[{"data":1,"prerenderedAt":1102},["ShallowReactive",2],{"$fE3qmD0FMmbyH6Xp_Pmwa7IoVs3pVkWtK8RjDPjbEPaE":3,"$fTvkUZNN1yfLEGDxBDI_haUBAcs7W1OOUzv2tYjM9V6E":257,"$fiGWLpQvDgHw83dMgkN5jClF1sD1PhdI5wXdb7q5UVeA":407,"$fTDGi3B0xK-5KIdN7Xam2gpGfrtZOK-OtTUxHb7hLjTs":417,"$fFojeK6Aj8e5N2GgeEF0zbkM4s9Ix4Q7HVfLjB1s6aXs":481,"$f6kf6c8KsOSfFf9avr98NAYMXfg5M8A-HJ1qG__sfPds":501,"$fvvcAcxJHlBOqeSZBZlzdKxRdnPkytjF-K4UCktVwIAQ":1068},[4,88,152,161,170,218,247],{"ID":5,"post_author":6,"post_date":7,"post_date_gmt":7,"post_content":8,"post_title":9,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":12,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":14,"menu_order":15,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":5,"menu_item_parent":17,"object_id":19,"object":20,"type":21,"type_label":22,"url":23,"title":9,"target":8,"attr_title":8,"description":8,"classes":24,"xfn":8,"layout_type":25,"children":26},13550,"32","2026-03-23 03:32:05","","Services","publish","closed","services-4",0,"https://cbtw.tech/preview/post/13550?p=13550&#038;preview=true&#038;post_type=nav_menu_item",1,"nav_menu_item","0","raw","12830","page","post_type","Page","https://cbtw.tech/apac/service-overview/",[8],"services",[27,36,49,60,69,78],{"ID":28,"post_author":6,"post_date":7,"post_date_gmt":7,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":30,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":31,"menu_order":32,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":28,"menu_item_parent":33,"object_id":19,"object":20,"type":21,"type_label":22,"url":23,"title":34,"target":8,"attr_title":8,"description":8,"classes":35,"xfn":8,"layout_type":25},13551," ","13551","https://cbtw.tech/preview/post/13551?p=13551&#038;preview=true&#038;post_type=nav_menu_item",2,"13550","Services Overview",[8],{"ID":37,"post_author":38,"post_date":7,"post_date_gmt":39,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":40,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":41,"guid":42,"menu_order":43,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":37,"menu_item_parent":33,"object_id":44,"object":20,"type":21,"type_label":22,"url":45,"title":46,"target":8,"attr_title":8,"description":8,"classes":47,"xfn":8,"layout_type":48},10788,"26","2025-10-07 04:49:57","10788",12830,"https://cbtw.tech/insights/10788",3,"7212","https://cbtw.tech/apac/service-overview/software-engineering/","Software Engineering",[8],"default",{"ID":50,"post_author":51,"post_date":7,"post_date_gmt":52,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":53,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":54,"menu_order":55,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":50,"menu_item_parent":33,"object_id":56,"object":20,"type":21,"type_label":22,"url":57,"title":58,"target":8,"attr_title":8,"description":8,"classes":59,"xfn":8,"layout_type":48},13444,"22","2026-03-20 13:07:25","13444","https://cbtw.tech/preview/post/13444?p=13444&#038;preview=true&#038;post_type=nav_menu_item",4,"13023","https://cbtw.tech/apac/service-overview/ai-data-platforms/","AI &amp; Data Platforms",[8],{"ID":61,"post_author":38,"post_date":7,"post_date_gmt":39,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":62,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":63,"menu_order":64,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":61,"menu_item_parent":33,"object_id":65,"object":20,"type":21,"type_label":22,"url":66,"title":67,"target":8,"attr_title":8,"description":8,"classes":68,"xfn":8,"layout_type":25},10786,"cloud-enterprise-platforms","https://cbtw.tech/insights/cloud-enterprise-platforms",5,"7500","https://cbtw.tech/apac/service-overview/cloud-and-enterprise-platforms/","Cloud &amp; Enterprise Platforms",[8],{"ID":70,"post_author":51,"post_date":7,"post_date_gmt":52,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":71,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":72,"menu_order":73,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":70,"menu_item_parent":33,"object_id":74,"object":20,"type":21,"type_label":22,"url":75,"title":76,"target":8,"attr_title":8,"description":8,"classes":77,"xfn":8,"layout_type":48},13443,"13443","https://cbtw.tech/preview/post/13443?p=13443&#038;preview=true&#038;post_type=nav_menu_item",6,"13141","https://cbtw.tech/apac/service-overview/cybersecurity/","Cybersecurity",[8],{"ID":79,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":81,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":82,"menu_order":83,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":79,"menu_item_parent":33,"object_id":84,"object":20,"type":21,"type_label":22,"url":85,"title":86,"target":8,"attr_title":8,"description":8,"classes":87,"xfn":8,"layout_type":48},10789,"2025-10-07 04:49:58","strategy-product-transformation","https://cbtw.tech/insights/strategy-product-transformation",7,"7149","https://cbtw.tech/apac/service-overview/strategy-product-transformation/","Strategy, Product &amp; Transformation",[8],{"ID":89,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":90,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":91,"menu_order":92,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":89,"menu_item_parent":17,"object_id":93,"object":20,"type":21,"type_label":22,"url":94,"title":95,"target":8,"attr_title":8,"description":8,"classes":96,"xfn":8,"layout_type":97,"children":98},10790,"10790","https://cbtw.tech/insights/10790",8,"6941","https://cbtw.tech/apac/sectors/","Sectors",[8],"sectors",[99,106,116,125,134,143],{"ID":100,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":8,"post_title":101,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":102,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":103,"menu_order":104,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":100,"menu_item_parent":90,"object_id":93,"object":20,"type":21,"type_label":22,"url":94,"title":101,"target":8,"attr_title":8,"description":8,"classes":105,"xfn":8,"layout_type":97},10791,"Sectors Overview","sectors-overview-2","https://cbtw.tech/insights/sectors-overview-2",9,[8],{"ID":107,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":108,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":109,"guid":110,"menu_order":111,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":107,"menu_item_parent":90,"object_id":112,"object":20,"type":21,"type_label":22,"url":113,"title":114,"target":8,"attr_title":8,"description":8,"classes":115,"xfn":8,"layout_type":48},10792,"banking-finance",6941,"https://cbtw.tech/insights/banking-finance",10,"8592","https://cbtw.tech/apac/sectors/banking-and-finance/","Banking &#038; Finance",[8],{"ID":117,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":118,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":109,"guid":119,"menu_order":120,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":117,"menu_item_parent":90,"object_id":121,"object":20,"type":21,"type_label":22,"url":122,"title":123,"target":8,"attr_title":8,"description":8,"classes":124,"xfn":8,"layout_type":48},10793,"energy-utilities","https://cbtw.tech/insights/energy-utilities",11,"8111","https://cbtw.tech/apac/sectors/energy-utilities/","Energy &amp; Utilities",[8],{"ID":126,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":127,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":109,"guid":128,"menu_order":129,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":126,"menu_item_parent":90,"object_id":130,"object":20,"type":21,"type_label":22,"url":131,"title":132,"target":8,"attr_title":8,"description":8,"classes":133,"xfn":8,"layout_type":48},10794,"10794","https://cbtw.tech/insights/10794",12,"8473","https://cbtw.tech/apac/sectors/luxury/","Luxury",[8],{"ID":135,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":136,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":109,"guid":137,"menu_order":138,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":135,"menu_item_parent":90,"object_id":139,"object":20,"type":21,"type_label":22,"url":140,"title":141,"target":8,"attr_title":8,"description":8,"classes":142,"xfn":8,"layout_type":48},10795,"10795","https://cbtw.tech/insights/10795",13,"8191","https://cbtw.tech/apac/sectors/manufacturing-industry/","Manufacturing &amp; Industry",[8],{"ID":144,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":145,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":109,"guid":146,"menu_order":147,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":144,"menu_item_parent":90,"object_id":148,"object":20,"type":21,"type_label":22,"url":149,"title":150,"target":8,"attr_title":8,"description":8,"classes":151,"xfn":8,"layout_type":48},10796,"telecommunications-media","https://cbtw.tech/insights/telecommunications-media",14,"8746","https://cbtw.tech/apac/sectors/telecommunications-media/","Telecommunications &amp; Media",[8],{"ID":153,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":154,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":155,"menu_order":156,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":153,"menu_item_parent":17,"object_id":157,"object":20,"type":21,"type_label":22,"url":158,"title":159,"target":8,"attr_title":8,"description":8,"classes":160,"xfn":8,"layout_type":48},10797,"10797","https://cbtw.tech/insights/10797",15,"8384","https://cbtw.tech/apac/partners/","Partners",[8],{"ID":162,"post_author":38,"post_date":7,"post_date_gmt":80,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":163,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":164,"menu_order":165,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":162,"menu_item_parent":17,"object_id":166,"object":20,"type":21,"type_label":22,"url":167,"title":168,"target":8,"attr_title":8,"description":8,"classes":169,"xfn":8,"layout_type":48},10798,"10798","https://cbtw.tech/insights/10798",16,"7435","https://cbtw.tech/apac/about/","About",[8],{"ID":171,"post_author":38,"post_date":7,"post_date_gmt":172,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":173,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":174,"menu_order":175,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":171,"menu_item_parent":17,"object_id":176,"object":20,"type":21,"type_label":22,"url":177,"title":178,"target":8,"attr_title":8,"description":8,"classes":179,"xfn":8,"layout_type":180,"children":181},10799,"2025-10-07 