{"id":775,"date":"2018-03-10T15:41:09","date_gmt":"2018-03-10T12:41:09","guid":{"rendered":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/information-security-management\/"},"modified":"2018-03-15T15:55:59","modified_gmt":"2018-03-15T12:55:59","slug":"information-security-management","status":"publish","type":"page","link":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/","title":{"rendered":"Information Security Management"},"content":{"rendered":"    <!--[section]-->\n\t\t<style>\n.bd-section-1382236278{padding-bottom:2em;padding-top:2em;background-color:#555555;}\n.bd-section-1382236278 h3{\n\tfont-weight:  bold;\n\ttext-align:  center;\n}\n<\/style>\t\t<section id=section4 class=\" bd-section-1382236278  bd-tagstyles\" data-section-title=\"Information Security Management\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t    <!--[columns]-->\n        <style>\n.bd-layoutcontainer-540120492 > .bd-container-inner > .container-fluid > .row{height:calc(110%);margin:-5px;}\n.bd-layoutcontainer-540120492 > .bd-container-inner > .container-fluid > .row > div{padding:5px;}\n.bd-layoutcontainer-540120492  > .bd-container-inner > .container-fluid:after{display:none;}<\/style><style>\n.bd-layoutcontainer-540120492 > .bd-container-inner > .container-fluid, .bd-layoutcontainer-540120492 > .bd-container-inner > .container-fluid > .row{height:100%;}<\/style><style>.bd-layoutcontainer-540120492 > .bd-container-inner > .container-fluid {padding-left: 0; padding-right: 0;}<\/style>        <style>\n.bd-layoutcolumn-2141547463{background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-320149447{background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-721878611{background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-62736172{background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-135946877{background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-1445884871{position:relative;background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-320981345{background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-1673245139{background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-2063307553{position:relative;background-color:#ffffff;border:1px solid #269ccb;}\n\n.bd-layoutcolumn-1848847922{position:relative;background-color:#ffffff;border:1px solid #269ccb;}<\/style>        <div class=\" bd-layoutcontainer-540120492  bd-columns bd-no-margins\">\n            <div class=\"bd-container-inner\">\n                <div class=\"container-fluid\">\n                    <div class=\"row bd-row-flex bd-row-align-top\">\n                        <!--{content}-->\n                                <!--[column]-->\n        <div class=\"col-md-12 col-sm-12 bd-columnwrapper-2141547463\">\n            <div class=\"bd-column  bd-layoutcolumn-2141547463 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[layoutbox]--><style>\n.additional-class-1034193125{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-1034193125  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-1907692163 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h1 style=\"text-align: center;\"><b>Information Security Management<\/b><\/h1><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\r\n        <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-320149447\">\n            <div class=\"bd-column  bd-layoutcolumn-320149447 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-931687765{width:auto;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/iso-27001.jpg\" alt=\"ISO\/IEC 27001, Information Security Management System\" class=\" additional-class-931687765   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-1628768950{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-1628768950  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-1413892713 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>ISO\/IEC 27001<\/b><br>Information Security Management System<\/h3>\r\n<p>\r\nThe ISO\/IEC 27001 Standard helps organizations keep corporate information and data secure, whether it is online or offline.<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-1981697698{float:right;margin:10px;}<\/style><style>.additional-class-1981697698 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1981697698:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1981697698:after { content: '\\19d'; }.additional-class-1981697698:before {width: auto; visibility: inherit;}.additional-class-1981697698:after{display: inline-block;}<\/style><style>.additional-class-1981697698:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-1981697698:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1981697698:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1981697698:hover:before {width: auto; visibility: inherit;}.additional-class-1981697698:hover:before{display: inline-block;}<\/style><style>.additional-class-1981697698:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/isoiec-27001-information-security-management-system\/\" class=\"btn btn-default  additional-class-1981697698  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\t\r\n\t\t    <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-721878611\">\n            <div class=\"bd-column  bd-layoutcolumn-721878611 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-808822945{width:100%;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/iso-iec-27002.jpg\" alt=\"ISO\/IEC 27002, Code of Practice for Information Security Controls\" class=\" additional-class-808822945   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-1335447881{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-1335447881  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-1961656383 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>ISO\/IEC 27002<\/b><br>Code of Practice for Information Security Controls<\/h3>\r\n<p>The ISO\/IEC 27002 standard was originally published as a rename of the existing ISO 17799 standard, a code of practice for information security.<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-1954927110{float:right;margin:10px;}<\/style><style>.additional-class-1954927110 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1954927110:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1954927110:after { content: '\\19d'; }.additional-class-1954927110:before {width: auto; visibility: inherit;}.additional-class-1954927110:after{display: inline-block;}<\/style><style>.additional-class-1954927110:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-1954927110:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1954927110:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1954927110:hover:before {width: auto; visibility: inherit;}.additional-class-1954927110:hover:before{display: inline-block;}<\/style><style>.additional-class-1954927110:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/isoiec-27002-code-of-practice-for-information-security-controls\/\" class=\"btn btn-default  additional-class-1954927110  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\t\r\n\t\t    <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-62736172\">\n            <div class=\"bd-column  bd-layoutcolumn-62736172 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-502673713{width:auto;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/iso-iec-27005.jpg\" alt=\"ISO\/IEC 27005, Information Security Risk Management\" class=\" additional-class-502673713   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-80017719{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-80017719  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-1003728417 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>ISO\/IEC 27005<\/b><br>Information Security Risk Management<\/h3>\r\n<p>ISO\/IEC 27005:2011 is part of the ISO 27000 series of standards, and provides guidelines for information security risk management.