{"id":14022,"date":"2026-02-25T16:52:56","date_gmt":"2026-02-25T14:52:56","guid":{"rendered":"https:\/\/www.inprosec.com\/?page_id=14022"},"modified":"2026-02-25T17:35:19","modified_gmt":"2026-02-25T15:35:19","slug":"governance-and-strategy","status":"publish","type":"page","link":"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/","title":{"rendered":"Governance and Strategy"},"content":{"rendered":"<section class=\"l-section wpb_row cabecera-interior height_medium color_primary with_img parallax_ver parallax_xpos_right\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1018\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-abstracto-azul.jpg);background-position: bottom right;\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><nav class=\"g-breadcrumbs us_custom_f4397b66 separator_custom align_left\" itemscope itemtype=\"http:\/\/schema.org\/BreadcrumbList\"><div class=\"g-breadcrumbs-item\">Pages<\/div><\/nav><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h1 style=\"text-align: left;\">Governance and Strategy<\/h1>\n<h2>Information Security Services<\/h2>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_f1f1dff3 menu-servicios has_text_color hide_on_mobiles height_auto type_sticky\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_eb849559\"><div class=\"wpb_wrapper\"><nav class=\"w-menu us_custom_ea2be81a layout_hor style_links us_menu_1\" style=\"--main-gap:2.5rem;--main-ver-indent:0.8em;--main-hor-indent:0.8em;--main-color:inherit;\"><ul id=\"menu-governance-and-strategy\" class=\"menu\"><li id=\"menu-item-14245\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14245\"><a href=\"#security-strategy\">SECURITY STRATEGY PLAN<\/a><\/li><li id=\"menu-item-14246\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14246\"><a href=\"#security-office\">SECURITY OFFICE<\/a><\/li><li id=\"menu-item-14247\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14247\"><a href=\"#ciso-service\">CISO AS A SERVICE<\/a><\/li><li id=\"menu-item-14248\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14248\"><a href=\"#vendor-risk\">VENDOR RISK MANAGEMENT<\/a><\/li><li id=\"menu-item-14249\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14249\"><a href=\"#it-risk\">IT RISK ASSESSMENT<\/a><\/li><li id=\"menu-item-14250\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14250\"><a href=\"#business-continuity\">BUSINESS CONTINUITY AND DISASTER RECOVERY<\/a><\/li><li id=\"menu-item-14251\" class=\"menu-item menu-item-type-custom menu-item-object-custom menu-item-14251\"><a href=\"#table-top\">TABLE-TOP EXERCISES<\/a><\/li><\/ul><style>@media ( max-width:600px ){.us_menu_1 .menu{display:block!important}.us_menu_1 .menu>li{margin:0 0 var(--main-gap,2.5rem)!important}}<\/style><\/nav><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_b03640aa height_auto\"><div class=\"l-section-overlay\" style=\"background:rgba(40,139,208,0.10)\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container  has_bg_color stretched\"><div class=\"vc_column-inner us_custom_d4bdde37 us_animate_this\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_23786b5e us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_large\"><\/div><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">We guide security towards effective and sustainable management<\/span><\/span><\/h2><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We help <strong>define and execute a security strategy aligned with your business goals.<\/strong> We provide governance, visibility, and control to manage security efficiently and sustainably.<\/p>\n<\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"security-strategy\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Security Strategy Plan<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We help you establish a strategic plan to guide your security investments. Each <strong>roadmap aligns with your risk profile, business goals and organisational context.<\/strong><\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"r8e2\"><button class=\"w-tabs-section-header\" aria-controls=\"content-r8e2\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-r8e2\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong>We design the Information Security strategy when it does not exist<\/strong>, risks are not prioritised, and security measures are implemented without a comprehensive or expert vision.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"sbb6\"><button class=\"w-tabs-section-header\" aria-controls=\"content-sbb6\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-sbb6\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We assess the level of maturity in information security, analyse risks and regulatory requirements, and define a <strong>strategic security plan with objectives, initiatives and priorities aligned with the business.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"qe98\"><button class=\"w-tabs-section-header\" aria-controls=\"content-qe98\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-qe98\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i>Definition of a clear, prioritised and <strong>actionable cybersecurity strategy.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Reduction of critical risks<\/strong> that impact business continuity.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Optimisation of the security budget<\/strong> based on actual risk.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Regulatory compliance<\/strong> and reinforcement of confidence in information protection.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_d6434207 height_large\" id=\"security-office\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default reversed stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-2-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-2-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-2-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-2-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-2.