04:49:59","10799","https://cbtw.tech/insights/10799",17,"74","https://cbtw.tech/apac/insights/","Insights",[8],"insights",[182,189,200,209],{"ID":183,"post_author":38,"post_date":7,"post_date_gmt":172,"post_content":8,"post_title":184,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":185,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":186,"menu_order":187,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":183,"menu_item_parent":173,"object_id":176,"object":20,"type":21,"type_label":22,"url":177,"title":184,"target":8,"attr_title":8,"description":8,"classes":188,"xfn":8,"layout_type":180},10800,"Insights Overview","insights-overview-2","https://cbtw.tech/insights/insights-overview-2",18,[8],{"ID":190,"post_author":38,"post_date":7,"post_date_gmt":172,"post_content":8,"post_title":191,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":192,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":193,"menu_order":194,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":190,"menu_item_parent":173,"object_id":195,"object":196,"type":196,"type_label":197,"title":191,"url":198,"target":8,"attr_title":8,"description":8,"classes":199,"xfn":8,"layout_type":48},10801,"Expert Articles","expert-articles","https://cbtw.tech/insights/expert-articles",19,"10801","custom","Custom Link","https://cbtw.tech/apac/insights?categories=insights",[8],{"ID":201,"post_author":38,"post_date":7,"post_date_gmt":172,"post_content":8,"post_title":202,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":203,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":204,"menu_order":205,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":201,"menu_item_parent":173,"object_id":206,"object":196,"type":196,"type_label":197,"title":202,"url":207,"target":8,"attr_title":8,"description":8,"classes":208,"xfn":8,"layout_type":48},10802,"Case Studies","case-studies-3","https://cbtw.tech/insights/case-studies-3",20,"10802","https://cbtw.tech/apac/insights?categories=case-studies",[8],{"ID":210,"post_author":38,"post_date":7,"post_date_gmt":172,"post_content":8,"post_title":211,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":212,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":213,"menu_order":214,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":210,"menu_item_parent":173,"object_id":215,"object":196,"type":196,"type_label":197,"title":211,"url":216,"target":8,"attr_title":8,"description":8,"classes":217,"xfn":8,"layout_type":48},10803,"Resources","resources-3","https://cbtw.tech/insights/resources-3",21,"10803","https://cbtw.tech/apac/insights?categories=resources",[8],{"ID":219,"post_author":38,"post_date":7,"post_date_gmt":172,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":220,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":221,"menu_order":222,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":219,"menu_item_parent":17,"object_id":223,"object":20,"type":21,"type_label":22,"url":224,"title":225,"target":8,"attr_title":8,"description":8,"classes":226,"xfn":8,"layout_type":48,"children":227},10804,"10804","https://cbtw.tech/insights/10804",22,"6937","https://cbtw.tech/apac/careers/","Careers",[8],[228,236],{"ID":229,"post_author":38,"post_date":7,"post_date_gmt":230,"post_content":8,"post_title":231,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":232,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":233,"menu_order":234,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":229,"menu_item_parent":220,"object_id":223,"object":20,"type":21,"type_label":22,"url":224,"title":231,"target":8,"attr_title":8,"description":8,"classes":235,"xfn":8,"layout_type":48},10805,"2025-10-07 04:50:00","Culture","culture-3","https://cbtw.tech/insights/culture-3",23,[8],{"ID":237,"post_author":38,"post_date":7,"post_date_gmt":238,"post_content":8,"post_title":239,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":240,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":241,"menu_order":242,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":237,"menu_item_parent":220,"object_id":243,"object":196,"type":196,"type_label":197,"title":239,"url":244,"target":245,"attr_title":8,"description":8,"classes":246,"xfn":8,"layout_type":48},10806,"2025-10-07 04:50:01","Open Positions","open-positions-2","https://cbtw.tech/insights/open-positions-2",24,"10806","https://jobs-collaborationbetterstheworld.icims.com/jobs/search?hashed=-625911731","_blank",[8],{"ID":248,"post_author":38,"post_date":7,"post_date_gmt":238,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":249,"to_ping":8,"pinged":8,"post_modified":7,"post_modified_gmt":7,"post_content_filtered":8,"post_parent":13,"guid":250,"menu_order":251,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":248,"menu_item_parent":17,"object_id":252,"object":20,"type":21,"type_label":22,"url":253,"title":254,"target":8,"attr_title":8,"description":8,"classes":255,"xfn":8,"layout_type":256},10807,"10807","https://cbtw.tech/insights/10807",25,"6718","https://cbtw.tech/apac/contact/","Contact",[8],"contact",[258,298,340,352,365,389],{"ID":259,"post_author":6,"post_date":260,"post_date_gmt":260,"post_content":8,"post_title":9,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":261,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":13,"guid":262,"menu_order":15,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":259,"menu_item_parent":17,"object_id":19,"object":20,"type":21,"type_label":22,"url":23,"title":9,"target":8,"attr_title":8,"description":8,"classes":263,"xfn":8,"layout_type":25,"children":264},13564,"2026-03-23 06:54:51","services-9","https://cbtw.tech/preview/post/13564?p=13564&#038;preview=true&#038;post_type=nav_menu_item",[8],[265,271,277,283,288,293],{"ID":266,"post_author":6,"post_date":260,"post_date_gmt":260,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":267,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":13,"guid":268,"menu_order":32,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":266,"menu_item_parent":269,"object_id":19,"object":20,"type":21,"type_label":22,"url":23,"title":34,"target":8,"attr_title":8,"description":8,"classes":270,"xfn":8,"layout_type":25},13565,"13565","https://cbtw.tech/preview/post/13565?p=13565&#038;preview=true&#038;post_type=nav_menu_item","13564",[8],{"ID":272,"post_author":38,"post_date":260,"post_date_gmt":273,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":274,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":41,"guid":275,"menu_order":43,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":272,"menu_item_parent":269,"object_id":44,"object":20,"type":21,"type_label":22,"url":45,"title":46,"target":8,"attr_title":8,"description":8,"classes":276,"xfn":8,"layout_type":48},10812,"2025-10-07 04:50:02","10812","https://cbtw.tech/insights/10812",[8],{"ID":278,"post_author":6,"post_date":260,"post_date_gmt":279,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":280,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":41,"guid":281,"menu_order":55,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":278,"menu_item_parent":269,"object_id":56,"object":20,"type":21,"type_label":22,"url":57,"title":58,"target":8,"attr_title":8,"description":8,"classes":282,"xfn":8,"layout_type":48},13469,"2026-03-20 14:13:36","13469","https://cbtw.tech/preview/post/13469?p=13469&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":284,"post_author":38,"post_date":260,"post_date_gmt":273,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":285,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":41,"guid":286,"menu_order":64,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":284,"menu_item_parent":269,"object_id":65,"object":20,"type":21,"type_label":22,"url":66,"title":67,"target":8,"attr_title":8,"description":8,"classes":287,"xfn":8,"layout_type":25},10810,"cloud-enterprise-platforms-2","https://cbtw.tech/insights/cloud-enterprise-platforms-2",[8],{"ID":289,"post_author":6,"post_date":260,"post_date_gmt":279,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":290,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":13,"guid":291,"menu_order":73,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":289,"menu_item_parent":269,"object_id":74,"object":20,"type":21,"type_label":22,"url":75,"title":76,"target":8,"attr_title":8,"description":8,"classes":292,"xfn":8,"layout_type":48},13470,"13470","https://cbtw.tech/preview/post/13470?p=13470&#038;preview=true&#038;post_type=nav_menu_item",[8],{"ID":294,"post_author":38,"post_date":260,"post_date_gmt":273,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":295,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":41,"guid":296,"menu_order":83,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":294,"menu_item_parent":269,"object_id":84,"object":20,"type":21,"type_label":22,"url":85,"title":86,"target":8,"attr_title":8,"description":8,"classes":297,"xfn":8,"layout_type":48},10813,"strategy-product-transformation-2","https://cbtw.tech/insights/strategy-product-transformation-2",[8],{"ID":299,"post_author":38,"post_date":260,"post_date_gmt":273,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":300,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":13,"guid":301,"menu_order":92,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":299,"menu_item_parent":17,"object_id":93,"object":20,"type":21,"type_label":22,"url":94,"title":95,"target":8,"attr_title":8,"description":8,"classes":302,"xfn":8,"layout_type":97,"children":303},10814,"10814","https://cbtw.tech/insights/10814",[8],[304,309,314,320,325,330],{"ID":305,"post_author":38,"post_date":260,"post_date_gmt":273,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":306,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":109,"guid":307,"menu_order":104,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":305,"menu_item_parent":300,"object_id":112,"object":20,"type":21,"type_label":22,"url":113,"title":114,"target":8,"attr_title":8,"description":8,"classes":308,"xfn":8,"layout_type":48},10815,"banking-finance-2","https://cbtw.tech/insights/banking-finance-2",[8],{"ID":310,"post_author":38,"post_date":260,"post_date_gmt":273,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":311,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":109,"guid":312,"menu_order":111,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":310,"menu_item_parent":300,"object_id":121,"object":20,"type":21,"type_label":22,"url":122,"title":123,"target":8,"attr_title":8,"description":8,"classes":313,"xfn":8,"layout_type":48},10816,"energy-utilities-2","https://cbtw.tech/insights/energy-utilities-2",[8],{"ID":315,"post_author":38,"post_date":260,"post_date_gmt":316,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":317,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":109,"guid":318,"menu_order":120,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":315,"menu_item_parent":300,"object_id":130,"object":20,"type":21,"type_label":22,"url":131,"title":132,"target":8,"attr_title":8,"description":8,"classes":319,"xfn":8,"layout_type":48},10817,"2025-10-07 