{"id":2685,"date":"2023-09-11T13:04:53","date_gmt":"2023-09-11T11:04:53","guid":{"rendered":"https:\/\/www.hwgsababa.com\/?page_id=2685"},"modified":"2025-09-12T13:55:40","modified_gmt":"2025-09-12T11:55:40","slug":"industrial-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.hwgsababa.com\/en\/industrial-cybersecurity\/","title":{"rendered":"Industrial cybersecurity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;bg_header&#8221; css=&#8221;.vc_custom_1693552613518{background-image: url(https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/09\/INDUSTRIAL.png?id=1681) !important;}&#8221;][vc_column]<style>.vcex-breadcrumbs.vcex_69e7043b70abf{--vcex-breadcrumbs-sep-color:#000000;color:#000000;font-family:Archivo;font-size:18px;line-height:36px;}<\/style><nav class=\"vcex-breadcrumbs vcex-breadcrumbs--links-inherit-color vcex-breadcrumbs--custom-color div_top vcex_69e7043b70abf\"><nav aria-label=\"breadcrumbs\" class=\"rank-math-breadcrumb\"><p><span class=\"last\">Home<\/span><\/p><\/nav><\/nav>[vc_column_text text_align=&#8221;center&#8221; color=&#8221;#ffffff&#8221; font_size=&#8221;60px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;60px&#8221; font_weight=&#8221;400&#8243; css=&#8221;.vc_custom_1754484692436{margin-top: 20px !important;}&#8221;]\n<h1 class=\"titolo2\">Industrial Cybersecurity<br \/>\nCybersafe in every move<\/h1>\n[\/vc_column_text][vc_single_image image=&#8221;265973&#8243; el_class=&#8221;margin_top_40 loop_image&#8221;][vc_column_text el_class=&#8221;freccia_move&#8221; text_align=&#8221;center&#8221;]<a href=\"#contenuto\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone local-scoll-link size-full wp-image-1597\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia.png\" alt=\"\" width=\"82\" height=\"51\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia.png 82w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia-24x15.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia-36x22.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia-48x30.png 48w\" sizes=\"auto, (max-width: 82px) 100vw, 82px\" \/><\/a>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_140&#8243; local_scroll_id=&#8221;contenuto&#8221;][vc_column][vc_column_text el_class=&#8221;paragrafo&#8221;]In an increasingly threatened industrial landscape \u2013 where critical infrastructure sectors are frequently targeted \u2013 our industrial security solutions, delivered by <a href=\"https:\/\/y-cyber.com\/\" rel=\"noopener\"><strong>Y Cyber<\/strong><\/a>, a dedicated business unit fully focused on OT cybersecurity, are designed to address the unique challenges faced by organizations.<\/p>\n<p>From advanced threat intelligence to proactive defense measures, we help protect industrial environments by safeguarding critical assets and preventing costly breaches.<\/p>\n<p>With deep expertise in OT\/ICS ecosystems, we guide you through the complex and rapidly evolving industrial cybersecurity landscape \u2013 ensuring the safety, resilience, and compliance of your operations.[\/vc_column_text]<div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-items-center wpex-text-left\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-25\"><a href=\"https:\/\/y-cyber.com\/brochure-download\/\" class=\"wpex-no-underline\" rel=\"noopener\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" style=\"width:92px;\" decoding=\"async\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia-icon.svg\" alt=\"\" width=\"92\" height=\"92\"><\/a><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><span class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:900;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:35px;line-height:var(--wpex-leading-tight);\"><a href=\"https:\/\/y-cyber.com\/brochure-download\/\" class=\"vcex-icon-box-link wpex-no-underline\" rel=\"noopener\">OT Security Service Catalogue<\/a><\/span><\/div><\/div>[\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_100&#8243; visibility=&#8221;hidden&#8221;][vc_column][vc_column_text color=&#8221;#0087cc&#8221; font_size=&#8221;100px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;100px&#8221; font_weight=&#8221;600&#8243; text_align=&#8221;center&#8221;]\n<h3 class=\"titolo1\">Industrial Cybersecurity Solutions<\/h3>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_100&#8243;][vc_column][vc_column_text color=&#8221;#0087cc&#8221; font_size=&#8221;100px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;100px&#8221; font_weight=&#8221;600&#8243; text_align=&#8221;center&#8221; css=&#8221;.vc_custom_1757593798917{padding-bottom: 30px !important;}&#8221;]\n<h2 class=\"titolo1\">Tailored Security Across the Industrial Supply Chain<\/h2>\n[\/vc_column_text][vc_column_text el_class=&#8221;paragrafo&#8221;]Each role in the industrial supply chain faces its own set of risks, duties, and compliance demands. That\u2019s why one-size-fits-all cybersecurity simply doesn\u2019t work. Our OT security portfolio is designed to address the unique needs of every stakeholder in the supply chain \u2013 from OEMs and integrators to plant operators and critical infrastructure owners. By tailoring solutions to specific roles, we help each organization secure what matters most, ensure compliance, and strengthen the entire supply chain\u2019s resilience.