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Security Office<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We <strong>design and implement Security Offices that coordinate governance, operations and oversight<\/strong>. This structure improves efficiency, accountability and visibility across your organisation.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"g18e\"><button class=\"w-tabs-section-header\" aria-controls=\"content-g18e\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-g18e\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We assist companies in <strong>centralising and professionalising their information security management<\/strong> when there are no clear processes in place, there is a lack of internal resources, and security is managed reactively.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"g438\"><button class=\"w-tabs-section-header\" aria-controls=\"content-g438\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-g438\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We offer companies a<strong> team of specialists in various areas of information security to outsource their security operations.<\/strong><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"l717\"><button class=\"w-tabs-section-header\" aria-controls=\"content-l717\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-l717\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i><strong>Reduction of structural costs<\/strong> by outsourcing specialised security profiles.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Guarantee<\/strong> of <strong>business continuity<\/strong> through expert cybersecurity management.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Alignment<\/strong> of security with <strong>strategic business objectives.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"ciso-service\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">CISO As a Service<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We <strong>provide senior-level cybersecurity leadership on a flexible basis<\/strong>. You gain strategic vision, expertise and guidance without recruiting a full-time CISO.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"b33b\"><button class=\"w-tabs-section-header\" aria-controls=\"content-b33b\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-b33b\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We help companies <strong>access expert cybersecurity leadership<\/strong> when they do not have an in-house CISO, need to strengthen their security governance, or manage risks strategically.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"g5dd\"><button class=\"w-tabs-section-header\" aria-controls=\"content-g5dd\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-g5dd\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We provide an <strong>expert profile to define and\/or orchestrate the company&#8217;s Information Security<\/strong> strategy, overseeing risks, regulatory compliance and the implementation of technical controls.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"w8b1\"><button class=\"w-tabs-section-header\" aria-controls=\"content-w8b1\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-w8b1\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i>Access to <strong>senior cybersecurity expertise without structural staffing costs.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Improved <strong>security risk management and prioritisation.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Ensuring <strong>regulatory compliance<\/strong> in cybersecurity.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Development of a <strong>strategic security vision<\/strong> aligned with the business.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Increased resilience against cyber threats.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-3-1-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-3-1-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-3-1-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-3-1-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-3-1.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_d6434207 height_large\" id=\"vendor-risk\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default reversed stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-4-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-4-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-4-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-4-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-4.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Vendor Risk Management VRM<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We assess and<strong> monitor the cybersecurity posture<\/strong> of your suppliers and partners. Our approach <strong>reinforces supply chain security<\/strong> and <strong>reduces dependency-related risks.<\/strong><\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"t646\"><button class=\"w-tabs-section-header\" aria-controls=\"content-t646\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-t646\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><strong>We control cybersecurity risks<\/strong> arising from suppliers and third parties <strong>when there is no structured assessment,<\/strong> there is a lack of visibility, and the risks of information breaches increase.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"j8d0\"><button class=\"w-tabs-section-header\" aria-controls=\"content-j8d0\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-j8d0\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We design and implement a <strong>third-party risk management programme<\/strong> that includes supplier classification, security assessments, continuous monitoring, and information security compliance requirements.