04:50:03","10817","https://cbtw.tech/insights/10817",[8],{"ID":321,"post_author":38,"post_date":260,"post_date_gmt":316,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":322,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":109,"guid":323,"menu_order":129,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":321,"menu_item_parent":300,"object_id":139,"object":20,"type":21,"type_label":22,"url":140,"title":141,"target":8,"attr_title":8,"description":8,"classes":324,"xfn":8,"layout_type":48},10818,"10818","https://cbtw.tech/insights/10818",[8],{"ID":326,"post_author":38,"post_date":260,"post_date_gmt":316,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":327,"to_ping":8,"pinged":8,"post_modified":260,"post_modified_gmt":260,"post_content_filtered":8,"post_parent":109,"guid":328,"menu_order":138,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":326,"menu_item_parent":300,"object_id":148,"object":20,"type":21,"type_label":22,"url":149,"title":150,"target":8,"attr_title":8,"description":8,"classes":329,"xfn":8,"layout_type":48},10819,"telecommunications-media-2","https://cbtw.tech/insights/telecommunications-media-2",[8],{"ID":331,"post_author":51,"post_date":332,"post_date_gmt":333,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":334,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":109,"guid":335,"menu_order":147,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":331,"menu_item_parent":300,"object_id":336,"object":20,"type":21,"type_label":22,"url":337,"title":338,"target":8,"attr_title":8,"description":8,"classes":339,"xfn":8,"layout_type":48},13462,"2026-03-23 06:54:52","2026-03-20 14:08:18","13462","https://cbtw.tech/preview/post/13462?p=13462&#038;preview=true&#038;post_type=nav_menu_item","13333","https://cbtw.tech/apac/sectors/retail-and-e-commerce/","Retail &amp; E-commerce",[8],{"ID":341,"post_author":38,"post_date":332,"post_date_gmt":316,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":342,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":343,"menu_order":156,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":341,"menu_item_parent":17,"object_id":157,"object":20,"type":21,"type_label":22,"url":158,"title":159,"target":8,"attr_title":8,"description":8,"classes":344,"xfn":8,"layout_type":48,"children":345},10820,"10820","https://cbtw.tech/insights/10820",[8],[346],{"ID":347,"post_author":38,"post_date":332,"post_date_gmt":316,"post_content":8,"post_title":348,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":349,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":350,"menu_order":165,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":347,"menu_item_parent":342,"object_id":157,"object":20,"type":21,"type_label":22,"url":158,"title":348,"target":8,"attr_title":8,"description":8,"classes":351,"xfn":8,"layout_type":48},10821,"Ecosystem","ecosystem-2","https://cbtw.tech/insights/ecosystem-2",[8],{"ID":353,"post_author":38,"post_date":332,"post_date_gmt":316,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":354,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":355,"menu_order":175,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":353,"menu_item_parent":17,"object_id":166,"object":20,"type":21,"type_label":22,"url":167,"title":168,"target":8,"attr_title":8,"description":8,"classes":356,"xfn":8,"layout_type":48,"children":357},10822,"10822","https://cbtw.tech/insights/10822",[8],[358],{"ID":359,"post_author":38,"post_date":332,"post_date_gmt":360,"post_content":8,"post_title":361,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":362,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":363,"menu_order":187,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":359,"menu_item_parent":354,"object_id":166,"object":20,"type":21,"type_label":22,"url":167,"title":361,"target":8,"attr_title":8,"description":8,"classes":364,"xfn":8,"layout_type":48},10823,"2025-10-07 04:50:04","Company","company","https://cbtw.tech/insights/company",[8],{"ID":366,"post_author":38,"post_date":332,"post_date_gmt":360,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":367,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":368,"menu_order":194,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":366,"menu_item_parent":17,"object_id":176,"object":20,"type":21,"type_label":22,"url":177,"title":178,"target":8,"attr_title":8,"description":8,"classes":369,"xfn":8,"layout_type":180,"children":370},10824,"10824","https://cbtw.tech/insights/10824",[8],[371,377,383],{"ID":372,"post_author":38,"post_date":332,"post_date_gmt":360,"post_content":8,"post_title":178,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":373,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":374,"menu_order":205,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":372,"menu_item_parent":367,"object_id":375,"object":196,"type":196,"type_label":197,"title":178,"url":198,"target":8,"attr_title":8,"description":8,"classes":376,"xfn":8,"layout_type":48},10825,"insights-3","https://cbtw.tech/insights/insights-3","10825",[8],{"ID":378,"post_author":38,"post_date":332,"post_date_gmt":360,"post_content":8,"post_title":202,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":379,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":380,"menu_order":214,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":378,"menu_item_parent":367,"object_id":381,"object":196,"type":196,"type_label":197,"title":202,"url":207,"target":8,"attr_title":8,"description":8,"classes":382,"xfn":8,"layout_type":48},10826,"case-studies-4","https://cbtw.tech/insights/case-studies-4","10826",[8],{"ID":384,"post_author":38,"post_date":332,"post_date_gmt":360,"post_content":8,"post_title":211,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":385,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":386,"menu_order":222,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":384,"menu_item_parent":367,"object_id":387,"object":196,"type":196,"type_label":197,"title":211,"url":216,"target":8,"attr_title":8,"description":8,"classes":388,"xfn":8,"layout_type":48},10827,"resources-4","https://cbtw.tech/insights/resources-4","10827",[8],{"ID":390,"post_author":38,"post_date":332,"post_date_gmt":360,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":391,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":392,"menu_order":234,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":390,"menu_item_parent":17,"object_id":223,"object":20,"type":21,"type_label":22,"url":224,"title":225,"target":8,"attr_title":8,"description":8,"classes":393,"xfn":8,"layout_type":48,"children":394},10828,"10828","https://cbtw.tech/insights/10828",[8],[395,401],{"ID":396,"post_author":38,"post_date":332,"post_date_gmt":397,"post_content":8,"post_title":231,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":398,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":399,"menu_order":242,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":396,"menu_item_parent":391,"object_id":223,"object":20,"type":21,"type_label":22,"url":224,"title":231,"target":8,"attr_title":8,"description":8,"classes":400,"xfn":8,"layout_type":48},10829,"2025-10-07 04:50:05","culture-4","https://cbtw.tech/insights/culture-4",[8],{"ID":402,"post_author":38,"post_date":332,"post_date_gmt":397,"post_content":8,"post_title":239,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":403,"to_ping":8,"pinged":8,"post_modified":332,"post_modified_gmt":332,"post_content_filtered":8,"post_parent":13,"guid":404,"menu_order":251,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":402,"menu_item_parent":391,"object_id":405,"object":196,"type":196,"type_label":197,"title":239,"url":244,"target":245,"attr_title":8,"description":8,"classes":406,"xfn":8,"layout_type":48},10830,"open-positions-3","https://cbtw.tech/insights/open-positions-3","10830",[8],{"items":408,"count":55},[409,411,413,415],{"value":410,"label":410},"EMEA",{"value":412,"label":412},"APAC",{"value":414,"label":414},"Americas",{"value":416,"label":416},"Africa",[418,426,435,444,454,464,473],{"ID":419,"post_author":38,"post_date":397,"post_date_gmt":397,"post_content":8,"post_title":420,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":421,"to_ping":8,"pinged":8,"post_modified":397,"post_modified_gmt":397,"post_content_filtered":8,"post_parent":13,"guid":422,"menu_order":15,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":419,"menu_item_parent":17,"object_id":423,"object":196,"type":196,"type_label":197,"title":420,"url":424,"target":8,"attr_title":8,"description":8,"classes":425,"xfn":8,"layout_type":48},10831,"Cookie Settings","cookie-settings-2","https://cbtw.tech/insights/cookie-settings-2","10831","https://cbtw.tech/apac/",[8],{"ID":427,"post_author":38,"post_date":397,"post_date_gmt":397,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":428,"to_ping":8,"pinged":8,"post_modified":397,"post_modified_gmt":397,"post_content_filtered":8,"post_parent":13,"guid":429,"menu_order":32,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":427,"menu_item_parent":17,"object_id":430,"object":20,"type":21,"type_label":22,"url":431,"title":432,"target":8,"attr_title":8,"description":8,"classes":433,"xfn":8,"layout_type":434},10832,"10832","https://cbtw.tech/insights/10832","616","https://cbtw.tech/apac/terms-of-use/","General terms of use",[8],"terms-of-use",{"ID":436,"post_author":38,"post_date":397,"post_date_gmt":397,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":437,"to_ping":8,"pinged":8,"post_modified":397,"post_modified_gmt":397,"post_content_filtered":8,"post_parent":13,"guid":438,"menu_order":43,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":436,"menu_item_parent":17,"object_id":439,"object":20,"type":21,"type_label":22,"url":440,"title":441,"target":8,"attr_title":8,"description":8,"classes":442,"xfn":8,"layout_type":443},10833,"10833","https://cbtw.tech/insights/10833","687","https://cbtw.tech/apac/cookie-policy/","Cookies