set for submission to the <a href=\"https:\/\/www.sangiin.go.jp\/eng\/\">National Diet<\/a> in 2025, this marks a pivotal moment in Japan\u2019s efforts to defend its critical infrastructure and digital economy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3263a4 elementor-widget elementor-widget-heading\" data-id=\"b3263a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Proposed Framework of Government<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a773a0d elementor-widget elementor-widget-text-editor\" data-id=\"a773a0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Targeted Monitoring of Foreign-Related Communications<\/strong>: The government will legally monitor suspicious foreign-related communications for signs of potential cyber threats.<br \/><br \/><\/li><li><strong>Mandatory Reporting for Critical Infrastructure<\/strong>: Water, electricity, and other essential infrastructure operators will be required to report cyber incidents to the government.<br \/><br \/><\/li><li><strong>Utilization of the Security Clearance System<\/strong>: To ensure effective information sharing, the framework proposes granting access to sensitive information via a security clearance system.<br \/><br \/><\/li><li><strong>Learning from International Models<\/strong>: Inspired by systems like the <a href=\"https:\/\/www.cisa.gov\/\">U.S. Cybersecurity and Infrastructure Security Agency (CISA)<\/a> and its Joint Cyber Defense Collaborative (JCDC), Japan aims to emulate global best practices.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35f5d21 elementor-widget elementor-widget-heading\" data-id=\"35f5d21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Insights for Businesses<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11d3443 elementor-widget elementor-widget-text-editor\" data-id=\"11d3443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Navigating Increased Responsibilities with Clear Guidance<br \/><\/strong>Ichida acknowledges the progress of establishing a collaborative council and mandatory reporting obligations for critical infrastructure. However, businesses must be proactive in understanding and meeting these new requirements.<br \/><span style=\"font-family: Catamaran;\"><span style=\"font-size: 16px;\"><b><br \/><\/b><\/span><\/span><b>Actionable Takeaways<br \/><\/b>Companies should strengthen their cyber threat monitoring systems by creating a real-time, two-way information-sharing framework between the public and private sectors. This will enable faster, more effective responses to emerging threats. Additionally, establishing clear incident reporting protocols will ensure a smooth and efficient response process.<br \/><br \/>For critical infrastructure operators, compliance with these new mandates is non-negotiable, and early adoption of reporting frameworks will ease the transition.<\/li><\/ol><ol start=\"2\"><li><strong> Addressing Challenges in Foreign Communications Monitoring<br \/><\/strong>The ACD\u2019s plan to focus on \u201cforeign communications\u201d monitoring raises practical challenges. Ichida points out the complexity of distinguishing between foreign and domestic data flows. The term &#8220;foreign&#8221; lacks clarity\u2014whether it refers to the source of the attack, the communication itself, or both. If the focus is on monitoring communications at Japan&#8217;s entry points, there is a risk that attacks initiated by foreign entities within the country may be overlooked. This issue impacts businesses, particularly those involved in global operations.<br \/><span style=\"font-style: inherit; font-weight: inherit; color: var(--ast-global-color-3); background-color: var( --e-global-color-astglobalcolor4 );\"><span style=\"font-family: Catamaran;\"><span style=\"font-size: 16px;\"><br \/><\/span><\/span><\/span><span style=\"font-style: inherit; color: var(--ast-global-color-3); background-color: var( --e-global-color-astglobalcolor4 );\"><b>Actionable Takeaways<\/b><br \/><span style=\"font-weight: inherit;\">Companies must collaborate with the government and ISPs to ensure that their networks comply with monitoring requirements without compromising operational efficiency.<\/span><br \/><br \/><span style=\"font-weight: inherit;\">Leveraging AI-powered threat detection technologies, as well as implementing solutions such as SIEM and MFA that contribute to a zero-trust framework, will enhance network security and strengthen the safety of the system environment.<\/span><\/span><\/li><\/ol><ol start=\"3\"><li><strong> Aligning Cyber security Measures with Legal and Constitutional Protections<br \/><\/strong>Ichida emphasizes the importance of aligning ACD-related initiatives with Japan\u2019s constitutional protections for communication privacy <a href=\"https:\/\/www.japaneselawtranslation.go.jp\/en\/laws\/view\/4241\/en#je_ch4sc2at5\">(Article 21)<\/a>.\u00a0<span style=\"font-size: 16px;\">Businesses must remain vigilant about protecting customer and stakeholder data while meeting new government mandates.<br \/><\/span><span style=\"font-family: Catamaran; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 ); color: var(--ast-global-color-3); font-size: 16px;\"><br \/><\/span><b>Actionable Takeaways:<\/b><br \/>Companies must review their data handling and privacy policies to ensure compliance with domestic laws and international regulations.<br \/><br \/>Transparency with customers about how their data is protected in light of new cyber security policies will be critical in maintaining trust.<\/li><\/ol><ol start=\"4\"><li><strong> Strengthening Organizational and Human Resource Capacity<br \/><\/strong>Ichida highlights the need for skilled personnel and robust organizations capable of rapid responses to ensure the effective implementation of ACD by the government. Businesses, especially those in critical sectors, will need to address similar challenges internally.