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"mba2\"><button class=\"w-tabs-section-header\" aria-controls=\"content-mba2\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-mba2\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i><strong>Reduction of cybersecurity risks<\/strong> in the supply chain and third parties.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Greater control over<\/strong> access, integrations and data shared with suppliers.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Regulatory compliance<\/strong> in terms of security and information protection.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Proactive prevention<\/strong> of incidents arising from third parties.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Strengthening <strong>trust<\/strong> in <strong>technology partners.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"it-risk\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">IT Risk Assessment<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p><strong>We identify, evaluate and prioritise technology risks across your environment.<\/strong> Our analysis supports informed decision-making and targeted risk mitigation.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"o777\"><button class=\"w-tabs-section-header\" aria-controls=\"content-o777\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-o777\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We help companies <strong>identify and prioritise their information security risks<\/strong> when there is no clear view of the threats, vulnerabilities and impacts on the business.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"ua05\"><button class=\"w-tabs-section-header\" aria-controls=\"content-ua05\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-ua05\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We perform cybersecurity <strong>risk analyses based on international standards<\/strong> such as ISO 27005, ISO 31000, NIST Risk Management Framework and methodologies aligned with ISO 27001, assessing assets, threats, impacts and treatment plans.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"sccb\"><button class=\"w-tabs-section-header\" aria-controls=\"content-sccb\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-sccb\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i>Real <strong>visibility of risks<\/strong> affecting information systems.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Decision-making based on business impact.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Exposure reduction.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Regulatory compliance.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Obtain a solid foundation for your <strong>cybersecurity strategy.<\/strong><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-5-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-5-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-5-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-5-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-5.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_d6434207 height_large\" id=\"business-continuity\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default reversed stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-6-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-6-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-6-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-6-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-6.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Business Continuity and Disaster Recovery<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We <strong>design robust continuity and recovery plans to sustain critical services and minimise downtime.<\/strong> Our solutions enable faster recovery and stronger resilience.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"ia81\"><button class=\"w-tabs-section-header\" aria-controls=\"content-ia81\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-ia81\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We help companies <strong>prepare for operational disruptions, cyber incidents, technological failures, or physical disasters<\/strong>\u2014situations that generate a high risk of financial losses, unavailability of critical services, and reputational impact.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"nd27\"><button class=\"w-tabs-section-header\" aria-controls=\"content-nd27\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-nd27\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We perform <strong>business impact analyses (BIA)<\/strong>, identify critical processes and technological dependencies, define continuity and recovery strategies, and <strong>develop business continuity plans (BCP)<\/strong> and<strong> disaster recovery plans (DRP)<\/strong> aligned with standards such as ISO 22301 and NIST 800-34.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"h014\"><button class=\"w-tabs-section-header\" aria-controls=\"content-h014\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-h014\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i><strong>Increased<\/strong> organisational <strong>preparedness for incidents and crises.<\/strong><\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Clear <strong>definition<\/strong> of <strong>recovery times <\/strong>and responsibilities.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>Structured <strong>capacity to respond and restore<\/strong> critical services.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Regulatory compliance<\/strong> and <strong>reduced<\/strong> operational and financial <strong>uncertainty<\/strong> in disruptive scenarios.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_33c3a0a5 height_large\" id=\"table-top\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><h2 class=\"w-text\"><span class=\"w-text-h\"><span class=\"w-text-value\">Table-Top Exercises<\/span><\/span><\/h2><div class=\"wpb_text_column acordeon\"><div class=\"wpb_wrapper\"><p>We facilitate <strong>interactive scenarios to evaluate how your teams respond to incidents<\/strong>. These exercises help refine roles, processes and decision-making under pressure.