Policy",[8],"cookie-policy",{"ID":445,"post_author":38,"post_date":446,"post_date_gmt":446,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":447,"to_ping":8,"pinged":8,"post_modified":446,"post_modified_gmt":446,"post_content_filtered":8,"post_parent":13,"guid":448,"menu_order":55,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":445,"menu_item_parent":17,"object_id":449,"object":20,"type":21,"type_label":22,"url":450,"title":451,"target":8,"attr_title":8,"description":8,"classes":452,"xfn":8,"layout_type":453},10834,"2025-10-07 04:50:06","10834","https://cbtw.tech/insights/10834","255","https://cbtw.tech/apac/privacy-policy/","Privacy Policy",[8],"privacy-policy",{"ID":455,"post_author":38,"post_date":456,"post_date_gmt":456,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":457,"to_ping":8,"pinged":8,"post_modified":456,"post_modified_gmt":456,"post_content_filtered":8,"post_parent":13,"guid":458,"menu_order":64,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":455,"menu_item_parent":17,"object_id":459,"object":20,"type":21,"type_label":22,"url":460,"title":461,"target":8,"attr_title":8,"description":8,"classes":462,"xfn":8,"layout_type":463},10835,"2025-10-07 04:50:07","10835","https://cbtw.tech/insights/10835","403","https://cbtw.tech/apac/whistleblowing-policy/","Whistleblowing Policy",[8],"whistleblowing-policy",{"ID":465,"post_author":38,"post_date":456,"post_date_gmt":456,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":466,"to_ping":8,"pinged":8,"post_modified":456,"post_modified_gmt":456,"post_content_filtered":8,"post_parent":13,"guid":467,"menu_order":73,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":465,"menu_item_parent":17,"object_id":468,"object":20,"type":21,"type_label":22,"url":469,"title":470,"target":8,"attr_title":8,"description":8,"classes":471,"xfn":8,"layout_type":472},10836,"10836","https://cbtw.tech/insights/10836","257","https://cbtw.tech/apac/lodge-a-complaint/","Lodge a complaint",[8],"lodge-a-complaint",{"ID":474,"post_author":38,"post_date":456,"post_date_gmt":456,"post_content":29,"post_title":8,"post_excerpt":8,"post_status":10,"comment_status":11,"ping_status":11,"post_password":8,"post_name":475,"to_ping":8,"pinged":8,"post_modified":456,"post_modified_gmt":456,"post_content_filtered":8,"post_parent":13,"guid":476,"menu_order":83,"post_type":16,"post_mime_type":8,"comment_count":17,"filter":18,"db_id":474,"menu_item_parent":17,"object_id":477,"object":20,"type":21,"type_label":22,"url":478,"title":479,"target":8,"attr_title":8,"description":8,"classes":480,"xfn":8,"layout_type":48},10837,"10837","https://cbtw.tech/insights/10837","2152","https://cbtw.tech/apac/index-egalite-femmes-hommes-de-72-100/","Index égalité femmes-hommes de 72/100",[8],[482,497,499],{"region_name":483,"social_list":484},"Global",[485,489,493],{"title":486,"link":487,"icon":488},"Instagram","https://www.instagram.com/collaborationbetterstheworld/","https://admin.cbtw.tech/wp-content/uploads/insAsset-1@2x.png",{"title":490,"link":491,"icon":492},"LinkedIn","https://www.linkedin.com/company/collaboration-betters-the-world","https://admin.cbtw.tech/wp-content/uploads/lkAsset-2@2x.png",{"title":494,"link":495,"icon":496},"Youtube","https://www.youtube.com/@collaborationbetterstheworld","https://admin.cbtw.tech/wp-content/uploads/youtubeAsset-3@2x.png",{"region_name":8,"social_list":498},[],{"region_name":8,"social_list":500},[],[502],{"id":74,"date":503,"date_gmt":503,"guid":504,"modified":506,"modified_gmt":506,"slug":507,"status":10,"type":20,"link":508,"title":509,"content":510,"excerpt":512,"author":513,"featured_media":514,"featured_image_url":515,"featured_image_sizes":516,"featured_image_alt":518,"parent":19,"menu_order":17,"comment_status":11,"ping_status":11,"template":8,"meta":519,"class_list":526,"acf":532,"yoast_head":8,"yoast_head_json":1061,"lang":8,"translations":1062,"cbtw_related_posts":1063,"cbtw_related_title":8,"breadcrumb":1064,"region":8,"assigned_regions":1065,"region_action_type":8,"cloned_regions":1066,"pll_sync_post":511,"_links":1067},"2026-03-20T07:09:30",{"rendered":505},"https://cbtw.tech/preview/page/13141/?post_type=page&#038;p=13141&#038;preview=true","2026-05-01T14:02:53","cybersecurity","https://cbtw.tech/service-overview/cybersecurity/",{"rendered":76},{"rendered":8,"protected":511},false,{"rendered":8,"protected":511},"24",7934,"https://admin.cbtw.tech/wp-content/uploads/CBTW-Service-Line-Cybersecurity-Cybersecurity-Experts.png",{"full":515,"thumbnail":517},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Service-Line-Cybersecurity-Cybersecurity-Experts-100x100.png","Collage of four diverse team members framed in colorful geometric shapes, representing Cybersecurity experts CBTW",{"layout_type":48,"assigned_regions":520},[521,522,523,524,525],"apac_page","americas_page","emea_page","africa_page","global",[527,20,528,529,530,531],"post-13141","type-page","status-publish","has-post-thumbnail","hentry",{"layout_type":48,"layout_builder":533},[534,558,576,659,767,795,815,884,1003,1023,1035],{"acf_fc_layout":535,"tag_name":536,"section_title":76,"description":537,"cta_link":8,"image":538,"scroll_next_button":556,"hubspot_form_id":557},"block_service_header","SERVICE","We help you grow your business without security constraints holding you back — deploying, operating, and optimizing security capabilities across your entire lifecycle, from governance to incident response.\r\nBuilding a resilient posture that is both technically robust and aligned with your business reality.",{"ID":514,"id":514,"title":539,"filename":540,"filesize":541,"url":515,"link":542,"alt":518,"author":543,"description":539,"caption":539,"name":544,"status":545,"uploaded_to":546,"date":547,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":553,"height":553,"sizes":554},"CBTW-Service-Line-Cybersecurity-Cybersecurity-Experts","CBTW-Service-Line-Cybersecurity-Cybersecurity-Experts.png",136532,"https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-cybersecurity-experts/","12","cbtw-service-line-cybersecurity-cybersecurity-experts","inherit",13141,"2025-06-30 14:53:59","2026-03-20 14:46:36","image/png","image","png","https://admin.cbtw.tech/wp-includes/images/media/default.png",501,{"thumbnail":517,"thumbnail-width":555,"thumbnail-height":555,"medium":515,"medium-width":553,"medium-height":553,"medium_large":515,"medium_large-width":553,"medium_large-height":553,"large":515,"large-width":553,"large-height":553,"1536x1536":515,"1536x1536-width":553,"1536x1536-height":553,"2048x2048":515,"2048x2048-width":553,"2048x2048-height":553},100,true,"2b771724-6b01-4d7b-aeaa-591dfb86a794",{"acf_fc_layout":559,"title":8,"short_description":8,"items":560,"cta_link":8,"hubspot_form_id":557},"block_5_item_cards_w_icon",[561,564,567,570,573],{"icon_url":562,"title":563,"description":8,"link":8},"https://admin.cbtw.tech/wp-content/uploads/40x40-CBTW-Experts-worldwide-careers-page.png","2,500+ experts",{"icon_url":565,"title":566,"description":8,"link":8},"https://admin.cbtw.tech/wp-content/uploads/Careers-page-Projects-worldwide-CBTW-40x40-1.png","21 countries",{"icon_url":568,"title":569,"description":8,"link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-careers-page-comminities-40x40-1.png","1,000+ clients",{"icon_url":571,"title":572,"description":8,"link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Icon-sevice-overview-all-services-40x40-1.png","15+ years in AI delivery",{"icon_url":574,"title":575,"description":8,"link":8},"https://admin.cbtw.tech/wp-content/uploads/icon-40x40px.png","ISO 27001",{"acf_fc_layout":577,"tagline":578,"carousel":579},"block_image_content_carousel","OUR ADDED VALUE",[580,608,633],{"title":581,"quote":582,"description":583,"image":584,"cta":598,"cards":601,"mobile_square":511,"hubspot_form_id":557},"We Help You Build the Foundation for ISO 27001 Compliance","Mobilidée partnered with us to formalize their information security approach and achieve ISO 27001 certification. Combining strategic guidance with Smartcockpit, we automated governance, improved team awareness, and built a long-term compliance framework.","\u003Cp>“Cybersecurity is neverending. With the right mindset and tools, we can stay ahead of the threats—and ISO 27001 gave us the right foundation.”\u003C/p>\n\u003Cp>&nbsp;\u003C/p>\n\u003Cp>&#8211; Giorgio Giovannini, Founder\u003C/p>\n",{"ID":585,"id":585,"title":586,"filename":587,"filesize":588,"url":589,"link":590,"alt":591,"author":543,"description":586,"caption":586,"name":592,"status":545,"uploaded_to":41,"date":593,"modified":594,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":595,"height":595,"sizes":596},8020,"CBTW-client-case-mobilidee-iso27001-certification","CBTW-client-case-mobilidee-iso27001-certification.png",631703,"https://admin.cbtw.tech/wp-content/uploads/CBTW-client-case-mobilidee-iso27001-certification.png","https://cbtw.tech/service-overview/cbtw-client-case-mobilidee-iso27001-certification/","A person follows curved white lines on a wide path, symbolizing Mobilidée’s structured journey toward ISO 27001 certification and company-wide cybersecurity awareness","cbtw-client-case-mobilidee-iso27001-certification","2025-07-01 10:09:50","2026-03-20 13:03:52",576,{"thumbnail":597,"thumbnail-width":555,"thumbnail-height":555,"medium":589,"medium-width":595,"medium-height":595,"medium_large":589,"medium_large-width":595,"medium_large-height":595,"large":589,"large-width":595,"large-height":595,"1536x1536":589,"1536x1536-width":595,"1536x1536-height":595,"2048x2048":589,"2048x2048-width":595,"2048x2048-height":595},"https://admin.cbtw.tech/wp-content/uploads/CBTW-client-case-mobilidee-iso27001-certification-100x100.png",{"title":599,"url":600,"target":245},"Read the full case\t\t\t","https://cbtw.tech/insights/elevating-cybersecurity-and-compliance-mobilidees-journey-with-smartcockpit",[602,605],{"card_number":603,"card_legend":604},"ISO27001","certification achieved",{"card_number":606,"card_legend":607},"5","operational areas aligned",{"title":609,"quote":610,"description":611,"image":612,"cta":624,"cards":626,"mobile_square":511,"hubspot_form_id":557},"We Help You Restore Your Operations After a Ransomware Attack","After a ransomware attack shut down a production site in Portugal, we contained the breach, restored operations, and overhauled the client's infrastructure. We standardized global defense, improved visibility, and secured long-term resilience.","\u003Cp>“CBTW’s response helped us get back on track very quickly. Recovery was one thing, but they also helped us review how we approach cybersecurity across all our sites.”