[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; gap=&#8221;35&#8243;][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-image.vcex_69e7043b736db .vcex-image-img{border-radius:var(--wpex-rounded);height:274px;}.vcex-image.vcex_69e7043b736db .vcex-image-inner{max-width:412px;}<\/style><figure class=\"vcex-image vcex-module textcenter vcex_69e7043b736db\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><a href=\"https:\/\/y-cyber.com\/ot-asset-owner\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img width=\"1044\" height=\"587\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-asset-owner.webp\" class=\"vcex-image-img wpex-align-middle wpex-object-cover\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-asset-owner.webp 1044w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-asset-owner-768x432.webp 768w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-asset-owner-24x13.webp 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-asset-owner-36x20.webp 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-asset-owner-48x27.webp 48w\" sizes=\"auto, (max-width: 1044px) 100vw, 1044px\" \/><\/a><\/div><\/figure>[vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-image.vcex_69e7043b740d9 .vcex-image-img{border-radius:var(--wpex-rounded);height:274px;}.vcex-image.vcex_69e7043b740d9 .vcex-image-inner{max-width:412px;}<\/style><figure class=\"vcex-image vcex-module textcenter vcex_69e7043b740d9\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><a href=\"https:\/\/y-cyber.com\/ot-service-provider\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img width=\"1200\" height=\"700\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-service-provider.webp\" class=\"vcex-image-img wpex-align-middle wpex-object-cover\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-service-provider.webp 1200w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-service-provider-768x448.webp 768w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-service-provider-24x14.webp 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-service-provider-36x21.webp 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-service-provider-48x28.webp 48w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/div><\/figure>[vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;]<style>.vcex-image.vcex_69e7043b74a47 .vcex-image-img{border-radius:var(--wpex-rounded);height:274px;}.vcex-image.vcex_69e7043b74a47 .vcex-image-inner{max-width:412px;}<\/style><figure class=\"vcex-image vcex-module textcenter vcex_69e7043b74a47\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><a href=\"https:\/\/y-cyber.com\/ot-component-supplier\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img width=\"1280\" height=\"853\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-component-supplier.webp\" class=\"vcex-image-img wpex-align-middle wpex-object-cover\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-component-supplier.webp 1280w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-component-supplier-768x512.webp 768w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-component-supplier-24x16.webp 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-component-supplier-36x24.webp 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/ot-component-supplier-48x32.webp 48w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/a><\/div><\/figure>[vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;audit_icon_box margin_top_140&#8243;][vc_column]<div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left hidden paragrafo\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-20\"><img width=\"202\" height=\"202\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png 202w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-150x150.png 150w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-24x24.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-36x36.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-48x48.png 48w\" sizes=\"auto, (max-width: 202px) 100vw, 202px\" \/><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><h3 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:600;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:36px;text-transform:uppercase;\">OT Security Assessment<\/h3><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p><strong><span style=\"color: #c70973\">Gain a comprehensive understanding of your organization\u2019s OT security posture<\/span><\/strong> and bridge the gap between IT and OT maturity levels. As companies strive to enhance overall security, assessing the maturity level of OT infrastructures becomes a crucial first step. Evaluate the presence, documentation, and application of security processes in your OT environment against the New Machinery Regulation, IEC62443 and other OT security compliance standards to<strong><span style=\"color: #c70973\"> identify areas for improvement<\/span><\/strong>. Assess readiness to respond to cyber incidents, identify and analyze anomalies in OT systems, and benefit from actionable insights to strengthen your OT security and overall posture.<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-icon-box vcex-icon-box-seven wpex-flex wpex-items-center wpex-text-right hidden wpex-flex-row-reverse\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-ml-25\"><a href=\"https:\/\/www.hwgsababa.com\/en\/resources-ot-cybersecurity-risk-assessment\/\" class=\"wpex-no-underline\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" style=\"width:92px;\" decoding=\"async\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia-icon.svg\" alt=\"\" width=\"92\" height=\"92\"><\/a><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><span class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:900;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:35px;line-height:var(--wpex-leading-tight);\"><a href=\"https:\/\/www.hwgsababa.com\/en\/resources-ot-cybersecurity-risk-assessment\/\" class=\"vcex-icon-box-link wpex-no-underline\">OT Risk Assessment brochure<\/a><\/span><\/div><\/div><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left hidden paragrafo margin_top_50\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-20\"><img width=\"202\" height=\"202\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png 202w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-150x150.png 150w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-24x24.