<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-1310139525{float:right;margin:10px;}<\/style><style>.additional-class-1310139525 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1310139525:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1310139525:after { content: '\\19d'; }.additional-class-1310139525:before {width: auto; visibility: inherit;}.additional-class-1310139525:after{display: inline-block;}<\/style><style>.additional-class-1310139525:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-1310139525:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1310139525:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1310139525:hover:before {width: auto; visibility: inherit;}.additional-class-1310139525:hover:before{display: inline-block;}<\/style><style>.additional-class-1310139525:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/isoiec-27005-information-security-risk-management\/\" class=\"btn btn-default  additional-class-1310139525  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\t\r\n\t\t    <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-135946877\">\n            <div class=\"bd-column  bd-layoutcolumn-135946877 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-2016704124{width:auto;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/iso-iec-27032.jpg\" alt=\"ISO\/IEC 27032, Cyber Security\" class=\" additional-class-2016704124   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-1303014875{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-1303014875  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-1522974217 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>ISO\/IEC 27032<\/b><br>Cyber Security<\/h3>\r\n<p>ISO\/IEC 27032:2012 provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-370424696{float:right;margin:10px;}<\/style><style>.additional-class-370424696 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-370424696:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-370424696:after { content: '\\19d'; }.additional-class-370424696:before {width: auto; visibility: inherit;}.additional-class-370424696:after{display: inline-block;}<\/style><style>.additional-class-370424696:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-370424696:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-370424696:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-370424696:hover:before {width: auto; visibility: inherit;}.additional-class-370424696:hover:before{display: inline-block;}<\/style><style>.additional-class-370424696:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/isoiec-27032-cyber-security\/\" class=\"btn btn-default  additional-class-370424696  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\t\r\n\t\t    <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-1445884871\">\n            <div class=\"bd-column  bd-layoutcolumn-1445884871 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-1595926248{width:auto;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/iso-iec-27034.jpg\" alt=\"ISO\/IEC 27034, Application Security\" class=\" additional-class-1595926248   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-576141457{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-576141457  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-373894799 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>ISO\/IEC 27034<\/b><br>Application Security<\/h3>\r\n<p>ISO\/IEC 27034 provides guidance to assist organizations in integrating security into the processes used for managing their applications.\r\n<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-1204396107{float:right;margin:10px;}<\/style><style>.additional-class-1204396107 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1204396107:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1204396107:after { content: '\\19d'; }.additional-class-1204396107:before {width: auto; visibility: inherit;}.additional-class-1204396107:after{display: inline-block;}<\/style><style>.additional-class-1204396107:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-1204396107:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1204396107:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1204396107:hover:before {width: auto; visibility: inherit;}.additional-class-1204396107:hover:before{display: inline-block;}<\/style><style>.additional-class-1204396107:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/isoiec-27034-application-security\/\" class=\"btn btn-default  additional-class-1204396107  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\t\r\n\t\t    <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-320981345\">\n            <div class=\"bd-column  bd-layoutcolumn-320981345 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-639900469{width:auto;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/iso-iec-27035.jpg\" alt=\"ISO\/IEC 27035, Incident Management\" class=\" additional-class-639900469   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-1642882820{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-1642882820  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-1159370308 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>ISO\/IEC 27035<\/b><br>Incident Management<\/h3>\r\n<p>ISO\/IEC 27035:2011 provides guidance on information security incident management for large and medium-sized organizations.<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-660812267{float:right;margin:10px;}<\/style><style>.additional-class-660812267 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-660812267:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-660812267:after { content: '\\19d'; }.additional-class-660812267:before {width: auto; visibility: inherit;}.additional-class-660812267:after{display: inline-block;}<\/style><style>.additional-class-660812267:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-660812267:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-660812267:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-660812267:hover:before {width: auto; visibility: inherit;}.additional-class-660812267:hover:before{display: inline-block;}<\/style><style>.additional-class-660812267:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/isoiec-27035-incident-management\/\" class=\"btn btn-default  additional-class-660812267  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\t\r\n\t\t    <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-1673245139\">\n            <div class=\"bd-column  bd-layoutcolumn-1673245139 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-529213674{width:auto;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/scada-security-manager.jpg\" alt=\"SCADA Security Manager\" class=\" additional-class-529213674   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-1783065984{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-1783065984  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-608872795 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>Lead SCADA Security Manager<\/b><\/h3>\r\n<p>Lead SCADA Security Manager training enables you to develop the necessary expertise to plan, design, and implement an effective program to protect SCADA systems.