{"id":98018,"date":"2024-09-19T12:16:09","date_gmt":"2024-09-19T12:16:09","guid":{"rendered":"https:\/\/sii.pl\/oferta\/ot-security\/"},"modified":"2025-06-30T13:31:37","modified_gmt":"2025-06-30T13:31:37","slug":"ot-security","status":"publish","type":"offering-page","link":"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/ot-security\/","title":{"rendered":"OT Security"},"content":{"rendered":"<div class=\"nsw-o-info-lead  -hidden-dark-overlay    js-mobile-trigger-button_1 \" >\n    <div class=\"nsw-o-info-lead__overlay\" style=\"position:relative;\">\n                    <div class=\"nsw-o-info-lead__background d-flex flex-column justify-content-center align-items-center\">\n                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/09\/SEO_top_desktop-1-2.jpg\" alt=\"\" data-no-lazy=\"1\">\n                            <\/div>\n                        <div class=\"nsw-o-info-lead__content container -nsw-container d-flex  flex-column \">\n           <div class=\"nsw-o-info-lead__breadcrumbs u-hidden-on-mobile\">\n                                  <ul class=\"nsw-m-breadcrumbs d-flex align-items-center flex-wrap -invert\" itemscope=\"\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\">\n        <li class=\"nsw-m-breadcrumbs__item\" itemprop=\"itemListElement\" itemscope=\"\" itemtype=\"https:\/\/schema.org\/ListItem\">\n        <a class=\" u-color-invert  \" itemprop=\"item\" href=\"https:\/\/sii.pl\/en\/\">\n            <span itemprop=\"name\" property=\"name\">Home<\/span>\n        <\/a>\n    <\/li>\n        <\/ul>                          <\/div>\n            <div class=\"nsw-o-info-lead__back-content u-hidden-on-desktop\">\n                                                            <a  href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/\" class=\"nsw-a-button -link-invert -icon-left -icon-small u-hidden-on-desktop nsw-o-info-lead__back-btn\"   >\n            <span class=\"nsw-a-button__icon\">\n            <svg width=\"4\" height=\"7\" viewBox=\"0 0 4 7\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n    <path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M3.85355 6.35355C3.65829 6.54882 3.34171 6.54882 3.14645 6.35355L0.292893 3.5L3.14645 0.646447C3.34171 0.451184 3.65829 0.451184 3.85355 0.646447C4.04882 0.841709 4.04882 1.15829 3.85355 1.35355L1.70711 3.5L3.85355 5.64645C4.04882 5.84171 4.04882 6.15829 3.85355 6.35355Z\"\/>\n<\/svg>\n\n        <\/span>\n        <span>Cybersecurity<\/span>\n    <\/a>\n                                                <\/div>\n            <div class=\"nsw-o-info-lead__row d-flex flex-column justify-content-between mt-auto\">\n                                                <div class=\"nsw-m-title-block -h2 -ph4 -invert\">\n                                <h1 class=\"nsw-m-title-block__title\">OT Security<\/h1>\n                        <p class=\"nsw-m-title-block__subtitle\">Sii protects your OT systems to keep your operations safe, your data secure, and your business running without disruptions. <\/p>\n    <\/div>\n\n                <div class=\"nsw-o-info-lead__controls-button\">\n                                                                                                                                                                                                                            <a  href=\"#nswOfferFormBlock\" class=\"nsw-a-button  -invert js-scroll-to-section\"    rel=\"nofollow\" >\n        <span>Get in touch<\/span>\n    <\/a>\n                                                                                                                        <\/div>\n\n            <\/div>\n                                            <\/div>\n    <\/div>\n<\/div><section class=\"wp-block-nsw-block-section nsw-section  section-50ca4e19-cdac-4fb8-ab53-62be6997757d\" id=\"\"><style type=\"text\/css\">.section-50ca4e19-cdac-4fb8-ab53-62be6997757d { \n\t\t\n\t\t\t\tpadding-top:80px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:80px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tbackground:linear-gradient(152deg, rgba(245, 249, 254, 0) 35.51%, rgba(245, 249, 254, 0.48) 55.73%, rgba(245, 249, 254, 1) 78.08%);\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-50ca4e19-cdac-4fb8-ab53-62be6997757d { \n\t\t\n\t\t\t\tpadding-top:30px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:30px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-9b5a79d9-7f65-4dab-932e-425d6133ac1a .nsw-m-title-block__title, .header-9b5a79d9-7f65-4dab-932e-425d6133ac1a .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-9b5a79d9-7f65-4dab-932e-425d6133ac1a .nsw-m-title-block__title, .header-9b5a79d9-7f65-4dab-932e-425d6133ac1a .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-9b5a79d9-7f65-4dab-932e-425d6133ac1a -h2 -ph3 \"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">RESILIENT DEFENSE OF OPERATIONAL SYSTEMS\u00a0\u00a0<\/mark><\/h2><p class=\"nsw-m-title-block__subtitle \"><\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-8debe15c-8a4e-4101-8f04-a2eaa6058c87\"><style type=\"text\/css\">.container-8debe15c-8a4e-4101-8f04-a2eaa6058c87 {  }\n                         @media screen and (max-width: 991px) { .container-8debe15c-8a4e-4101-8f04-a2eaa6058c87 {  } }<\/style><h2 class=\"wp-block-heading has-nsw-p-2-font-size\">We apply recognized frameworks such as IEC 62443 and NIST SP 800-82 to secure everything from remote-access gateways to SCADA environments.\u00a0<\/h2><\/div><\/section><section class=\"wp-block-nsw-block-section nsw-section  section-ef49cf03-207c-4c53-8fdb-85e25c6e11ab\" id=\"\"><style type=\"text\/css\">.section-ef49cf03-207c-4c53-8fdb-85e25c6e11ab { \n\t\t\n\t\t\t\tpadding-top:68px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:42px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tbackground:linear-gradient(152deg, rgba(245, 249, 254, 0) 35.51%, rgba(245, 249, 254, 0.48) 55.73%, rgba(245, 249, 254, 1) 78.08%);\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-ef49cf03-207c-4c53-8fdb-85e25c6e11ab { \n\t\t\n\t\t\t\tpadding-top:24px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:2px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-ef518db6-505f-45f0-84cb-400d33712573 .nsw-m-title-block__title, .header-ef518db6-505f-45f0-84cb-400d33712573 .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-ef518db6-505f-45f0-84cb-400d33712573 .nsw-m-title-block__title, .header-ef518db6-505f-45f0-84cb-400d33712573 .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-ef518db6-505f-45f0-84cb-400d33712573 -h2 -ph3 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">ACHIEVE MORE WITH<\/mark> SII x OT SECURITY\u00a0<\/h2><p class=\"nsw-m-title-block__subtitle \"><\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-a51c0c6c-e7b3-42a9-a0ad-e2c2167d6cc8\"><style type=\"text\/css\">.container-a51c0c6c-e7b3-42a9-a0ad-e2c2167d6cc8 { margin-top:60px; }\n                         @media screen and (max-width: 991px) { .container-a51c0c6c-e7b3-42a9-a0ad-e2c2167d6cc8 { margin-top:20px; } }<\/style><div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p class=\"is-style-nsw-mb-0\"><\/p>\n\n<h2 class=\"wp-block-heading mb-3 has-nsw-h-3-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">OT security assessment\u00a0<\/mark><\/h2>\n\n<p>Sii\u2019s team begins by mapping your environment against respected models like the Purdue Model, in adherence to IEC 62443 and NIST 800-82 standards. We pinpoint identity and access issues, network architecture flaws, and ICS\/SCADA vulnerabilities. Drawing on these insights, we form a roadmap to bridge security gaps and embed robust risk mitigation. Our data-driven analysis offers a grounding for any subsequent industrial control systems (ICS) security measures you adopt.\u00a0<\/p>\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p class=\"is-style-nsw-mb-0\"><\/p>\n\n<h2 class=\"wp-block-heading mb-3 has-nsw-h-3-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">OT network segmentation architecture\u00a0<\/mark><\/h2>\n\n<p>We\u2019ll design or refine your network segmentation strategies to keep critical processes separate from less-trusted zones. Sii\u2019s specialists will formalize both a High-Level Design (HLD) and a Low-Level Design (LLD) \u2013 by capturing standards for current and future deployments. We will also guide your teams in executing secure deployments that withstand modern cyberattacks.\u00a0<\/p>\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p class=\"is-style-nsw-mb-0\"><\/p>\n\n<h2 class=\"wp-block-heading mb-3 has-nsw-h-3-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">Network implementation and security configuration\u00a0<\/mark><\/h2>\n\n<p>Sii\u2019s experts will deploy and configure vital equipment \u2013 firewalls, switches, and advanced security gateways \u2013 to shield your industrial processes. Where needed, we\u2019ll adjust firewall policies and ACLs, conduct thorough testing, and guide cutovers to new setups. Our carefully orchestrated sequence moves you from a legacy or patchwork network to an integrated OT security framework that reduces risk without slowing operations.<\/p>\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p class=\"is-style-nsw-mb-0\"><\/p>\n\n<h2 class=\"wp-block-heading mb-3 has-nsw-h-3-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">Security control implementation\u00a0<\/mark><\/h2>\n\n<p>We\u2019ll fill the gaps unearthed by your security assessments with measures like industrial intrusion detection, controlled remote access, and consistent backup and disaster recovery solutions. Our emphasis on asset management and endpoint protection gives an end-to-end security model that unifies ICS, SCADA, and other critical OT segments under one strategy.\u00a0<\/p>\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<p class=\"is-style-nsw-mb-0\"><\/p>\n\n<h2 class=\"wp-block-heading mb-3 has-nsw-h-3-font-size\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">24\/7 OT threat monitoring and response service\u00a0<\/mark><\/h2>\n\n<p>We deliver constant surveillance over your OT infrastructure \u2013 to detect anomalies long before they harm production. If an incident surfaces, Sii\u2019s security analysts provide containment and coordinated recovery. Threat intelligence helps us track emerging techniques and lets us respond proactively to potential exploits. Documented incident logs and response activities guarantee transparency and readiness for any audits or compliance reviews.\u00a0<\/p><\/div><\/section><section class=\"wp-block-nsw-block-section nsw-section  section-c5f28c07-1203-4aed-bfa0-6edb6ca67f62\" id=\"\"><style type=\"text\/css\">.section-c5f28c07-1203-4aed-bfa0-6edb6ca67f62 { \n\t\t\n\t\t\t\tpadding-top:70px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:14px;\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-c5f28c07-1203-4aed-bfa0-6edb6ca67f62 { \n\t\t\n\t\t\t\tpadding-top:24px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:3px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-cc8ec108-cb0f-47f9-b74a-2455e4fab499 .nsw-m-title-block__title, .header-cc8ec108-cb0f-47f9-b74a-2455e4fab499 .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-cc8ec108-cb0f-47f9-b74a-2455e4fab499 .nsw-m-title-block__title, .header-cc8ec108-cb0f-47f9-b74a-2455e4fab499 .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-cc8ec108-cb0f-47f9-b74a-2455e4fab499 -h2 -ph3 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">WHY PARTNER WITH SII<\/mark> FOR OT SECURITY SOLUTIONS\u00a0<\/h2><p class=\"nsw-m-title-block__subtitle \"><\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container nsw__asymetric-container container-e783551c-8216-4cd8-b943-d0536729e46b\"><style type=\"text\/css\">.container-e783551c-8216-4cd8-b943-d0536729e46b { margin-top:60px; }\n                         @media screen and (max-width: 991px) { .container-e783551c-8216-4cd8-b943-d0536729e46b { margin-top:30px; } }<\/style><div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\"><div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><h2 class=\"wp-block-heading mb-3 has-nsw-h-3-font-size\">170+ certified technology and cybersecurity experts\u00a0<\/h2>\n\n<p>Sii\u2019s brings together deep, cross-functional experience in securing industrial control systems and critical infrastructure. This broad collective experience of Sii\u2019s team translates to ability to tackle any security demands of ICS, keeping your operations both productive and protected.\u00a0<\/p>\n\n<h2 class=\"wp-block-heading mb-3 has-nsw-h-3-font-size\">Bridging IT and OT cybersecurity\u00a0<\/h2>\n\n<p>Sii\u2019s professionals recognize that operational environments require a nuanced approach beyond typical IT safeguards. We unify both IT and OT security perspectives to craft protection schemes that span every layer of your infrastructure. From remote monitoring stations to sensor-level communication, our methods account for real-time performance and industrial safety. With Sii, you have a fully integrated defense.\u00a0<\/p>\n\n<h2 class=\"wp-block-heading mb-3 has-nsw-h-3-font-size\">End-to-end support across the security lifecycle\u00a0<\/h2>\n\n<p>We deliver an end-to-end support that extends from governance and compliance to design, implementation, and continuous monitoring. Sii\u2019s process covers vulnerability management, incident handling, and regular verification \u2013 to give you a technology-driven framework that evolves with the latest threats. With Sii, you gain sustained resilience, no matter how dynamic or complicated your operational environment is.\u00a0<\/p><\/div>\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:4%\"><\/div>\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"822\" height=\"517\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/09\/WhyPartnerWithUs1.jpg\" alt=\"\" class=\"wp-image-101422\" style=\"aspect-ratio:4\/3;object-fit:cover\" srcset=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/09\/WhyPartnerWithUs1.jpg 822w, https:\/\/sii.pl\/wp-content\/uploads\/2024\/09\/WhyPartnerWithUs1-400x252.jpg 400w, https:\/\/sii.pl\/wp-content\/uploads\/2024\/09\/WhyPartnerWithUs1-768x483.jpg 768w\" sizes=\"(max-width: 822px) 100vw, 822px\" \/><\/figure><\/div><\/div><\/div><\/section><section class=\"wp-block-nsw-block-section nsw-section  section-c42dfb83-bc9b-4744-a20a-cae2f372f0af\" id=\"\"><style type=\"text\/css\">.section-c42dfb83-bc9b-4744-a20a-cae2f372f0af { \n\t\t\n\t\t\t\tpadding-top:68px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:72px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tbackground:#F5F9FE;\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-c42dfb83-bc9b-4744-a20a-cae2f372f0af { \n\t\t\n\t\t\t\tpadding-top:25px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:16px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-c386039c-489c-4522-93ce-15fdd8e31b2b .nsw-m-title-block__title, .header-c386039c-489c-4522-93ce-15fdd8e31b2b .