<br \/><span style=\"font-family: Catamaran; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 ); color: var(--ast-global-color-3); font-size: 16px;\"><br \/><\/span><b>Actionable Takeaways<br \/><\/b>Companies should invest in training cyber security professionals and creating dedicated teams to manage compliance and threat response.<br \/><br \/>Leveraging external expertise, such as from firms like Nihon Cyber Defence, can fill gaps in knowledge and resources.<\/li><\/ol><ol start=\"5\"><li><strong> Leveraging Lessons from International Models<br \/><\/strong>Ichida points to the U.S. model (e.g., CISA\u2019s JCDC) as a reference for Japan\u2019s ACD framework. Businesses involved in these global initiatives provide valuable insights for others looking to adapt.<br \/><span style=\"font-family: Catamaran; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 ); color: var(--ast-global-color-3); font-size: 16px;\"><br \/><\/span><b>Actionable Takeaways:<br \/><\/b>Businesses should study best practices from countries with established proactive cyber defense systems to anticipate potential challenges.<br \/><br \/>Participating in international or domestic threat-sharing councils will provide an opportunity to stay ahead of emerging threats.<\/li><\/ol><ol start=\"6\"><li><strong> Opportunities for Innovation and Collaboration<br \/><\/strong>Ichida underscores the need for collaboration across public and private sectors, with ISPs and other entities playing a critical role. For businesses, this presents both a challenge and an opportunity.<br \/><span style=\"font-family: Catamaran; font-style: inherit; font-weight: inherit; background-color: var( --e-global-color-astglobalcolor4 ); color: var(--ast-global-color-3); font-size: 16px;\"><br \/><\/span><b>Actionable Takeaways:<\/b><br \/>Companies should actively participate in public-private partnerships to share intelligence and enhance their own security capabilities.<br \/><br \/>Cyber security providers and tech firms should seize the chance to innovate solutions that align with the government\u2019s monitoring and response needs.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7aa422f elementor-widget elementor-widget-heading\" data-id=\"7aa422f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Looking Ahead<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e2cbec elementor-widget elementor-widget-text-editor\" data-id=\"3e2cbec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Japan\u2019s proactive approach to cyber security represents a critical step forward, but the road ahead is not without hurdles. The implementation of ACD-related legislation indicates progress in clarifying legal interpretations and potential amendments concerning the protection of communications confidentiality. Based on the assumption that actions taken by the relevant authorities is considered legitimate, the implementation will require transforming government cyber defence capabilities, fostering public-private cooperation, and building organizational and technical capacity.<\/p><p>Ichida\u2019s insights underscore the complexity of the task, reminding us that while the foundations are being laid, continuous adaptation and vigilance will be required to meet the ever-evolving landscape of cyber threats. The next few years will be pivotal as Japan navigates these challenges to secure its digital future. Addressing these challenges and protecting Japan\u2019s digital society will require sustained collaboration between the public and private sectors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-bea3839\" data-id=\"bea3839\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fcccadb elementor-widget elementor-widget-html\" data-id=\"fcccadb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Load Roboto font from Google Fonts -->\r\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Roboto:wght@400;500;700&display=swap\" rel=\"stylesheet\" \/>\r\n\r\n<div class=\"modern-profile-card\">\r\n  <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/akira-ichida\/\" target=\"_blank\">\r\n    <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/Admiral_Akira_Ichida-1-1-1.png?ssl=1\" alt=\"Akira Ichida\" class=\"profile-image\" \/>\r\n  <\/a>\r\n\r\n  <div class=\"profile-content\">\r\n    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/akira-ichida\/\" target=\"_blank\" class=\"profile-name-link\">\r\n      Akira Ichida\r\n    <\/a>\r\n    <p class=\"profile-title\">\r\n      <em>Retired Admiral, Japan Maritime Self-Defense Force, Senior Advisor @ Nihon Cyber Defence<\/em>\r\n    <\/p>\r\n    <p class=\"profile-description\">\r\n      Retired JMSDF Admiral, Ichida led MSDF cyber operations, intelligence enhancements, advancing cyber defence, information sharing, and overseas training for Japan\u2019s military.