<\/p>\n<\/div><\/div><div class=\"w-tabs acordeon style_default switch_click accordion type_togglable has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"uc31\"><button class=\"w-tabs-section-header\" aria-controls=\"content-uc31\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">What do we solve?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-uc31\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We help companies <strong>validate their ability to respond to cyber incidents,<\/strong> operational crises, and business continuity scenarios when plans exist but have not been tested.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"jec4\"><button class=\"w-tabs-section-header\" aria-controls=\"content-jec4\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">How do we solve it?<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-jec4\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>We design and facilitate <strong>table-top exercises based on realistic scenarios of cyber attacks, critical disruptions and business crises<\/strong>, aligned with the organisation&#8217;s risks. We guide management, technical and business teams in decision-making, crisis communication and response plan activation, documenting gaps, lessons learned and improvement actions.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"u19e\"><button class=\"w-tabs-section-header\" aria-controls=\"content-u19e\" aria-expanded=\"false\"><h3 class=\"w-tabs-section-title\">Benefits<\/h3><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-u19e\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"g-cols wpb_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner us_custom_47474b22 us_animate_this\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul class=\"custom-checklist\">\n<li><i class=\"fas fa-check-square\"><\/i><strong>Practical validation<\/strong> of <strong>continuity and disaster<\/strong> recovery <strong>plans<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Identification<\/strong> of organisational and technical <strong>gaps<\/strong>.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i><strong>Improved decision-making<\/strong> and strengthened capacity to manage high-impact incidents.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-6 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-image us_custom_7e20fa79 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-7-1024x538.png\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-7-1024x538.png 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-7-300x158.png 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-7-600x315.png 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/GyE-7.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large color_primary\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Why choose Inprosec?<\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">people<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Multidisciplinary team<\/h4><div class=\"w-iconbox-text\"><p style=\"text-align: center;\">At Inprosec we have a multilingual team formed of various academic profiles (engineers, business analysts, auditors, \u2026) who perform their duties assuming the roles of consultants, auditors, project managers, etc.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">signal_cellular_alt<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Continuous improvement<\/h4><div class=\"w-iconbox-text\"><p style=\"text-align: center;\">In a world that is constantly changing, it is fundamental learn and improve to adapt and offer services aligned with the needs of Customers.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-4 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-iconbox acordeon iconpos_top style_default color_secondary align_center\"><div class=\"w-iconbox-icon\" style=\"font-size:90px;\"><i class=\"material-icons\">add_task<\/i><\/div><div class=\"w-iconbox-meta\"><h4 class=\"w-iconbox-title\">Value proposition<\/h4><div class=\"w-iconbox-text\"><ul style=\"text-align: left;\">\n<li><i class=\"fas fa-check-square\"><\/i>We are not incompatible with audits.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We are independent. We are Consultants.<\/li>\n<li><i class=\"fas fa-check-square\"><\/i>We do not compete in markets that are unfamiliar to us.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<section class=\"l-section wpb_row height_large\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 class=\"titular\" style=\"text-align: center;\"><span class=\"fina\">Do you want to learn about <\/span>Governance and Strategy<span class=\"fina\">?<\/span><\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-grid type_grid layout_5303 cols_3 overflow_hidden with_css_animation\" id=\"us_grid_1\" style=\"--gap:0.5rem;\" data-filterable=\"true\"><style>@media (max-width:1024px){#us_grid_1 .w-grid-item{width:50%}}@media (max-width:600px){#us_grid_1 .w-grid-list{margin:0}#us_grid_1 .w-grid-item{width:100%;padding:0;margin-bottom:var(--gap,0px)}}.layout_5303 .w-grid-item-h{background:var(--color-header-middle-bg);color:var(--color-content-text);box-shadow:0 0rem 0rem rgba(0,0,0,0.1),0 0rem 0rem rgba(0,0,0,0.1);transition-duration:0.3s}.no-touch .layout_5303 .w-grid-item-h:hover{box-shadow:0 0.1rem 0.2rem rgba(0,0,0,0.1),0 0.33rem 1rem rgba(0,0,0,0.15);z-index:4}.layout_5303 .usg_post_title_1{font-size:1.4rem!important;font-weight:700!important}.layout_5303 .usg_vwrapper_1{padding:9% 11% 11% 11%!important}.layout_5303 .usg_post_taxonomy_1{font-weight:700!important;text-transform:uppercase!important;font-size:10px!important;position:absolute!important;top:1.2rem!important;right:1.2rem!important;left:1.2rem!important}.layout_5303 .usg_hwrapper_1{color:var(--color-content-faded)!important;font-size:0.9rem!important}@media (max-width:600px){.layout_5303 .usg_post_title_1{font-size:1.2rem!important}}<\/style><div class=\"w-grid-list\">\t<article class=\"w-grid-item us_animate_fade size_1x1 post-14262 post type-post status-publish format-standard has-post-thumbnail hentry category-information-security category-technical-article\" data-id=\"14262\" style=\"animation-delay:0s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/the-supply-chain-the-true-attack-vector-in-cybersecurity\/\" aria-label=\"The Supply Chain: The True Attack Vector in Cybersecurity\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2026\/02\/2-1.