{"id":47,"date":"2026-01-23T09:24:54","date_gmt":"2026-01-23T09:24:54","guid":{"rendered":"http:\/\/localhost\/fourthsquare\/?page_id=47"},"modified":"2026-03-11T09:27:27","modified_gmt":"2026-03-11T09:27:27","slug":"cyber-security","status":"publish","type":"page","link":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/solutions\/cyber-security\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"47\" class=\"elementor elementor-47\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22d3f1c e-flex e-con-boxed e-con e-parent\" data-id=\"22d3f1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8ba53f0 e-con-full e-flex e-con e-child\" data-id=\"8ba53f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0585af elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"f0585af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enabling Trust in a Hyper connected World\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0750459 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"0750459\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tWe embed Security by Design and Privacy by Design across your organisation making you resilient, compliant, and agile amidst evolving threats and regulations like DPDPA, CERT-IN, GDPR, and CCPA.\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c21dacd e-flex e-con-boxed e-con e-parent\" data-id=\"c21dacd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac25b68 elementor-widget elementor-widget-text-editor\" data-id=\"ac25b68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tOur Core Cyber Security Services\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b644c39 elementor-widget elementor-widget-heading\" data-id=\"b644c39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"color:#198754\">360\u00b0<\/span> portfolio across prevention, detection, response &amp; recovery\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a18a31 elementor-widget elementor-widget-text-editor\" data-id=\"9a18a31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tOutcome-driven services aligned to Defence in Depth (DiD).\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-575ccbb elementor-widget__width-initial elementor-widget elementor-widget-html\" data-id=\"575ccbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!DOCTYPE html>\r\n<html lang=\"en\">\r\n\r\n<head>\r\n  <meta charset=\"UTF-8\">\r\n  <title>First Slider<\/title>\r\n\r\n  <!-- Bootstrap CSS -->\r\n  <link href=\"https:\/\/cdn.jsdelivr.net\/npm\/bootstrap@5.3.2\/dist\/css\/bootstrap.min.css\" rel=\"stylesheet\">\r\n\r\n  <!-- Slick CSS -->\r\n  <link rel=\"stylesheet\" href=\"https:\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.css\">\r\n  <link rel=\"stylesheet\" href=\"https:\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick-theme.css\">\r\n\r\n  <link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/7.0.1\/css\/all.min.css\">\r\n\r\n  <style>\r\n    \/* ================= BASE STYLES ================= *\/\r\n    .hover-card {\r\n      transition: transform 0.3s ease, box-shadow 0.3s ease;\r\n      border-radius: 15px;\r\n    }\r\n\r\n    .hover-card:hover {\r\n      transform: translateY(-10px);\r\n      box-shadow: 0 15px 30px rgba(0, 0, 0, 0.1);\r\n    }\r\n\r\n    .slick-slide img {\r\n      display: inline-block;\r\n    }\r\n\r\n    .slick-slide p {\r\n      height: 50px;\r\n      color: #000 !important;\r\n      line-height: 20px;\r\n    }\r\n\r\n    .slide-item {\r\n      margin: 5px;\r\n    }\r\n\r\n    .slick-prev {\r\n      left: -20px !important;\r\n    }\r\n\r\n     .slick-next {\r\n      right: -25px !important;\r\n    }\r\n\r\n     .slick-prev::before,\r\n     .slick-next::before {\r\n      font-size: 25px !important;\r\n    }\r\n\r\n    .cor ul li {\r\n      list-style: disc;\r\n    }\r\n\r\n     .slick-prev,\r\n     .slick-next {\r\n      width: 40px;\r\n      height: 40px;\r\n      background: #21a141;\r\n      border-radius: 50%;\r\n      z-index: 5;\r\n    }\r\n\r\n     .slick-prev::before,\r\n   .slick-next::before {\r\n      color: #fff;\r\n      font-size: 20px;\r\n      opacity: 1;\r\n    }\r\n\r\n    .slick-prev {\r\n      left: -10px;\r\n    }\r\n\r\n    .slick-next {\r\n      right: -10px;\r\n    }\r\n\r\n    .custom-prev,\r\n    .custom-next {\r\n      position: absolute;\r\n      top: 45%;\r\n      transform: translateY(-50%);\r\n      width: 45px;\r\n      height: 45px;\r\n      background: #21a141;\r\n      border-radius: 