{"id":1709,"date":"2025-03-26T19:49:03","date_gmt":"2025-03-26T16:49:03","guid":{"rendered":"https:\/\/cbernet.com\/asset-risk-management-solutions\/"},"modified":"2025-04-10T19:24:56","modified_gmt":"2025-04-10T16:24:56","slug":"asset-risk-management-solutions","status":"publish","type":"page","link":"https:\/\/cbernet.com\/en\/asset-risk-management-solutions\/","title":{"rendered":"Asset &amp; Risk Management Solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1709\" class=\"elementor elementor-1709 elementor-644\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50fe2c8 e-con-full e-flex e-con e-parent\" data-id=\"50fe2c8\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f2d95ef elementor-widget elementor-widget-heading\" data-id=\"f2d95ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Asset &amp; Risk Management Solutions<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c854c75 e-con-full e-flex e-con e-parent\" data-id=\"c854c75\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5b541b5 e-con-full e-flex e-con e-child\" data-id=\"5b541b5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b8ad0e5 elementor-widget elementor-widget-text-editor\" data-id=\"b8ad0e5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity means not only preventing attacks, but also managing assets correctly and creating a strategic line of defense by identifying potential risks in advance. Today, companies use hundreds of different systems, devices and software in their IT and OT infrastructure. However, if it is not known where these assets are located, how they are used and by whom, and what vulnerabilities they have, they become vulnerable to cyber threats.<\/p><p>As CBERNET, we offer comprehensive solutions that enable organizations to properly manage their digital assets and minimize cyber risks. We analyze the security status of your IT and OT systems, identify critical assets and implement risk assessment processes against potential threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d7b67b elementor-widget elementor-widget-heading\" data-id=\"3d7b67b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Identify Cyber Risks in Advance and Build a Strong Security Strategy<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9c55cd elementor-widget elementor-widget-text-editor\" data-id=\"e9c55cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The majority of cyber-attacks are caused by unknown or overlooked vulnerabilities in systems. We safeguard your business&#8217;s digital assets through comprehensive asset management and an effective risk assessment process.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9874e3 elementor-widget elementor-widget-heading\" data-id=\"c9874e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Asset &amp; Risk Management Solutions<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebedbf9 elementor-widget elementor-widget-etheme_timeline\" data-id=\"ebedbf9\" data-element_type=\"widget\" data-widget_type=\"etheme_timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        \n        <div class=\"etheme-timeline-wrapper\" data-layout=\"left\" data-step-position=\"top\" data-item-animation=\"auto\">\n            \n            <div class=\"etheme-timeline-connector\">\n                <div class=\"etheme-timeline-connector-inner\"><\/div>\n            <\/div>\n\n            <div class=\"etheme-timeline-items\">\n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-60b5edf\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Digital Asset Inventory and Discovery Solutions                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        We inventory all your IT and OT systems and identify critical assets, devices and software used.                                    <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-040cedb\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Cyber Risk Assessment and Vulnerability Management                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        We create a cyber risk map of your organization, analyze existing security vulnerabilities and identify the points where attackers can target the most.                                    <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-d337b21\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Asset Management for Critical Infrastructure                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        We increase operational security by ensuring the correct management of OT systems used in the energy, production and critical infrastructure sectors.                                    <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-7b80521\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Threat Modeling and Attack Scenarios                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        By modeling the possible threats your company may face, we predict how attackers may act and strengthen defense mechanisms accordingly.                                    <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-11f07f6\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Regulatory and Compliance Solutions                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        We ensure that your business is ready for security audits by offering asset and risk management solutions that comply with standards such as ISO 27001, IEC 62443, NIST and EMRA.                                    <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                    \n                    <div class=\"etheme-timeline-item elementor-repeater-item-f1e3c8d\">\n                        \n                        <span class=\"etheme-timeline-step etheme-timeline-dot\"><\/span>\t\n\t                        \n                        <div class=\"etheme-timeline-content\">\n                            \n                                                        \n                            <div class=\"etheme-timeline-content-inner\">\n\t\n\t                                                                <h3 class=\"etheme-timeline-title\">\n                                        Risk Mitigation and Incident Response Strategies                                    <\/h3>\n                                                                    <div class=\"etheme-timeline-description\">\n                                        We develop proactive risk mitigation and incident response plans to ensure the most effective response to potential cyber threats.                                    <\/div>\n                                                        \n                            <\/div>\n                        \n                        <\/div>\n                        \n                    <\/div>\n                    \n                                \n            <\/div>\n\n                        \n        <\/div>\n        \n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0b25da e-con-full e-flex e-con e-child\" data-id=\"f0b25da\" data-element_type=\"container\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;sticky_offset&quot;:0,&quot;sticky_effects_offset&quot;:0,&quot;sticky_anchor_link_offset&quot;:0}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-07888c3 elementor-widget elementor-widget-image\" data-id=\"07888c3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"700\" src=\"https:\/\/cbernet.com\/wp-content\/uploads\/xstore\/xstore-placeholder-1024x1024.png\" class=\"attachment-large size-large wp-image-1593 lazyload lazyload-simple et-lazyload-fadeIn\" alt=\"\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-src=\"https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-varlik-risk-yonetimi-02.jpg\" data-srcset=\"https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-varlik-risk-yonetimi-02.jpg 1000w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-varlik-risk-yonetimi-02-300x210.jpg 300w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-varlik-risk-yonetimi-02-768x538.jpg 768w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-varlik-risk-yonetimi-02-1x1.jpg 1w, https:\/\/cbernet.com\/wp-content\/uploads\/2025\/03\/cozumler-varlik-risk-yonetimi-02-10x7.jpg 10w\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e21a53 elementor-widget elementor-widget-heading\" data-id=\"6e21a53\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Our Solutions<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce1c628 elementor-widget elementor-widget-etheme_static_block\" data-id=\"ce1c628\" data-element_type=\"widget\" data-widget_type=\"etheme_static_block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t    <div class=\"etheme-static_block-wrapper\">\n\t            <div class=\"et-no-preview\"><h3>8theme - Static Block<\/h3><p>No preview available.<\/p><\/div><style>\n                .et-no-preview{\n                    font-size: 13px;\n                    background: #f0f0f0;\n                    padding: 8px 12px;\n                    color: #000;\n                    font-family: -apple-system,BlinkMacSystemFont,Segoe UI,Roboto,Oxygen-Sans,Ubuntu,Cantarell,Helvetica Neue,sans-serif;\n                }\n                .et-no-preview h3 {\n                    font-size: 14px;\n                    font-family: inherit;\n                    font-weight: 600;\n                    margin: 4px 0;\n                }\n                .et-no-preview p {\n                    margin: 4px 0;\n                    font-size: 13px;\n                }\n            <\/style>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9c7482 e-con-full e-flex e-con e-parent\" data-id=\"c9c7482\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ba7c13a e-con-full e-flex e-con e-child\" data-id=\"ba7c13a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b6c9ff8 e-con-full e-flex e-con e-child\" data-id=\"b6c9ff8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8cb0b50 elementor-widget elementor-widget-heading\" data-id=\"8cb0b50\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sustainable<br>For your safety<br><strong>Contact<\/strong> us<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-583a26c e-con-full e-flex e-con e-child\" data-id=\"583a26c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d1ff6b etheme-contact-form-7-button-custom elementor-widget elementor-widget-et-contact-form-7\" data-id=\"8d1ff6b\" data-element_type=\"widget\" data-widget_type=\"et-contact-form-7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t                <div class=\"pp-contact-form etheme-contact-form-7 placeholder-show\">\n                                        \n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1676-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"1676\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/1709#wpcf7-f1676-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"1676\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.4\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1676-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Name &amp; Surname\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Email Address\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"phone-number\"><input size=\"40\" maxlength=\"400\" minlength=\"3\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your Phone Number\" value=\"\" type=\"tel\" name=\"phone-number\" \/><\/span><\/label>\n<\/p>\n<p><label><br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea\" aria-invalid=\"false\" placeholder=\"Your message\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Send\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n                <\/div>\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-215d0be e-con-full e-flex e-con e-child\" data-id=\"215d0be\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f59828b e-con-full e-flex e-con e-child\" data-id=\"f59828b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3ab53fd elementor-icon-list--layout-inline elementor-align-left elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"3ab53fd\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+90%20312%20285%2026%2076%20\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-phone\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M493.4 24.6l-104-24c-11.3-2.6-22.9 3.3-27.5 13.9l-48 112c-4.2 9.8-1.4 21.3 6.9 28l60.6 49.6c-36 76.7-98.9 140.5-177.2 177.2l-49.6-60.6c-6.8-8.3-18.2-11.1-28-6.9l-112 48C3.9 366.5-2 378.1.6 389.4l24 104C27.1 504.2 36.7 512 48 512c256.1 0 464-207.5 464-464 0-11.2-7.7-20.9-18.6-23.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">+90 312 285 26 76  <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ddd9fc e-con-full e-flex e-con e-child\" data-id=\"2ddd9fc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0934283 elementor-icon-list--layout-inline elementor-align-left elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0934283\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:info@cbernet.com\" target=\"_blank\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 64H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V112c0-26.51-21.49-48-48-48zm0 48v40.805c-22.422 18.259-58.168 46.651-134.587 106.49-16.841 13.247-50.201 45.072-73.413 44.701-23.208.375-56.579-31.459-73.413-44.701C106.18 199.465 70.425 171.067 48 152.805V112h416zM48 400V214.398c22.914 18.251 55.409 43.862 104.938 82.646 21.857 17.205 60.134 55.186 103.062 54.955 42.717.231 80.509-37.199 103.053-54.947 49.528-38.783 82.032-64.401 104.947-82.653V400H48z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">info@cbernet.com<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cc3eefd e-con-full e-flex e-con e-child\" data-id=\"cc3eefd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e9c27b elementor-icon-list--layout-inline elementor-align-right elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"1e9c27b\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-map-pin\" viewBox=\"0 0 288 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M112 316.94v156.69l22.02 33.02c4.75 7.12 15.22 7.12 19.97 0L176 473.63V316.94c-10.39 1.92-21.06 3.06-32 3.06s-21.61-1.14-32-3.06zM144 0C64.47 0 0 64.47 0 144s64.47 144 144 144 144-64.47 144-144S223.53 0 144 0zm0 76c-37.5 0-68 30.5-68 68 0 6.62-5.38 12-12 12s-12-5.38-12-12c0-50.73 41.28-92 92-92 6.62 0 12 5.38 12 12s-5.38 12-12 12z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">K\u0131z\u0131l\u0131rmak Mahallesi 1443.Cadde No:9 Ulusoy Plaza Kat:2 Daire:6 \u00c7ankaya \/ Ankara TURKEY<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Asset &amp; Risk Management Solutions Cybersecurity means not only preventing attacks, but also managing assets correctly and creating a strategic line of defense by identifying<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1709","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/comments?post=1709"}],"version-history":[{"count":1,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1709\/revisions"}],"predecessor-version":[{"id":1710,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1709\/revisions\/1710"}],"wp:attachment":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/media?parent=1709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}