\u003C/p>\n\u003Cp>&nbsp;\u003C/p>\n\u003Cp>&#8211; CISO, Industrial Manufacturing Group\u003C/p>\n",{"ID":613,"id":613,"title":614,"filename":615,"filesize":616,"url":617,"link":618,"alt":619,"author":543,"description":614,"caption":614,"name":620,"status":545,"uploaded_to":546,"date":621,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":595,"height":595,"sizes":622},8057,"CBTW-client-case-industrial-leader-ransomware-crisis-management","CBTW-client-case-industrial-leader-ransomware-crisis-management.png",540460,"https://admin.cbtw.tech/wp-content/uploads/CBTW-client-case-industrial-leader-ransomware-crisis-management.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-client-case-industrial-leader-ransomware-crisis-management/","Storefront display of colorful sneakers in a glass grid, symbolizing controlled environments and restored operational order after a ransomware attack","cbtw-client-case-industrial-leader-ransomware-crisis-management","2025-07-01 13:11:35",{"thumbnail":623,"thumbnail-width":555,"thumbnail-height":555,"medium":617,"medium-width":595,"medium-height":595,"medium_large":617,"medium_large-width":595,"medium_large-height":595,"large":617,"large-width":595,"large-height":595,"1536x1536":617,"1536x1536-width":595,"1536x1536-height":595,"2048x2048":617,"2048x2048-width":595,"2048x2048-height":595},"https://admin.cbtw.tech/wp-content/uploads/CBTW-client-case-industrial-leader-ransomware-crisis-management-100x100.png",{"title":599,"url":625,"target":245},"https://cbtw.tech/insights/ransomware-crisis-management-how-we-helped-an-industrial-leader-restore-its-operations",[627,630],{"card_number":628,"card_legend":629},"+600","Team size",{"card_number":631,"card_legend":632},"3,5 years","Duration",{"title":634,"quote":635,"description":636,"image":637,"cta":649,"cards":652,"mobile_square":511,"hubspot_form_id":557},"We Help You Improve Your Security Through Password Policy Reform","To assess password strength, a leading European bank asked us to conduct a week-long password-cracking exercise. The results led to new policy standards, stronger protection, and better employee awareness around security risks.","\u003Cp>“This audit gave us the clarity we needed. It showed where our practices fell short and helped us take action quickly.”\u003C/p>\n\u003Cp>&nbsp;\u003C/p>\n\u003Cp>\u003Cbr data-start=\"447\" data-end=\"450\" />&#8211; CISO, European Banking Group\u003C/p>\n",{"ID":638,"id":638,"title":639,"filename":640,"filesize":641,"url":642,"link":643,"alt":644,"author":543,"description":639,"caption":639,"name":645,"status":545,"uploaded_to":546,"date":646,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":595,"height":595,"sizes":647},8058,"CBTW-client-case-bank-cybersecurity-password-security","CBTW-client-case-bank-cybersecurity-password-security.png",354388,"https://admin.cbtw.tech/wp-content/uploads/CBTW-client-case-bank-cybersecurity-password-security.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-client-case-bank-cybersecurity-password-security/","Tablet on a desk displaying a numeric password entry screen, symbolizing secure authentication and password protection in a corporate setting","cbtw-client-case-bank-cybersecurity-password-security","2025-07-01 13:16:42",{"thumbnail":648,"thumbnail-width":555,"thumbnail-height":555,"medium":642,"medium-width":595,"medium-height":595,"medium_large":642,"medium_large-width":595,"medium_large-height":595,"large":642,"large-width":595,"large-height":595,"1536x1536":642,"1536x1536-width":595,"1536x1536-height":595,"2048x2048":642,"2048x2048-width":595,"2048x2048-height":595},"https://admin.cbtw.tech/wp-content/uploads/CBTW-client-case-bank-cybersecurity-password-security-100x100.png",{"title":650,"url":651,"target":245},"Read the full case","https://cbtw.tech/insights/how-a-leading-european-bank-strengthened-cybersecurity-by-transforming-password-practices",[653,656],{"card_number":654,"card_legend":655},"30%","passwords cracked",{"card_number":657,"card_legend":658},"1","new policy enforced",{"acf_fc_layout":660,"cbtw_list_key":661,"cbtw_list_title":662,"cbtw_list_items":663,"cta_link":764,"hubspot_form_id":557},"block_dynamic_list","MULTIDISCIPLINARY EXPERTISE","How We Create Value",[664,692,713,730,747],{"cbtw_list_item_title":665,"cbtw_list_item_description":666,"cbtw_list_item_image":667,"cbtw_list_item_video":691},"A Global Tech Solutions Company","\u003Cp>Our capabilities span the full technology value chain, from Strategy, Product &amp; Transformation through Software Engineering, AI &amp; Data, and Cloud &amp; Enterprise Platforms, to Cybersecurity and ongoing operations. We deliver these through a single integrated model – not as separate workstreams – across Banking &amp; Finance, Retail &amp; E-commerce, Telco &amp; Media, and Luxury.\u003C/p>\n",{"ID":668,"id":668,"title":669,"filename":670,"filesize":671,"url":672,"link":673,"alt":674,"author":543,"description":675,"caption":676,"name":669,"status":545,"uploaded_to":677,"date":678,"modified":679,"menu_order":13,"mime_type":680,"type":550,"subtype":681,"icon":552,"width":682,"height":682,"sizes":683},14194,"cbtw-global-tech-solutions-ecosystem","cbtw-global-tech-solutions-ecosystem.webp",36480,"https://admin.cbtw.tech/wp-content/uploads/cbtw-global-tech-solutions-ecosystem.webp","https://cbtw.tech/?attachment_id=14194","Diagram showing CBTW’s five interconnected service lines arranged in a circle: Software Engineering, Cloud & Enterprise Platforms, Cybersecurity, AI & Data Platforms, and Strategy, Product & Transformation. At the center, a loop labeled ‘Advise, Build, Run’ illustrates the continuous delivery model connecting all domains","This diagram shows how cloud infrastructure, enterprise platforms, software engineering, cybersecurity, AI and data, and strategic transformation can work together across the full Advise, Build and Run cycle","From advisory to implementation and ongoing operations: a connected approach that covers every stage of your technology transformation",13831,"2026-04-02 13:54:34","2026-04-02 13:55:05","image/webp","webp",1801,{"thumbnail":684,"thumbnail-width":555,"thumbnail-height":555,"medium":685,"medium-width":686,"medium-height":686,"medium_large":672,"medium_large-width":687,"medium_large-height":687,"large":688,"large-width":689,"large-height":689,"1536x1536":672,"1536x1536-width":690,"1536x1536-height":690,"2048x2048":672,"2048x2048-width":682,"2048x2048-height":682},"https://admin.cbtw.tech/wp-content/uploads/cbtw-global-tech-solutions-ecosystem-100x100.webp","https://admin.cbtw.tech/wp-content/uploads/cbtw-global-tech-solutions-ecosystem-800x800.webp",800,768,"https://admin.cbtw.tech/wp-content/uploads/cbtw-global-tech-solutions-ecosystem-1024x1024.webp",1024,1536,{"video":8},{"cbtw_list_item_title":693,"cbtw_list_item_description":694,"cbtw_list_item_image":695,"cbtw_list_item_video":712},"Strategy, Product & Transformation","\u003Cp>Cybersecurity is inseparable from a company’s strategy because it protects critical assets, ensures business continuity, and preserves customer trust. Without a solid cyber foundation, no digital transformation, innovation, or sustainable growth is possible.\u003C/p>\n",{"ID":696,"id":696,"title":697,"filename":698,"filesize":699,"url":700,"link":701,"alt":702,"author":703,"description":697,"caption":704,"name":697,"status":545,"uploaded_to":705,"date":706,"modified":707,"menu_order":13,"mime_type":680,"type":550,"subtype":681,"icon":552,"width":682,"height":682,"sizes":708},13718,"cbtw-global-tech-solution-company-ecosystem-cybersecurity-strategy-product-transformation","cbtw-global-tech-solution-company-ecosystem-cybersecurity-strategy-product-transformation.webp",41598,"https://admin.cbtw.tech/wp-content/uploads/cbtw-global-tech-solution-company-ecosystem-cybersecurity-strategy-product-transformation.webp","https://cbtw.tech/?attachment_id=13718","Diagram of CBTW’s Global Tech Solutions ecosystem highlighting Cybersecurity and Strategy, Product & Transformation. These two service lines are emphasized in yellow among five interconnected domains, with a central loop labeled ‘Global Tech Solutions’ representing continuous collaboration and integration.","20","Strategy, Product and Transformation sets the direction for cybersecurity by defining governance, risk priorities, and secure-by-design principles—ensuring compliance, resilience, and protection are built into products from the start, not added later.",13586,"2026-03-24 10:38:20","2026-03-31 11:21:00",{"thumbnail":709,"thumbnail-width":555,"thumbnail-height":555,"medium":710,"medium-width":686,"medium-height":686,"medium_large":700,"medium_large-width":687,"medium_large-height":687,"large":711,"large-width":689,"large-height":689,"1536x1536":700,"1536x1536-width":690,"1536x1536-height":690,"2048x2048":700,"2048x2048-width":682,"2048x2048-height":682},"https://admin.cbtw.tech/wp-content/uploads/cbtw-global-tech-solution-company-ecosystem-cybersecurity-strategy-product-transformation-100x100.webp","https://admin.cbtw.tech/wp-content/uploads/cbtw-global-tech-solution-company-ecosystem-cybersecurity-strategy-product-transformation-800x800.webp","https://admin.cbtw.tech/wp-content/uploads/cbtw-global-tech-solution-company-ecosystem-cybersecurity-strategy-product-transformation-1024x1024.webp",{"video":8},{"cbtw_list_item_title":46,"cbtw_list_item_description":714,"cbtw_list_item_image":715,"cbtw_list_item_video":729},"\u003Cp>Insecure code is a liability, not just a technical debt. Embedding security into your development lifecycle means faster releases, fewer vulnerabilities in production, and software your customers can trust. Security-by-design is what separates products that scale from products that fail.