50%;\r\n      border: none;\r\n      z-index: 999;\r\n      display: flex;\r\n      align-items: center;\r\n      justify-content: center;\r\n    }\r\n\r\n    .custom-prev {\r\n      left: -20px;\r\n    }\r\n\r\n    .custom-next {\r\n      right: -20px;\r\n    }\r\n\r\n    .custom-prev i,\r\n    .custom-next i {\r\n      color: #fff;\r\n      font-size: 18px;\r\n    }\r\n\r\n    .custom-prev:hover,\r\n    .custom-next:hover {\r\n      background: #000;\r\n    }\r\n    .second-slider{\r\n      padding-top: 140px;\r\n    }\r\n\r\n    \/* ================= MOBILE ================= *\/\r\n    @media only screen and (max-width: 600px) {\r\n\r\n      .slick-slide img {\r\n        width: 25% !important;\r\n      }\r\n\r\n      .slick-slide h5 {\r\n        font-size: 16px !important;\r\n      }\r\n\r\n       .slick-slide p {\r\n        font-size: 14px;\r\n        line-height: 16px;\r\n        height: 110px;\r\n      }\r\n\r\n      .slick-slide li {\r\n        font-size: 12px;\r\n      }\r\n    }\r\n  <\/style>\r\n<\/head>\r\n\r\n<body>\r\n\r\n  <div class=\"container py-5\">\r\n    <div class=\"row g-4 p-4 first-slider\">\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"100\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <!-- Icon + Title in Flex -->\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-content\/uploads\/2026\/03\/SOC.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Security Operations Center (SOC)<\/h5>\r\n            <\/div>\r\n\r\n            <p class=\"text-muted\">\r\n              We design and operate advanced 24\u00d77 SOCs tailored for hybrid, on-premises, and cloud-native\r\n              environments. Outcome would be proactive threat visibility and faster incident response to reduce\r\n              business risk.\r\n            <\/p>\r\n\r\n            <ul class=\"  text-muted\">\r\n              <li> Real-time threat monitoring using SIEM, SOAR, and threat intel<\/li>\r\n              <li> Behavioural analytics and log correlation<\/li>\r\n              <li> Incident management and ticketing workflows<\/li>\r\n              <li> Phishing detection and insider threat alerts<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"100\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <!-- Icon + Title in Flex -->\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-content\/uploads\/2026\/03\/MDR.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Incident Response & Managed Detection & Response (MDR)<\/h5>\r\n            <\/div>\r\n\r\n            <p class=\"text-muted\">\r\n              We help you respond to, recover from, and learn from cybersecurity incidents, before they escalate.\r\n              Outcome would be business continuity with minimal downtime and reduced reputational impact.\r\n            <\/p>\r\n\r\n            <ul class=\"  text-muted\">\r\n              <li> Breach containment and ransomware mitigation<\/li>\r\n              <li> Malware triage and reverse engineering<\/li>\r\n              <li> Threat hunting and digital forensics (DFIR)<\/li>\r\n              <li> Cyber Risk Quantification (CRQ) and tailored Cyber Threat Intelligence (CTI)<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <!-- Card 2 -->\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"100\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <!-- Icon + Title in Flex -->\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/3057\/3057648.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Code & Application Security<\/h5>\r\n            <\/div>\r\n\r\n            <p class=\"text-muted\">\r\n              We secure your applications right from the design phase through development and deployment. Outcome\r\n              would be lower development rework and robust security posture for every application.\r\n            <\/p>\r\n\r\n            <ul class=\"  text-muted \">\r\n              <li> Secure Code Reviews (manual & automated)<\/li>\r\n              <li> Static & Dynamic Application Security Testing (SAST\/DAST)<\/li>\r\n              <li> Software Composition Analysis (SCA)<\/li>\r\n              <li> Secure Development Lifecycle (SDLC) advisory<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n\r\n\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/18240\/18240667.png\" width=\"50\" class=\"me-3\"\r\n                alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Penetration Testing (Pentest)<\/h5>\r\n            <\/div>\r\n\r\n            <p class=\"text-muted\">\r\n              We simulate real-world cyberattacks to uncover critical vulnerabilities across your digital assets.