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/the-supply-chain-the-true-attack-vector-in-cybersecurity\/\">The Supply Chain: The True Attack Vector in Cybersecurity<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2026-02-18T11:05:51+02:00\" title=\"18 February 2026 at 11:05:51 +02:00\">18 Feb at 11:05 am<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/the-supply-chain-the-true-attack-vector-in-cybersecurity\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In the cybersecurity ecosystem, we tend to focus our efforts on development security. We invest significant resources in auditing proprietary&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item us_animate_fade size_1x1 post-13761 post type-post status-publish format-standard has-post-thumbnail hentry category-information-security category-technical-article\" data-id=\"13761\" style=\"animation-delay:0.1s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/strategy-for-preventing-information-leaks-in-microsoft-environments\/\" aria-label=\"Strategy for Preventing Information Leaks in Microsoft Environments\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2025\/11\/2-2.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/strategy-for-preventing-information-leaks-in-microsoft-environments\/\">Strategy for Preventing Information Leaks in Microsoft Environments<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2025-11-20T11:54:10+02:00\" title=\"20 November 2025 at 11:54:10 +02:00\">November 20, 2025<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/strategy-for-preventing-information-leaks-in-microsoft-environments\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">In many organizations, the plan to prevent data leaks can be summarized as \u201clet\u2019s implement a DLP.\u201d Solutions such as&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item us_animate_fade size_1x1 post-11939 post type-post status-publish format-standard has-post-thumbnail hentry category-information-security category-technical-article\" data-id=\"11939\" style=\"animation-delay:0.2s\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 stretched\"><a href=\"https:\/\/www.inprosec.com\/en\/how-to-implement-amendment-12024-to-iso-iec-270012022\/\" aria-label=\"HOW TO IMPLEMENT AMENDMENT 1:2024 TO ISO\/IEC 27001:2022?\"><img decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022-1024x538.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022-600x315.jpg 600w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2024\/07\/enmienda-1-2024-a-ISO-IEC-27001-2022.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/div><div class=\"w-post-elm post_taxonomy usg_post_taxonomy_1 style_badge color_link_inherit\"><div class=\"w-post-elm-list\"><a class=\"w-btn us-btn-style_badge term-97 term-information-security\" href=\"https:\/\/www.inprosec.com\/en\/category\/information-security\/\"><span class=\"w-btn-label\">Information Security<\/span><\/a><a class=\"w-btn us-btn-style_badge term-52 term-technical-article\" href=\"https:\/\/www.inprosec.com\/en\/category\/technical-article\/\"><span class=\"w-btn-label\">Technical Article<\/span><\/a><\/div><\/div><div class=\"w-vwrapper usg_vwrapper_1 align_left valign_top\"><h2 class=\"w-post-elm post_title usg_post_title_1 entry-title color_link_inherit\"><a href=\"https:\/\/www.inprosec.com\/en\/how-to-implement-amendment-12024-to-iso-iec-270012022\/\">HOW TO IMPLEMENT AMENDMENT 1:2024 TO ISO\/IEC 27001:2022?<\/a><\/h2><div class=\"w-hwrapper usg_hwrapper_1 has_text_color align_left valign_top wrap\"><time class=\"w-post-elm post_date usg_post_date_1 entry-date published\" datetime=\"2024-07-31T09:12:27+02:00\" title=\"31 July 2024 at 09:12:27 +02:00\">July 31, 2024<\/time><div class=\"w-post-elm post_comments usg_post_comments_1 layout_amount color_link_inherit\"><i class=\"material-icons\">question_answer<\/i><a href=\"https:\/\/www.inprosec.com\/en\/how-to-implement-amendment-12024-to-iso-iec-270012022\/#respond\" class=\"smooth-scroll\">0<\/a><\/div><\/div><div class=\"w-post-elm post_content usg_post_content_1\">The new amendment affecting the ISO\/IEC 27001:2022 AMD 1:2024 standard is auditable from May 2024 and marks a significant evolution&hellip;<\/div><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div><div class=\"w-grid-preloader\">\t<div class=\"g-preloader type_1\">\r\n\t\t<div><\/div>\r\n\t<\/div>\r\n\t<\/div>\t<div class=\"w-grid-json hidden\" onclick='return {&quot;action&quot;:&quot;us_ajax_grid&quot;,&quot;infinite_scroll&quot;:0,&quot;max_num_pages&quot;:3,&quot;pagination&quot;:&quot;none&quot;,&quot;template_vars&quot;:{&quot;columns&quot;:&quot;3&quot;,&quot;exclude_items&quot;:&quot;none&quot;,&quot;img_size&quot;:&quot;default&quot;,&quot;ignore_items_size&quot;:0,&quot;items_layout&quot;:&quot;5303&quot;,&quot;items_offset&quot;:&quot;1&quot;,&quot;load_animation&quot;:&quot;fade&quot;,&quot;overriding_link&quot;:&quot;%7B%22url%22%3A%22%22%7D&quot;,&quot;post_id&quot;:0,&quot;query_args&quot;:{&quot;post_type&quot;:[&quot;post&quot;],&quot;tax_query&quot;:[{&quot;taxonomy&quot;:&quot;category&quot;,&quot;field&quot;:&quot;slug&quot;,&quot;terms&quot;:[&quot;information-security&quot;]}],&quot;post_status&quot;:[&quot;publish&quot;,&quot;acf-disabled&quot;],&quot;posts_per_page&quot;:&quot;3&quot;},&quot;orderby_query_args&quot;:{&quot;orderby&quot;:{&quot;date&quot;:&quot;DESC&quot;}},&quot;type&quot;:&quot;grid&quot;,&quot;us_grid_ajax_index&quot;:1,&quot;us_grid_filter_params&quot;:[],&quot;us_grid_index&quot;:1,&quot;_us_grid_post_type&quot;:&quot;post&quot;,&quot;page_args&quot;:[],&quot;lang&quot;:&quot;en&quot;}}'><\/div>\r\n\t<\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_large