\u003C/p>\n",{"ID":716,"id":716,"title":717,"filename":718,"filesize":719,"url":720,"link":721,"alt":8,"author":513,"description":8,"caption":8,"name":722,"status":545,"uploaded_to":723,"date":724,"modified":724,"menu_order":13,"mime_type":680,"type":550,"subtype":681,"icon":552,"width":682,"height":682,"sizes":725},13714,"GTS_Scheme_Cyber&SE","GTS_Scheme_CyberSE.webp",40438,"https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CyberSE.webp","https://cbtw.tech/?attachment_id=13714","gts_scheme_cyberse",13254,"2026-03-24 10:35:27",{"thumbnail":726,"thumbnail-width":555,"thumbnail-height":555,"medium":727,"medium-width":686,"medium-height":686,"medium_large":720,"medium_large-width":687,"medium_large-height":687,"large":728,"large-width":689,"large-height":689,"1536x1536":720,"1536x1536-width":690,"1536x1536-height":690,"2048x2048":720,"2048x2048-width":682,"2048x2048-height":682},"https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CyberSE-100x100.webp","https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CyberSE-800x800.webp","https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CyberSE-1024x1024.webp",{"video":8},{"cbtw_list_item_title":731,"cbtw_list_item_description":732,"cbtw_list_item_image":733,"cbtw_list_item_video":746},"Cloud & Enterprise Platforms ","\u003Cp>Whether you&#8217;re migrating to the cloud, managing a hybrid environment, or orchestrating across multiple cloud providers — complexity is your biggest attack surface. Without security built into your infrastructure from day one, speed becomes a risk. We ensure your platforms scale with confidence, your data stays protected, and your operations remain resilient — wherever they run.\u003C/p>\n",{"ID":734,"id":734,"title":735,"filename":736,"filesize":737,"url":738,"link":739,"alt":8,"author":513,"description":8,"caption":8,"name":740,"status":545,"uploaded_to":723,"date":741,"modified":741,"menu_order":13,"mime_type":680,"type":550,"subtype":681,"icon":552,"width":682,"height":682,"sizes":742},13724,"GTS_Scheme_Cloud&Cyber","GTS_Scheme_CloudCyber.webp",40562,"https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CloudCyber.webp","https://cbtw.tech/?attachment_id=13724","gts_scheme_cloudcyber","2026-03-24 10:44:10",{"thumbnail":743,"thumbnail-width":555,"thumbnail-height":555,"medium":744,"medium-width":686,"medium-height":686,"medium_large":738,"medium_large-width":687,"medium_large-height":687,"large":745,"large-width":689,"large-height":689,"1536x1536":738,"1536x1536-width":690,"1536x1536-height":690,"2048x2048":738,"2048x2048-width":682,"2048x2048-height":682},"https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CloudCyber-100x100.webp","https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CloudCyber-800x800.webp","https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CloudCyber-1024x1024.webp",{"video":8},{"cbtw_list_item_title":748,"cbtw_list_item_description":749,"cbtw_list_item_image":750,"cbtw_list_item_video":763},"AI & Data Platforms","\u003Cp>AI is only as trustworthy as the data behind it. As organizations accelerate AI adoption, unsecured data pipelines and ungoverned models become critical vulnerabilities. We protect your data assets, ensure regulatory compliance, and give your leadership the confidence to innovate without exposing the business to hidden risk.\u003C/p>\n",{"ID":751,"id":751,"title":752,"filename":753,"filesize":754,"url":755,"link":756,"alt":8,"author":513,"description":8,"caption":8,"name":757,"status":545,"uploaded_to":723,"date":758,"modified":758,"menu_order":13,"mime_type":680,"type":550,"subtype":681,"icon":552,"width":682,"height":682,"sizes":759},13711,"GTS_Scheme_Cyber&Data","GTS_Scheme_CyberData.webp",41198,"https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CyberData.webp","https://cbtw.tech/?attachment_id=13711","gts_scheme_cyberdata","2026-03-24 10:34:11",{"thumbnail":760,"thumbnail-width":555,"thumbnail-height":555,"medium":761,"medium-width":686,"medium-height":686,"medium_large":755,"medium_large-width":687,"medium_large-height":687,"large":762,"large-width":689,"large-height":689,"1536x1536":755,"1536x1536-width":690,"1536x1536-height":690,"2048x2048":755,"2048x2048-width":682,"2048x2048-height":682},"https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CyberData-100x100.webp","https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CyberData-800x800.webp","https://admin.cbtw.tech/wp-content/uploads/GTS_Scheme_CyberData-1024x1024.webp",{"video":8},{"title":765,"url":766,"target":8},"Discover our services","https://cbtw.tech/service-overview/",{"acf_fc_layout":768,"tag_name":769,"section_title":770,"cta_link":771,"cards":774,"background":556,"hubspot_form_id":557},"block_expertises","AREAS OF EXPERTISE","Strengthen Your Security Posture",{"title":772,"url":773,"target":8},"Contact an expert","https://cbtw.tech/contact/",[775,780,785,790],{"icon_url":776,"title":777,"description":778,"sub_content":779,"navigation_link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Service-Line-Security-Governance.png","Governance, Risk & Compliance","Strengthen your security posture and meet your legal obligations.","\u003Cp class=\"pf0\">\u003Cspan class=\"cf0\">• GDPR, ISO27001, DORA, nLPD, SOC2 &#8230;\u003Cbr />\n\u003C/span>\u003Cspan class=\"cf0\">• Strategic Support &amp; Compliance Audit\u003Cbr />\n• Crisis Management &amp; Risk Analysis\u003C/span>\u003Cspan class=\"cf0\">\u003Cbr />\n• Awareness and Trainings\u003Cbr />\n• Security Games\u003Cbr />\n• AI Security\u003Cbr />\n\u003C/span>\u003C/p>\n\u003Cp>\u003C!--EndFragment -->\u003C/p>\n\u003Cp>\u003C!--EndFragment -->\u003C/p>\n",{"icon_url":781,"title":782,"description":783,"sub_content":784,"navigation_link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Service-Line-Security-Operations.png","Offensive & Preventive Security","Identify your vulnerabilities and simulate real-world attacks to strengthen your defenses.","\u003Cp>• Penetration Testing (Web, API, iOS..)\u003Cbr />\n• External Footprint &amp; OSINT\u003Cbr />\n• Automated Pentest Campaigns\u003Cbr />\n• Configuration Audits\u003Cbr />\n• Phishing Scenarios\u003Cbr />\n• Vulnerability Assessment &amp; Remediation\u003C/p>\n",{"icon_url":786,"title":787,"description":788,"sub_content":789,"navigation_link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Service-Line-Infrastructure-and-Cloud-Security.png","Operational Security","Ensure 24/7 monitoring and incident response with a fully integrated, AI-driven, and automated SOC.","\u003Cp>• Managed SOC Service\u003Cbr />\n• Incident Response &amp; Forensics\u003Cbr />\n• 24/7 Threat Detection &amp; Response\u003Cbr />\n• EDR and NDR Service Coverage\u003Cbr />\n• Alert Automation &amp; Escalation\u003Cbr />\n• Crisis Management\u003C/p>\n",{"icon_url":791,"title":792,"description":793,"sub_content":794,"navigation_link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Service-Line-Offensive-Security.png","Infrastructure & Cloud Security","Ensure the protection of your infrastructure from network to Cloud.","\u003Cp>• IAM &amp; PAM Architecture\u003Cbr />\n• Multi-Cloud Security (AWS, Azure)\u003Cbr />\n• Application Security\u003Cbr />\n• DevSecOps\u003Cbr />\n• Network Security\u003Cbr />\n• Infrastructure Security\u003C/p>\n",{"acf_fc_layout":559,"title":796,"short_description":797,"items":798,"cta_link":8,"hubspot_form_id":557},"Our Approach","Cybersecurity at Business Speed",[799,803,807,811],{"icon_url":800,"title":801,"description":802,"link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-collaboration-steps-connect.png","Assess your exposure before attackers do.","We map your critical assets, regulatory obligations, and threat landscape to give leadership a prioritized view of risk aligned with your business.",{"icon_url":804,"title":805,"description":806,"link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-collaboration-steps-advise.png","Build your cybersecurity defenses in. Not on.","We embed protection into your architecture, workflows, and culture from DevSecOps pipelines to governance frameworks and compliance automation.",{"icon_url":808,"title":809,"description":810,"link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-collaboration-steps-offer.png","Run your business. We'll run your defenses.","Our teams detect and contain threats 24/7 — with AI-assisted triage, automated response, and full coverage across cloud, endpoints, and identity.",{"icon_url":812,"title":813,"description":814,"link":8},"https://admin.cbtw.tech/wp-content/uploads/CBTW-collaboration-steps-collaborate.png","Optimize continuously. Count on us always.","We provide ongoing support to keep your teams operational and your defenses sharp combining proactive optimization with responsive expert assistance.",{"acf_fc_layout":816,"tagline":817,"section_title":818,"card":819,"link":8,"hubspot_form_id":557},"block_highlights","WHY WORK WITH US","Driving Performance and Competitive Advantage",[820,838,853,868],{"image":821,"title":836,"description":837},{"ID":822,"id":822,"title":823,"filename":824,"filesize":825,"url":826,"link":827,"alt":828,"author":703,"description":823,"caption":823,"name":823,"status":545,"uploaded_to":705,"date":829,"modified":830,"menu_order":13,"mime_type":831,"type":550,"subtype":832,"icon":552,"width":833,"height":833,"sizes":834},13795,"cbtw-why-work-with-us-revenue-increase","cbtw-why-work-with-us-revenue-increase.jpg",13075,"https://admin.cbtw.tech/wp-content/uploads/cbtw-why-work-with-us-revenue-increase.jpg","https://cbtw.tech/?attachment_id=13795","Abstract architectural pattern of vertical panels with sharp diagonal shadows creating a geometric contrast of light and dark.","2026-03-24 15:06:09","2026-03-24 15:06:21","image/jpeg","jpeg",400,{"thumbnail":835,"thumbnail-width":555,"thumbnail-height":555,"medium":826,"medium-width":833,"medium-height":833,"medium_large":826,"medium_large-width":833,"medium_large-height":833,"large":826,"large-width":833,"large-height":833,"1536x1536":826,"1536x1536-width":833,"1536x1536-height":833,"2048x2048":826,"2048x2048-width":833,"2048x2048-height":833},"https://admin.cbtw.tech/wp-content/uploads/cbtw-why-work-with-us-revenue-increase-100x100.jpg","Revenue Growth","Ship faster, build customer trust, unlock new markets, and make security your strongest competitive