\r\n              Outcome would be actionable insights and hardened defences before attacker\u2019s strike.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Web applications, mobile apps, and APIs<\/li>\r\n              <li> Cloud configurations and networks<\/li>\r\n              <li> Internal systems and physical access<\/li>\r\n              <li> Employee awareness via social engineering<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/5951\/5951440.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Compliance & Risk Management<\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              We guide you in meeting the most demanding cybersecurity and privacy regulations, both local and global.\r\n              Outcome would be stress-free audits and a compliant-by-default culture.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> DPDPA, CERT-IN, GDPR, HIPAA, ISO27001, PCI-DSS<\/li>\r\n              <li> Risk assessments and internal audits<\/li>\r\n              <li> Data classification and governance mapping<\/li>\r\n              <li> Policy frameworks (NIST, HITRUST, COBIT)<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"row g-4 p-4 second-slider\">\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/2525\/2525975.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Cyber Playbooks & Tabletop Exercises<\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              We build and test your Incident Response (IR) plans through simulation-based training. Outcome would be,\r\n              Your teams are prepared, confident, and aligned during a real cyber event.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Customized cyber crisis playbooks<\/li>\r\n              <li> Executive and stakeholder training<\/li>\r\n              <li> Role-based scenario simulations<\/li>\r\n              <li> Post-exercise review and refinement<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/7607\/7607629.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Red, Blue & Purple Teaming<\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\" >\r\n              We evaluate your ability to detect and respond to advanced threats through simulated adversary\r\n              engagements. Outcome would be, Better coordination between defence (Blue) and offense (Red), resulting\r\n              in enhanced readiness (Purple).\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Advanced Persistent Threats (APT)<\/li>\r\n              <li> Lateral movement and privilege escalation<\/li>\r\n              <li> MITRE ATT&CK framework alignment<\/li>\r\n\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/13409\/13409697.png\" width=\"50\" class=\"me-3\"\r\n                alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">IoT, Embedded & Industrial Security<\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              We secure your connected devices, sensors, and embedded systems, from firmware to field operations.\r\n              Outcome would be reliable, secure, and future-proofed connected ecosystems.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Secure Boot and Firmware Validation<\/li>\r\n              <li> SBOM compliance and OTA update protection<\/li>\r\n              <li> Industrial Control Systems (ICS) and SCADA<\/li>\r\n              <li> Threat modelling and cryptographic reviews<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/3703\/3703033.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">AI\/ML Security <\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              We protect your AI and machine learning systems from exploitation and manipulation. Outcome would be\r\n              responsible AI adoption with trusted and secure ML models.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Model extraction, inversion, and data poisoning<\/li>\r\n              <li> Fuzzing for adversarial inputs<\/li>\r\n              <li> Bias audits and fairness validation<\/li>\r\n              <li> Pipeline integrity and model explainability<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/3883\/3883488.