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-c386039c-489c-4522-93ce-15fdd8e31b2b .nsw-m-title-block__title, .header-c386039c-489c-4522-93ce-15fdd8e31b2b .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-c386039c-489c-4522-93ce-15fdd8e31b2b -h2 -uppercase -p1 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">OT SECURITY <\/mark>case studies<\/h2><p class=\"nsw-m-title-block__subtitle \"><\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-696e8764-3e81-49e6-9440-b0d99acce7a1\"><style type=\"text\/css\">.container-696e8764-3e81-49e6-9440-b0d99acce7a1 { margin-top:90px; }\n                         @media screen and (max-width: 991px) { .container-696e8764-3e81-49e6-9440-b0d99acce7a1 { margin-top:20px; } }<\/style><div class=\"nsw-o-cards-extender\">\n    <div class=\"nsw-o-slider nsw-o-slider__big  js-slider js-slider-fade-on-desktop js-slider-center js-slider-sync_1779099983332  -visibleArrowsOnMobile\">\n        <div class=\"nsw-o-slider__navigation  u-hidden-on-desktop\">\n            <button  class=\"nsw-a-icon-button -transparent nsw-o-slider__prev  u-hidden-on-desktop js-slide-prev\" >\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 19.03125 4.28125 L 8.03125 15.28125 L 7.34375 16 L 8.03125 16.71875 L 19.03125 27.71875 L 20.46875 26.28125 L 10.1875 16 L 20.46875 5.71875 Z\"\/><\/svg>\n\n    <\/button>\n            <button  class=\"nsw-a-icon-button -transparent nsw-o-slider__next  u-hidden-on-desktop js-slide-next\" >\n      <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg>\n\n    <\/button>\n        <\/div>\n        <div class=\"nsw-o-slider__box \">\n            <div class=\"nsw-o-slider__content js-carousel-movies-large js-carousel \">\n                                                            <div class=\"nsw-o-slider__content__item  big-slide d-flex flex-column flex-lg-row\">\n                            <div class=\"cnt\">\n                                                                    <div class=\"logo\">\n                                        <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/08\/Logo-CS_Flying-Tiger.png\" alt=\"Enhanced organization security with 8\/5 SOC service\" \/>\n                                    <\/div>\n                                                                                                     <h3 class=\"title\">Enhanced organization security with 8\/5 SOC service<\/h3>\n                                                                                                    <div class=\"desc\">\n                                        Check out how we raised the internal security level of Flying Tiger Copenhagen, a Danish chain of nearly 1 000 accessory stores worldwide. By conducting a security assessment of the organization and IT environment and providing the 8\/5 SOC service, the client gained continuous monitoring and incident resolution by the SLA, achieving the required resistance to attacks. \n                                    <\/div>\n                                                                                                <ul class=\"chips \">\n                                                                                                        <\/ul>\n                            <\/div>\n                            <div class=\"img-box\">\n                                                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/08\/CS_Flying-Tiger.jpg\" alt=\"Enhanced organization security with 8\/5 SOC service\" \/>\n                                                                                            <\/div>\n                        <\/div>\n                                                                                <div class=\"nsw-o-slider__content__item  big-slide d-flex flex-column flex-lg-row\">\n                            <div class=\"cnt\">\n                                                                    <div class=\"logo\">\n                                        <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Logo-CS_Qiagen.png\" alt=\"Azure cloud PKI security consulting for Qiagen\" \/>\n                                    <\/div>\n                                                                                                     <h3 class=\"title\">Azure cloud PKI security consulting for Qiagen<\/h3>\n                                                                                                    <div class=\"desc\">\n                                        Check out how we improved the security of newly introduced IoT devices for a leader in providing solutions for molecular research. We provided consulting on securing the system, especially in the area of authentication and certificate management and provided the architecture for a secure PKI solution. \n                                    <\/div>\n                                                                                                <ul class=\"chips \">\n                                                                                                        <\/ul>\n                            <\/div>\n                            <div class=\"img-box\">\n                                                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/CS_Qiagen.jpg\" alt=\"Azure cloud PKI security consulting for Qiagen\" \/>\n                                                                                            <\/div>\n                        <\/div>\n                                                                                <div class=\"nsw-o-slider__content__item  big-slide d-flex flex-column flex-lg-row\">\n                            <div class=\"cnt\">\n                                                                    <div class=\"logo\">\n                                        <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Logo-CS_Pansa.png\" alt=\"Strengthening the cybersecurity of the Polish Air Navigation Services Agency\" \/>\n                                    <\/div>\n                                                                                                     <h3 class=\"title\">Strengthening the cybersecurity of the Polish Air Navigation Services Agency<\/h3>\n                                                                                                    <div class=\"desc\">\n                                        See how we helped a key service operator comply with the national cybersecurity system act requirements. We analyzed the current state, designed security monitoring and incident handling processes, created correlation rules for the existing SIEM system, verified regulatory compliance, and designed network security enhancements. \n                                    <\/div>\n                                                                                                <ul class=\"chips \">\n                                                                                                        <\/ul>\n                            <\/div>\n                            <div class=\"img-box\">\n                                                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/CS_Pansa-1.png\" alt=\"Strengthening the cybersecurity of the Polish Air Navigation Services Agency\" \/>\n                                                                                            <\/div>\n                        <\/div>\n                                                                                <div class=\"nsw-o-slider__content__item  big-slide d-flex flex-column flex-lg-row\">\n                            <div class=\"cnt\">\n                                                                    <div class=\"logo\">\n                                        <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Logo-CS_VIG.png\" alt=\"Improved application security through comprehensive penetration testing  \" \/>\n                                    <\/div>\n                                                                                                     <h3 class=\"title\">Improved application security through comprehensive penetration testing  <\/h3>\n                                                                                                    <div class=\"desc\">\n                                        For Vienna Insurance Group, we conducted a program to verify the security of applications deployed by external companies. See how, through secure code analysis, vulnerability assessment, and grey-box penetration testing by the OWASP Web Security Testing Guide, we increased the overall level of security and resistance to various types of attacks. The client also gained a report with identified problems and proposed solutions. \n                                    <\/div>\n                                                                                                <ul class=\"chips \">\n                                                                                                        <\/ul>\n                            <\/div>\n                            <div class=\"img-box\">\n                                                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/CS_VIG.jpg\" alt=\"Improved application security through comprehensive penetration testing  \" \/>\n                                                                                            <\/div>\n                        <\/div>\n                                                <\/div>\n        <\/div>\n    <\/div>\n\n    <div class=\"nsw-o-slider nsw-o-slider__small  js-slider  js-slider-sync_1779099983332 js-slider-revert-first js-focusNextOnSelect js-slider-custom-dots   u-hidden-on-mobile\">\n        <div class=\"nsw-o-slider__box\">\n            <div class=\"nsw-o-slider__content js-carousel-movies-small js-carousel\">\n                                                            <div  class=\"sii-o-slider__content__item  small-slide u-background-color-invert\">\n                                                            <div class=\"logo\">\n                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/08\/Logo-CS_Flying-Tiger.png\" alt=\"Enhanced organization security with 8\/5 SOC service\" \/>\n                                <\/div>\n                                                                    <div class=\"desc\">\n                                        Enhanced organization security with 8\/5 SOC service\n                                    <\/div>\n                                                                                    <\/div>\n                                                                                <div  class=\"sii-o-slider__content__item  small-slide u-background-color-invert\">\n                                                            <div class=\"logo\">\n                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Logo-CS_Qiagen.png\" alt=\"Azure cloud PKI security consulting for Qiagen\" \/>\n                                <\/div>\n                                                                    <div class=\"desc\">\n                                        Azure cloud PKI security consulting for Qiagen\n                                    <\/div>\n                                                                                    <\/div>\n                                                                                <div  class=\"sii-o-slider__content__item  small-slide u-background-color-invert\">\n                                                            <div class=\"logo\">\n                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Logo-CS_Pansa.png\" alt=\"Strengthening the cybersecurity of the Polish Air Navigation Services Agency\" \/>\n                                <\/div>\n                                                                    <div class=\"desc\">\n                                        Strengthening the cybersecurity of the Polish Air Navigation Services Agency\n                                    <\/div>\n                                                                                    <\/div>\n                                                                                <div  class=\"sii-o-slider__content__item  small-slide u-background-color-invert\">\n                                                            <div class=\"logo\">\n                                    <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Logo-CS_VIG.png\" alt=\"Improved application security through comprehensive penetration testing  \" \/>\n                                <\/div>\n                                                                    <div class=\"desc\">\n                                        Improved application security through comprehensive penetration testing  \n                                    <\/div>\n                                                                                    <\/div>\n                                                <\/div>\n        <\/div>\n    <\/div>\n\n<\/div>\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer u-hidden-on-mobile\"><\/div>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer u-hidden-on-desktop\"><\/div>\n\n<div class=\"wp-block-buttons u-hidden-on-mobile is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button is-style-nsw-outline-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sii.pl\/en\/case-studies\/\">See all case studies<\/a><\/div><\/div>\n\n<div class=\"wp-block-buttons u-hidden-on-desktop is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button is-style-nsw-outline-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sii.pl\/en\/case-studies\/\">See all case studies<\/a><\/div><\/div><\/div><\/section><section class=\"wp-block-nsw-block-section nsw-section  section-3349c74b-6e55-4fa8-8376-803d550832b5\" id=\"\"><style type=\"text\/css\">.section-3349c74b-6e55-4fa8-8376-803d550832b5 { \n\t\t\n\t\t\t\tpadding-top:69px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:80px;\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-3349c74b-6e55-4fa8-8376-803d550832b5 { \n\t\t\n\t\t\t\tpadding-top:24px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:22px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-6be62cb4-175e-4a48-8da8-8f2cd64241ed .nsw-m-title-block__title, .header-6be62cb4-175e-4a48-8da8-8f2cd64241ed .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-6be62cb4-175e-4a48-8da8-8f2cd64241ed .nsw-m-title-block__title, .header-6be62cb4-175e-4a48-8da8-8f2cd64241ed .