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-36x36.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-48x48.png 48w\" sizes=\"auto, (max-width: 202px) 100vw, 202px\" \/><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><h3 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:600;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:36px;text-transform:uppercase;\">OT Penetration Testing<\/h3><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p><strong><span style=\"color: #c70973\">Strengthen your sensitive ICS environments<\/span><\/strong> with specialized vulnerability assessment and penetration testing services, backed up by deep vertical expertise in working with sensitive ICS environments, understanding the unique challenges and security requirements they entail. We provide comprehensive insights into the architecture, operations, and vulnerabilities of your ICS infrastructure, including hardware, software, and industrial protocols. By simulating real-world attacks on OT devices like SCADA, PLCs, and IIoT, we identify weaknesses and recommend protection and hardening measures to<strong><span style=\"color: #c70973\"> fortify your automation systems.<\/span><\/strong><\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left hidden paragrafo margin_top_50\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-20\"><img width=\"202\" height=\"202\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png 202w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-150x150.png 150w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-24x24.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-36x36.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-48x48.png 48w\" sizes=\"auto, (max-width: 202px) 100vw, 202px\" \/><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><h3 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:600;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:36px;text-transform:uppercase;\">ICS Component Onboarding<\/h3><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p>Assess the cybersecurity of new components before integrating them into your secured system, ensuring compatibility and protection. We conduct comprehensive technical and compliance assessments to <strong><span style=\"color: #c70973\">evaluate vulnerabilities of the individual components<\/span><\/strong>, both standalone and as part of your system. Our assessment aligns with the \u201cNew Machinery Regulation\u201d (NMR) issued by the EU, prioritizing cybersecurity in machinery and equipment. Comply with regulations, <strong><span style=\"color: #c70973\">mitigate risks and safeguard your system<\/span> <\/strong>from potential cyber threats, ensuring a cyber-safe onboarding process and uninterrupted security for your production line.<\/p>\n<\/div><\/div><\/div>[vc_empty_space][vc_column_text color=&#8221;#0087cc&#8221; font_size=&#8221;100px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;100px&#8221; font_weight=&#8221;600&#8243; text_align=&#8221;center&#8221;]\n<h2 class=\"titolo1\">Partners<\/h2>\n[\/vc_column_text]<figure class=\"vcex-image vcex-module textcenter\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block vc_custom_1757590208853\"><img width=\"2338\" height=\"1040\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/partner.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/partner.png 2338w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/partner-768x342.png 768w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/partner-1536x683.png 1536w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/partner-2048x911.png 2048w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/partner-24x11.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/partner-36x16.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/partner-48x21.png 48w\" sizes=\"auto, (max-width: 2338px) 100vw, 2338px\" \/><\/div><\/figure><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left hidden paragrafo margin_top_50\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-20\"><img width=\"202\" height=\"202\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png 202w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-150x150.png 150w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-24x24.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-36x36.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-48x48.png 48w\" sizes=\"auto, (max-width: 202px) 100vw, 202px\" \/><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><h3 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:600;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:36px;text-transform:uppercase;\">VIRTUAL OT CISO \/ OT CISO ADVISOR<\/h3><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p><strong><span style=\"color: #c70973\">Empower your OT security strategy<\/span><\/strong> with expert guidance. Our dedicated C-level OT CISO advisor will design and execute complex cybersecurity projects tailored to your organization\u2019s unique needs. Leveraging his expertise, we bridge talent gaps and ensure effective planning for critical projects. Receive comprehensive support as our advisor engages additional vertical security experts when required, leading cybersecurity initiatives and providing valuable second opinions to your internal CISO. Benefit from a robust plan that addresses both IT and OT environments, <strong><span style=\"color: #c70973\">supporting your organization\u2019s cybersecurity posture<\/span><\/strong> and safeguarding your critical assets with confidence.