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Telecom & 5G Infrastructure Security <\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              We secure telecom core and RAN components in 4G\/5G environments. Outcome would be secure and resilient\r\n              telecom networks, ready for scale.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Signalling protocol testing (S1\/X2\/Xn, NG-RAN)<\/li>\r\n              <li> Rogue base station simulation<\/li>\r\n              <li> EPS & 5G-AKA authentication checks<\/li>\r\n              <li> NESAS, 3GPP, GSMA compliance audits<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"row g-4 p-4 third-slider\">\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/4152\/4152097.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Hardware & OT Security <\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              We safeguard mission-critical hardware systems from physical and cyber exploitation. Outcome would be\r\n              resilience across industrial, critical, and national infrastructure.\r\n            <\/p>\r\n            <ul class=\"  text-muted \" style=\"height:95px;\">\r\n              <li> Side-channel and electromagnetic attacks<\/li>\r\n              <li> Reverse engineering and hardware fuzzing<\/li>\r\n              <li> Secure firmware design and industrial network defence<\/li>\r\n              <!-- <li> NESAS, 3GPP, GSMA compliance audits<\/li> -->\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/2084\/2084028.png\" width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Automotive Cybersecurity <\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              We protect modern vehicles, ECUs, and control systems from rising cyber threats. Outcome would be safer\r\n              connected mobility and future-ready vehicles.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> ECU firmware analysis<\/li>\r\n              <li> CAN Bus security and fuzzing<\/li>\r\n              <li> Vehicle network penetration testing<\/li>\r\n              <li> AUTOSAR compliance consulting<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/10162\/10162904.png\" width=\"50\" class=\"me-3\"\r\n                alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Privacy Engineering & Governance <\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              We integrate privacy as a core principle in your system design and workflows. Outcome would be user\r\n              trust and compliance with global data protection laws.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Privacy Impact Assessments (PIAs\/DPIAs)<\/li>\r\n              <li> Consent and preference management<\/li>\r\n              <li> Data minimization and anonymization<\/li>\r\n              <li> Differential privacy and PETs<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-content\/uploads\/2026\/03\/cyber-security.png\"\r\n                width=\"50\" class=\"me-3\" alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">vCISO (Virtual CISO) Services <\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              Get executive-level cybersecurity leadership without hiring full-time. Outcome would be alignment\r\n              between cybersecurity, business objectives, and stakeholder trust.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Strategic security roadmap<\/li>\r\n              <li> Risk and compliance oversight<\/li>\r\n              <li> Policy creation and vendor audits<\/li>\r\n              <li> Board-level reporting and communication<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n      <div class=\"col-md-6 slide-item\" data-aos=\"fade-up\" data-aos-delay=\"200\">\r\n        <div class=\"card shadow-lg border-0 h-100 hover-card\">\r\n          <div class=\"card-body text-start p-4\">\r\n\r\n            <div class=\"d-flex align-items-center mb-3\">\r\n              <img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/11275\/11275981.png\" width=\"50\" class=\"me-3\"\r\n                alt=\"SOC Icon\">\r\n              <h5 class=\"fw-bold mb-0\">Cloud & Container Security <\/h5>\r\n            <\/div>\r\n            <p class=\"text-muted\">\r\n              Secure your cloud-native, multi-cloud, and container-based environments. Outcome would be confident,\r\n              secure cloud deployments from development to production.