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-6be62cb4-175e-4a48-8da8-8f2cd64241ed -h2 -p1 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \">BENEFIT FROM OUR<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\"> OT SECURITY SERVICES<\/mark><\/h2><p class=\"nsw-m-title-block__subtitle \">A step-by-step approach<\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-1455b3b8-fdc4-4e15-9ef7-fd8b2074df21\"><style type=\"text\/css\">.container-1455b3b8-fdc4-4e15-9ef7-fd8b2074df21 { margin-top:60px; }\n                         @media screen and (max-width: 991px) { .container-1455b3b8-fdc4-4e15-9ef7-fd8b2074df21 { margin-top:20px; } }<\/style><style>\n    .editor-styles-wrapper .nsw-o-expanded-slider__item img {\n        height: 100%;\n        z-index: 0;\n    }\n    .editor-styles-wrapper .nsw-o-expanded-slider__item a:hover {\n        text-decoration: none!important;\n    }\n<\/style>\n\n    <div class=\"nsw-o-expanded-slider  d-flex align-items-center flex-column flex-lg-row js-accordion js-oneOpen js-accordion-autoplay js-noScroll   -number -image-default\"  data-accordion-autoplay-speed=\"6000\" >\n                                        <button class=\"nsw-o-expanded-slider__item js-accordion-item js-accordion-header active\">\n                                            <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/08\/01seo-2.jpg\" alt=\"\">\n                                                                            <div class=\"nsw-o-expanded-slider__details d-flex flex-column js-accordion-body\">\n                                                                                    <span class=\"nsw-o-expanded-slider__number u-color-nswc-invert\">01<\/span>\n                                                                                <h3 class=\"u-color-nswc-invert u-font-bold\"> <span>01<\/span> <span class=\"u-font-bold\">Assessment <\/span> <\/h3>\n                                        <p class=\"u-color-nswc-invert\">Sii\u2019s team starts by surveying your operational landscape, analyzing where vulnerabilities could arise, and identifying the most critical assets. The upfront clarity guides the subsequent creation of a personalized risk reduction plan. <\/p>\n                                                                                                                                                                                                        <\/div>\n                                                    <\/button>\n                                                <button class=\"nsw-o-expanded-slider__item js-accordion-item js-accordion-header \">\n                                            <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/08\/02seo-1.jpg\" alt=\"\">\n                                                                            <div class=\"nsw-o-expanded-slider__details d-flex flex-column js-accordion-body\">\n                                                                                    <span class=\"nsw-o-expanded-slider__number u-color-nswc-invert\">02<\/span>\n                                                                                <h3 class=\"u-color-nswc-invert u-font-bold\"> <span>02<\/span> <span class=\"u-font-bold\">Design <\/span> <\/h3>\n                                        <p class=\"u-color-nswc-invert\">We produce structured architecture guidelines \u2013 such as HLD and LLD \u2013 that detail how your network, devices, and processes interconnect. Building from established standards, we incorporate best practices to keep industrial workflows efficient but protected. <\/p>\n                                                                                                                                                                                                        <\/div>\n                                                    <\/button>\n                                                <button class=\"nsw-o-expanded-slider__item js-accordion-item js-accordion-header \">\n                                            <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2022\/06\/03seo.jpg\" alt=\"\">\n                                                                            <div class=\"nsw-o-expanded-slider__details d-flex flex-column js-accordion-body\">\n                                                                                    <span class=\"nsw-o-expanded-slider__number u-color-nswc-invert\">03<\/span>\n                                                                                <h3 class=\"u-color-nswc-invert u-font-bold\"> <span>03<\/span> <span class=\"u-font-bold\">Implementation <\/span> <\/h3>\n                                        <p class=\"u-color-nswc-invert\">Sii\u2019s OT security engineers roll out the necessary hardware and software, fine-tuning each component to guarantee minimal disruption. This includes reconfiguring existing networks, firewalls, or endpoint protections that need alignment with the new approach. <\/p>\n                                                                                                                                                                                                        <\/div>\n                                                    <\/button>\n                                                <button class=\"nsw-o-expanded-slider__item js-accordion-item js-accordion-header \">\n                                            <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2022\/06\/04seo.jpg\" alt=\"\">\n                                                                            <div class=\"nsw-o-expanded-slider__details d-flex flex-column js-accordion-body\">\n                                                                                    <span class=\"nsw-o-expanded-slider__number u-color-nswc-invert\">04<\/span>\n                                                                                <h3 class=\"u-color-nswc-invert u-font-bold\"> <span>04<\/span> <span class=\"u-font-bold\">Monitoring <\/span> <\/h3>\n                                        <p class=\"u-color-nswc-invert\">We provide around-the-clock oversight using threat intelligence and specialized OT detection tools. By spotting anomalies in real time, we empower your teams to address suspicious behavior before it escalates into a full-scale incident. <\/p>\n                                                                                                                                                                                                        <\/div>\n                                                    <\/button>\n                                                <button class=\"nsw-o-expanded-slider__item js-accordion-item js-accordion-header \">\n                                            <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2022\/06\/05seo.jpg\" alt=\"\">\n                                                                            <div class=\"nsw-o-expanded-slider__details d-flex flex-column js-accordion-body\">\n                                                                                    <span class=\"nsw-o-expanded-slider__number u-color-nswc-invert\">05<\/span>\n                                                                                <h3 class=\"u-color-nswc-invert u-font-bold\"> <span>05<\/span> <span class=\"u-font-bold\">Response <\/span> <\/h3>\n                                        <p class=\"u-color-nswc-invert\">If a breach is detected, Sii\u2019s experts help contain it immediately, limiting any potential damage to critical processes. Our incident documentation captures each step to reinforce your future defenses and assure management or regulators of your robust response posture. <\/p>\n                                                                                                                                                                                                        <\/div>\n                                                    <\/button>\n                                                <button class=\"nsw-o-expanded-slider__item js-accordion-item js-accordion-header \">\n                                            <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/08\/06seo.jpg\" alt=\"\">\n                                                                            <div class=\"nsw-o-expanded-slider__details d-flex flex-column js-accordion-body\">\n                                                                                    <span class=\"nsw-o-expanded-slider__number u-color-nswc-invert\">06<\/span>\n                                                                                <h3 class=\"u-color-nswc-invert u-font-bold\"> <span>06<\/span> <span class=\"u-font-bold\">Continual Improvement <\/span> <\/h3>\n                                        <p class=\"u-color-nswc-invert\">We believe in dynamic defense. By evaluating your OT environment regularly and incorporating emerging techniques or standards, we make sure your infrastructure remains relevant against fast-evolving attack methods and compliance requirements. <\/p>\n                                                                                                                                                                                                        <\/div>\n                                                    <\/button>\n                        <\/div><\/div><\/section><section class=\"nsw-o-download-section-form nsw-section \"  style=\"background-image: url(https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Gated_Content_Cybersecurity.png)\">\n    <div class=\"container -nsw-container\">\n        <div class=\"nsw-o-download-section-form__cnt -js-open-form-control__container\">\n                                    <div class=\"nsw-m-title-block -h2 -ph3 -at0 -has-title-mark-color-gradient-main -has-subtitle-mark-color-gradient-main -above-title-text-default -has-subtitle-color-default -has-title-margin-bottom-16\">\n            <h2 class=\"nsw-m-title-block__above-title\"><\/h2>\n                                <h2 class=\"nsw-m-title-block__title\"><mark>CYBERSECURITY <\/mark> AWARENESS   ABC <\/h2>\n                        <p class=\"nsw-m-title-block__subtitle\">Your essential handbook for staying safe<\/p>\n    <\/div>\n            <a  href=\"#\" class=\"nsw-a-button -ghost -blue -js-open-form-control__container__btn nsw-o-download-section-form__button\"    rel=\"nofollow\" >\n        <span>Download<\/span>\n    <\/a>\n\n            <div class=\"nsw-o-download-section-form__form-box\">\n                <form action=\"\" name=\"form_gated_content_sales\" id=\"form_gated_content_sales\" method=\"POST\" class=\"nsw-o-download-section-form -none-padding js-form js-d365-correlation-watcher\" onsubmit=\"event.preventDefault()\" novalidate>\n    <div class=\"js-form-initial\">\n        <div class=\"js-hidden-inputs\"><input type=\"hidden\" name=\"correlation_id\" id=\"correlation_id\" value=\"\"><input type=\"hidden\" name=\"language_site\" id=\"language_site\" value=\"en\"><input type=\"hidden\" name=\"msd365mkttr\" id=\"msd365mkttr\" value=\"\"><input type=\"hidden\" name=\"msd365mkttrs\" id=\"msd365mkttrs\" value=\"\"><input type=\"hidden\" name=\"cd_visitorkey\" id=\"cd_visitorkey\" value=\"\"><input type=\"hidden\" name=\"additional_info\" id=\"additional_info\" value=\"{\"page_url\":\"https:\\\/\\\/sii.pl\\\/en\\\/wp-json\\\/wp\\\/v2\\\/offering-page\\\/98018\"}\"><input type=\"hidden\" name=\"page_url\" id=\"page_url\" value=\"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/offering-page\/98018\"><input type=\"hidden\" name=\"frm_xpnd\" id=\"frm_xpnd\" value=\"form_nsw_gated_content_sales\"><input type=\"hidden\" name=\"Source\" id=\"Source\" value=\"form_nsw_gated_content_sales\"><input type=\"hidden\" name=\"Site\" id=\"Site\" value=\"sii.pl\"><input type=\"hidden\" name=\"privacy_policy_delivered\" id=\"privacy_policy_delivered\" value=\"on\"><input type=\"hidden\" id=\"gclid_field\" name=\"gclid_field\" value=\"\"><\/div>\n        <div class=\"frow d-flex flex-wrap justify-content-between\">\n            <div class=\"box\">\n                <label class=\"nsw-m-input-line  frow\" for=\"name\">\n    <span class=\"nsw-m-input-line__label d-block\">\n        First name<span class=\"nsw-m-input-line__required\">*<\/span>\n            <\/span>\n        <input \n            \n            data-allowed-chars=\"\u00c5\u00c9\u00c0\u00c4\u00d6\u1e9e\u00dc\u0104\u015a\u0106\u0179\u017b\u0141\u0118\u0106\u0143\u00d3\u0105\u015b\u0107\u017a\u017c\u0142\u00f3\u0119\u0107\u0144\u00e4\u00f6\u00df\u00fc\u00e0\u00e9\u00e5&#039; \"\n            class=\"input-text required \"\n            name=\"name\"\n            id=\"name\"\n            value=\"\"\n                                        >\n    <span class=\"nsw-m-input-line__helper-text\"><\/span>\n            <span class=\"nsw-m-input-line__error js-require-error u-hidden\">First name is required<\/span>\n        <span class=\"nsw-m-input-line__error js-format-error u-hidden\">This field must contain only letters and special characters<\/span>\n    \n<\/label>\n            <\/div>\n            <div class=\"box\">\n                <label class=\"nsw-m-input-line  frow\" for=\"surname\">\n    <span class=\"nsw-m-input-line__label d-block\">\n        Surname<span class=\"nsw-m-input-line__required\">*<\/span>\n            <\/span>\n        <input \n            \n            data-allowed-chars=\"\u00c5\u00c9\u00c0\u00c4\u00d6\u1e9e\u00dc\u0104\u015a\u0106\u0179\u017b\u0141\u0118\u0106\u0143\u00d3\u0105\u015b\u0107\u017a\u017c\u0142\u00f3\u0119\u0107\u0144\u00e4\u00f6\u00df\u00fc\u00e0\u00e9\u00e5&#039; -\"\n            class=\"input-text required \"\n            name=\"surname\"\n            id=\"surname\"\n            value=\"\"\n                                        >\n    <span class=\"nsw-m-input-line__helper-text\"><\/span>\n            <span class=\"nsw-m-input-line__error js-require-error u-hidden\">Surname is required<\/span>\n        <span class=\"nsw-m-input-line__error js-format-error u-hidden\">This field must contain only letters and special characters<\/span>\n    \n<\/label>\n            <\/div>\n        <\/div>\n        <div class=\"frow  d-flex flex-wrap justify-content-between\">\n            <div class=\"box\">\n                <label class=\"nsw-m-input-line  frow\" for=\"phone\">\n    <span class=\"nsw-m-input-line__label d-block\">\n        Phone number    <\/span>\n        <input \n            type=tel\n            data-allowed-chars=\"\"\n            class=\"input-text  \"\n            name=\"phone\"\n            id=\"phone\"\n            value=\"\"\n                                                    maxlength=\"14\"\n                >\n    <span class=\"nsw-m-input-line__helper-text\"><\/span>\n        <span class=\"nsw-m-input-line__error js-format-error u-hidden\">Please enter a valid phone number<\/span>\n    \n<\/label>\n            <\/div>\n            <div class=\"box\">\n                <label class=\"nsw-m-input-line  frow\" for=\"email\">\n    <span class=\"nsw-m-input-line__label d-block\">\n        E-mail<span class=\"nsw-m-input-line__required\">*<\/span>\n            <\/span>\n        <input \n            type=email\n            data-allowed-chars=\"\"\n            class=\"input-text required js-mail-auto-complete\"\n            name=\"email\"\n            id=\"email\"\n            value=\"\"\n                                        >\n    <span class=\"nsw-m-input-line__helper-text\"><\/span>\n            <span class=\"nsw-m-input-line__error js-require-error u-hidden\">E-mail address is required<\/span>\n        <span class=\"nsw-m-input-line__error js-format-error u-hidden\">Please enter a valid email address<\/span>\n    \n<\/label>\n            <\/div>\n        <\/div>\n        <div class=\"frow -consents\">\n            <label \n       class=\"nsw-m-checkbox-label -label-small d-flex align-items-start justify-content-between\"\n                     >\n\n    <input type=\"checkbox\" \n           class=\"required\"\n           data-label=\"I consent to the processing of my personal data by Sii sp. z o.o. and its subsidiaries for the purpose of sending marketing information to the provided e-mail address.