\r\n    <\/p>\r\n  <\/div>\r\n<\/div>\r\n\r\n<style>\r\n  .modern-profile-card {\r\n    max-width: 580px;\r\n    margin: 0 auto;\r\n    padding: 16px 20px;\r\n    background-color: #ffffff;\r\n    border: 1px solid #e5e7eb;\r\n    border-radius: 2px;\r\n    box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1); \/* \ud83d\udc48 Shadow from #more-services *\/\r\n    font-family: 'Roboto', sans-serif;\r\n    display: flex;\r\n    flex-direction: column;\r\n    align-items: center;\r\n  }\r\n\r\n  .profile-image {\r\n    width: 100%;\r\n    max-width: 260px;\r\n    border-radius: 10px;\r\n    object-fit: cover;\r\n    margin-bottom: 16px;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-image:hover {\r\n    opacity: 0.9;\r\n  }\r\n\r\n  .profile-content {\r\n    text-align: center;\r\n    width: 100%;\r\n  }\r\n\r\n  .profile-name-link {\r\n    display: block;\r\n    font-size: 1.1rem;\r\n    font-weight: 700;\r\n    text-transform: uppercase;\r\n    letter-spacing: 0.4px;\r\n    margin-bottom: 6px;\r\n    text-decoration: none;\r\n    color: #ce0047;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-name-link:hover {\r\n    opacity: 0.85;\r\n  }\r\n\r\n  .profile-title {\r\n    font-size: 0.8rem;\r\n    color: #666;\r\n    margin-bottom: 12px;\r\n    line-height: 1.4;\r\n    font-style: italic;\r\n  }\r\n\r\n  .profile-description {\r\n    font-size: 0.88rem;\r\n    color: #333;\r\n    line-height: 1.6;\r\n  }\r\n\r\n  @media (max-width: 480px) {\r\n    .modern-profile-card {\r\n      padding: 14px 16px;\r\n    }\r\n\r\n    .profile-name-link {\r\n      font-size: 1rem;\r\n    }\r\n\r\n    .profile-title {\r\n      font-size: 0.78rem;\r\n    }\r\n\r\n    .profile-description {\r\n      font-size: 0.85rem;\r\n    }\r\n  }\r\n<\/style>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76c4617 elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"76c4617\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\/* Start custom CSS for html, class: .elementor-element-e56c3b6 *\/\/* Styling for More Services Section *\/\r\n#more-services {\r\n  padding: 20px;\r\n  background-color: #ffffff;\r\n  border-radius: 2px;\r\n  box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1);\r\n}\r\n\r\n#more-services .widget-title {\r\n  font-size: 1.5rem;\r\n  font-weight: bold;\r\n  color: #ce0047;\r\n  margin-bottom: 10px;\r\n  border-bottom: 2px solid #ce0047;\r\n  display: inline-block;\r\n  padding-bottom: 5px;\r\n}\r\n\r\n#more-services nav ul {\r\n  list-style: none;\r\n  padding: 0;\r\n}\r\n\r\n#more-services nav ul li {\r\n  margin: 10px 0;\r\n}\r\n\r\n#more-services nav ul li a {\r\n  text-decoration: none;\r\n  font-size: 1rem;\r\n  color: black;\r\n  transition: color 0.3s ease;\r\n}\r\n\r\n#more-services nav ul li a:hover {\r\n  color: #ce0047;\r\n}\/* End custom CSS *\/<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26192\" class=\"elementor elementor-26192\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e182c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2e182c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f1fdc3d\" data-id=\"f1fdc3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e56c3b6 elementor-widget elementor-widget-html\" data-id=\"e56c3b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-widget-container\">\r\n    <aside id=\"more-services\" class=\"widget widget_more_services\">\r\n        <h2 class=\"widget-title\">Explore NCD Services<\/h2>\r\n        <nav aria-label=\"More Services\">\r\n            <ul>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/services\/#protective-services\">Protective Services<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Security Operations<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">NCD SIEM<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management Services<\/a><\/li>\r\n            <\/ul>\r\n        <\/nav>\r\n    <\/aside>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=ncd_service_sidebar_mar25\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba985c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"ba985c9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9ca1bf0\" data-id=\"9ca1bf0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b0e282a elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"b0e282a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-24612 .elementor-element.elementor-element-65c14fa:not(.elementor-motion-effects-element-type-background), .elementor-24612 .elementor-element.elementor-element-65c14fa > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-astglobalcolor5 );}.elementor-24612 .elementor-element.elementor-element-65c14fa{transition:background 0.3s, border 0.3s, border-radius 0.3s, box-shadow 0.3s;padding:40px 0px 0px 0px;}.elementor-24612 .elementor-element.elementor-element-65c14fa > .elementor-background-overlay{transition:background 0.3s, border-radius 0.3s, opacity 0.3s;}.elementor-24612 .elementor-element.elementor-element-20a4c35 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;-webkit-text-stroke-color:#000;stroke:#000;color:var( --e-global-color-3f44114 );}.elementor-24612 .elementor-element.elementor-element-9871ba7{font-family:\"Roboto\", Sans-serif;font-size:18px;}.elementor-24612 .elementor-element.elementor-element-9871ba7 p{margin-block-end:0px;}.elementor-24612 .elementor-element.elementor-element-f2ac74a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-f2ac74a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;color:#CE0047;}.elementor-24612 .elementor-element.elementor-element-7e1fd79{text-align:center;}.elementor-24612 .elementor-element.elementor-element-7e1fd79 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;}.elementor-24612 .elementor-element.elementor-element-bf733a7{--spacer-size:10px;}.elementor-24612 .elementor-element.elementor-element-cad7d3a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-cad7d3a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;color:#CE0047;}.elementor-24612 .elementor-element.elementor-element-93dbb7a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-93dbb7a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;}.elementor-24612 .elementor-element.elementor-element-dbe8c8d > .elementor-widget-container{margin:10px 0px 0px 0px;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"24612\" class=\"elementor elementor-24612\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65c14fa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"65c14fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-951cee2\" data-id=\"951cee2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20a4c35 elementor-widget