\r\n            <\/p>\r\n            <ul class=\"  text-muted \">\r\n              <li> Kubernetes and Docker hardening<\/li>\r\n              <li> Image scanning and vulnerability patching<\/li>\r\n              <li> IAM, RBAC, and zero-trust posture management<\/li>\r\n              <li> CI\/CD pipeline integration and runtime protection<\/li>\r\n            <\/ul>\r\n          <\/div>\r\n        <\/div>\r\n      <\/div>\r\n\r\n    <\/div>\r\n  <\/div>\r\n\r\n  <!-- jQuery -->\r\n  <script src=\"https:\/\/code.jquery.com\/jquery-3.7.1.min.js\"><\/script>\r\n\r\n  <!-- Slick JS -->\r\n  <script src=\"https:\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.min.js\"><\/script>\r\n\r\n  <script>\r\n    $('.first-slider').slick({\r\n      autoplay: true,\r\n      autoplaySpeed: 3000,\r\n      speed: 700,\r\n      slidesToShow: 2,\r\n      slidesToScroll: 1,\r\n      arrows: true,\r\n      prevArrow: `<button class=\"custom-prev\"><i class=\"fa-solid fa-angle-left\"><\/i><\/button>`,\r\n      nextArrow: `<button class=\"custom-next\"><i class=\"fa-solid fa-angle-right\"><\/i><\/button>`,\r\n      dots: false,\r\n      responsive: [\r\n        {\r\n          breakpoint: 992,\r\n          settings: {\r\n            slidesToShow: 1\r\n          }\r\n        }\r\n      ]\r\n    });\r\n     $('.second-slider').slick({\r\n      autoplay: true,\r\n      autoplaySpeed: 3000,\r\n      speed: 700,\r\n      slidesToShow: 2,\r\n      slidesToScroll: 1,\r\n      arrows: true,\r\n      prevArrow: `<button class=\"custom-prev\"><i class=\"fa-solid fa-angle-left\"><\/i><\/button>`,\r\n      nextArrow: `<button class=\"custom-next\"><i class=\"fa-solid fa-angle-right\"><\/i><\/button>`,\r\n      dots: false,\r\n      responsive: [\r\n        {\r\n          breakpoint: 992,\r\n          settings: {\r\n            slidesToShow: 1\r\n          }\r\n        }\r\n      ]\r\n    });\r\n     $('.third-slider').slick({\r\n      autoplay: true,\r\n      autoplaySpeed: 3000,\r\n      speed: 700,\r\n      slidesToShow: 2,\r\n      slidesToScroll: 1,\r\n      arrows: true,\r\n      prevArrow: `<button class=\"custom-prev\"><i class=\"fa-solid fa-angle-left\"><\/i><\/button>`,\r\n      nextArrow: `<button class=\"custom-next\"><i class=\"fa-solid fa-angle-right\"><\/i><\/button>`,\r\n      dots: false,\r\n      responsive: [\r\n        {\r\n          breakpoint: 992,\r\n          settings: {\r\n            slidesToShow: 1\r\n          }\r\n        }\r\n      ]\r\n    });\r\n  <\/script>\r\n\r\n<\/body>\r\n\r\n<\/html>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-aace7ca e-flex e-con-boxed e-con e-parent\" data-id=\"aace7ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7701aa9 e-con-full e-flex e-con e-child\" data-id=\"7701aa9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfd4bf2 elementor-widget elementor-widget-image\" data-id=\"cfd4bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-content\/uploads\/2026\/03\/5595.jpg\" class=\"attachment-large size-large wp-image-3676\" alt=\"\" srcset=\"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-content\/uploads\/2026\/03\/5595.jpg 1000w, https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-content\/uploads\/2026\/03\/5595-300x300.jpg 300w, https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-content\/uploads\/2026\/03\/5595-150x150.jpg 150w, https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-content\/uploads\/2026\/03\/5595-768x768.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-be17b3d e-con-full e-flex e-con e-child\" data-id=\"be17b3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27f7cec elementor-widget elementor-widget-text-editor\" data-id=\"27f7cec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tOur People\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bba2ca elementor-widget elementor-widget-heading\" data-id=\"2bba2ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Human Firewall Behind FourthSquare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b772d0d elementor-widget elementor-widget-text-editor\" data-id=\"b772d0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tAt the heart of FourthSquare is a <strong>diverse, highly certified, and passionate cybersecurity team.<\/strong> We bring together red teamers, cloud experts, compliance specialists, and forensic analysts, each driven by a mission to <span style=\"color:#21a141;font-weight:600\">protect, enable, and empower.