\"\n           data-id=\"form_contact_email\"\n           name=\"contact_email\"\n                      value=\"yes\" >\n\n    <span class=\"nsw-m-checkbox-label__input\"><\/span>\n\n    <span class=\"nsw-m-checkbox-label__name\" >\n        I consent to the processing of my personal data by Sii sp. z o.o. and its subsidiaries for the purpose of sending marketing information to the provided e-mail address.<span class=\"nsw-m-checkbox-label__req\">*<\/span>            <\/span>\n\n    <\/label>\n        <\/div>\n\n        <div class=\"frow -consents-text\">\n\n            At any time, you may withdraw your consent to the processing of personal data, but such withdrawal shall not affect the legal compliance of any processing of such data, which had occurred before you withdrew your consent. Detailed information on the processing of your personal data is specified in the  <a class=\"link-privacy-policy\" href=\"https:\/\/sii.pl\/en\/privacy-policy\/\" target=\"_blank\" title=\"Privacy Policy \"> Privacy Policy<\/a>.\n        <\/div>\n\n        <div class=\"frow -submit\">\n                        <button  type=\"submit\"  class=\"nsw-a-button \">Download<\/button>\n                            <a  href=\"\" class=\"nsw-a-button -link nsw-o-download-section-form__close  -js-open-form-control__container__btn-close\"   >\n        <span>Close<\/span>\n    <\/a>\n                    <\/div>\n    <\/div>\n        <div class=\"js-form-success u-hidden\">\n    <div class=\"js-success-substate js-success-download sii-m-message-success default\">\n        <a href=\"#\" class=\"sii-a-badge-button -invert -big-icon\" rel=\"nofollow\" >\n            <svg class=\"icon icon-arrow-right2\">\n                <use xlink:href=\"https:\/\/sii.pl\/wp-content\/themes\/sii-sage\/dist\/spritemap.svg#sprite-la-check\"><\/use>\n            <\/svg>\n        <\/a>\n                <h3>Thank you! <\/h3>\n    <\/div>\n                <div class=\"js-success-substate js-success-new-window u-center-text\">\n        <a href=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/08\/CYBERSECURITY-AWARENESS-ABC.pdf\" target=\"_blank\"\n            class=\"sii-a-button -ghost -primary\">Download<\/a>\n    <\/div>\n                \n<\/div>    <div class=\"nsw-o-process-error u-hidden js-form-error\">\n    <div class=\"nsw-o-process-error__default\">\n                <h2 class=\"nsw-o-process-error__title has-nsw-h-3-font-size u-color-nswc-grey-1000\">\n            <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 16 4 C 9.382813 4 4 9.382813 4 16 C 4 22.617188 9.382813 28 16 28 C 22.617188 28 28 22.617188 28 16 C 28 9.382813 22.617188 4 16 4 Z M 16 6 C 21.535156 6 26 10.464844 26 16 C 26 21.535156 21.535156 26 16 26 C 10.464844 26 6 21.535156 6 16 C 6 10.464844 10.464844 6 16 6 Z M 15 10 L 15 18 L 17 18 L 17 10 Z M 15 20 L 15 22 L 17 22 L 17 20 Z\"\/><\/svg>Sorry, something went wrong and your message was not delivered<\/h2>\n                                    <p class=\"subtitle has-nsw-h-4-font-size u-color-nswc-grey-600\">Refresh the page and try again. <a href=\"https:\/\/sii.pl\/en\/contact-us\/\">Contact us<\/a>, if problem occurs again <\/p>\n                    <div class=\"nsw-o-process-error__button-line\">\n                            <a  href=\"\" class=\"nsw-a-button -ghost-primary u-margin-positive-32\"   >\n        <span>Refresh<\/span>\n    <\/a>\n                                <\/div>\n    <\/div>\n    <div class=\"nsw-o-process-error__file-error\">\n        <h2 class=\"nsw-o-process-error__title has-nsw-h-3-font-size u-color-nswc-grey-1000\">\n            <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 16 4 C 9.382813 4 4 9.382813 4 16 C 4 22.617188 9.382813 28 16 28 C 22.617188 28 28 22.617188 28 16 C 28 9.382813 22.617188 4 16 4 Z M 16 6 C 21.535156 6 26 10.464844 26 16 C 26 21.535156 21.535156 26 16 26 C 10.464844 26 6 21.535156 6 16 C 6 10.464844 10.464844 6 16 6 Z M 15 10 L 15 18 L 17 18 L 17 10 Z M 15 20 L 15 22 L 17 22 L 17 20 Z\"\/><\/svg>\n            We\u2019re sorry, but the selected file appears to be damaged and we can&#039;t process it.\n        <\/h2>\n        <p class=\"subtitle has-nsw-h-4-font-size u-color-nswc-grey-600\">\n            Please try uploading a different copy or a new version of the file. \n            <a href=\"mailto:contact@sii.pl\" rel=\"nofollow\" > Contact us<\/a>, if problem occurs again.\n        <\/p>\n        <div class=\"nsw-o-process-error__button-line\">\n            <a  href=\"\" class=\"nsw-a-button -ghost-primary u-margin-positive-32 js-wrong-file-button\"   >\n        <span>Choose another file<\/span>\n    <\/a>\n        <\/div>\n    <\/div>\n<\/div><div class=\"nsw-o-processing d-lg-flex justify-content-between u-hidden js-form-pending\" >\n     <div class=\"nsw-a-preloader\">\n    <div class=\"nsw-a-preloader__spinner\">\n        <span><\/span>\n    <\/div>\n<\/div>\n     <div class=\"nsw-o-processing__txt d-flex align-items-center\">\n                           <div class=\"nsw-m-title-block -h3 -p3 -has-title-color-primary -has-subtitle-color-default\">\n                                <h2 class=\"nsw-m-title-block__title\">Processing&#8230;<\/h2>\n                <\/div>\n     <\/div>\n <\/div>\n\n\n<\/form>\n            <\/div>\n\n        <\/div>\n    <\/div>\n<\/section><section class=\"wp-block-nsw-block-section nsw-section  section-a2ad1f89-c556-4136-8b4b-66b96803a1a4\" id=\"\"><style type=\"text\/css\">.section-a2ad1f89-c556-4136-8b4b-66b96803a1a4 { \n\t\t\n\t\t\t\tpadding-top:70px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:80px;\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-a2ad1f89-c556-4136-8b4b-66b96803a1a4 { \n\t\t\n\t\t\t\tpadding-top:26px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:0px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-400cc45f-3729-4614-817c-9cfff41e5e38 .nsw-m-title-block__title, .header-400cc45f-3729-4614-817c-9cfff41e5e38 .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-400cc45f-3729-4614-817c-9cfff41e5e38 .nsw-m-title-block__title, .header-400cc45f-3729-4614-817c-9cfff41e5e38 .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-400cc45f-3729-4614-817c-9cfff41e5e38 -h2 -uppercase -p1 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \">OT SECURITY <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">NEWS &amp; PROJECTS<\/mark><\/h2><p class=\"nsw-m-title-block__subtitle \"><\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-92deee67-4141-41a8-b7f2-82fdfcd1aa86\"><style type=\"text\/css\">.container-92deee67-4141-41a8-b7f2-82fdfcd1aa86 { margin-top:56px; }\n                         @media screen and (max-width: 991px) { .container-92deee67-4141-41a8-b7f2-82fdfcd1aa86 { margin-top:20px; } }<\/style><style>\n    .editor-styles-wrapper .nsw-o-insight-grid .nsw-o-slider__content .nsw-o-insight-grid__slide{\n        display: none!important;\n    }\n    .editor-styles-wrapper .nsw-o-insight-grid .nsw-o-slider__content .nsw-o-insight-grid__slide:first-child{\n        display: flex!important;\n    }\n<\/style>\n\n    <div class=\"nsw-o-insight-grid\">\n    <div class=\"nsw-o-slider  js-slider js-slider-center js-slider-show_1 js-slider-custom-dots js-slider-custom-dots-append u-hidden-on-mobile\">\n        <div class=\"nsw-o-slider__navigation \">\n            <button  class=\"nsw-a-icon-button -transparent nsw-o-slider__prev js-slide-prev\" >\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 19.03125 4.28125 L 8.03125 15.28125 L 7.34375 16 L 8.03125 16.71875 L 19.03125 27.71875 L 20.46875 26.28125 L 10.1875 16 L 20.46875 5.71875 Z\"\/><\/svg>\n\n    <\/button>\n            <button  class=\"nsw-a-icon-button -transparent nsw-o-slider__next js-slide-next\" >\n      <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg>\n\n    <\/button>\n        <\/div>\n        <div class=\"nsw-o-slider__box\">\n            <div class=\"nsw-o-slider__content  js-carousel\">\n                                                       <div class=\"sii-o-slider__content__item  nsw-o-insight-grid__slide  d-flex flex-column flex-lg-row\">\n                       <div class=\"nsw-o-insight-grid__col-big d-flex\">\n                           <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <source media=\"(max-width:992px)\" srcset=\"https:\/\/sii.pl\/wp-content\/uploads\/2026\/04\/1920X740_presroom_Sailpoint-1024x395.jpg\">\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2026\/04\/1920X740_presroom_Sailpoint-900x740.jpg\" alt=\"Identity Security in practice: Sii Poland joins SailPoint&amp;#8217;s partner network\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">Identity Security in practice: Sii Poland joins SailPoint&#8217;s partner network<\/h3>\n          <a href=\"https:\/\/sii.pl\/en\/news-feed\/identity-security-in-practice-sii-poland-joins-sailpoints-partner-network\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                       <\/div>\n                                           \n                        \n                                                                                                             <div class=\"nsw-o-insight-grid__col-small d-flex flex-column\">\n                        \n                                                        <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2024\/07\/Zapewnienie-bezpiecznej-i-etycznej-sztucznej-inteligencji-\u2013-rola-Guardrails-w-Llama-3.jpg\" alt=\"Ensuring safe and ethical AI \u2013 the role of Guardrails in Llama 3\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">Ensuring safe and ethical AI \u2013 the role of Guardrails in Llama 3<\/h3>\n          <a href=\"https:\/\/sii.pl\/blog\/en\/ensuring-safe-and-ethical-ai-the-role-of-guardrails-in-llama-3\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                         \n                                                                                     \n                                                        <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <source media=\"(max-width:992px)\" srcset=\"https:\/\/sii.pl\/wp-content\/uploads\/2026\/01\/1920x700_cover-www-worker-v2-1024x448.png\">\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2026\/01\/1920x700_cover-www-worker-v2-370x290.png\" alt=\"DevSecOps\u00a0in practice: Integrating security throughout the development lifecycle\u00a0\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">DevSecOps\u00a0in practice: Integrating security throughout the development lifecycle\u00a0<\/h3>\n          <a href=\"https:\/\/sii.pl\/en\/news-feed\/devsecops-in-practice-integrating-security-throughout-the-development-lifecycle\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                         \n                                                 <\/div><\/div>\n                                                                               <div class=\"sii-o-slider__content__item  nsw-o-insight-grid__slide  d-flex flex-column flex-lg-row\">\n                       <div class=\"nsw-o-insight-grid__col-big d-flex\">\n                           <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2023\/10\/Znaczenie-identyfikowalnosci-z-perspektywy-projektowania-oprogramowania-wyrobu-medycznego.jpg\" alt=\"The importance of traceability from the perspective of designing a medical device software\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">The importance of traceability from the perspective of designing a medical device software<\/h3>\n          <a href=\"https:\/\/sii.pl\/blog\/en\/the-importance-of-traceability-from-the-perspective-of-designing-a-medical-device-software\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                       <\/div>\n                                           \n                        \n                                                                                                             <div class=\"nsw-o-insight-grid__col-small d-flex flex-column\">\n                        \n                                                        <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <source media=\"(max-width:992px)\" srcset=\"https:\/\/sii.pl\/wp-content\/uploads\/2025\/07\/1920x740_cover-www-1-1024x395.jpg\">\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2025\/07\/1920x740_cover-www-1-370x290.jpg\" alt=\"Long-term value from the KPO (Krajowy Plan Odbudowy). How to plan and deliver cybersecurity projects that stand the test of time\u00a0\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">Long-term value from the KPO (Krajowy Plan Odbudowy). How to plan and deliver cybersecurity projects that stand the test of time\u00a0<\/h3>\n          <a href=\"https:\/\/sii.pl\/en\/news-feed\/long-term-value-from-the-kpo-krajowy-plan-odbudowy-how-to-plan-and-deliver-cybersecurity-projects-that-stand-the-test-of-time\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                         \n                                                                                     \n                                                        <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2023\/07\/Narzedzia-sluzace-do-pozyskiwania-informacji-o-ludziach-i-firmach-.jpg\" alt=\"Tools used for collecting information about individuals and companies \u2013 what is OSINT?