elementor-widget-heading\" data-id=\"20a4c35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Maturity Assessment<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9871ba7 elementor-widget elementor-widget-text-editor\" data-id=\"9871ba7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nihon Cyber Defence (NCD) offers comprehensive\u00a0<a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Maturity Assessments<\/a>\u00a0designed to evaluate an organisations current cyber security capabilities, identify areas for improvement, and develop a strategic roadmap to enhance overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2ac74a elementor-widget elementor-widget-heading\" data-id=\"f2ac74a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Security Framework (NIST)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e1fd79 elementor-widget elementor-widget-heading\" data-id=\"7e1fd79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">National Institute of Standards and Technology<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3aa09b3 elementor-widget elementor-widget-image\" data-id=\"3aa09b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"404\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?fit=768%2C404&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24616\" alt=\"NIST Framework Graphic\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=300%2C158&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=1024%2C538&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=768%2C404&amp;ssl=1 768w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=1536%2C807&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf733a7 elementor-widget elementor-widget-spacer\" data-id=\"bf733a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cad7d3a elementor-widget elementor-widget-heading\" data-id=\"cad7d3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Assessment Framework (CAF)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93dbb7a elementor-widget elementor-widget-heading\" data-id=\"93dbb7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">National Cyber Security Centre<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe8c8d elementor-widget elementor-widget-image\" data-id=\"dbe8c8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"680\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?fit=768%2C680&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24618\" alt=\"CAF Framework Graphic\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?w=1342&amp;ssl=1 1342w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=300%2C266&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=1024%2C906&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=768%2C680&amp;ssl=1 768w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09fb82 elementor-widget elementor-widget-text-editor\" data-id=\"b09fb82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore more of the NCD suite: <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/protective-services-2\/\">Protective Services<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Network Monitoring &amp; Security Operations<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">SIEM<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=cma_en\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-44fa2f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"44fa2f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7217a39\" data-id=\"7217a39\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5352f2c elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"5352f2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style1 .tpg-widget-heading::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style4::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .entry-title:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-el-image-wrap img{width:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder:hover .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .post-meta-tags a:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a{border-style:solid;border-width:1px 1px 1px 1px;border-color:#D4D4D4;}body .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a:hover{color:#CE0047;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination-wrap{justify-content:center;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover) > a{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover){color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li > a:not(:hover), .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > span{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:hover > a{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn:hover{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:focus,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:focus{color:#FFFFFF !important;background-color:#CE0047 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li.active > a{color:#FFFFFF;background-color:#CE0047;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26442\" class=\"elementor elementor-26442\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-366640da elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"366640da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc744a9\" data-id=\"dc744a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67c9a499 meta-visibility-show section-title-style-style1 title_position_default title_hover_border_default title-default img_hover_animation_default meta_position_default tpg-category-position-default readmore-btn-default-style grid-hover-overlay-type-always tpg-el-box-border-enable tpg-border-bottom-disable elementor-widget elementor-widget-tpg-grid-layout\" data-id=\"67c9a499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tpg-grid-layout.