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2c48f6 elementor-view-stacked elementor-shape-rounded elementor-position-inline-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"e2c48f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-award\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M97.12 362.63c-8.69-8.69-4.16-6.24-25.12-11.85-9.51-2.55-17.87-7.45-25.43-13.32L1.2 448.7c-4.39 10.77 3.81 22.47 15.43 22.03l52.69-2.01L105.56 507c8 8.44 22.04 5.81 26.43-4.96l52.05-127.62c-10.84 6.04-22.87 9.58-35.31 9.58-19.5 0-37.82-7.59-51.61-21.37zM382.8 448.7l-45.37-111.24c-7.56 5.88-15.92 10.77-25.43 13.32-21.07 5.64-16.45 3.18-25.12 11.85-13.79 13.78-32.12 21.37-51.62 21.37-12.44 0-24.47-3.55-35.31-9.58L252 502.04c4.39 10.77 18.44 13.4 26.43 4.96l36.25-38.28 52.69 2.01c11.62.44 19.82-11.27 15.43-22.03zM263 340c15.28-15.55 17.03-14.21 38.79-20.14 13.89-3.79 24.75-14.84 28.47-28.98 7.48-28.4 5.54-24.97 25.95-45.75 10.17-10.35 14.14-25.44 10.42-39.58-7.47-28.38-7.48-24.42 0-52.83 3.72-14.14-.25-29.23-10.42-39.58-20.41-20.78-18.47-17.36-25.95-45.75-3.72-14.14-14.58-25.19-28.47-28.98-27.88-7.61-24.52-5.62-44.95-26.41-10.17-10.35-25-14.4-38.89-10.61-27.87 7.6-23.98 7.61-51.9 0-13.89-3.79-28.72.25-38.89 10.61-20.41 20.78-17.05 18.8-44.94 26.41-13.89 3.79-24.75 14.84-28.47 28.98-7.47 28.39-5.54 24.97-25.95 45.75-10.17 10.35-14.15 25.44-10.42 39.58 7.47 28.36 7.48 24.4 0 52.82-3.72 14.14.25 29.23 10.42 39.59 20.41 20.78 18.47 17.35 25.95 45.75 3.72 14.14 14.58 25.19 28.47 28.98C104.6 325.96 106.27 325 121 340c13.23 13.47 33.84 15.88 49.74 5.82a39.676 39.676 0 0 1 42.53 0c15.89 10.06 36.5 7.65 49.73-5.82zM97.66 175.96c0-53.03 42.24-96.02 94.34-96.02s94.34 42.99 94.34 96.02-42.24 96.02-94.34 96.02-94.34-42.99-94.34-96.02z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\t20+ years of combined cyber experience across sectors\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b845e5 elementor-view-stacked elementor-shape-rounded elementor-position-inline-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"1b845e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-sync\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M440.65 12.57l4 82.77A247.16 247.16 0 0 0 255.83 8C134.73 8 33.91 94.92 12.29 209.82A12 12 0 0 0 24.09 224h49.05a12 12 0 0 0 11.67-9.26 175.91 175.91 0 0 1 317-56.94l-101.46-4.86a12 12 0 0 0-12.57 12v47.41a12 12 0 0 0 12 12H500a12 12 0 0 0 12-12V12a12 12 0 0 0-12-12h-47.37a12 12 0 0 0-11.98 12.57zM255.83 432a175.61 175.61 0 0 1-146-77.8l101.8 4.87a12 12 0 0 0 12.57-12v-47.4a12 12 0 0 0-12-12H12a12 12 0 0 0-12 12V500a12 12 0 0 0 12 12h47.35a12 12 0 0 0 12-12.6l-4.15-82.57A247.17 247.17 0 0 0 255.83 504c121.11 0 221.93-86.92 243.55-201.82a12 12 0 0 0-11.8-14.18h-49.05a12 12 0 0 0-11.67 9.26A175.86 175.86 0 0 1 255.83 432z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCertifications: CISSP, OSCP, CEH, CCSP, CISA, ISO 27001 LA, DFIR, Cloud Security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c27e60 elementor-view-stacked elementor-shape-rounded elementor-position-inline-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"6c27e60\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-cog\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M487.4 315.7l-42.6-24.6c4.3-23.2 4.3-47 0-70.2l42.6-24.6c4.9-2.8 7.1-8.6 5.5-14-11.1-35.6-30-67.8-54.7-94.6-3.8-4.1-10-5.1-14.8-2.3L380.8 110c-17.9-15.4-38.5-27.3-60.8-35.1V25.8c0-5.6-3.9-10.5-9.4-11.7-36.7-8.2-74.3-7.8-109.2 0-5.5 1.2-9.4 6.1-9.4 11.7V75c-22.2 7.9-42.8 19.8-60.8 35.1L88.7 85.5c-4.9-2.8-11-1.9-14.8 2.3-24.7 26.7-43.6 58.9-54.7 94.6-1.7 5.4.6 11.2 5.5 14L67.3 221c-4.3 23.2-4.3 47 0 70.2l-42.6 24.6c-4.9 2.8-7.1 8.6-5.5 14 11.1 35.6 30 67.8 54.7 94.6 3.8 4.1 10 5.1 14.8 2.3l42.6-24.6c17.9 15.4 38.5 27.3 60.8 35.1v49.2c0 5.6 3.9 10.5 9.4 11.7 36.7 8.2 74.3 7.8 109.2 0 5.5-1.2 9.4-6.1 9.4-11.7v-49.2c22.2-7.9 42.8-19.8 60.8-35.1l42.6 24.6c4.9 2.8 11 1.9 14.8-2.3 24.7-26.7 43.6-58.9 54.7-94.6 1.5-5.5-.7-11.3-5.6-14.1zM256 336c-44.1 0-80-35.9-80-80s35.9-80 80-80 80 35.9 80 80-35.9 80-80 80z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCross-functional: SOC design, privacy, threat intel, GRC, AI security\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20089f3 elementor-view-stacked elementor-shape-rounded elementor-position-inline-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"20089f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-friends\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M192 256c61.9 0 112-50.1 112-112S253.9 32 192 32 80 82.1 80 144s50.1 112 112 112zm76.8 32h-8.3c-20.8 10-43.9 16-68.5 16s-47.6-6-68.5-16h-8.3C51.6 288 0 339.6 0 