{"id":1691,"date":"2025-03-25T19:43:56","date_gmt":"2025-03-25T16:43:56","guid":{"rendered":"https:\/\/cbernet.com\/consulting-services-cbernet\/"},"modified":"2025-04-10T19:08:08","modified_gmt":"2025-04-10T16:08:08","slug":"consulting-services-cbernet","status":"publish","type":"page","link":"https:\/\/cbernet.com\/en\/consulting-services-cbernet\/","title":{"rendered":"Consulting Services | CBERNET"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1691\" class=\"elementor elementor-1691 elementor-527\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd7deb5 e-con-full e-flex e-con e-parent\" data-id=\"cd7deb5\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ea4ebd elementor-widget elementor-widget-heading\" data-id=\"6ea4ebd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Consulting Services <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67888ee e-con-full e-flex e-con e-parent\" data-id=\"67888ee\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e4e70d7 e-con-full e-flex e-con e-child\" data-id=\"e4e70d7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-30e26b6 elementor-widget elementor-widget-text-editor\" data-id=\"30e26b6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is not just a technology investment, but a strategic necessity that protects business continuity and reputation. Strong security policies not only prevent attacks, but also help your business comply with regulations, identify risks in advance and sustain security processes.<\/p><p>As CBERNET, we offer comprehensive consultancy services to secure IT and OT systems, increase regulatory compliance and minimize cyber risks. We develop customized solutions for sectors such as energy, production, finance, health and critical infrastructures, and create a cyber security roadmap tailored to your organization.<\/p><p><strong>Turn Your Cyber Security into Strategic Advantage with CBERNET<\/strong><\/p><p>Every organization has different cyber security needs. Instead of one-size-fits-all solutions, we prepare you for the threats of the future by developing strategies tailored to the structure of your business and industry requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c42f822 elementor-widget elementor-widget-n-accordion\" data-id=\"c42f822\" data-element_type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2050\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2050\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Regulatory and Compliance Consulting <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2050\" class=\"elementor-element elementor-element-e862803 e-con-full e-flex e-con e-child\" data-id=\"e862803\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2050\" class=\"elementor-element elementor-element-10b3d87 e-flex e-con-boxed e-con e-child\" data-id=\"10b3d87\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40308b7 elementor-widget elementor-widget-text-editor\" data-id=\"40308b7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We offer customized solutions for your organization to ensure full compliance with standards and regulations such as EMRA in the energy sector, IEC 62443 in industrial systems, ISO 27001 in corporate IT infrastructures and KVKK. We evaluate your existing security policies, identify your shortcomings and create a regulatory compliant security framework.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2051\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2051\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> IT &amp; OT Security Consulting <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2051\" class=\"elementor-element elementor-element-ea6cdf7 e-con-full e-flex e-con e-child\" data-id=\"ea6cdf7\" data-element_type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2051\" class=\"elementor-element elementor-element-7d7015a e-flex e-con-boxed e-con e-child\" data-id=\"7d7015a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-728b21c elementor-widget elementor-widget-text-editor\" data-id=\"728b21c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber attacks now target not only IT systems but also operational technology (OT) environments. We provide specialized consulting services with our team of experts to enhance the security of your SCADA, DCS, PLC and other industrial control systems. We provide guidance on critical issues such as network segmentation, access control, industrial cyber threat management and incident response planning.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2052\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2052\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Risk Management and Threat Modeling <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2052\" class=\"elementor-element elementor-element-4756029 e-flex e-con-boxed e-con e-child\" data-id=\"4756029\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2052\" class=\"elementor-element elementor-element-a389c12 e-con-full e-flex e-con e-child\" data-id=\"a389c12\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9c13bef elementor-widget elementor-widget-text-editor\" data-id=\"9c13bef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Before the attacks take place, we analyze the cyber threats your organization may face and minimize potential risks. We create threat scenarios specific to your organization, identify