\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">Tools used for collecting information about individuals and companies \u2013 what is OSINT?<\/h3>\n          <a href=\"https:\/\/sii.pl\/blog\/en\/tools-used-for-collecting-information-about-individuals-and-companies-what-is-osint\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                         \n                                                 <\/div><\/div>\n                                        \n                \n            <\/div>\n\n            <div class=\"nsw-o-slider__dots js-slider-custom-dots-append-container \">\n            <\/div>\n\n        <\/div>\n    <\/div>\n\n    <div class=\"nsw-o-slider nsw-o-insight-grid__slider-mobile  js-slider js-slider-center js-slider-show-mobile_2 -visibleArrowsOnMobile u-hidden-on-desktop\">\n        <div class=\"nsw-o-slider__navigation  u-hidden-on-desktop\">\n            <button  class=\"nsw-a-icon-button -transparent nsw-o-slider__prev  u-hidden-on-desktop js-slide-prev\" >\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 19.03125 4.28125 L 8.03125 15.28125 L 7.34375 16 L 8.03125 16.71875 L 19.03125 27.71875 L 20.46875 26.28125 L 10.1875 16 L 20.46875 5.71875 Z\"\/><\/svg>\n\n    <\/button>\n            <button  class=\"nsw-a-icon-button -transparent nsw-o-slider__next  u-hidden-on-desktop js-slide-next\" >\n      <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg>\n\n    <\/button>\n        <\/div>\n        <div class=\"nsw-o-slider__box\">\n            <div class=\"nsw-o-slider__content  js-carousel\">\n                                    <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2026\/04\/1920X740_presroom_Sailpoint-1024x395.jpg\" alt=\"Identity Security in practice: Sii Poland joins SailPoint&amp;#8217;s partner network\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">Identity Security in practice: Sii Poland joins SailPoint&#8217;s partner network<\/h3>\n          <a href=\"https:\/\/sii.pl\/en\/news-feed\/identity-security-in-practice-sii-poland-joins-sailpoints-partner-network\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                                    <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2024\/07\/Zapewnienie-bezpiecznej-i-etycznej-sztucznej-inteligencji-\u2013-rola-Guardrails-w-Llama-3.jpg\" alt=\"Ensuring safe and ethical AI \u2013 the role of Guardrails in Llama 3\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">Ensuring safe and ethical AI \u2013 the role of Guardrails in Llama 3<\/h3>\n          <a href=\"https:\/\/sii.pl\/blog\/en\/ensuring-safe-and-ethical-ai-the-role-of-guardrails-in-llama-3\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                                    <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2026\/01\/1920x700_cover-www-worker-v2-1024x448.png\" alt=\"DevSecOps\u00a0in practice: Integrating security throughout the development lifecycle\u00a0\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">DevSecOps\u00a0in practice: Integrating security throughout the development lifecycle\u00a0<\/h3>\n          <a href=\"https:\/\/sii.pl\/en\/news-feed\/devsecops-in-practice-integrating-security-throughout-the-development-lifecycle\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                                    <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2023\/10\/Znaczenie-identyfikowalnosci-z-perspektywy-projektowania-oprogramowania-wyrobu-medycznego.jpg\" alt=\"The importance of traceability from the perspective of designing a medical device software\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">The importance of traceability from the perspective of designing a medical device software<\/h3>\n          <a href=\"https:\/\/sii.pl\/blog\/en\/the-importance-of-traceability-from-the-perspective-of-designing-a-medical-device-software\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                                    <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2025\/07\/1920x740_cover-www-1-1024x395.jpg\" alt=\"Long-term value from the KPO (Krajowy Plan Odbudowy). How to plan and deliver cybersecurity projects that stand the test of time\u00a0\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">Long-term value from the KPO (Krajowy Plan Odbudowy). How to plan and deliver cybersecurity projects that stand the test of time\u00a0<\/h3>\n          <a href=\"https:\/\/sii.pl\/en\/news-feed\/long-term-value-from-the-kpo-krajowy-plan-odbudowy-how-to-plan-and-deliver-cybersecurity-projects-that-stand-the-test-of-time\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                                    <div class=\"nsw-o-insight-grid__card\">\n    <picture>\n                <img decoding=\"async\" src=\"https:\/\/sii.pl\/blog\/wp-content\/uploads\/2023\/07\/Narzedzia-sluzace-do-pozyskiwania-informacji-o-ludziach-i-firmach-.jpg\" alt=\"Tools used for collecting information about individuals and companies \u2013 what is OSINT?\" \/>\n    <\/picture>\n     <div class=\"desc\">\n          <h3  class=\"u-color-invert\">Tools used for collecting information about individuals and companies \u2013 what is OSINT?<\/h3>\n          <a href=\"https:\/\/sii.pl\/blog\/en\/tools-used-for-collecting-information-about-individuals-and-companies-what-is-osint\/\" class=\"u-color-invert \">Read more<\/a>\n     <\/div>\n<\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/div><\/div><\/section><section class=\"wp-block-nsw-block-section nsw-section  section-fa9a2cc0-b85f-40a9-a6c0-32a6ba979929\" id=\"\"><style type=\"text\/css\">.section-fa9a2cc0-b85f-40a9-a6c0-32a6ba979929 { \n\t\t\n\t\t\t\tpadding-top:70px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:82px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tbackground:#F5F9FE;\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-fa9a2cc0-b85f-40a9-a6c0-32a6ba979929 { \n\t\t\n\t\t\t\tpadding-top:23px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:32px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-0c0ca9e8-e33b-44c6-8312-b1f37b8071e0 .nsw-m-title-block__title, .header-0c0ca9e8-e33b-44c6-8312-b1f37b8071e0 .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-0c0ca9e8-e33b-44c6-8312-b1f37b8071e0 .nsw-m-title-block__title, .header-0c0ca9e8-e33b-44c6-8312-b1f37b8071e0 .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-0c0ca9e8-e33b-44c6-8312-b1f37b8071e0 -h2 -p1 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-nswc-gradient-color\">WHAT YOU NEED TO KNOW<\/mark><\/h2><p class=\"nsw-m-title-block__subtitle \">Read out FAQ<\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-728bbcd3-cc89-4b8e-8c08-353427eb65e3\"><style type=\"text\/css\">.container-728bbcd3-cc89-4b8e-8c08-353427eb65e3 { margin-top:40px; }\n                         @media screen and (max-width: 991px) { .container-728bbcd3-cc89-4b8e-8c08-353427eb65e3 { margin-top:20px; } }<\/style><script type=\"application\/ld+json\">\n        {\n          \"@context\": \"https:\/\/schema.org\",\n          \"@type\": \"FAQPage\",\n          \"mainEntity\": [\n                    {\n              \"@type\": \"Question\",\n              \"name\": \"How do OT security services differ from standard IT cybersecurity measures? \",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Operational Technology security focuses on systems controlling physical processes \u2013 like manufacturing lines or power grids \u2013 where downtime and misconfigurations can lead to production halts or safety hazards. This requirement for real-time control and strict reliability sets OT security apart from typical IT environments that primarily guard data or networks.\u00a0\\n\"\n        }\n      },\n                    {\n              \"@type\": \"Question\",\n              \"name\": \"Which standards guide OT security assessments and deployments? \",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Key guidelines include IEC 62443 and NIST SP 800-82, alongside frameworks like the Purdue Model. These standards define recommended architectures, segmentation techniques, and policies for protecting ICS and SCADA systems, ensuring robust defense while enabling continuous operations.\u00a0\\n\"\n        }\n      },\n                    {\n              \"@type\": \"Question\",\n              \"name\": \"How does network segmentation strengthen ICS and SCADA security? \",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Segmentation splits large OT networks into smaller zones, each with specific security controls. This limits an attacker\u2019s ability to move laterally. If one part of the network is compromised, the rest remains isolated, containing the damage and preventing system-wide disruption.\u00a0\\n\"\n        }\n      },\n                    {\n              \"@type\": \"Question\",\n              \"name\": \"Can OT security solutions integrate with my existing IT cybersecurity tools? \",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Yes. We aim for a unified approach that merges both domains \u2014 integrating ICS-specific detection with your existing SIEM or threat intelligence platforms. This cohesive picture of your environment uncovers potential attack vectors more comprehensively.\u00a0\\n\"\n        }\n      },\n                    {\n              \"@type\": \"Question\",\n              \"name\": \"Why is 24\\\/7 threat monitoring crucial in OT security? \",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Industrial processes often run continuously, making any unplanned downtime costly. Around-the-clock monitoring spots anomalies immediately, reducing the window for attackers to exploit vulnerabilities. This round-the-clock vigilance is essential for critical infrastructure that can\u2019t afford operational lapses.\u00a0\\n\"\n        }\n      },\n                    {\n              \"@type\": \"Question\",\n              \"name\": \"What types of incidents are typical in OT environments? \",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Attacks may range from ransomware targeting ICS servers to malicious code altering sensor data. Insider threats can also be significant if someone accidentally \u2013 or intentionally \u2013 misconfigures devices. Proper security controls and ongoing awareness training help mitigate these diverse risks.\u00a0\\n\"\n        }\n      },\n                    {\n              \"@type\": \"Question\",\n              \"name\": \"Is it necessary to combine backup and disaster recovery with OT security solutions? \",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Yes. While robust defenses can block the majority of threats, no system is fully invulnerable. A consistent backup and recovery plan is crucial for quickly restoring critical functions in a worst-case scenario. By pairing this with your OT security strategy, you ensure resilience against catastrophic breaches or hardware failures.\u00a0\\n\"\n        }\n      },\n                    {\n              \"@type\": \"Question\",\n              \"name\": \"How quickly can Sii onboard new OT security projects? \",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Timelines vary based on complexity, but we typically finalize an initial assessment within weeks. We then create or refine architecture designs, plan network changes, and implement advanced security controls in phases to minimize impact on operations.\u00a0\\n\"\n        }\n      }\n                ]\n      }\n    <\/script>\n\n<div class=\"nsw-o-content-accordion js-accordion js-oneOpen js-noScroll  js-show-more-opacity-container nsw-o-content-accordion--read-more \">\n            <div class=\"nsw-o-content-accordion__item js-accordion-item js-accordion-read-more-item  \">\n            <div class=\"nsw-o-content-accordion__header js-accordion-header d-flex\">\n                <span class=\"nsw-o-content-accordion__counter\">1.<\/span>\n                <div class=\"nsw-o-content-accordion__title d-flex flex-column\">\n                    <span class=\"d-flex align-items-center justify-content-between\">\n                        How do OT security services differ from standard IT cybersecurity measures? \n                        <div class=\"nsw-o-content-accordion__icon -plus\"><svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path id=\"Vector\" d=\"M7.11111 15.1111C7.11111 15.3469 7.20476 15.573 7.37146 15.7397C7.53816 15.9064 7.76425 16 8 16C8.23575 16 8.46184 15.9064 8.62854 15.7397C8.79524 15.573 8.88889 15.3469 8.88889 15.1111V8.88889H15.1111C15.3469 8.88889 15.573 8.79524 15.7397 8.62854C15.9064 8.46184 16 8.23575 16 8C16 7.76425 15.9064 7.53816 15.7397 7.37146C15.573 7.20476 15.3469 7.11111 15.1111 7.11111H8.88889V0.888889C8.88889 0.653141 8.79524 0.427048 8.62854 0.260349C8.46184 0.0936505 8.23575 0 8 0C7.76425 0 7.53816 0.0936505 7.37146 0.260349C7.20476 0.427048 7.11111 0.653141 7.11111 0.888889V7.11111H0.888889C0.653141 7.11111 0.427048 7.20476 0.260349 7.37146C0.0936505 7.53816 0 7.76425 0 8C0 8.23575 0.0936505 8.46184 0.260349 8.62854C0.427048 8.79524 0.653141 8.88889 0.888889 8.88889H7.11111V15.1111Z\" \/>\n<\/svg>\n<\/div>\n                        <div class=\"nsw-o-content-accordion__icon -minus\"><svg width=\"16\" height=\"2\" viewBox=\"0 0 16 2\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Minus\">\n<path id=\"Vector\" d=\"M7.11111 1.88911H8.5H8.88889H15.1111C15.3469 1.88911 15.573 1.79546 15.7397 1.62876C15.9064 1.46206 16 1.23597 16 1.00022C16 0.764469 15.9064 0.538377 15.7397 0.371678C15.573 0.204979 15.3469 0.111328 15.1111 0.111328H8.88889L7.37146 0.11145L7.11111 0.111382L0.888889 0.111328C0.653141 0.111328 0.427049 0.204979 0.260349 0.371678C0.0936505 0.538377 0 0.764469 0 1.00022C0 1.23597 0.0936505 1.46206 0.260349 1.62876C0.427049 1.79546 0.653141 1.88911 0.888889 1.88911H7.11111Z\"\/>\n<\/g>\n<\/svg>\n<\/div>\n                    <\/span>\n                    <div class=\"nsw-o-content-accordion__content js-accordion-body\">\n                        <p><span class=\"TextRun SCXW223996768 BCX8\" lang=\"PL\" xml:lang=\"PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW223996768 BCX8\">Operational Technology security focuses on systems controlling physical processes \u2013 like manufacturing lines or power grids \u2013 where downtime and misconfigurations can lead to production halts or safety hazards. This requirement for real-time control and strict reliability sets OT security apart from typical IT environments that primarily guard data or networks.