{"id":187,"date":"2025-08-22T15:02:03","date_gmt":"2025-08-22T13:02:03","guid":{"rendered":"https:\/\/www.nexiguard-partners.com\/conseil-strategique-en-cybersecurite\/"},"modified":"2025-09-05T16:44:31","modified_gmt":"2025-09-05T14:44:31","slug":"strategic-cybersecurity-consulting","status":"publish","type":"page","link":"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/","title":{"rendered":"Strategic Cybersecurity Consulting"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#F7F7FA&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_stops=&#8221;rgba(255,255,255,0) 0%|rgba(115,70,239,0.6) 100%&#8221; background_color_gradient_overlays_image=&#8221;on&#8221; background_image=&#8221;https:\/\/www.nexiguard-partners.com\/wp-content\/uploads\/2025\/08\/conseil-strat-bg.webp&#8221; max_width=&#8221;1550px&#8221; custom_margin=&#8221;||35px||false|false&#8221; custom_padding=&#8221;100px|45px|100px|45px|true|true&#8221; border_radii=&#8221;on|25px|25px|25px|25px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Bruno Ace SC||||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;64px&#8221; custom_margin=&#8221;||15px||false|false&#8221; header_font_size_tablet=&#8221;64px&#8221; header_font_size_phone=&#8221;34px&#8221; header_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Nexiguard<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;&#8211;et_global_body_font||||||||&#8221; text_text_color=&#8221;#FFFFFF&#8221; text_font_size=&#8221;16px&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;20px&#8221; header_3_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Strategic cybersecurity consulting.<\/h3>\n<p>Make cybersecurity a strategic asset.<br \/>\nNexiguard is by your side in France and internationally to help you navigate this complex environment, anticipate risks, and secure your company&#8217;s future.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1500px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#F7F7FA&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#3F3F52&#8243; text_font_size=&#8221;15px&#8221; header_3_font_size=&#8221;20px&#8221; width=&#8221;90%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>Adopt a proactive approach to secure your business <\/strong><strong>:<\/strong><\/h3>\n<p>Cybersecurity is no longer just a technical issue, but a strategic challenge that impacts business resilience, reputation and competitiveness. At Nexiguard, we support organizations in France and internationally in developing and implementing their cybersecurity strategy, ensuring a personalized approach aligned with their development objectives.[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#F7F7FA&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#3F3F52&#8243; text_font_size=&#8221;15px&#8221; header_3_font_size=&#8221;20px&#8221; width=&#8221;90%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>Strategic cupport: Security aligned with your objectives :<\/strong><\/h3>\n<p>We help companies integrate cybersecurity into their overall strategy, to protect their digital assets while facilitating their growth. Our mission is to help you anticipate risks, secure your systems and comply with regulations.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#F7F7FA&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1500px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nexiguard-partners.com\/wp-content\/uploads\/2025\/08\/icone-cybersecurite.svg&#8221; title_text=&#8221;icone-cybersecurite&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_text_color=&#8221;#14141C&#8221; header_2_font_size=&#8221;24px&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||10px||false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Our <span style=\"color: #7346ef;\">strategic support<\/span> steps:<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1500px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#3F3F52&#8243; text_font_size=&#8221;15px&#8221; header_3_font_size=&#8221;20px&#8221; width=&#8221;90%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>1. Risk Assessment and Diagnosis<br \/>\n<\/strong><\/h3>\n<p>Every organization is unique. We begin with a comprehensive assessment of your risks and current security posture to identify threats specific to your sector and environment.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Business risk analysis<\/li>\n<li>Identification of critical vulnerabilities<\/li>\n<li>Mapping of sensitive assets<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#3F3F52&#8243; text_font_size=&#8221;15px&#8221; header_3_font_size=&#8221;20px&#8221; width=&#8221;90%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>2. Cybersecurity Strategy Definition<\/strong><\/h3>\n<p>Based on the diagnosis, we define a clear roadmap, integrating security priorities while taking into account your business imperatives. We help you integrate cybersecurity into your decision-making processes.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Action prioritization based on risks<\/li>\n<li>Design of a security policy adapted to your organization<\/li>\n<li>Harmonization with growth objectives and compliance needs<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1500px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#3F3F52&#8243; text_font_size=&#8221;15px&#8221; header_3_font_size=&#8221;20px&#8221; width=&#8221;90%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>3. Implementation support<br \/><\/strong><\/h3>\n<p>A good strategy doesn&#8217;t stop at theory. We support you in implementing the solutions and processes necessary to achieve your security objectives<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Securing critical infrastructures<\/li>\n<li>Integration of data and system protection solutions<\/li>\n<li>Continuous threat monitoring and incident management<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#3F3F52&#8243; text_font_size=&#8221;15px&#8221; header_3_font_size=&#8221;20px&#8221; width=&#8221;90%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>4. Management and continuous adjustment<\/strong><\/h3>\n<p>The environment of cyber threats evolves rapidly. We support you in managing and evolving your cybersecurity strategy to ensure it remains aligned with new threats and transformations in your business.