advantage.",{"image":839,"title":851,"description":852},{"ID":840,"id":840,"title":841,"filename":842,"filesize":843,"url":844,"link":845,"alt":846,"author":703,"description":841,"caption":841,"name":841,"status":545,"uploaded_to":705,"date":847,"modified":848,"menu_order":13,"mime_type":831,"type":550,"subtype":832,"icon":552,"width":833,"height":833,"sizes":849},13797,"cbtw-why-work-with-us-cost-reduction","cbtw-why-work-with-us-cost-reduction.jpg",14613,"https://admin.cbtw.tech/wp-content/uploads/cbtw-why-work-with-us-cost-reduction.jpg","https://cbtw.tech/?attachment_id=13797","Abstract folded shapes with smooth edges, forming layered peaks and shadows in muted yellow and green tones.","2026-03-24 15:08:44","2026-03-24 15:08:57",{"thumbnail":850,"thumbnail-width":555,"thumbnail-height":555,"medium":844,"medium-width":833,"medium-height":833,"medium_large":844,"medium_large-width":833,"medium_large-height":833,"large":844,"large-width":833,"large-height":833,"1536x1536":844,"1536x1536-width":833,"1536x1536-height":833,"2048x2048":844,"2048x2048-width":833,"2048x2048-height":833},"https://admin.cbtw.tech/wp-content/uploads/cbtw-why-work-with-us-cost-reduction-100x100.jpg","Cost Reduction","Turn security audits into savings: cut redundancy, optimize licensing, standardize processes, and avoid breach costs.",{"image":854,"title":866,"description":867},{"ID":855,"id":855,"title":856,"filename":857,"filesize":858,"url":859,"link":860,"alt":861,"author":703,"description":856,"caption":856,"name":856,"status":545,"uploaded_to":705,"date":862,"modified":863,"menu_order":13,"mime_type":831,"type":550,"subtype":832,"icon":552,"width":833,"height":833,"sizes":864},13799,"cbtw-why-work-with-us-rsik-mitigation","cbtw-why-work-with-us-rsik-mitigation.jpg",28895,"https://admin.cbtw.tech/wp-content/uploads/cbtw-why-work-with-us-rsik-mitigation.jpg","https://cbtw.tech/?attachment_id=13799","Abstract pattern of colorful circular shapes on a dark background, resembling glowing dots arranged in a grid-like formation.","2026-03-24 15:10:40","2026-03-24 15:11:01",{"thumbnail":865,"thumbnail-width":555,"thumbnail-height":555,"medium":859,"medium-width":833,"medium-height":833,"medium_large":859,"medium_large-width":833,"medium_large-height":833,"large":859,"large-width":833,"large-height":833,"1536x1536":859,"1536x1536-width":833,"1536x1536-height":833,"2048x2048":859,"2048x2048-width":833,"2048x2048-height":833},"https://admin.cbtw.tech/wp-content/uploads/cbtw-why-work-with-us-rsik-mitigation-100x100.jpg","Risk Mitigation","Enforce governance, protect data integrity, ensure compliance, and prevent costly outages before they happen.",{"image":869,"title":882,"description":883},{"ID":870,"id":870,"title":871,"filename":872,"filesize":873,"url":874,"link":875,"alt":876,"author":703,"description":871,"caption":871,"name":877,"status":545,"uploaded_to":705,"date":878,"modified":879,"menu_order":13,"mime_type":831,"type":550,"subtype":832,"icon":552,"width":833,"height":833,"sizes":880},13800,"cbtw-why-work-with-us-future-proof-solutions","cbtw-why-work-with-us-futur-proof-solutions.jpg",30033,"https://admin.cbtw.tech/wp-content/uploads/cbtw-why-work-with-us-futur-proof-solutions.jpg","https://cbtw.tech/?attachment_id=13800","Curved architectural facade with a textured, repeating pattern against a soft sky with clouds, creating a modern and fluid visual effect.","cbtw-why-work-with-us-futur-proof-solutions","2026-03-24 15:12:50","2026-04-02 14:44:48",{"thumbnail":881,"thumbnail-width":555,"thumbnail-height":555,"medium":874,"medium-width":833,"medium-height":833,"medium_large":874,"medium_large-width":833,"medium_large-height":833,"large":874,"large-width":833,"large-height":833,"1536x1536":874,"1536x1536-width":833,"1536x1536-height":833,"2048x2048":874,"2048x2048-width":833,"2048x2048-height":833},"https://admin.cbtw.tech/wp-content/uploads/cbtw-why-work-with-us-futur-proof-solutions-100x100.jpg","Future-Proof Solutions","Anticipate threats, adapt to regulations, and build resilient architectures that scale with your business not against it.",{"acf_fc_layout":885,"tagline":886,"section_title":887,"button_link":8,"card":888,"hubspot_form_id":557},"block_partners_temp_2","PARTNERS\t\t\t","Powered by Leading Technology Partnerships",[889,909,925,941,956,972,987],{"image":890,"description":905,"link":906},{"ID":891,"id":891,"title":892,"filename":893,"filesize":894,"url":895,"link":896,"alt":897,"author":543,"description":892,"caption":892,"name":898,"status":545,"uploaded_to":546,"date":899,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":900,"height":901,"sizes":902},7985,"CBTW-service-line-cybersecurity-partners-crowdstrike","CBTW-service-line-cybersecurity-partners-crowdstrike.png",15565,"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-crowdstrike.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-partners-crowdstrike/","Crowdstrike logo","cbtw-service-line-cybersecurity-partners-crowdstrike","2025-06-30 18:30:01",500,487,{"thumbnail":903,"thumbnail-width":555,"thumbnail-height":904,"medium":895,"medium-width":900,"medium-height":901,"medium_large":895,"medium_large-width":900,"medium_large-height":901,"large":895,"large-width":900,"large-height":901,"1536x1536":895,"1536x1536-width":900,"1536x1536-height":901,"2048x2048":895,"2048x2048-width":900,"2048x2048-height":901},"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-crowdstrike-100x97.png",97,"We use CrowdStrike’s EDR platform to deliver endpoint visibility, threat hunting, and response. Integrated into our SOC, it supports fast, proactive detection across complex hybrid environments without impacting system performance.",{"title":907,"url":908,"target":245},"Visit website","https://www.crowdstrike.com/en-us/",{"image":910,"description":922,"link":923},{"ID":911,"id":911,"title":912,"filename":913,"filesize":914,"url":915,"link":916,"alt":917,"author":543,"description":912,"caption":912,"name":918,"status":545,"uploaded_to":546,"date":919,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":900,"height":901,"sizes":920},7981,"CBTW-service-line-cybersecurity-partners-darktrace","CBTW-service-line-cybersecurity-partners-darktrace.png",16372,"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-darktrace.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-partners-darktrace/","Darktrace logo","cbtw-service-line-cybersecurity-partners-darktrace","2025-06-30 18:18:10",{"thumbnail":921,"thumbnail-width":555,"thumbnail-height":904,"medium":915,"medium-width":900,"medium-height":901,"medium_large":915,"medium_large-width":900,"medium_large-height":901,"large":915,"large-width":900,"large-height":901,"1536x1536":915,"1536x1536-width":900,"1536x1536-height":901,"2048x2048":915,"2048x2048-width":900,"2048x2048-height":901},"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-darktrace-100x97.png","Partnered with us since 2017, Darktrace powers our SOC services with AI-driven detection and response. Its behavioral engine helps us identify unknown threats and automate containment across IT, cloud, and collaboration environments.",{"title":907,"url":924,"target":245},"https://www.darktrace.com/",{"image":926,"description":938,"link":939},{"ID":927,"id":927,"title":928,"filename":929,"filesize":930,"url":931,"link":932,"alt":933,"author":543,"description":928,"caption":928,"name":934,"status":545,"uploaded_to":546,"date":935,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":900,"height":901,"sizes":936},7980,"CBTW-service-line-cybersecurity-partners-microsoft","CBTW-service-line-cybersecurity-partners-microsoft.png",13065,"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-microsoft.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-partners-microsoft/","Microsoft logo","cbtw-service-line-cybersecurity-partners-microsoft","2025-06-30 18:18:09",{"thumbnail":937,"thumbnail-width":555,"thumbnail-height":904,"medium":931,"medium-width":900,"medium-height":901,"medium_large":931,"medium_large-width":900,"medium_large-height":901,"large":931,"large-width":900,"large-height":901,"1536x1536":931,"1536x1536-width":900,"1536x1536-height":901,"2048x2048":931,"2048x2048-width":900,"2048x2048-height":901},"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-microsoft-100x97.png","We integrate Microsoft’s security suite to reinforce cloud-native protection, identity governance, and compliance across hybrid environments. Their ecosystem supports our infrastructure, governance, and DevSecOps capabilities with scalable solutions.",{"title":907,"url":940,"target":245},"https://www.microsoft.com/fr-be/",{"image":942,"description":953,"link":954},{"ID":943,"id":943,"title":944,"filename":945,"filesize":946,"url":947,"link":948,"alt":949,"author":543,"description":944,"caption":944,"name":950,"status":545,"uploaded_to":546,"date":899,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":900,"height":901,"sizes":951},7986,"CBTW-service-line-cybersecurity-partners-mindflow","CBTW-service-line-cybersecurity-partners-mindflow.png",14748,"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-mindflow.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-partners-mindflow/","Mindflow logo","cbtw-service-line-cybersecurity-partners-mindflow",{"thumbnail":952,"thumbnail-width":555,"thumbnail-height":904,"medium":947,"medium-width":900,"medium-height":901,"medium_large":947,"medium_large-width":900,"medium_large-height":901,"large":947,"large-width":900,"large-height":901,"1536x1536":947,"1536x1536-width":900,"1536x1536-height":901,"2048x2048":947,"2048x2048-width":900,"2048x2048-height":901},"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-mindflow-100x97.png","We rely on Mindflow to automate incident response, triage, and orchestration across cybersecurity tools. Its no-code interface boosts SOC performance, letting teams act faster without complex integrations or custom scripts.",{"title":907,"url":955,"target":245},"https://mindflow.io/",{"image":957,"description":969,"link":970},{"ID":958,"id":958,"title":959,"filename":960,"filesize":961,"url":962,"link":963,"alt":964,"author":543,"description":959,"caption":959,"name":965,"status":545,"uploaded_to":546,"date":966,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":900,"height":901,"sizes":967},7987,"CBTW-service-line-cybersecurity-partners-okta","CBTW-service-line-cybersecurity-partners-okta.png",15280,"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-okta.