<\/span><\/span><span class=\"EOP SCXW223996768 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n            <div class=\"nsw-o-content-accordion__item js-accordion-item js-accordion-read-more-item  \">\n            <div class=\"nsw-o-content-accordion__header js-accordion-header d-flex\">\n                <span class=\"nsw-o-content-accordion__counter\">2.<\/span>\n                <div class=\"nsw-o-content-accordion__title d-flex flex-column\">\n                    <span class=\"d-flex align-items-center justify-content-between\">\n                        Which standards guide OT security assessments and deployments? \n                        <div class=\"nsw-o-content-accordion__icon -plus\"><svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path id=\"Vector\" d=\"M7.11111 15.1111C7.11111 15.3469 7.20476 15.573 7.37146 15.7397C7.53816 15.9064 7.76425 16 8 16C8.23575 16 8.46184 15.9064 8.62854 15.7397C8.79524 15.573 8.88889 15.3469 8.88889 15.1111V8.88889H15.1111C15.3469 8.88889 15.573 8.79524 15.7397 8.62854C15.9064 8.46184 16 8.23575 16 8C16 7.76425 15.9064 7.53816 15.7397 7.37146C15.573 7.20476 15.3469 7.11111 15.1111 7.11111H8.88889V0.888889C8.88889 0.653141 8.79524 0.427048 8.62854 0.260349C8.46184 0.0936505 8.23575 0 8 0C7.76425 0 7.53816 0.0936505 7.37146 0.260349C7.20476 0.427048 7.11111 0.653141 7.11111 0.888889V7.11111H0.888889C0.653141 7.11111 0.427048 7.20476 0.260349 7.37146C0.0936505 7.53816 0 7.76425 0 8C0 8.23575 0.0936505 8.46184 0.260349 8.62854C0.427048 8.79524 0.653141 8.88889 0.888889 8.88889H7.11111V15.1111Z\" \/>\n<\/svg>\n<\/div>\n                        <div class=\"nsw-o-content-accordion__icon -minus\"><svg width=\"16\" height=\"2\" viewBox=\"0 0 16 2\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Minus\">\n<path id=\"Vector\" d=\"M7.11111 1.88911H8.5H8.88889H15.1111C15.3469 1.88911 15.573 1.79546 15.7397 1.62876C15.9064 1.46206 16 1.23597 16 1.00022C16 0.764469 15.9064 0.538377 15.7397 0.371678C15.573 0.204979 15.3469 0.111328 15.1111 0.111328H8.88889L7.37146 0.11145L7.11111 0.111382L0.888889 0.111328C0.653141 0.111328 0.427049 0.204979 0.260349 0.371678C0.0936505 0.538377 0 0.764469 0 1.00022C0 1.23597 0.0936505 1.46206 0.260349 1.62876C0.427049 1.79546 0.653141 1.88911 0.888889 1.88911H7.11111Z\"\/>\n<\/g>\n<\/svg>\n<\/div>\n                    <\/span>\n                    <div class=\"nsw-o-content-accordion__content js-accordion-body\">\n                        <p><span class=\"TextRun SCXW207405738 BCX8\" lang=\"PL\" xml:lang=\"PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW207405738 BCX8\">Key guidelines include IEC 62443 and NIST SP 800-82, alongside frameworks like the Purdue Model. These standards define recommended architectures, segmentation techniques, and policies for protecting ICS and SCADA systems, ensuring robust defense while enabling continuous operations.<\/span><\/span><span class=\"EOP SCXW207405738 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n            <div class=\"nsw-o-content-accordion__item js-accordion-item js-accordion-read-more-item  \">\n            <div class=\"nsw-o-content-accordion__header js-accordion-header d-flex\">\n                <span class=\"nsw-o-content-accordion__counter\">3.<\/span>\n                <div class=\"nsw-o-content-accordion__title d-flex flex-column\">\n                    <span class=\"d-flex align-items-center justify-content-between\">\n                        How does network segmentation strengthen ICS and SCADA security? \n                        <div class=\"nsw-o-content-accordion__icon -plus\"><svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path id=\"Vector\" d=\"M7.11111 15.1111C7.11111 15.3469 7.20476 15.573 7.37146 15.7397C7.53816 15.9064 7.76425 16 8 16C8.23575 16 8.46184 15.9064 8.62854 15.7397C8.79524 15.573 8.88889 15.3469 8.88889 15.1111V8.88889H15.1111C15.3469 8.88889 15.573 8.79524 15.7397 8.62854C15.9064 8.46184 16 8.23575 16 8C16 7.76425 15.9064 7.53816 15.7397 7.37146C15.573 7.20476 15.3469 7.11111 15.1111 7.11111H8.88889V0.888889C8.88889 0.653141 8.79524 0.427048 8.62854 0.260349C8.46184 0.0936505 8.23575 0 8 0C7.76425 0 7.53816 0.0936505 7.37146 0.260349C7.20476 0.427048 7.11111 0.653141 7.11111 0.888889V7.11111H0.888889C0.653141 7.11111 0.427048 7.20476 0.260349 7.37146C0.0936505 7.53816 0 7.76425 0 8C0 8.23575 0.0936505 8.46184 0.260349 8.62854C0.427048 8.79524 0.653141 8.88889 0.888889 8.88889H7.11111V15.1111Z\" \/>\n<\/svg>\n<\/div>\n                        <div class=\"nsw-o-content-accordion__icon -minus\"><svg width=\"16\" height=\"2\" viewBox=\"0 0 16 2\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Minus\">\n<path id=\"Vector\" d=\"M7.11111 1.88911H8.5H8.88889H15.1111C15.3469 1.88911 15.573 1.79546 15.7397 1.62876C15.9064 1.46206 16 1.23597 16 1.00022C16 0.764469 15.9064 0.538377 15.7397 0.371678C15.573 0.204979 15.3469 0.111328 15.1111 0.111328H8.88889L7.37146 0.11145L7.11111 0.111382L0.888889 0.111328C0.653141 0.111328 0.427049 0.204979 0.260349 0.371678C0.0936505 0.538377 0 0.764469 0 1.00022C0 1.23597 0.0936505 1.46206 0.260349 1.62876C0.427049 1.79546 0.653141 1.88911 0.888889 1.88911H7.11111Z\"\/>\n<\/g>\n<\/svg>\n<\/div>\n                    <\/span>\n                    <div class=\"nsw-o-content-accordion__content js-accordion-body\">\n                        <p><span class=\"TextRun SCXW212687799 BCX8\" lang=\"PL\" xml:lang=\"PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW212687799 BCX8\">Segmentation splits large OT networks into smaller zones, each with specific security controls. This limits an attacker\u2019s ability to move laterally. If one part of the network is compromised, the rest remains isolated, containing the damage and preventing system-wide disruption.<\/span><\/span><span class=\"EOP SCXW212687799 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n            <div class=\"nsw-o-content-accordion__item js-accordion-item js-accordion-read-more-item  \">\n            <div class=\"nsw-o-content-accordion__header js-accordion-header d-flex\">\n                <span class=\"nsw-o-content-accordion__counter\">4.<\/span>\n                <div class=\"nsw-o-content-accordion__title d-flex flex-column\">\n                    <span class=\"d-flex align-items-center justify-content-between\">\n                        Can OT security solutions integrate with my existing IT cybersecurity tools? \n                        <div class=\"nsw-o-content-accordion__icon -plus\"><svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path id=\"Vector\" d=\"M7.11111 15.1111C7.11111 15.3469 7.20476 15.573 7.37146 15.7397C7.53816 15.9064 7.76425 16 8 16C8.23575 16 8.46184 15.9064 8.62854 15.7397C8.79524 15.573 8.88889 15.3469 8.88889 15.1111V8.88889H15.1111C15.3469 8.88889 15.573 8.79524 15.7397 8.62854C15.9064 8.46184 16 8.23575 16 8C16 7.76425 15.9064 7.53816 15.7397 7.37146C15.573 7.20476 15.3469 7.11111 15.1111 7.11111H8.88889V0.888889C8.88889 0.653141 8.79524 0.427048 8.62854 0.260349C8.46184 0.0936505 8.23575 0 8 0C7.76425 0 7.53816 0.0936505 7.37146 0.260349C7.20476 0.427048 7.11111 0.653141 7.11111 0.888889V7.11111H0.888889C0.653141 7.11111 0.427048 7.20476 0.260349 7.37146C0.0936505 7.53816 0 7.76425 0 8C0 8.23575 0.0936505 8.46184 0.260349 8.62854C0.427048 8.79524 0.653141 8.88889 0.888889 8.88889H7.11111V15.1111Z\" \/>\n<\/svg>\n<\/div>\n                        <div class=\"nsw-o-content-accordion__icon -minus\"><svg width=\"16\" height=\"2\" viewBox=\"0 0 16 2\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Minus\">\n<path id=\"Vector\" d=\"M7.11111 1.88911H8.5H8.88889H15.1111C15.3469 1.88911 15.573 1.79546 15.7397 1.62876C15.9064 1.46206 16 1.23597 16 1.00022C16 0.764469 15.9064 0.538377 15.7397 0.371678C15.573 0.204979 15.3469 0.111328 15.1111 0.111328H8.88889L7.37146 0.11145L7.11111 0.111382L0.888889 0.111328C0.653141 0.111328 0.427049 0.204979 0.260349 0.371678C0.0936505 0.538377 0 0.764469 0 1.00022C0 1.23597 0.0936505 1.46206 0.260349 1.62876C0.427049 1.79546 0.653141 1.88911 0.888889 1.88911H7.11111Z\"\/>\n<\/g>\n<\/svg>\n<\/div>\n                    <\/span>\n                    <div class=\"nsw-o-content-accordion__content js-accordion-body\">\n                        <p class=\"first-token\" data-sourcepos=\"1:1-1:33\"><span class=\"TextRun SCXW249040807 BCX8\" lang=\"PL\" xml:lang=\"PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW249040807 BCX8\">Yes. We aim for a unified approach that merges both domains \u2014 integrating ICS-specific detection with your existing SIEM or threat intelligence platforms. This cohesive picture of your environment uncovers potential attack vectors more comprehensively.<\/span><\/span><span class=\"EOP SCXW249040807 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n            <div class=\"nsw-o-content-accordion__item js-accordion-item js-accordion-read-more-item  \">\n            <div class=\"nsw-o-content-accordion__header js-accordion-header d-flex\">\n                <span class=\"nsw-o-content-accordion__counter\">5.<\/span>\n                <div class=\"nsw-o-content-accordion__title d-flex flex-column\">\n                    <span class=\"d-flex align-items-center justify-content-between\">\n                        Why is 24\/7 threat monitoring crucial in OT security? \n                        <div class=\"nsw-o-content-accordion__icon -plus\"><svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path id=\"Vector\" d=\"M7.11111 15.1111C7.11111 15.3469 7.20476 15.573 7.37146 15.7397C7.53816 15.9064 7.76425 16 8 16C8.23575 16 8.46184 15.9064 8.62854 15.7397C8.79524 15.573 8.88889 15.3469 8.88889 15.1111V8.88889H15.1111C15.3469 8.88889 15.573 8.79524 15.7397 8.62854C15.9064 8.46184 16 8.23575 16 8C16 7.76425 15.9064 7.53816 15.7397 7.37146C15.573 7.20476 15.3469 7.11111 15.1111 7.11111H8.88889V0.888889C8.88889 0.653141 8.79524 0.427048 8.62854 0.260349C8.46184 0.0936505 8.23575 0 8 0C7.76425 0 7.53816 0.0936505 7.37146 0.260349C7.20476 0.427048 7.11111 0.653141 7.11111 0.888889V7.11111H0.888889C0.653141 7.11111 0.427048 7.20476 0.260349 7.37146C0.0936505 7.53816 0 7.76425 0 8C0 8.23575 0.0936505 8.46184 0.260349 8.62854C0.427048 8.79524 0.653141 8.88889 0.888889 8.88889H7.11111V15.1111Z\" \/>\n<\/svg>\n<\/div>\n                        <div class=\"nsw-o-content-accordion__icon -minus\"><svg width=\"16\" height=\"2\" viewBox=\"0 0 16 2\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Minus\">\n<path id=\"Vector\" d=\"M7.11111 1.88911H8.5H8.88889H15.1111C15.3469 1.88911 15.573 1.79546 15.7397 1.62876C15.9064 1.46206 16 1.23597 16 1.00022C16 0.764469 15.9064 0.538377 15.7397 0.371678C15.573 0.204979 15.3469 0.111328 15.1111 0.111328H8.88889L7.37146 0.11145L7.11111 0.111382L0.888889 0.111328C0.653141 0.111328 0.427049 0.204979 0.260349 0.371678C0.0936505 0.538377 0 0.764469 0 1.00022C0 1.23597 0.0936505 1.46206 0.260349 1.62876C0.427049 1.79546 0.653141 1.88911 0.888889 1.88911H7.11111Z\"\/>\n<\/g>\n<\/svg>\n<\/div>\n                    <\/span>\n                    <div class=\"nsw-o-content-accordion__content js-accordion-body\">\n                        <p data-sourcepos=\"3:1-3:73\"><span class=\"TextRun SCXW186795469 BCX8\" lang=\"PL\" xml:lang=\"PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW186795469 BCX8\">Industrial processes often run continuously, making any unplanned downtime costly. Around-the-clock monitoring spots anomalies immediately, reducing the window for attackers to exploit vulnerabilities. This round-the-clock vigilance is essential for critical infrastructure that can\u2019t afford operational lapses.<\/span><\/span><span class=\"EOP SCXW186795469 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n            <div class=\"nsw-o-content-accordion__item js-accordion-item js-accordion-read-more-item  js-opacity-hidden\">\n            <div class=\"nsw-o-content-accordion__header js-accordion-header d-flex\">\n                <span class=\"nsw-o-content-accordion__counter\">6.<\/span>\n                <div class=\"nsw-o-content-accordion__title d-flex flex-column\">\n                    <span class=\"d-flex align-items-center justify-content-between\">\n                        What types of incidents are typical in OT environments? \n                        <div class=\"nsw-o-content-accordion__icon -plus\"><svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path id=\"Vector\" d=\"M7.11111 15.1111C7.11111 15.3469 7.20476 15.573 7.37146 15.7397C7.53816 15.9064 7.76425 16 8 16C8.23575 16 8.46184 15.9064 8.62854 15.7397C8.79524 15.573 8.88889 15.3469 8.88889 15.1111V8.88889H15.1111C15.3469 8.88889 15.573 8.79524 15.7397 8.62854C15.9064 8.46184 16 8.23575 16 8C16 7.76425 15.9064 7.53816 15.7397 7.37146C15.573 7.20476 15.3469 7.11111 15.1111 7.11111H8.88889V0.888889C8.88889 0.653141 8.79524 0.427048 8.62854 0.260349C8.46184 0.0936505 8.23575 0 8 0C7.76425 0 7.53816 0.0936505 7.37146 0.260349C7.20476 0.427048 7.11111 0.653141 7.11111 0.888889V7.11111H0.888889C0.653141 7.11111 0.427048 7.20476 0.260349 7.37146C0.0936505 7.53816 0 7.76425 0 8C0 8.23575 0.0936505 8.46184 0.260349 8.62854C0.427048 8.79524 0.653141 8.88889 0.888889 8.88889H7.11111V15.1111Z\" \/>\n<\/svg>\n<\/div>\n                        <div class=\"nsw-o-content-accordion__icon -minus\"><svg width=\"16\" height=\"2\" viewBox=\"0 0 16 2\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Minus\">\n<path id=\"Vector\" d=\"M7.11111 1.88911H8.5H8.88889H15.1111C15.3469 1.88911 15.573 1.79546 15.7397 1.62876C15.9064 1.46206 16 1.23597 16 1.00022C16 0.764469 15.9064 0.538377 15.7397 0.371678C15.573 0.204979 15.3469 0.111328 15.1111 0.111328H8.88889L7.37146 0.11145L7.11111 0.111382L0.888889 0.111328C0.653141 0.111328 0.427049 0.204979 0.260349 0.371678C0.0936505 0.538377 0 0.764469 0 1.00022C0 1.23597 0.0936505 1.46206 0.260349 1.62876C0.427049 1.79546 0.653141 1.88911 0.888889 1.88911H7.11111Z\"\/>\n<\/g>\n<\/svg>\n<\/div>\n                    <\/span>\n                    <div class=\"nsw-o-content-accordion__content js-accordion-body\">\n                        <p><span class=\"TextRun SCXW114681815 BCX8\" lang=\"PL\" xml:lang=\"PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW114681815 BCX8\">Attacks may range from ransomware targeting ICS servers to malicious code altering sensor data. Insider threats can also be significant if someone accidentally \u2013 or intentionally \u2013 misconfigures devices. Proper security controls and ongoing awareness training help mitigate these diverse risks.<\/span><\/span><span class=\"EOP SCXW114681815 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n            <div class=\"nsw-o-content-accordion__item js-accordion-item js-accordion-read-more-item  js-opacity-hidden\">\n            <div class=\"nsw-o-content-accordion__header js-accordion-header d-flex\">\n                <span class=\"nsw-o-content-accordion__counter\">7.