the weakest points of your systems and develop proactive security measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2053\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2053\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Cyber Incident Response and Crisis Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2053\" class=\"elementor-element elementor-element-eac06da e-flex e-con-boxed e-con e-child\" data-id=\"eac06da\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2053\" class=\"elementor-element elementor-element-ee3fe53 e-con-full e-flex e-con e-child\" data-id=\"ee3fe53\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ea3011 elementor-widget elementor-widget-text-editor\" data-id=\"8ea3011\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>How prepared are you for cyber incidents? It is vital to determine in advance what you will do, how you will react and how you will protect your business continuity when an attack occurs. We prepare cyber incident response plans, optimize your crisis management processes and develop the fastest response methods against possible attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2054\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2054\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Establishment and Implementation of Security Policies <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"et-icon et-right-arrow\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"et-icon et-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2054\" class=\"elementor-element elementor-element-38ec60b e-flex e-con-boxed e-con e-child\" data-id=\"38ec60b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2054\" class=\"elementor-element elementor-element-dd94aad e-con-full e-flex e-con e-child\" data-id=\"dd94aad\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2d3320 elementor-widget elementor-widget-text-editor\" data-id=\"e2d3320\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security is not just about technical measures. The right policies need to be established and implemented by all employees. We develop security policies and manage implementation processes specific to your company in areas such as authorization strategies, access management, data protection, cyber hygiene rules and security awareness programs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b29f35d elementor-widget elementor-widget-text-editor\" data-id=\"b29f35d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Prepare for the Future with CBERNET<\/strong><\/p><p>Cybersecurity requires being ready not only for today&#8217;s threats but also for future risks. CBERNET consulting services offer an approach that not only identifies problems, but also prepares your business for the future.<\/p><p>Contact us to create a customized cybersecurity strategy for your organization, increase your compliance with regulations and minimize risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7577bc1 e-con-full e-flex e-con e-child\" data-id=\"7577bc1\" data-element_type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c8da1d elementor-widget elementor-widget-image\" data-id=\"2c8da1d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"700\" src=\"https:\/\/cbernet.com\/wp-content\/uploads\/xstore\/xstore-placeholder-1024x1024.png\" class=\"attachment-large size-large wp-image-1581 lazyload lazyload-simple et-lazyload-fadeIn\" alt=\"\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-src=\"https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-danismanlik-02.jpg\" data-srcset=\"https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-danismanlik-02.jpg 1000w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-danismanlik-02-300x210.jpg 300w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-danismanlik-02-768x538.jpg 768w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-danismanlik-02-1x1.jpg 1w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/hizmet-danismanlik-02-10x7.jpg 10w\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b361c0 elementor-widget elementor-widget-heading\" data-id=\"5b361c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our Services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c2b131 elementor-widget elementor-widget-etheme_static_block\" data-id=\"4c2b131\" data-element_type=\"widget\" data-widget_type=\"etheme_static_block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t    <div class=\"etheme-static_block-wrapper\">\n\t            <div class=\"et-no-preview\"><h3>8theme - Static Block<\/h3><p>No preview available.