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"rt-container-fluid rt-tpg-container tpg-el-main-wrapper clearfix grid-layout1-main \"\n\t\t\t id=\"rt-tpg-container-2281750161\"\n\t\t\t data-layout=\"grid-layout1\"\n\t\t\t data-grid-style=\"tpg-full-height\"\n\t\t\t data-sc-id=\"elementor\"\n\t\t\t data-el-settings=''\n\t\t\t data-el-query=''\n\t\t\t data-el-path=''\n\t\t>\n\t\t\t\t\t\t<div class='tpg-header-wrapper '>\n\t\t\t\t\n        <div class=\"tpg-widget-heading-wrapper rt-clear heading-style1 \">\n            <span class=\"tpg-widget-heading-line line-left\"><\/span>\n\t\t\t<h2 class='tpg-widget-heading'>\n\t\t\t\n\t\t\t\t                    <span>\n\t\t\t\t\t\tMore from NCD\u200b\t\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h2>            <span class=\"tpg-widget-heading-line line-right\"><\/span>\n\n\t\t\t\n        <\/div>\n\n\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t<div data-title=\"Loading ...\" class=\"rt-row rt-content-loader grid-layout1 grid-behaviour tpg-full-height grid_layout_wrapper\">\n\t\t\t\t<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29266 post type-post status-publish format-standard has-post-thumbnail hentry category-103\"        data-id=\"29266\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/02\/ncdevent2026_v1.2-1-1.png?fit=768%2C327&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"327\"\n                             alt=\"NCD EVENT 2026\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Understanding Phishing and How to Stop it !!!<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/02\/05\/\">\n\t\t\t\t\tFebruary 5, 2026\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\" href=\"https:\/\/nihoncyberdefence.co.jp\/category\/%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\/\">\u30d7\u30ec\u30b9\u30ea\u30ea\u30fc\u30b9<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) is proud to host a special cybersecurity seminar on Tuesday, February 24, 2026. This exclusive event brings together leading experts from NCD, Netcraft, and the Japan Cyber...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29155 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29155\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/01\/DSC_0361-scaled.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence opens Kyiv office\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence opens Kyiv office<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/01\/20\/\">\n\t\t\t\t\tJanuary 20, 2026\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence Co., Ltd. (NCD) held an official opening reception for the Kyiv office in Kyiv, Ukraine on December 30, 2025, with the presence of His Excellency Ambassador Extraordinary and...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29073 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29073\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/NCSCOE.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/12\/28\/\">\n\t\t\t\t\tDecember 28, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence and Shizuoka City Announce Strategic Cooperation to Establish Nihon Cyber Shizuoka Centre of Excellence (NCSCOE)...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28997 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-ncsc tag-nihon tag-presentation\"        data-id=\"28997\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/11\/edited-photo.jpg?fit=768%2C319&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"319\"\n                             alt=\"Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/11\/18\/\">\n\t\t\t\t\tNovember 18, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tCartan McLaughlin, CEO of Nihon Cyber Defence (NCD)\u2014the first Japanese cybersecurity company to receive certification from the UK\u2019s National Cyber Security Centre (NCSC)\u2014will be speaking at this event...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28930 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-nihon tag-presentation\"        data-id=\"28930\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/08\/econosec-edited-1.png?fit=768%2C438&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"438\"\n                             alt=\"Exhibition and Presentation at ECONOSEC JAPAN 2025\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Exhibition and Presentation at ECONOSEC JAPAN 2025<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/09\/29\/\">\n\t\t\t\t\tSeptember 29, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defense (NCD) will be exhibiting at ECONOSEC Japan 2025, held at Sunshine City, Ikebukuro from September 30 to October 1, 2025, in partnership with Fivecast...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28687 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-cyber-diplomacy tag-cybersecurity-company-tokyo tag-cybersecurity-growth-japan tag-executive-appointment-cybersecurity tag-japan-cyber-defence-platform tag-japan-cybersecurity-leadership tag-japan-ukraine-cyber-security tag-ncd tag-ncd-japan tag-nihon-cyber-defence-en tag-public-private-cyber-cooperation tag-senior-advisor tag-sergiy-korsunsky tag-sovereign-cybersecurity-japan tag-ukrainian-ambassador-japan\"        data-id=\"28687\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/Korsunsky-NCD-EN-2.png?fit=768%2C339&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"339\"\n                             alt=\"Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/07\/09\/\">\n\t\t\t\t\tJuly 9, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) appoints former Ukrainian Ambassador to Japan, Dr. Sergiy Korsunsky, as Senior Advisor. Dr. Korsunsky will enhance NCD\u2019s international strategy and cyber defence leadership...