<\/span>\n                <div class=\"nsw-o-content-accordion__title d-flex flex-column\">\n                    <span class=\"d-flex align-items-center justify-content-between\">\n                        Is it necessary to combine backup and disaster recovery with OT security solutions? \n                        <div class=\"nsw-o-content-accordion__icon -plus\"><svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path id=\"Vector\" d=\"M7.11111 15.1111C7.11111 15.3469 7.20476 15.573 7.37146 15.7397C7.53816 15.9064 7.76425 16 8 16C8.23575 16 8.46184 15.9064 8.62854 15.7397C8.79524 15.573 8.88889 15.3469 8.88889 15.1111V8.88889H15.1111C15.3469 8.88889 15.573 8.79524 15.7397 8.62854C15.9064 8.46184 16 8.23575 16 8C16 7.76425 15.9064 7.53816 15.7397 7.37146C15.573 7.20476 15.3469 7.11111 15.1111 7.11111H8.88889V0.888889C8.88889 0.653141 8.79524 0.427048 8.62854 0.260349C8.46184 0.0936505 8.23575 0 8 0C7.76425 0 7.53816 0.0936505 7.37146 0.260349C7.20476 0.427048 7.11111 0.653141 7.11111 0.888889V7.11111H0.888889C0.653141 7.11111 0.427048 7.20476 0.260349 7.37146C0.0936505 7.53816 0 7.76425 0 8C0 8.23575 0.0936505 8.46184 0.260349 8.62854C0.427048 8.79524 0.653141 8.88889 0.888889 8.88889H7.11111V15.1111Z\" \/>\n<\/svg>\n<\/div>\n                        <div class=\"nsw-o-content-accordion__icon -minus\"><svg width=\"16\" height=\"2\" viewBox=\"0 0 16 2\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Minus\">\n<path id=\"Vector\" d=\"M7.11111 1.88911H8.5H8.88889H15.1111C15.3469 1.88911 15.573 1.79546 15.7397 1.62876C15.9064 1.46206 16 1.23597 16 1.00022C16 0.764469 15.9064 0.538377 15.7397 0.371678C15.573 0.204979 15.3469 0.111328 15.1111 0.111328H8.88889L7.37146 0.11145L7.11111 0.111382L0.888889 0.111328C0.653141 0.111328 0.427049 0.204979 0.260349 0.371678C0.0936505 0.538377 0 0.764469 0 1.00022C0 1.23597 0.0936505 1.46206 0.260349 1.62876C0.427049 1.79546 0.653141 1.88911 0.888889 1.88911H7.11111Z\"\/>\n<\/g>\n<\/svg>\n<\/div>\n                    <\/span>\n                    <div class=\"nsw-o-content-accordion__content js-accordion-body\">\n                        <p><span class=\"TextRun SCXW233002685 BCX8\" lang=\"PL\" xml:lang=\"PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW233002685 BCX8\">Yes. While robust defenses can block the majority of threats, no system is fully invulnerable. A consistent backup and recovery plan is crucial for quickly restoring critical functions in a worst-case scenario. By pairing this with your OT security strategy, you ensure resilience against catastrophic breaches or hardware failures.<\/span><\/span><span class=\"EOP SCXW233002685 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n            <div class=\"nsw-o-content-accordion__item js-accordion-item js-accordion-read-more-item  js-opacity-hidden\">\n            <div class=\"nsw-o-content-accordion__header js-accordion-header d-flex\">\n                <span class=\"nsw-o-content-accordion__counter\">8.<\/span>\n                <div class=\"nsw-o-content-accordion__title d-flex flex-column\">\n                    <span class=\"d-flex align-items-center justify-content-between\">\n                        How quickly can Sii onboard new OT security projects? \n                        <div class=\"nsw-o-content-accordion__icon -plus\"><svg width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path id=\"Vector\" d=\"M7.11111 15.1111C7.11111 15.3469 7.20476 15.573 7.37146 15.7397C7.53816 15.9064 7.76425 16 8 16C8.23575 16 8.46184 15.9064 8.62854 15.7397C8.79524 15.573 8.88889 15.3469 8.88889 15.1111V8.88889H15.1111C15.3469 8.88889 15.573 8.79524 15.7397 8.62854C15.9064 8.46184 16 8.23575 16 8C16 7.76425 15.9064 7.53816 15.7397 7.37146C15.573 7.20476 15.3469 7.11111 15.1111 7.11111H8.88889V0.888889C8.88889 0.653141 8.79524 0.427048 8.62854 0.260349C8.46184 0.0936505 8.23575 0 8 0C7.76425 0 7.53816 0.0936505 7.37146 0.260349C7.20476 0.427048 7.11111 0.653141 7.11111 0.888889V7.11111H0.888889C0.653141 7.11111 0.427048 7.20476 0.260349 7.37146C0.0936505 7.53816 0 7.76425 0 8C0 8.23575 0.0936505 8.46184 0.260349 8.62854C0.427048 8.79524 0.653141 8.88889 0.888889 8.88889H7.11111V15.1111Z\" \/>\n<\/svg>\n<\/div>\n                        <div class=\"nsw-o-content-accordion__icon -minus\"><svg width=\"16\" height=\"2\" viewBox=\"0 0 16 2\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g id=\"Minus\">\n<path id=\"Vector\" d=\"M7.11111 1.88911H8.5H8.88889H15.1111C15.3469 1.88911 15.573 1.79546 15.7397 1.62876C15.9064 1.46206 16 1.23597 16 1.00022C16 0.764469 15.9064 0.538377 15.7397 0.371678C15.573 0.204979 15.3469 0.111328 15.1111 0.111328H8.88889L7.37146 0.11145L7.11111 0.111382L0.888889 0.111328C0.653141 0.111328 0.427049 0.204979 0.260349 0.371678C0.0936505 0.538377 0 0.764469 0 1.00022C0 1.23597 0.0936505 1.46206 0.260349 1.62876C0.427049 1.79546 0.653141 1.88911 0.888889 1.88911H7.11111Z\"\/>\n<\/g>\n<\/svg>\n<\/div>\n                    <\/span>\n                    <div class=\"nsw-o-content-accordion__content js-accordion-body\">\n                        <p><span class=\"TextRun SCXW236136323 BCX8\" lang=\"PL\" xml:lang=\"PL\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW236136323 BCX8\">Timelines vary based on complexity, but we typically finalize an initial assessment within weeks. We then create or refine architecture designs, plan network changes, and implement advanced security controls in phases to minimize impact on operations.<\/span><\/span><span class=\"EOP SCXW236136323 BCX8\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240,&quot;335559740&quot;:360}\">\u00a0<\/span><\/p>\n\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n                <a  href=\"#\" class=\"nsw-a-button -link js-more-btn nsw-o-content-accordion__read-more\" target=_blank   rel=\"nofollow\" >\n        <span>Read more<\/span>\n    <\/a>\n        <a  href=\"#\" class=\"nsw-a-button -link js-less-btn nsw-o-content-accordion__read-more u-hidden\" target=_blank   rel=\"nofollow\" >\n        <span>Read less<\/span>\n    <\/a>\n    <\/div><\/div><\/section><section class=\"wp-block-nsw-block-section nsw-section  js-mobile-trigger-button_1 section-1dd217fd-9801-454e-b45c-c84ea3c465bd\" id=\"nswOfferFormBlock\"><style type=\"text\/css\">.section-1dd217fd-9801-454e-b45c-c84ea3c465bd { \n\t\t\n\t\t\t\tpadding-top:70px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:30px;\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-1dd217fd-9801-454e-b45c-c84ea3c465bd { \n\t\t\n\t\t\t\tpadding-top:24px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:0px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-71c3d79b-0eda-43c4-a9f6-c304be8c713b .nsw-m-title-block__title, .header-71c3d79b-0eda-43c4-a9f6-c304be8c713b .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-71c3d79b-0eda-43c4-a9f6-c304be8c713b .nsw-m-title-block__title, .header-71c3d79b-0eda-43c4-a9f6-c304be8c713b .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-71c3d79b-0eda-43c4-a9f6-c304be8c713b -h2 -p1 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \">GET IN TOUCH<\/h2><p class=\"nsw-m-title-block__subtitle \">Let&#8217;s start the conversation today<\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-f55a4e65-a764-4f01-a16f-14ce368f772b\"><style type=\"text\/css\">.container-f55a4e65-a764-4f01-a16f-14ce368f772b { margin-top:50px; }\n                         @media screen and (max-width: 991px) { .container-f55a4e65-a764-4f01-a16f-14ce368f772b { margin-top:0px; } }<\/style><div class=\"nsw-o-offer-contact-form\" id=\"nsw-o-offer-contact-form\">\n\n    <form id=\"nswOfferFormBlock\" name=\"form_expert_contact\" action=\"\" method=\"POST\" class=\"js-form js-form-scrollMobile\" onsubmit=\"event.preventDefault()\" novalidate>\n        <div class=\"row d-flex flex-column-reverse flex-lg-row js-form-initial\">\n            <div class=\"col-lg-10\">\n                <div class=\"nsw-o-offer-contact-form__form  d-flex flex-wrap \">\n                    <div class=\"js-hidden-inputs\"><input type=\"hidden\" name=\"correlation_id\" id=\"correlation_id\" value=\"\"><input type=\"hidden\" name=\"language_site\" id=\"language_site\" value=\"en\"><input type=\"hidden\" name=\"msd365mkttr\" id=\"msd365mkttr\" value=\"\"><input type=\"hidden\" name=\"msd365mkttrs\" id=\"msd365mkttrs\" value=\"\"><input type=\"hidden\" name=\"cd_visitorkey\" id=\"cd_visitorkey\" value=\"\"><input type=\"hidden\" name=\"additional_info\" id=\"additional_info\" value=\"{\"page_url\":\"https:\\\/\\\/sii.pl\\\/en\\\/wp-json\\\/wp\\\/v2\\\/offering-page\\\/98018\",\"expert_name\":\"Dawid Jankowski\",\"expert_position\":\"Cybersecurity Competency Center Director\",\"expert_image\":\"https:\\\/\\\/sii.pl\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Dawid-Jankowski-1.png\",\"category_contact\":\"907000002\",\"industry_expert\":\"907000009\"}\"><input type=\"hidden\" name=\"page_url\" id=\"page_url\" value=\"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/offering-page\/98018\"><input type=\"hidden\" name=\"expert_name\" id=\"expert_name\" value=\"Dawid Jankowski\"><input type=\"hidden\" name=\"expert_position\" id=\"expert_position\" value=\"Cybersecurity Competency Center Director\"><input type=\"hidden\" name=\"expert_image\" id=\"expert_image\" value=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Dawid-Jankowski-1.png\"><input type=\"hidden\" name=\"category_contact\" id=\"category_contact\" value=\"907000002\"><input type=\"hidden\" name=\"industry_expert\" id=\"industry_expert\" value=\"907000009\"><input type=\"hidden\" name=\"frm_xpnd\" id=\"frm_xpnd\" value=\"form_nsw_offer_contact\"><input type=\"hidden\" name=\"Source\" id=\"Source\" value=\"form_nsw_offer_contact\"><input type=\"hidden\" name=\"Site\" id=\"Site\" value=\"sii.pl\"><input type=\"hidden\" name=\"privacy_policy_delivered\" id=\"privacy_policy_delivered\" value=\"on\"><input type=\"hidden\" id=\"gclid_field\" name=\"gclid_field\" value=\"\"><\/div>\n                    <div class=\"box -credentials d-flex flex-wrap\">\n                        <label class=\"nsw-m-input-line  frow\" for=\"name\">\n    <span class=\"nsw-m-input-line__label d-block\">\n        First name<span class=\"nsw-m-input-line__required\">*<\/span>\n            <\/span>\n        <input \n            \n            data-allowed-chars=\"\u00c5\u00c9\u00c0\u00c4\u00d6\u1e9e\u00dc\u0104\u015a\u0106\u0179\u017b\u0141\u0118\u0106\u0143\u00d3\u0105\u015b\u0107\u017a\u017c\u0142\u00f3\u0119\u0107\u0144\u00e4\u00f6\u00df\u00fc\u00e0\u00e9\u00e5&#039; \"\n            class=\"input-text required \"\n            name=\"name\"\n            id=\"name\"\n            value=\"\"\n                                        >\n    <span class=\"nsw-m-input-line__helper-text\"><\/span>\n            <span class=\"nsw-m-input-line__error js-require-error u-hidden\">First name is required<\/span>\n        <span class=\"nsw-m-input-line__error js-format-error u-hidden\">This field must contain only letters and special characters<\/span>\n    \n<\/label>\n                        <label class=\"nsw-m-input-line  frow\" for=\"surname\">\n    <span class=\"nsw-m-input-line__label d-block\">\n        Surname<span class=\"nsw-m-input-line__required\">*<\/span>\n            <\/span>\n        <input \n            \n            data-allowed-chars=\"\u00c5\u00c9\u00c0\u00c4\u00d6\u1e9e\u00dc\u0104\u015a\u0106\u0179\u017b\u0141\u0118\u0106\u0143\u00d3\u0105\u015b\u0107\u017a\u017c\u0142\u00f3\u0119\u0107\u0144\u00e4\u00f6\u00df\u00fc\u00e0\u00e9\u00e5&#039; -\"\n            class=\"input-text required \"\n            name=\"surname\"\n            id=\"surname\"\n            value=\"\"\n                                        >\n    <span class=\"nsw-m-input-line__helper-text\"><\/span>\n            <span class=\"nsw-m-input-line__error js-require-error u-hidden\">Surname is required<\/span>\n        <span class=\"nsw-m-input-line__error js-format-error u-hidden\">This field must contain only letters and special characters<\/span>\n    \n<\/label>\n                        <div class=\"frow\">\n                            <label class=\"nsw-m-input-line  \" for=\"email\">\n    <span class=\"nsw-m-input-line__label d-block\">\n        E-mail<span class=\"nsw-m-input-line__required\">*<\/span>\n            <\/span>\n        <input \n            type=email\n            data-allowed-chars=\"\"\n            class=\"input-text required js-mail-auto-complete\"\n            name=\"email\"\n            id=\"email\"\n            value=\"\"\n                                        >\n    <span class=\"nsw-m-input-line__helper-text\"><\/span>\n            <span class=\"nsw-m-input-line__error js-require-error u-hidden\">E-mail address is required<\/span>\n        <span class=\"nsw-m-input-line__error js-format-error u-hidden\">Please enter a valid email address<\/span>\n    \n<\/label>\n                        <\/div>\n                        <label class=\"nsw-m-input-line  frow\" for=\"phone\">\n    <span class=\"nsw-m-input-line__label d-block\">\n        Phone number    <\/span>\n        <input \n            type=tel\n            data-allowed-chars=\"\"\n            class=\"input-text  \"\n            name=\"phone\"\n            id=\"phone\"\n            value=\"\"\n                                                    maxlength=\"14\"\n                >\n    <span class=\"nsw-m-input-line__helper-text\"><\/span>\n        <span class=\"nsw-m-input-line__error js-format-error u-hidden\">Please enter a valid phone number<\/span>\n    \n<\/label>\n                    <\/div>\n                    <div class=\"box\">\n                                                <p class=\"nsw-m-drag-and-drop__lab\">Your file<\/p>\n\n<div class=\"nsw-m-drag-and-drop d-flex flex-column justify-content-center align-items-center nsw-o-offer-contact-form__file-upload js-drag-and-drop mt-3 js-input-container\">\n            <input type=\"file\" class=\" u-hidden\"  name=\"upload_file\"     id=\"form_upload_file\"  class=\"nsw-m-drag-and-drop__input\"  value=\"\" accept=\".doc,.docx,.pdf,application\/msword,application\/vnd.ms-office,application\/vnd.openxmlformats-officedocument.wordprocessingml.document,application\/zip,application\/msword,application\/x-zip,application\/pdf,application\/force-download,application\/x-download,binary\/octet-stream,application\/x-pdf\"\/>\n        <div class=\"nsw-m-drag-and-drop__uploaded-files js-uploaded-files-container u-hidden\">\n        <span>Uploaded file:<\/span>\n        <ul>\n            <li class=\"d-flex flex-row justify-content-center\">\n                <?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<svg width=\"9px\" height=\"12px\" viewBox=\"0 0 9 12\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\">\n    <!