<\/p><\/div><style>\n                .et-no-preview{\n                    font-size: 13px;\n                    background: #f0f0f0;\n                    padding: 8px 12px;\n                    color: #000;\n                    font-family: -apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;\n                }\n                .et-no-preview h3 {\n                    font-size: 14px;\n                    font-family: inherit;\n                    font-weight: 600;\n                    margin: 4px 0;\n                }\n                .et-no-preview p {\n                    margin: 4px 0;\n                    font-size: 13px;\n                }\n            <\/style>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-875a931 e-con-full e-flex e-con e-parent\" data-id=\"875a931\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-fc627f8 e-con-full e-flex e-con e-child\" data-id=\"fc627f8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cce6fb6 e-con-full e-flex e-con e-child\" data-id=\"cce6fb6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-640786a elementor-widget elementor-widget-heading\" data-id=\"640786a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sustainable<br>For your safety<br><strong>Contact<\/strong> us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5ed42d e-con-full e-flex e-con e-child\" data-id=\"c5ed42d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96fce06 etheme-contact-form-7-button-custom elementor-widget elementor-widget-et-contact-form-7\" data-id=\"96fce06\" data-element_type=\"widget\" data-widget_type=\"et-contact-form-7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t                <div class=\"pp-contact-form etheme-contact-form-7 placeholder-show\">\n                                        \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1676-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1676\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/1691#wpcf7-f1676-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1676\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1676-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Name &amp; Surname\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Email Address\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"phone-number\"><input size=\"40\" maxlength=\"400\" minlength=\"3\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Phone Number\" value=\"\" type=\"tel\" name=\"phone-number\" \/><\/span><\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Your message\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n                <\/div>\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-269f0ee e-con-full e-flex e-con e-child\" data-id=\"269f0ee\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3c73491 e-con-full e-flex e-con e-child\" data-id=\"3c73491\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a55f3b7 elementor-icon-list--layout-inline elementor-align-left elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a55f3b7\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+90%20312%20285%2026%2076%20\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-phone\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M493.4 24.6l-104-24c-11.3-2.6-22.9 3.3-27.5 13.9l-48 112c-4.2 9.8-1.4 21.3 6.9 28l60.6 49.6c-36 76.7-98.9 140.5-177.2 177.2l-49.6-60.6c-6.8-8.3-18.2-11.1-28-6.9l-112 48C3.9 366.5-2 378.1.6 389.4l24 104C27.1 504.2 36.7 512 48 512c256.1 0 464-207.5 464-464 0-11.2-7.7-20.9-18.6-23.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+90 312 285 26 76  <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b2de1e e-con-full e-flex e-con e-child\" data-id=\"6b2de1e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76e2017 elementor-icon-list--layout-inline elementor-align-left elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"76e2017\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:info@cbernet.com\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 64H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V112c0-26.51-21.49-48-48-48zm0 48v40.805c-22.422 18.259-58.168 46.651-134.587 106.49-16.841 13.247-50.201 45.072-73.413 44.701-23.208.375-56.579-31.459-73.413-44.701C106.18 199.465 70.425 171.067 48 152.805V112h416zM48 400V214.398c22.914 18.251 55.409 43.862 104.938 82.646 21.857 17.205 60.134 55.186 103.062 54.955 42.717.231 80.509-37.199 103.053-54.947 49.528-38.783 82.032-64.401 104.947-82.653V400H48z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">info@cbernet.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a2b966 e-con-full e-flex e-con e-child\" data-id=\"2a2b966\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f12a535 elementor-icon-list--layout-inline elementor-align-right elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f12a535\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-map-pin\" viewBox=\"0 0 288 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M112 316.94v156.69l22.02 33.02c4.75 7.12 15.22 7.12 19.97 0L176 473.63V316.94c-10.39 1.92-21.06 3.06-32 3.06s-21.61-1.14-32-3.06zM144 0C64.47 0 0 64.47 0 144s64.47 144 144 144 144-64.47 144-144S223.53 0 144 0zm0 76c-37.5 0-68 30.5-68 68 0 6.62-5.38 12-12 12s-12-5.38-12-12c0-50.73 41.28-92 92-92 6.62 0 12 5.38 12 12s-5.38 12-12 12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">K\u0131z\u0131l\u0131rmak Mahallesi 1443.Cadde No:9 Ulusoy Plaza Kat:2 Daire:6 \u00c7ankaya \/ Ankara TURKEY<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Consulting Services Cybersecurity is not just a technology investment, but a strategic necessity that protects business continuity and reputation. Strong security policies not only prevent<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1691","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/comments?post=1691"}],"version-history":[{"count":1,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1691\/revisions"}],"predecessor-version":[{"id":1692,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1691\/revisions\/1692"}],"wp:attachment":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/media?parent=1691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}