<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-576828855{float:right;margin:10px;}<\/style><style>.additional-class-576828855 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-576828855:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-576828855:after { content: '\\19d'; }.additional-class-576828855:before {width: auto; visibility: inherit;}.additional-class-576828855:after{display: inline-block;}<\/style><style>.additional-class-576828855:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-576828855:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-576828855:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-576828855:hover:before {width: auto; visibility: inherit;}.additional-class-576828855:hover:before{display: inline-block;}<\/style><style>.additional-class-576828855:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/lead-scada-security-manager\/\" class=\"btn btn-default  additional-class-576828855  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\t\r\n\t\t    <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-2063307553\">\n            <div class=\"bd-column  bd-layoutcolumn-2063307553 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-1543275318{width:auto;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/penetration-testing.jpg\" alt=\"Penetration Testing\" class=\" additional-class-1543275318   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-139604966{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-139604966  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-1511634997 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>Penetration Testing<\/b><\/h3>\r\n<p>A pen test can also be used to test an organization's security policy compliance, its employees' security awareness and the organization's ability to identify and respond to security incidents.<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-1315870317{float:right;margin:10px;}<\/style><style>.additional-class-1315870317 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1315870317:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1315870317:after { content: '\\19d'; }.additional-class-1315870317:before {width: auto; visibility: inherit;}.additional-class-1315870317:after{display: inline-block;}<\/style><style>.additional-class-1315870317:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-1315870317:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-1315870317:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-1315870317:hover:before {width: auto; visibility: inherit;}.additional-class-1315870317:hover:before{display: inline-block;}<\/style><style>.additional-class-1315870317:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/penetration-testing\/\" class=\"btn btn-default  additional-class-1315870317  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n\r\n\t\r\n\t\t    <!--[column]-->\n        <div class=\"col-md-4 col-sm-6 bd-columnwrapper-1848847922\">\n            <div class=\"bd-column  bd-layoutcolumn-1848847922 \">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[image]--><style>\n.additional-class-2103753545{width:auto;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/computer-forensics.jpg\" alt=\"Computer Forensics\" class=\" additional-class-2103753545   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\r\n\t\r\n\t\t<!--[layoutbox]--><style>\n.additional-class-47881589{padding-right:2em;padding-left:2em;}<\/style><div class=\"clearfix  additional-class-47881589  bd-no-margins\"><div class=\"bd-container-inner\"><!--{content}--><!--[html]--><style><\/style><div class=\"bd-tagstyles  additional-class-2063853940 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h3><b>Computer Forensics<\/b><\/h3>\r\n<p>Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.<\/p><!--{\/content}--><\/div><\/div><!--[\/html]--><!--{\/content}--><\/div><\/div><!--[\/layoutbox]-->\r\n\t\r\n\t\t<!--[button]--><style>\n.additional-class-817289859{float:right;margin:10px;}<\/style><style>.additional-class-817289859 {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-817289859:after {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-817289859:after { content: '\\19d'; }.additional-class-817289859:before {width: auto; visibility: inherit;}.additional-class-817289859:after{display: inline-block;}<\/style><style>.additional-class-817289859:after {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><style>.additional-class-817289859:hover {\n                    text-decoration: inherit;\n\t                display: inline-block;\n\t                speak: none;\n\t            }\n\n                .additional-class-817289859:hover:before {\n                    font-family: 'Billion Web Font';\n\t                font-style: normal;\n\t                font-weight: normal;\n\t                text-decoration: inherit;\n\t                text-align: center;\n\t                text-transform: none;\n\t                width: 1em;\n                }.additional-class-817289859:hover:before {width: auto; visibility: inherit;}.additional-class-817289859:hover:before{display: inline-block;}<\/style><style>.additional-class-817289859:hover:before {\n        vertical-align: middle;\n        text-decoration: none;\n    }<\/style><a href=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/computer-forensics\/\" class=\"btn btn-default  additional-class-817289859  bd-no-margins bd-icon bd-own-margins bd-content-element\"><!--{content}-->\nRead More\n<!--{\/content}--><\/a><!--[\/button]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n                        <!--{\/content}-->\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/columns]-->\n\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":699,"parent":813,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/775"}],"collection":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/comments?post=775"}],"version-history":[{"count":0,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/775\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/813"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media\/699"}],"wp:attachment":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media?parent=775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}