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28732 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-leadership tag-acd-compliance-strategy tag-acd-law-japan tag-blog tag-board-cyber-governance tag-business-continuity-japan tag-critical-infrastructure-cybersecurity-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-executive-cyber-risk tag-japan-active-cyber-defence tag-meti-cybersecurity-guidance tag-ncd tag-ncd-governance-support tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan tag-toshio-nawa-cyber-insights\"        data-id=\"28732\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/what-acd-means-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Japanese train conductor on platform, preparing for departure highlighting metro rail as part of Japan\u2019s critical infrastructure.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">What Japan\u2019s ACD Law Means for Business Leaders<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/16\/\">\n\t\t\t\t\tJune 16, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-security-leadership\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-security-leadership\/\">Cyber Security Leadership<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tJapan\u2019s ACD Law places cyber risk accountability on boards and executives. Learn what leaders in CNI, finance, and manufacturing must now prioritise...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28665 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-crisis-communications-cyber-attack tag-critical-infrastructure-cybersecurity-japan tag-cyber-incident-response tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-services-cyber-resilience-japan tag-incident-management-service-japan tag-leadership-cyber-crisis-communications tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28665\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/crisis_communication.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Microphones at press conference, symbolising leadership communications during a cyber incident.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Crisis Communications in Cyber Incidents<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/12\/\">\n\t\t\t\t\tJune 12, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow leadership teams in Japan\u2019s CNI, Finance, and Manufacturing sectors can strengthen crisis communications in cyber incident response...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28638 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-acd-law-japan tag-blog tag-critical-infrastructure-cybersecurity-japan tag-cti-integration tag-cti-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-sector-cybersecurity-japan tag-japan-cyber-threat-intelligence tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28638\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/CTI-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Business leader analysing cyber threat intelligence data visualisation on large digital display in cyber security operations centre, Japan.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">Integrating a Strategic CTI Function in Japan<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/10\/\">\n\t\t\t\t\tJune 10, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow Japanese enterprises can integrate Cyber Threat Intelligence (CTI) to strengthen cyber resilience, meet compliance, and protect critical sectors...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t\t<div class='rt-pagination-wrap' data-total-pages='4' data-posts-per-page='' data-type='pagination'><div class=\"rt-pagination\"><ul class=\"pagination-list\"><li class=\"active\"><span>1<\/span><\/li><li><a data-paged='2' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24775\/page\/2\/'>2<\/a><\/li><li><a data-paged='3' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24775\/page\/3\/'>3<\/a><\/li><li><a data-paged='4' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24775\/page\/4\/'>4<\/a><\/li><\/ul><\/div><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=more_from_ncd_english\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.<\/p>\n","protected":false},"author":1,"featured_media":26100,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[77],"tags":[99,100,101,102],"class_list":["post-24775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risk-management","tag-active-cyber-defense","tag-cyber-threat-mitigation","tag-cybersecurity-strategies","tag-threat-response"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preparing for Active Cyber Defense (ACD) - Nihon Cyber Defence<\/title>\n<meta name=\"description\" content=\"Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preparing for Active Cyber Defense (ACD) - Nihon Cyber Defence\" \/>\n<meta property=\"og:description\" content=\"Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/\" \/>\n<meta property=\"og:site_name\" content=\"Nihon Cyber Defence\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-31T10:11:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T00:58:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\"},\"headline\":\"Preparing for Active Cyber Defense (ACD)\",\"datePublished\":\"2025-01-31T10:11:51+00:00\",\"dateModified\":\"2025-04-23T00:58:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/\"},\"wordCount\":1433,\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/resized_image-1.webp?fit=1200%2C531&ssl=1\",\"keywords\":[\"Active Cyber Defense\",\"Cyber Threat Mitigation\",\"Cybersecurity Strategies\",\"Threat Response\"],\"articleSection\":[\"Risk Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/\",\"name\":\"Preparing for Active Cyber Defense (ACD) - Nihon Cyber