403.2V432c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48v-28.8c0-63.6-51.6-115.2-115.2-115.2zM480 256c53 0 96-43 96-96s-43-96-96-96-96 43-96 96 43 96 96 96zm48 32h-3.8c-13.9 4.8-28.6 8-44.2 8s-30.3-3.2-44.2-8H432c-20.4 0-39.2 5.9-55.7 15.4 24.4 26.3 39.7 61.2 39.7 99.8v38.4c0 2.2-.5 4.3-.6 6.4H592c26.5 0 48-21.5 48-48 0-61.9-50.1-112-112-112z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWorked with Fortune 500s, governments, startups, and critical infrastructure\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-39de6d0 e-flex e-con-boxed e-con e-parent\" data-id=\"39de6d0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c650d36 elementor-widget elementor-widget-heading\" data-id=\"c650d36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Choose FourthSquare?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0254e65 elementor-widget elementor-widget-heading\" data-id=\"0254e65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Expertise you can measure. Trust you can feel.\n<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bae7dcd elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bae7dcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1143e31 elementor-widget__width-inherit elementor-widget elementor-widget-html\" data-id=\"1143e31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!DOCTYPE html>\r\n<html lang=\"en\">\r\n\r\n<head>\r\n\r\n<meta charset=\"UTF-8\">\r\n<title>Case Studies Slider<\/title>\r\n\r\n<!-- Bootstrap -->\r\n<link href=\"https:\/\/cdn.jsdelivr.net\/npm\/bootstrap@5.3.2\/dist\/css\/bootstrap.min.css\" rel=\"stylesheet\">\r\n\r\n<!-- Slick Slider -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.css\">\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick-theme.css\">\r\n\r\n<!-- Font Awesome -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/7.0.1\/css\/all.min.css\">\r\n\r\n<style>\r\n\r\n.case-studies-slider{\r\npadding:0 10px;\r\n}\r\n\r\n\/* spacing between slides *\/\r\n.slide-item{\r\npadding:15px;\r\n}\r\n\r\n\/* card style *\/\r\n.case-studies-slider .card{\r\nborder-radius:22px;\r\npadding:30px 20px;\r\ntext-align:center;\r\nbox-shadow:0 8px 20px rgba(0,0,0,0.08);\r\nborder:none;\r\ntransition:.3s;\r\nheight:100%;\r\n}\r\n\r\n.case-studies-slider .card:hover{\r\ntransform:translateY(-8px);\r\nbox-shadow:0 15px 30px rgba(0,0,0,0.12);\r\n}\r\n\r\n.case-studies-slider img{\r\nmargin-bottom:15px;\r\n}\r\n\r\n.case-studies-slider h6{\r\nfont-size:18px;\r\nfont-weight:700;\r\nmargin-bottom:10px;\r\n}\r\n\r\n.case-studies-slider p{\r\nfont-size:15px;\r\nline-height:1.6;\r\nmargin:0;\r\n}\r\n\r\n\/* arrows *\/\r\n\r\n.custom-prev,\r\n.custom-next{\r\nposition:absolute;\r\ntop:50%;\r\ntransform:translateY(-50%);\r\nwidth:45px;\r\nheight:45px;\r\nbackground:#1fa043;\r\nborder-radius:50%;\r\nborder:none;\r\ndisplay:flex;\r\nalign-items:center;\r\njustify-content:center;\r\nz-index:10;\r\nbox-shadow:0 6px 12px rgba(0,0,0,0.15);\r\ncursor:pointer;\r\n}\r\n\r\n.custom-prev{\r\nleft:-25px;\r\n}\r\n\r\n.custom-next{\r\nright:-25px;\r\n}\r\n\r\n.custom-prev i,\r\n.custom-next i{\r\ncolor:#fff;\r\nfont-size:18px;\r\n}\r\n\r\n.custom-prev:hover,\r\n.custom-next:hover{\r\nbackground:#000;\r\n}\r\n\r\n<\/style>\r\n\r\n<\/head>\r\n\r\n<body>\r\n\r\n<div class=\"container\">\r\n\r\n<div class=\"case-studies-slider\">\r\n\r\n<!-- Card 1 -->\r\n<div class=\"slide-item col-md-4\">\r\n<div class=\"card\">\r\n<div class=\"card-body\">\r\n<img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/7909\/7909971.png\" width=\"50\">\r\n<h6>End-to-End Expertise<\/h6>\r\n<p>From strategy to SOC run\u2014one accountable partner.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<!-- Card 2 -->\r\n<div class=\"slide-item col-md-4\">\r\n<div class=\"card\">\r\n<div class=\"card-body\">\r\n<img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/16856\/16856218.png\" width=\"50\">\r\n<h6>Compliance Mastery<\/h6>\r\n<p>DPDPA, CERT-IN, GDPR, HIPAA, PCI-DSS & more.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<!-- Card 3 -->\r\n<div class=\"slide-item col-md-4\">\r\n<div class=\"card\">\r\n<div class=\"card-body\">\r\n<img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/5352\/5352110.png\" width=\"50\">\r\n<h6>Certified Practitioners<\/h6>\r\n<p>Hands-on experts who\u2019ve shipped secure outcomes.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<!