<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left hidden paragrafo margin_top_50\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-20\"><img width=\"202\" height=\"202\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png 202w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-150x150.png 150w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-24x24.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-36x36.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-48x48.png 48w\" sizes=\"auto, (max-width: 202px) 100vw, 202px\" \/><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><h3 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:600;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:36px;text-transform:uppercase;\">Secure OT Plant<\/h3><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p><strong><span style=\"color: #c70973\">Secure your OT plant<\/span><\/strong> with seamless integration of OT security solutions into your ICS environment. As your trusted partner, we collaborate with leading industrial security vendors to design, implement, configure, manage, and maintain robust security measures for safeguarding your industrial networks, firewalls, and endpoints. Rest easy, knowing your <strong><span style=\"color: #c70973\">critical infrastructure is continuously fortified against cyber threats,<\/span><\/strong> with minimized downtime risks.<\/p>\n<p><img loading=\"lazy\" class=\"soc_loghi alignnone wp-image-264718 size-full\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/logo-x-website-1.png\" alt=\"industrial cybersecurity\" width=\"1096\" height=\"232\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/logo-x-website-1.png 1096w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/logo-x-website-1-768x163.png 768w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/logo-x-website-1-24x5.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/logo-x-website-1-36x8.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/logo-x-website-1-48x10.png 48w\" sizes=\"auto, (max-width: 1096px) 100vw, 1096px\" \/><\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left paragrafo margin_top_50\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-20\"><img width=\"202\" height=\"202\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png 202w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-150x150.png 150w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-24x24.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-36x36.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-48x48.png 48w\" sizes=\"auto, (max-width: 202px) 100vw, 202px\" \/><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><h3 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:600;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:36px;text-transform:uppercase;\">INDUSTRIAL SOC<\/h3><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p><strong><span style=\"color: #c70973\">Enhance your security observability<\/span><\/strong> with seamless integration into the OT domain. Our Industrial SOC goes beyond IT, collecting and analyzing data from dedicated OT security solutions. Proactively recognize cyber-attacks before they disrupt industrial systems and processes. Enjoy customized protection for legacy systems, including outdated PCs and older operating systems. Benefit from network integrity monitoring and precise management of industrial communication protocols. Our <strong><span style=\"color: #c70973\">dedicated <a href=\"https:\/\/www.hwgsababa.com\/en\/?p=230171\">OT SOC<\/a><\/span><\/strong> ensures <strong><span style=\"color: #c70973\">continuous monitoring across plants and controlled machines<\/span><\/strong>, safeguarding critical infrastructures from potential cyber threats.<\/p>\n<\/div><\/div><\/div><div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-text-left paragrafo margin_top_50\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-20\"><img width=\"202\" height=\"202\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png\" class=\"vcex-icon-box-image wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso.png 202w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-150x150.png 150w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-24x24.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-36x36.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/bullet-rosso-48x48.png 48w\" sizes=\"auto, (max-width: 202px) 100vw, 202px\" \/><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><h3 class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:600;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:36px;text-transform:uppercase;\">OT SECURITY TRAINING<\/h3><div class=\"vcex-icon-box-content wpex-last-mb-0 wpex-clr\"><p><strong><span style=\"color: #c70973\">Empower your organization<\/span><\/strong> with comprehensive OT Training solutions. Our Security Awareness program delivers online training personalized to employees\u2019 knowledge levels, cultivating a security-focused culture and mitigating human-related risks. Enhance cybersecurity skills with our Advanced Training OT, covering fundamentals of information security, protection systems, secure network architecture, and industry best practices. Empower your workforce with the expertise to effectively <strong><span style=\"color: #c70973\">safeguard OT\/ICS equipment<\/span><\/strong>, ensuring a <strong><span style=\"color: #c70973\">resilient and secure operational environment<\/span><\/strong>.