Defence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/resized_image-1.webp?fit=1200%2C531&ssl=1\",\"datePublished\":\"2025-01-31T10:11:51+00:00\",\"dateModified\":\"2025-04-23T00:58:51+00:00\",\"description\":\"Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/resized_image-1.webp?fit=1200%2C531&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/resized_image-1.webp?fit=1200%2C531&ssl=1\",\"width\":1200,\"height\":531},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/preparing-for-active-cyber-defense-acd\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preparing for Active Cyber Defense (ACD)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"name\":\"Nihon Cyber Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\",\"name\":\"Nihon Cyber Defence\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"width\":424,\"height\":164,\"caption\":\"Nihon Cyber Defence\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\"],\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preparing for Active Cyber Defense (ACD) - Nihon Cyber Defence","description":"Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/","og_locale":"en_US","og_type":"article","og_title":"Preparing for Active Cyber Defense (ACD) - Nihon Cyber Defence","og_description":"Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.","og_url":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/","og_site_name":"Nihon Cyber Defence","article_published_time":"2025-01-31T10:11:51+00:00","article_modified_time":"2025-04-23T00:58:51+00:00","og_image":[{"width":1200,"height":531,"url":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":false,"Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/#article","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/"},"author":{"name":"admin","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43"},"headline":"Preparing for Active Cyber Defense (ACD)","datePublished":"2025-01-31T10:11:51+00:00","dateModified":"2025-04-23T00:58:51+00:00","mainEntityOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/"},"wordCount":1433,"publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1","keywords":["Active Cyber Defense","Cyber Threat Mitigation","Cybersecurity Strategies","Threat Response"],"articleSection":["Risk Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/","url":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/","name":"Preparing for Active Cyber Defense (ACD) - Nihon Cyber Defence","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/#primaryimage"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1","datePublished":"2025-01-31T10:11:51+00:00","dateModified":"2025-04-23T00:58:51+00:00","description":"Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.","breadcrumb":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/#primaryimage","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1","width":1200,"height":531},{"@type":"BreadcrumbList","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/nihoncyberdefence.co.jp\/en\/"},{"@type":"ListItem","position":2,"name":"Preparing for Active Cyber Defense (ACD)"}]},{"@type":"WebSite","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","name":"Nihon Cyber Defence","description":"","publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nihoncyberdefence.co.jp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization","name":"Nihon Cyber Defence","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","width":424,"height":164,"caption":"Nihon Cyber Defence"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nihoncyberdefence.co.jp"],"url":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1",1200,531,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=300%2C133&ssl=1",300,133,true],"medium_large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=768%2C340&ssl=1",768,340,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1024%2C453&ssl=1",1024,453,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1",1200,531,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1",1200,531,true]},"uagb_author_info":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"uagb_comment_info":1,"uagb_excerpt":"Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.","jetpack_sharing_enabled":true,"rttpg_featured_image_url":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1",1200,531,false],"landscape":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp",1200,531,false],"portraits":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp",1200,531,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=300%2C133&ssl=1",300,133,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1024%2C453&ssl=1",1024,453,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1",1200,531,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/01\/resized_image-1.webp?fit=1200%2C531&ssl=1",1200,531,true]},"rttpg_author":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"rttpg_comment":1,"rttpg_category":"<a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/risk-management\/\" rel=\"category tag\">Risk Management<\/a>","rttpg_excerpt":"Japan\u2019s Active Cyber Defense (ACD) policy is set to transform cyber security, requiring critical infrastructure operators to comply with new reporting mandates. Ret. Adm. Akira Ichida explores the implications, challenges, and strategies for businesses to stay ahead.","_links":{"self":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/comments?post=24775"}],"version-history":[{"count":10,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24775\/revisions"}],"predecessor-version":[{"id":27477,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/24775\/revisions\/27477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media\/26100"}],"wp:attachment":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media?parent=24775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/categories?post=24775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/tags?post=24775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}