with_img parallax_ver\"><div class=\"l-section-img\" role=\"img\" data-img-width=\"1893\" data-img-height=\"1265\" style=\"background-image: url(https:\/\/www.inprosec.com\/wp-content\/uploads\/2022\/02\/fondo-ordenador-composicion.jpg);\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_middle type_default stacking_default\"><div class=\"vc_col-sm-9 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Can we help with Governance and Strategy?<\/h2>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_col-sm-3 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-btn-wrapper default_align_none laptops_align_none tablets_align_none mobiles_align_center\"><a class=\"w-btn us-btn-style_1\" title=\"Contact\" href=\"http:\/\/inprosec.com\/contacto\/\"><span class=\"w-btn-label\">Contact with us<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"The new amendment affecting the ISO\/IEC 27001:2022 AMD 1:2024 standard is auditable from May 2024 and marks a significant evolution in integrating sustainability alongside organizational security. This amendment was published by the International Organization for Standardization (ISO) on February 23, 2024, affecting sections 4.1 Understanding the organization and its context and 4.2 Understanding the needs...","protected":false},"author":6,"featured_media":0,"parent":14160,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-14022","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Governance and Strategy | Inprosec, information security<\/title>\n<meta name=\"description\" content=\"Define your cybersecurity strategy with robust governance plans and expert leadership (CISO as a Service), advanced IT risk management, business continuity, and supplier oversight to ensure regulatory compliance and reduce critical threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Governance and Strategy\" \/>\n<meta property=\"og:description\" content=\"Define your cybersecurity strategy with robust governance plans and expert leadership (CISO as a Service), advanced IT risk management, business continuity, and supplier oversight to ensure regulatory compliance and reduce critical threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T15:35:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/governance-and-strategy\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/governance-and-strategy\\\/\",\"name\":\"Governance and Strategy | Inprosec, information security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"datePublished\":\"2026-02-25T14:52:56+00:00\",\"dateModified\":\"2026-02-25T15:35:19+00:00\",\"description\":\"Define your cybersecurity strategy with robust governance plans and expert leadership (CISO as a Service), advanced IT risk management, business continuity, and supplier oversight to ensure regulatory compliance and reduce critical threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/governance-and-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/governance-and-strategy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/governance-and-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/servicios\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/services\\\/information-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Governance and Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Governance and Strategy | Inprosec, information security","description":"Define your cybersecurity strategy with robust governance plans and expert leadership (CISO as a Service), advanced IT risk management, business continuity, and supplier oversight to ensure regulatory compliance and reduce critical threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Governance and Strategy","og_description":"Define your cybersecurity strategy with robust governance plans and expert leadership (CISO as a Service), advanced IT risk management, business continuity, and supplier oversight to ensure regulatory compliance and reduce critical threats.","og_url":"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/","og_site_name":"Inprosec","article_modified_time":"2026-02-25T15:35:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/","url":"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/","name":"Governance and Strategy | Inprosec, information security","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"datePublished":"2026-02-25T14:52:56+00:00","dateModified":"2026-02-25T15:35:19+00:00","description":"Define your cybersecurity strategy with robust governance plans and expert leadership (CISO as a Service), advanced IT risk management, business continuity, and supplier oversight to ensure regulatory compliance and reduce critical threats.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/services\/information-security\/governance-and-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.inprosec.com\/en\/servicios\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.inprosec.com\/en\/services\/information-security\/"},{"@type":"ListItem","position":4,"name":"Governance and Strategy"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=14022"}],"version-history":[{"count":6,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14022\/revisions"}],"predecessor-version":[{"id":14307,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14022\/revisions\/14307"}],"up":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/pages\/14160"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=14022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}