<\/p>\n<\/div><\/div><\/div>[\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_140&#8243;][vc_column][vc_column_text text_align=&#8221;center&#8221; color=&#8221;#c80973&#8243; font_size=&#8221;75px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;75px&#8221; font_weight=&#8221;600&#8243; el_class=&#8221;titolo3&#8243;]OT case study[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1712313844022{margin-top: 20px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;3340&#8243; img_size=&#8221;355 x 503&#8243; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; link=&#8221;https:\/\/www.hwgsababa.com\/en\/case_studies\/safeguarding-energy-infrastructure\/&#8221;]<div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-items-center wpex-text-left\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-25\"><a href=\"https:\/\/www.hwgsababa.com\/en\/case_studies\/safeguarding-energy-infrastructure\/\" class=\"wpex-no-underline\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" style=\"width:92px;\" decoding=\"async\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia-icon.svg\" alt=\"\" width=\"92\" height=\"92\"><\/a><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><span class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:700;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:30px;\"><a href=\"https:\/\/www.hwgsababa.com\/en\/case_studies\/safeguarding-energy-infrastructure\/\" class=\"vcex-icon-box-link wpex-no-underline\">Download<\/a><\/span><\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5317&#8243; img_size=&#8221;355 x 503&#8243; onclick=&#8221;custom_link&#8221; img_link_target=&#8221;_blank&#8221; link=&#8221;https:\/\/www.hwgsababa.com\/en\/case_studies\/safeguarding-energy-infrastructure\/&#8221;]<div class=\"vcex-module vcex-icon-box vcex-icon-box-one wpex-flex wpex-items-center wpex-text-left\"><div class=\"vcex-icon-box-symbol wpex-flex-shrink-0 wpex-mr-25\"><a href=\"https:\/\/www.hwgsababa.com\/en\/case_studies\/arduino-cybersecurity-in-automation\/\" class=\"wpex-no-underline\"><img loading=\"lazy\" class=\"vcex-icon-box-image wpex-align-middle\" style=\"width:92px;\" decoding=\"async\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/08\/freccia-icon.svg\" alt=\"\" width=\"92\" height=\"92\"><\/a><\/div><div class=\"vcex-icon-box-text wpex-flex-grow\"><span class=\"vcex-icon-box-heading wpex-heading wpex-mb-10\" style=\"font-family:Archivo Expanded;font-weight:700;color:#0087cc;--wpex-hover-heading-link-color:#0087cc;font-size:30px;\"><a href=\"https:\/\/www.hwgsababa.com\/en\/case_studies\/arduino-cybersecurity-in-automation\/\" class=\"vcex-icon-box-link wpex-no-underline\">Download<\/a><\/span><\/div><\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1692792888207{margin-top: 20px !important;}&#8221; visibility=&#8221;hidden&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;670&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;671&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;672&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_100&#8243; visibility=&#8221;hidden&#8221;][vc_column][vc_column_text text_align=&#8221;center&#8221; color=&#8221;#eb00ff&#8221; font_size=&#8221;75px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;75px&#8221; font_weight=&#8221;600&#8243; el_class=&#8221;titolo3&#8243;]Recent Industrial Cybersecurity blog articles[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1692792898839{margin-top: 20px !important;}&#8221; visibility=&#8221;hidden&#8221;][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;673&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;673&#8243;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;673&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_120&#8243;][vc_column][vc_column_text text_align=&#8221;center&#8221; color=&#8221;#0087cc&#8221; font_size=&#8221;60px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;60px&#8221; font_weight=&#8221;300&#8243; el_class=&#8221;titolo2&#8243;]Do you want to learn more<br \/>\nor schedule a call for expert consultancy?[\/vc_column_text][vc_column_text el_class=&#8221;titolo3 margin_top_60&#8243; color=&#8221;#0087cc&#8221; font_size=&#8221;75px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;100px&#8221; font_weight=&#8221;600&#8243; text_align=&#8221;center&#8221;]Fill out the form below.[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_bot_90&#8243;][vc_column]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2758-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"2758\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/2685#wpcf7-f2758-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2758\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2758-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"vc_row\">\n\t<div class=\"vc_col-sm-6\">\n\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"First\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"First name *\" value=\"\" type=\"text\" name=\"First\" \/><\/span><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-6\">\n\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"Last\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Last name *\" value=\"\" type=\"text\" name=\"Last\" \/><\/span><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-6\">\n\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"Company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Company *\" value=\"\" type=\"text\" name=\"Company\" \/><\/span><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-6\">\n\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"Role\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Role *\" value=\"\" type=\"text\" name=\"Role\" \/><\/span><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-6\">\n\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"Email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email *\" value=\"\" type=\"email\" name=\"Email\" \/><\/span><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-6\">\n\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"Phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" placeholder=\"Phone\" value=\"\" type=\"text\" name=\"Phone\" \/><\/span><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-12\" style=\"margin-top:20px\">\n\t\t<p><label> <span class=\"wpcf7-form-control-wrap\" data-name=\"Messagge\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Messagge\" name=\"Messagge\"><\/textarea><\/span><\/label>\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-12\">\n\t\t<p class=\"testo_form\"><b>Marketing permissions<\/b><br \/>\nSelect all the ways you would like to receive information from HWG Sababa:\n\t\t<\/p>\n\t\t<p class=\"testo_form\"><span class=\"wpcf7-form-control-wrap\" data-name=\"Newsletter\"><span class=\"wpcf7-form-control wpcf7-acceptance\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"Newsletter\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><b>Newsletter *<\/b><\/span><\/label><\/span><\/span><\/span><br \/>\nI declare that I have read the <a href=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/Privacy-Policy-HWG-Sababa-S.r.l._ENG.pdf\">privacy policy<\/a> of HWG Sababa S.r.l with sole shareholder and I consent to the processing of my personal data for sending informative communications\/newsletters by the same company.\n\t\t<\/p>\n\t\t<p class=\"testo_form\"><span class=\"wpcf7-form-control-wrap\" data-name=\"Maildirette\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"Maildirette\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><b> Direct mail<\/b><\/span><\/label><\/span><\/span><\/span><br \/>\nI agree to receive information and offers that may be of interest to me. In order to receive personalized communications, my preferences and behaviors and the use of HWG Sababa S.r.l with sole shareholder products and services will be analysed. The latter company can therefore contact me for promotional purposes at the e-mail address I have provided when filling this form.\n\t\t<\/p>\n\t\t<p class=\"testo_form\"><span class=\"wpcf7-form-control-wrap\" data-name=\"Inoltrodatiaterzi\"><span class=\"wpcf7-form-control wpcf7-acceptance optional\"><span class=\"wpcf7-list-item\"><label><input type=\"checkbox\" name=\"Inoltrodatiaterzi\" value=\"1\" aria-invalid=\"false\" \/><span class=\"wpcf7-list-item-label\"><b>Forwarding data to third parties<\/b><\/span><\/label><\/span><\/span><\/span><br \/>\nI consent to the forwarding of my data to independent third party data controllers, indicated in the privacy policy, for sending of their own promotional and marketing communications on their own or third party products and services.\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-6\">\n\t\t<p class=\"testo_form margin_form\">We use Salesforce as our marketing platform. By clicking below to sign up, you acknowledge that your information will be transferred to Salesforce for processing.\n\t\t<\/p>\n\t\t<p class=\"testo_form\"><a target=\"_blank\" href=\"https:\/\/www.salesforce.com\/it\/company\/privacy\/\" rel=\"noopener\">Click here<\/a> for more information about Salesforce's privacy policy.\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"vc_col-sm-6 margin_form\">\n\t\t<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner send_form\" type=\"submit\" value=\"Submit\" \/>\n\t\t<\/p>\n\t<\/div>\n\t<div>\n\t<\/div>\n<\/div><input type='hidden' class='wpcf7-pum' value='{\"closepopup\":false,\"closedelay\":0,\"openpopup\":false,\"openpopup_id\":0}' \/><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;bg_header&#8221; css=&#8221;.vc_custom_1693552613518{background-image: url(https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/09\/INDUSTRIAL.png?id=1681) !important;}&#8221;][vc_column][vc_column_text text_align=&#8221;center&#8221; color=&#8221;#ffffff&#8221; font_size=&#8221;60px&#8221; font_family=&#8221;Archivo Expanded&#8221; line_height=&#8221;60px&#8221; font_weight=&#8221;400&#8243; css=&#8221;.vc_custom_1754484692436{margin-top: 20px !important;}&#8221;] Industrial Cybersecurity Cybersafe in every move [\/vc_column_text][vc_single_image image=&#8221;265973&#8243; el_class=&#8221;margin_top_40 loop_image&#8221;][vc_column_text el_class=&#8221;freccia_move&#8221; text_align=&#8221;center&#8221;][\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_140&#8243; local_scroll_id=&#8221;contenuto&#8221;][vc_column][vc_column_text el_class=&#8221;paragrafo&#8221;]In an increasingly threatened industrial landscape \u2013 where critical infrastructure sectors are frequently targeted \u2013 our industrial security solutions, delivered by Y Cyber, a dedicated&hellip;<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-2685","page","type-page","status-publish","hentry","entry","no-media"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/pages\/2685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/comments?post=2685"}],"version-history":[{"count":65,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/pages\/2685\/revisions"}],"predecessor-version":[{"id":266173,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/pages\/2685\/revisions\/266173"}],"wp:attachment":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/media?parent=2685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}