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-partners-okta/","Okta logo","cbtw-service-line-cybersecurity-partners-okta","2025-06-30 18:30:02",{"thumbnail":968,"thumbnail-width":555,"thumbnail-height":904,"medium":962,"medium-width":900,"medium-height":901,"medium_large":962,"medium_large-width":900,"medium_large-height":901,"large":962,"large-width":900,"large-height":901,"1536x1536":962,"1536x1536-width":900,"1536x1536-height":901,"2048x2048":962,"2048x2048-width":900,"2048x2048-height":901},"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-okta-100x97.png","We deploy Okta to strengthen IAM and PAM capabilities. From user authentication to lifecycle management, it helps reduce identity-related risks and supports secure access across cloud and enterprise systems.",{"title":907,"url":971,"target":245},"https://www.okta.com/",{"image":973,"description":984,"link":985},{"ID":974,"id":974,"title":975,"filename":976,"filesize":977,"url":978,"link":979,"alt":980,"author":543,"description":975,"caption":975,"name":981,"status":545,"uploaded_to":546,"date":966,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":900,"height":901,"sizes":982},7988,"CBTW-service-line-cybersecurity-partners-phished","CBTW-service-line-cybersecurity-partners-phished.png",17715,"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-phished.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-partners-phished/","Phished logo","cbtw-service-line-cybersecurity-partners-phished",{"thumbnail":983,"thumbnail-width":555,"thumbnail-height":904,"medium":978,"medium-width":900,"medium-height":901,"medium_large":978,"medium_large-width":900,"medium_large-height":901,"large":978,"large-width":900,"large-height":901,"1536x1536":978,"1536x1536-width":900,"1536x1536-height":901,"2048x2048":978,"2048x2048-width":900,"2048x2048-height":901},"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-phished-100x97.png","Phished supports our phishing simulations and awareness campaigns. Personalized training modules help teams build lasting reflexes against real threats, often used alongside red team engagements and awareness programs.",{"title":907,"url":986,"target":245},"https://phished.io/",{"image":988,"description":1000,"link":1001},{"ID":989,"id":989,"title":990,"filename":991,"filesize":992,"url":993,"link":994,"alt":995,"author":543,"description":990,"caption":990,"name":996,"status":545,"uploaded_to":546,"date":997,"modified":548,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":900,"height":901,"sizes":998},7990,"CBTW-service-line-cybersecurity-partners-smartcockpit","CBTW-service-line-cybersecurity-partners-smartcockpit.png",29144,"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-smartcockpit.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-partners-smartcockpit/","Smartcockpit logo","cbtw-service-line-cybersecurity-partners-smartcockpit","2025-06-30 18:54:48",{"thumbnail":999,"thumbnail-width":555,"thumbnail-height":904,"medium":993,"medium-width":900,"medium-height":901,"medium_large":993,"medium_large-width":900,"medium_large-height":901,"large":993,"large-width":900,"large-height":901,"1536x1536":993,"1536x1536-width":900,"1536x1536-height":901,"2048x2048":993,"2048x2048-width":900,"2048x2048-height":901},"https://admin.cbtw.tech/wp-content/uploads/CBTW-service-line-cybersecurity-partners-smartcockpit-100x97.png","Smartcockpit helps consolidate security data into actionable dashboards—supporting SOC decision-making and CISO reporting.",{"title":907,"url":1002,"target":245},"https://www.smartcockpit.ch/en/",{"acf_fc_layout":1004,"tag_name":1005,"section_title":1006,"description":1007,"image":1008,"cta_link":1020,"hubspot_form_id":1022,"align_center":511},"block_lets_connect","LET'S CONNECT ","How can we support your next cybersecurity move?","Speak with our experts to assess your current posture, explore what’s working and what’s missing, clarify your priorities, and identify what we can improve together (without overhauling everything).",{"ID":1009,"id":1009,"title":1010,"filename":1011,"filesize":1012,"url":1013,"link":1014,"alt":518,"author":543,"description":1010,"caption":1010,"name":1015,"status":545,"uploaded_to":546,"date":1016,"modified":1017,"menu_order":13,"mime_type":549,"type":550,"subtype":551,"icon":552,"width":553,"height":553,"sizes":1018},7935,"CBTW-Service-Line-Cybersecurity-Contact-Our-Cybersecurity-Experts","CBTW-Service-Line-Cybersecurity-Contact-Our-Cybersecurity-Experts.png",137708,"https://admin.cbtw.tech/wp-content/uploads/CBTW-Service-Line-Cybersecurity-Contact-Our-Cybersecurity-Experts.png","https://cbtw.tech/service-overview/cybersecurity/cbtw-service-line-cybersecurity-contact-our-cybersecurity-experts/","cbtw-service-line-cybersecurity-contact-our-cybersecurity-experts","2025-06-30 14:54:00","2026-03-20 14:46:37",{"thumbnail":1019,"thumbnail-width":555,"thumbnail-height":555,"medium":1013,"medium-width":553,"medium-height":553,"medium_large":1013,"medium_large-width":553,"medium_large-height":553,"large":1013,"large-width":553,"large-height":553,"1536x1536":1013,"1536x1536-width":553,"1536x1536-height":553,"2048x2048":1013,"2048x2048-width":553,"2048x2048-height":553},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Service-Line-Cybersecurity-Contact-Our-Cybersecurity-Experts-100x100.png",{"title":772,"url":1021,"target":8},"#contact-form","66833c6e-0847-470f-97c2-1c9d51e981fd",{"acf_fc_layout":1024,"title":1025,"ui_v2":556,"short_description":1026,"cbtw_related_group_filters":1027,"items":511,"link":1033,"hubspot_form_id":557,"mainPostId":74},"block_insights","INSIGHTS","Gain Inspiration From Our Cybersecurity Experts’ Insights",{"cbtw_related_category_filter":1028,"cbtw_related_tag_filter":1029,"cbtw_related_industry_filter":1030,"cbtw_related_service_filter":1031},[180],[],[],[1032],"cyber-security",{"title":8,"url":1034,"target":245},"https://collaborationbetterstheworld.com/insights?categories=insights&cbtw_services=cybersecurity",{"acf_fc_layout":559,"title":1036,"short_description":1037,"items":1038,"cta_link":8,"hubspot_form_id":557},"SERVICES","Discover Our Capabilities",[1039,1044,1050,1056],{"icon_url":1040,"title":46,"description":1041,"link":1042},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Icon-service-Cyber-Security.png","Build scalable digital systems that speed up delivery, improve reliability, and support long-term product growth.",{"title":46,"url":1043,"target":8},"https://cbtw.tech/service-overview/software-engineering/",{"icon_url":1045,"title":748,"description":1046,"link":1047},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Icon-service-data-analytics-AI.png","Turn data into actionable intelligence to improve decisions, automate work, and unlock new business value.",{"title":1048,"url":1049,"target":8},"Data Analytics & AI","https://cbtw.tech/service-overview/ai-data-platforms/",{"icon_url":1051,"title":1052,"description":1053,"link":1054},"https://admin.cbtw.tech/wp-content/uploads/CBTW-Icon-Cloud-Enterprise-Platforms.png","Cloud & Enterprise Platforms","Build resilient cloud and enterprise platforms that improve scalability, performance, and operational efficiency.",{"title":1052,"url":1055,"target":8},"https://cbtw.tech/service-overview/cloud-and-enterprise-platforms/",{"icon_url":1057,"title":693,"description":1058,"link":1059},"https://admin.cbtw.tech/wp-content/uploads/60x60_StrategyProductTransformation.png","Helping organizations translate strategic vision into tangible digital products and transformation programs.",{"title":693,"url":1060,"target":8},"https://cbtw.tech/service-overview/strategy-product-transformation/",[],[],[],[],[],[],[],{"related_title":8,"posts":1069},[1070,1080,1091],{"id":1071,"title":1072,"description":8,"excerpt":1073,"date":1075,"categories":191,"link":1076,"image":1077,"images":1078},11991,"AI Driven Cybersecurity in a World Where ISMS Isn’t Enough",{"rendered":1074},"AI Driven cybersecurity should be prioritized. For many organizations, ISO 27001 certification represents a major milestone as it signals maturity, discipline, and control, but it is only the beginning. Yet across industries, security leaders are asking a harder question: why do incidents still happen in ISMS certified environments? Certification proves intent and structure, but it [&hellip;]","2026-01-06","https://cbtw.tech/insights/ai-driven-security-beyond-isms-iso-27001","https://admin.cbtw.tech/wp-content/uploads/2150172118-1.jpg",{"medium":1079,"large":1077,"full":1077},"https://admin.cbtw.tech/wp-content/uploads/2150172118-1-800x533.jpg",{"id":1081,"title":1082,"description":8,"excerpt":1083,"date":1085,"categories":191,"link":1086,"image":1087,"images":1088},10131,"Shadow AI: The Hidden Security Risk Lurking Inside Your Company",{"rendered":1084},"The Rise of Shadow AI: Is Your Organization Vulnerable from the Inside?  Shadow AI often enters the workplace unnoticed, as employees rely on generative AI to handle emails, documents, and even coding challenges. What they don’t always realize is that these tools, often accessed through personal accounts or unsanctioned browser extensions, can introduce new and [&hellip;]","2025-10-01","https://cbtw.tech/insights/shadow-ai-hidden-threats","https://admin.cbtw.tech/wp-content/uploads/21506-1.jpg",{"medium":1089,"large":1090,"full":1087},"https://admin.cbtw.tech/wp-content/uploads/21506-1-800x533.jpg","https://admin.cbtw.tech/wp-content/uploads/21506-1-1024x683.jpg",{"id":1092,"title":1093,"description":8,"excerpt":1094,"date":1096,"categories":191,"link":1097,"image":1098,"images":1099},9969,"Systems and AI Security: Why Outdated Tech Hurts Detection",{"rendered":1095},"Generative AI is transforming cybersecurity, enabling real-time threat detection and automated incident response. However, many organizations are discovering that outdated infrastructure quietly limits these advances. When underlying systems lag, even the most sophisticated AI tools cannot perform at their full potential. While AI platforms have become more capable, their success depends heavily on the surrounding [&hellip;]","2025-09-03","https://cbtw.tech/insights/legacy-systems-ai-security","https://admin.cbtw.tech/wp-content/uploads/2149506876-1.jpg",{"medium":1100,"large":1101,"full":1098},"https://admin.cbtw.tech/wp-content/uploads/2149506876-1-800x533.jpg","https://admin.cbtw.tech/wp-content/uploads/2149506876-1-1024x683.jpg",1777644328522]