-- Card 4 -->\r\n<div class=\"slide-item col-md-4\">\r\n<div class=\"card\">\r\n<div class=\"card-body\">\r\n<img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/8572\/8572068.png\" width=\"50\">\r\n<h6>Agile Delivery<\/h6>\r\n<p>Right-sized for startups to large enterprises.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<!-- Card 5 -->\r\n<div class=\"slide-item col-md-4\">\r\n<div class=\"card\">\r\n<div class=\"card-body\">\r\n<img decoding=\"async\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/4371\/4371076.png\" width=\"50\">\r\n<h6>Trusted Across Sectors<\/h6>\r\n<p>Government, BFSI, Healthcare, Energy & Tech.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<\/div>\r\n\r\n<\/div>\r\n\r\n\r\n<!-- jQuery -->\r\n<script src=\"https:\/\/code.jquery.com\/jquery-3.7.1.min.js\"><\/script>\r\n\r\n<!-- Slick JS -->\r\n<script src=\"https:\/\/cdn.jsdelivr.net\/npm\/slick-carousel@1.8.1\/slick\/slick.min.js\"><\/script>\r\n\r\n<script>\r\n\r\n$('.case-studies-slider').slick({\r\n\r\nslidesToShow:3,\r\nslidesToScroll:1,\r\nautoplay:true,\r\nautoplaySpeed:3000,\r\nspeed:700,\r\narrows:true,\r\ndots:false,\r\n\r\nprevArrow:`<button class=\"custom-prev\"><i class=\"fa-solid fa-angle-left\"><\/i><\/button>`,\r\nnextArrow:`<button class=\"custom-next\"><i class=\"fa-solid fa-angle-right\"><\/i><\/button>`,\r\n\r\nresponsive:[\r\n\r\n{\r\nbreakpoint:992,\r\nsettings:{slidesToShow:2}\r\n},\r\n\r\n{\r\nbreakpoint:600,\r\nsettings:{slidesToShow:1}\r\n}\r\n\r\n]\r\n\r\n});\r\n\r\n<\/script>\r\n\r\n<\/body>\r\n<\/html>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e9e7559 e-flex e-con-boxed e-con e-parent\" data-id=\"e9e7559\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5015a4a elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5015a4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Let\u2019s Start the\n <br><span style=\"color:#6c757d\">Conversation<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ff58f4 elementor-widget elementor-widget-text-editor\" data-id=\"1ff58f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tSecure your organisation from evolving threats\n\n\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fb7acc2 e-con-full e-flex e-con e-child\" data-id=\"fb7acc2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb8ac64 elementor-widget elementor-widget-button\" data-id=\"bb8ac64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"tel:+19729196135\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-phone-alt\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M497.39 361.8l-112-48a24 24 0 0 0-28 6.9l-49.6 60.6A370.66 370.66 0 0 1 130.6 204.11l60.6-49.6a23.94 23.94 0 0 0 6.9-28l-48-112A24.16 24.16 0 0 0 122.6.61l-104 24A24 24 0 0 0 0 48c0 256.5 207.9 464 464 464a24 24 0 0 0 23.4-18.6l24-104a24.29 24.29 0 0 0-14.01-27.6z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\"> Call Us Now         <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-964c245 elementor-widget elementor-widget-button\" data-id=\"964c245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"mailto:info@fourthsquare.com\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\"> Email Us         <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e4de79 elementor-widget elementor-widget-text-editor\" data-id=\"0e4de79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tOur team typically responds within 24 hours\n\n \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n    <div class=\"xs_social_share_widget xs_share_url after_content \t\tmain_content  wslu-style-1 wslu-share-box-shaped wslu-fill-colored wslu-none wslu-share-horizontal wslu-theme-font-no wslu-main_content\">\n\n\t\t\n        <ul>\n\t\t\t        <\/ul>\n    <\/div> \n","protected":false},"excerpt":{"rendered":"<p>Enabling Trust in a Hyper connected World We embed Security by Design and Privacy by Design across your organisation making [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7505,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-47","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-json\/wp\/v2\/pages\/47","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-json\/wp\/v2\/comments?post=47"}],"version-history":[{"count":0,"href":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-json\/wp\/v2\/pages\/47\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-json\/wp\/v2\/pages\/7505"}],"wp:attachment":[{"href":"https:\/\/bestcoachinginstitute.com\/project\/fourthsquare\/wp-json\/wp\/v2\/media?parent=47"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}