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Strategy adjustments according to new challenges<\/li>\n<li>Ajustements de la strat\u00e9gie selon les nouveaux enjeux<\/li>\n<li>Monitoring compliance with applicable standards (RGPD, ISO 27001, etc.)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row make_equal=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;1500px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#FFFFFF&#8221; custom_padding=&#8221;25px|25px|25px|25px|true|true&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#3F3F52&#8243; text_font_size=&#8221;15px&#8221; header_3_font_size=&#8221;20px&#8221; width=&#8221;90%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><strong>Why Trust Us ?<\/strong><\/h3>\n<ul><\/ul>\n<ul>\n<li><strong>Personalized approach<\/strong><span>\u00a0<\/span>: We adapt each strategy to the specificities of your sector and your objectives.<\/li>\n<li><strong>Recognized expertise<\/strong><span>\u00a0<\/span>: Our consultants have years of experience in cybersecurity management for companies of all sizes.<\/li>\n<li><strong>Business focus<\/strong><span>\u00a0<\/span>: We integrate security into your company&#8217;s overall strategy, minimizing the impact on your operations while maximizing your protection.<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul><\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>NexiguardStrategic cybersecurity consulting. Make cybersecurity a strategic asset. Nexiguard is by your side in France and internationally to help you navigate this complex environment, anticipate risks, and secure your company&#8217;s future.Adopt a proactive approach to secure your business : Cybersecurity is no longer just a technical issue, but a strategic challenge that impacts business resilience, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"dipi_cpt_category":[],"class_list":["post-187","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Strategic Cybersecurity Consulting - Nexiguard<\/title>\n<meta name=\"description\" content=\"Benefit from Nexiguard\u2019s strategic consulting to anticipate threats and strengthen your cybersecurity for the long term.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strategic Cybersecurity Consulting - Nexiguard\" \/>\n<meta property=\"og:description\" content=\"Benefit from Nexiguard\u2019s strategic consulting to anticipate threats and strengthen your cybersecurity for the long term.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/\" \/>\n<meta property=\"og:site_name\" content=\"Nexiguard\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-05T14:44:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/strategic-cybersecurity-consulting\\\/\",\"url\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/strategic-cybersecurity-consulting\\\/\",\"name\":\"Strategic Cybersecurity Consulting - Nexiguard\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/#website\"},\"datePublished\":\"2025-08-22T13:02:03+00:00\",\"dateModified\":\"2025-09-05T14:44:31+00:00\",\"description\":\"Benefit from Nexiguard\u2019s strategic consulting to anticipate threats and strengthen your cybersecurity for the long term.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/strategic-cybersecurity-consulting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/strategic-cybersecurity-consulting\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/strategic-cybersecurity-consulting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strategic Cybersecurity Consulting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/\",\"name\":\"Nexiguard\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nexiguard-partners.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Strategic Cybersecurity Consulting - Nexiguard","description":"Benefit from Nexiguard\u2019s strategic consulting to anticipate threats and strengthen your cybersecurity for the long term.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/","og_locale":"en_US","og_type":"article","og_title":"Strategic Cybersecurity Consulting - Nexiguard","og_description":"Benefit from Nexiguard\u2019s strategic consulting to anticipate threats and strengthen your cybersecurity for the long term.","og_url":"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/","og_site_name":"Nexiguard","article_modified_time":"2025-09-05T14:44:31+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/","url":"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/","name":"Strategic Cybersecurity Consulting - Nexiguard","isPartOf":{"@id":"https:\/\/www.nexiguard-partners.com\/en\/#website"},"datePublished":"2025-08-22T13:02:03+00:00","dateModified":"2025-09-05T14:44:31+00:00","description":"Benefit from Nexiguard\u2019s strategic consulting to anticipate threats and strengthen your cybersecurity for the long term.","breadcrumb":{"@id":"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.nexiguard-partners.com\/en\/strategic-cybersecurity-consulting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.nexiguard-partners.com\/en\/"},{"@type":"ListItem","position":2,"name":"Strategic Cybersecurity Consulting"}]},{"@type":"WebSite","@id":"https:\/\/www.nexiguard-partners.com\/en\/#website","url":"https:\/\/www.nexiguard-partners.com\/en\/","name":"Nexiguard","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nexiguard-partners.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/pages\/187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/comments?post=187"}],"version-history":[{"count":5,"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/pages\/187\/revisions"}],"predecessor-version":[{"id":247,"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/pages\/187\/revisions\/247"}],"wp:attachment":[{"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/media?parent=187"}],"wp:term":[{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/www.nexiguard-partners.com\/en\/wp-json\/wp\/v2\/dipi_cpt_category?post=187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}