-- Generator: Sketch 60.1 (88133) - https:\/\/sketch.com -->\n    <title>file_icon<\/title>\n    <desc>Created with Sketch.<\/desc>\n    <g id=\"New_JobOffer\" stroke=\"none\" stroke-width=\"1\" fill=\"none\" fill-rule=\"evenodd\">\n        <g id=\"Career-&gt;-Job-offers-&gt;-New_engineer-ONEATTACHMENT\" transform=\"translate(-1201.000000, -2773.000000)\" fill=\"#0E6EE0\" fill-rule=\"nonzero\">\n            <path d=\"M1209.9375,2784.4375 L1209.9375,2775.96094 L1209.82812,2775.79688 L1207.20312,2773.17188 L1207.03906,2773.0625 L1201.1875,2773.0625 L1201.1875,2784.4375 L1209.9375,2784.4375 Z M1209.0625,2783.5625 L1202.0625,2783.5625 L1202.0625,2773.9375 L1206.4375,2773.9375 L1206.4375,2776.5625 L1209.0625,2776.5625 L1209.0625,2783.5625 Z M1208.43359,2775.6875 L1207.3125,2775.6875 L1207.3125,2774.56641 L1208.43359,2775.6875 Z M1207.75,2778.3125 L1207.75,2777.4375 L1203.375,2777.4375 L1203.375,2778.3125 L1207.75,2778.3125 Z M1207.75,2780.0625 L1207.75,2779.1875 L1203.375,2779.1875 L1203.375,2780.0625 L1207.75,2780.0625 Z M1207.75,2781.8125 L1207.75,2780.9375 L1203.375,2780.9375 L1203.375,2781.8125 L1207.75,2781.8125 Z\" id=\"file_icon\"><\/path>\n        <\/g>\n    <\/g>\n<\/svg>\n                <p class=\"js-uploaded-file-name\"><\/p>\n                <a href=\"#\" class=\"remove-file js-remove-file-from-dropdown\" rel=\"nofollow\" >\n                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 15 4 C 14.476563 4 13.941406 4.183594 13.5625 4.5625 C 13.183594 4.941406 13 5.476563 13 6 L 13 7 L 7 7 L 7 9 L 8 9 L 8 25 C 8 26.644531 9.355469 28 11 28 L 23 28 C 24.644531 28 26 26.644531 26 25 L 26 9 L 27 9 L 27 7 L 21 7 L 21 6 C 21 5.476563 20.816406 4.941406 20.4375 4.5625 C 20.058594 4.183594 19.523438 4 19 4 Z M 15 6 L 19 6 L 19 7 L 15 7 Z M 10 9 L 24 9 L 24 25 C 24 25.554688 23.554688 26 23 26 L 11 26 C 10.445313 26 10 25.554688 10 25 Z M 12 12 L 12 23 L 14 23 L 14 12 Z M 16 12 L 16 23 L 18 23 L 18 12 Z M 20 12 L 20 23 L 22 23 L 22 12 Z\"\/><\/svg>\n                <\/a>\n            <\/li>\n        <\/ul>\n    <\/div>\n    <div class=\"nsw-m-drag-and-drop__logo d-flex w-80 justify-content-center justify-content-lg-center\">\n            <span class=\"nsw-a-icon-label-simple d-flex js-choose-file u-hidden-on-mobile -default\">\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" width=\"12.002\" height=\"12.002\" viewBox=\"0 0 12.002 12.002\">\n  <defs>\n    <clipPath id=\"clip-path\">\n      <path id=\"Path_2561\" data-name=\"Path 2561\" d=\"M0,0H12V12H0Z\" fill=\"none\"\/>\n    <\/clipPath>\n  <\/defs>\n  <g id=\"drop\" clip-path=\"url(#clip-path)\">\n    <path id=\"Path_2556\" data-name=\"Path 2556\" d=\"M15.251,16.5h-5A1.252,1.252,0,0,1,9,15.251v-2a.25.25,0,1,1,.5,0v2a.751.751,0,0,0,.75.75h5a.751.751,0,0,0,.75-.75v-5a.751.751,0,0,0-.75-.75h-2.5a.25.25,0,0,1,0-.5h2.5a1.252,1.252,0,0,1,1.25,1.25v5A1.252,1.252,0,0,1,15.251,16.5Z\" transform=\"translate(-4.499 -4.499)\" \/>\n    <path id=\"Path_2557\" data-name=\"Path 2557\" d=\"M7,14.5H6.75a.25.25,0,1,1,0-.5H7a.25.25,0,1,1,0,.5Z\" transform=\"translate(-3.25 -6.999)\" \/>\n    <path id=\"Path_2558\" data-name=\"Path 2558\" d=\"M2.49,7.5H1.984a.25.25,0,1,1,0-.5H2.49a.25.25,0,0,1,0,.5ZM.977,7.463a.251.251,0,0,1-.069-.01A1.249,1.249,0,0,1,.37,7.138a.25.25,0,0,1,.353-.355.752.752,0,0,0,.323.19.25.25,0,0,1-.068.491ZM.25,6.279A.25.25,0,0,1,0,6.029V5.524a.25.25,0,0,1,.5,0v.506A.25.25,0,0,1,.25,6.279Zm0-1.517A.25.25,0,0,1,0,4.513V4.007a.25.25,0,1,1,.5,0v.506A.25.25,0,0,1,.25,4.763Zm0-1.516A.25.25,0,0,1,0,3V2.491a.25.25,0,1,1,.5,0V3A.25.25,0,0,1,.25,3.246Zm7-.516A.25.25,0,0,1,7,2.481V1.975a.25.25,0,1,1,.5,0v.506A.25.25,0,0,1,7.251,2.731Zm-7-1A.25.25,0,0,1,0,1.48V1.25A1.26,1.26,0,0,1,.047.91a.25.25,0,1,1,.481.136.755.755,0,0,0-.028.2v.23a.25.25,0,0,1-.25.25Zm6.96-.512a.25.25,0,0,1-.24-.18A.755.755,0,0,0,6.778.717.25.25,0,0,1,7.13.361,1.251,1.251,0,0,1,7.451.9a.25.25,0,0,1-.17.31.229.229,0,0,1-.07.011ZM.969.54A.25.25,0,0,1,.9.05,1.257,1.257,0,0,1,1.25,0h.221a.25.25,0,0,1,0,.5H1.25A.744.744,0,0,0,1.04.53.245.245,0,0,1,.969.54ZM6.02.5H5.515a.25.25,0,0,1,0-.5H6.02a.25.25,0,1,1,0,.5ZM4.5.5H4A.25.25,0,0,1,4,0H4.5a.25.25,0,1,1,0,.5ZM2.987.5H2.482a.25.25,0,0,1,0-.5h.506a.25.25,0,0,1,0,.5Z\" transform=\"translate(0 0)\"\/>\n    <path id=\"Path_2559\" data-name=\"Path 2559\" d=\"M14.25,7.25A.25.25,0,0,1,14,7V6.75a.25.25,0,1,1,.5,0V7A.25.25,0,0,1,14.25,7.25Z\" transform=\"translate(-6.999 -3.25)\" \/>\n    <path id=\"Path_2560\" data-name=\"Path 2560\" d=\"M9.822,12.346H8.8a1.252,1.252,0,0,1-1.25-1.25v-.9l-.224-.224a.781.781,0,0,1,.446-1.326.779.779,0,0,1,.227-.606.787.787,0,0,1,.661-.221.777.777,0,0,1,.214-.4.8.8,0,0,1,.809-.186.78.78,0,0,1,1.3-.315l.775.775a2.726,2.726,0,0,1-1.927,4.653ZM8.046,10.7v.4a.751.751,0,0,0,.75.75H9.822a2.225,2.225,0,0,0,1.574-3.8l-.775-.775a.28.28,0,0,0-.4,0,.28.28,0,0,0,0,.4.25.25,0,1,1-.353.354l-.25-.25a.287.287,0,0,0-.4,0,.28.28,0,0,0,0,.4l.25.25a.25.25,0,1,1-.354.354L8.745,8.4a.287.287,0,0,0-.4,0,.28.28,0,0,0,0,.4l.625.625a.25.25,0,0,1-.354.354l-.548-.548a.287.287,0,0,0-.4,0,.28.28,0,0,0,0,.4l1.3,1.3a.25.25,0,1,1-.354.354Z\" transform=\"translate(-3.546 -3.344)\"\/>\n  <\/g>\n<\/svg>\n\n\n    <span class=\"nsw-a-icon-label-simple__label\">\n        Drag &amp; drop file\n    <\/span>\n<\/span>\n                <span class=\"nsw-a-icon-label-simple d-flex js-choose-file -primary u-hidden-on-mobile\">\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15.348\" height=\"12\" viewBox=\"0 0 15.348 12\">\n  <path id=\"XMLID_52_\" d=\"M52.027,73.267a1.512,1.512,0,0,0-1.229-.623h-.371v-1A1.525,1.525,0,0,0,48.9,70.122H44.444a.977.977,0,0,1-.683-.28l-.7-.7a1.51,1.51,0,0,0-1.075-.445H38.5a1.525,1.525,0,0,0-1.524,1.527v8.886A1.542,1.542,0,0,0,38.521,80.7H49.235a1.525,1.525,0,0,0,1.457-1.072l1.566-5.005A1.515,1.515,0,0,0,52.027,73.267Zm-14.49-3.04a.968.968,0,0,1,.963-.967h3.485a.983.983,0,0,1,.683.28l.7.7a1.51,1.51,0,0,0,1.075.445H48.9a.968.968,0,0,1,.967.963v1H40.062A1.526,1.526,0,0,0,38.6,73.712l-1.072,3.419v-6.9Zm14.182,4.231-1.566,5.005a.958.958,0,0,1-.921.676H38.517a.982.982,0,0,1-.939-1.275l1.559-4.984a.958.958,0,0,1,.921-.676H50.794a.954.954,0,0,1,.778.392A.94.94,0,0,1,51.719,74.458Z\" transform=\"translate(-36.979 -68.7)\" \/>\n<\/svg>\n\n\n    <span class=\"nsw-a-icon-label-simple__label\">\n        Local drive\n    <\/span>\n<\/span>\n                    <span class=\"nsw-a-icon-label-simple d-flex js-choose-file -primary u-hidden-on-desktop\">\n    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15.348\" height=\"12\" viewBox=\"0 0 15.348 12\">\n  <path id=\"XMLID_52_\" d=\"M52.027,73.267a1.512,1.512,0,0,0-1.229-.623h-.371v-1A1.525,1.525,0,0,0,48.9,70.122H44.444a.977.977,0,0,1-.683-.28l-.7-.7a1.51,1.51,0,0,0-1.075-.445H38.5a1.525,1.525,0,0,0-1.524,1.527v8.886A1.542,1.542,0,0,0,38.521,80.7H49.235a1.525,1.525,0,0,0,1.457-1.072l1.566-5.005A1.515,1.515,0,0,0,52.027,73.267Zm-14.49-3.04a.968.968,0,0,1,.963-.967h3.485a.983.983,0,0,1,.683.28l.7.7a1.51,1.51,0,0,0,1.075.445H48.9a.968.968,0,0,1,.967.963v1H40.062A1.526,1.526,0,0,0,38.6,73.712l-1.072,3.419v-6.9Zm14.182,4.231-1.566,5.005a.958.958,0,0,1-.921.676H38.517a.982.982,0,0,1-.939-1.275l1.559-4.984a.958.958,0,0,1,.921-.676H50.794a.954.954,0,0,1,.778.392A.94.94,0,0,1,51.719,74.458Z\" transform=\"translate(-36.979 -68.7)\" \/>\n<\/svg>\n\n\n    <span class=\"nsw-a-icon-label-simple__label\">\n        Choose from your files\n    <\/span>\n<\/span>\n            <\/div>\n    <div class=\"nsw-m-drag-and-drop__title\">\n        Acceptable files: doc, docx, pdf. (max 5MB)\n    <\/div>\n\n    <div class=\"nsw-m-drag-and-drop__error js-error-wrong-extension u-hidden\">Please submit your file in DOC, DOCX or PDF format<\/div>\n    <div class=\"nsw-m-drag-and-drop__error js-error-wrong-size u-hidden\">The upload size is limited to 5 MB<\/div>\n    <div class=\"nsw-m-drag-and-drop__error js-error-wrong-size-empty u-hidden\">File is empty<\/div>\n    <div class=\"nsw-m-drag-and-drop__error sii-error-upload-container js-require-error u-hidden\">\n                    File was not uploaded\n            <\/div>\n<\/div>                    <\/div>\n                    <div class=\"box -full-width\">\n                        <label class=\"nsw-m-textarea  frow\" for=\"message\"><span class=\"nsw-m-textarea__label d-block\">Your message<span class=\"nsw-m-textarea__required\">*<\/span><\/span>\n    <textarea class=\"input-text required\" data-allowed-chars=\"\u00c5\u00c9\u00c0\u00c4\u00d6\u1e9e\u00dc\u0104\u015a\u0106\u0179\u017b\u0141\u0118\u0106\u0143\u00d3\u0105\u015b\u0107\u017a\u017c\u0142\u00f3\u0119\u0107\u0144\u00e4\u00f6\u00df\u00fc\u00e0\u00e9\u00e5\u2010 -\u2212 \u2013\u2014 \u2011&amp;+!.,?;:&lt;&gt;\\\/{}[]=-+_()*&amp;^%$#@|&#039;\u2019&quot;\" name=\"message\" id=\"message\" value=\"\"  ><\/textarea>\n         <span class=\"nsw-m-textarea__error js-require-error u-hidden\">Field is required<\/span>    <span class=\"nsw-m-textarea__error js-format-error u-hidden\">The field can contain only letters, digits and special characters<\/span>\n<\/label>\n                    <\/div>\n                    <div class=\"box -consents\">\n                        <p class=\"consents-text\">\n                            <label \n       class=\"nsw-m-checkbox-label -label-small d-flex align-items-start justify-content-between\"\n                     >\n\n    <input type=\"checkbox\" \n           class=\"\"\n           data-label=\"I consent to the processing of my personal data by Sii sp. z o.o. and its subsidiaries for the purpose of sending marketing information to the provided e-mail address.\"\n           data-id=\"form_contact_email\"\n           name=\"contact_email\"\n                      value=\"yes\" >\n\n    <span class=\"nsw-m-checkbox-label__input\"><\/span>\n\n    <span class=\"nsw-m-checkbox-label__name\" >\n        I consent to the processing of my personal data by Sii sp. z o.o. and its subsidiaries for the purpose of sending marketing information to the provided e-mail address.            <\/span>\n\n    <\/label>\n                        <\/p>\n                        <p class=\"consents-text\">\n                            At any time, you may withdraw your consent to the processing of personal data, but such withdrawal shall not affect the legal compliance of any processing of such data, which had occurred before you withdrew your consent. Detailed information on the processing of your personal data is specified in the  <a class=\"link-privacy-policy\" href=\"https:\/\/sii.pl\/en\/privacy-policy\/\" target=\"_blank\" title=\"Privacy Policy \"> Privacy Policy<\/a>.\n                        <\/p>\n                    <\/div>\n                    <div class=\"box -submit\">\n                        <button  type=\"submit\"  class=\"nsw-a-button \">Send<\/button>\n                    <\/div>\n                <\/div>\n            <\/div>\n            <div class=\"col-lg-2 d-flex flex-column align-items-start align-items-lg-center u-margin-positive-18 u-mobile-top-positive-0 u-mobile-bottom-positive-20\">\n                                    <div class=\"nsw-o-offer-contact-form__image u-hidden-on-mobile \">\n                        <img decoding=\"async\" src=\"https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Dawid-Jankowski-1.png\" alt=\"\">\n                    <\/div>\n                                                        <h2 class=\"nsw-o-offer-contact-form__name u-color-nswc-grey-1000 u-margin-positive-15\">Dawid Jankowski<\/h2>\n                                                        <p class=\"nsw-o-offer-contact-form__position u-color-nswc-primary u-margin-positive-4\">Cybersecurity Competency Center Director<\/p>\n                            <\/div>\n        <\/div>\n        <div class=\"nsw-o-offer-contact-form__success js-form-success u-hidden\">\n            <h2 class=\"nsw-o-offer-contact-form__success-title has-nsw-h-3-font-size u-color-nswc-grey-1000\">\n                <svg width=\"26\" height=\"26\" viewBox=\"0 0 26 26\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M23.5998 2.45618C23.3869 2.2419 23.1183 2.09155 22.8243 2.02219C22.5304 1.95283 22.2228 1.96724 21.9367 2.06378L3.50664 8.20709C3.17903 8.3162 2.8947 8.52684 2.69489 8.80845C2.49507 9.09007 2.39017 9.42801 2.39539 9.77327C2.4006 10.1185 2.51567 10.4532 2.7239 10.7286C2.93214 11.004 3.2227 11.206 3.55346 11.3052L11.7479 13.7637C11.8767 13.8021 11.9939 13.872 12.089 13.967C12.184 14.062 12.2538 14.1792 12.2922 14.308L14.7504 22.5021C14.8486 22.8333 15.0502 23.1244 15.3258 23.3327C15.6013 23.5411 15.9363 23.6559 16.2817 23.6602L16.3071 23.6606C16.6483 23.6613 16.981 23.5543 17.2577 23.3547C17.5344 23.1552 17.741 22.8733 17.848 22.5493L23.9917 4.11926C24.0883 3.83312 24.1028 3.52563 24.0335 3.23168C23.9642 2.93773 23.814 2.66908 23.5998 2.45618ZM16.3071 22.0355L13.849 13.8411C13.8081 13.7252 13.7585 13.6126 13.7004 13.5043L18.4772 8.72726C18.5526 8.65183 18.6125 8.56227 18.6533 8.4637C18.6941 8.36513 18.7152 8.25949 18.7152 8.1528C18.7152 8.04612 18.6941 7.94047 18.6533 7.84191C18.6125 7.74334 18.5526 7.65378 18.4772 7.57834C18.4018 7.5029 18.3122 7.44306 18.2136 7.40223C18.1151 7.36141 18.0094 7.34039 17.9027 7.34039C17.7961 7.34039 17.6904 7.36141 17.5918 7.40223C17.4933 7.44306 17.4037 7.5029 17.3283 7.57834L12.5516 12.3553C12.4433 12.2974 12.3307 12.2478 12.2148 12.207L4.02042 9.74885L22.4508 3.60509L16.3071 22.0355ZM3.03971 19.2898C2.88735 19.4421 2.68071 19.5277 2.46524 19.5277C2.24978 19.5277 2.04314 19.4421 1.89078 19.2898C1.73843 19.1374 1.65283 18.9308 1.65283 18.7153C1.65283 18.4998 1.73843 18.2932 1.89078 18.1408L5.95328 14.0783C6.10564 13.926 6.31228 13.8404 6.52774 13.8404C6.74321 13.8404 6.94985 13.926 7.10221 14.0783C7.25456 14.2307 7.34016 14.4373 7.34016 14.6528C7.34016 14.8683 7.25456 15.0749 7.10221 15.2273L3.03971 19.2898ZM11.9772 18.9533C12.0527 19.0288 12.1125 19.1183 12.1534 19.2169C12.1942 19.3155 12.2152 19.4211 12.2152 19.5278C12.2152 19.6345 12.1942 19.7402 12.1534 19.8387C12.1125 19.9373 12.0527 20.0268 11.9772 20.1023L7.91471 24.1648C7.83927 24.2402 7.74971 24.3 7.65114 24.3409C7.55257 24.3817 7.44693 24.4027 7.34024 24.4027C7.23356 24.4027 7.12791 24.3817 7.02935 24.3409C6.93078 24.3 6.84122 24.2402 6.76578 24.1648C6.69034 24.0893 6.6305 23.9998 6.58967 23.9012C6.54885 23.8026 6.52783 23.697 6.52783 23.5903C6.52783 23.4836 6.54885 23.378 6.58967 23.2794C6.6305 23.1808 6.69034 23.0913 6.76578 23.0158L10.8283 18.9533C10.9037 18.8779 10.9933 18.818 11.0918 18.7772C11.1904 18.7363 11.296 18.7153 11.4027 18.7153C11.5094 18.7153 11.6151 18.7363 11.7137 18.7772C11.8122 18.818 11.9018 18.8779 11.9772 18.9533ZM7.8909 19.258L3.85617 23.3483C3.78125 23.4243 3.6921 23.4847 3.59382 23.5262C3.49553 23.5677 3.39003 23.5895 3.28334 23.5902C3.17665 23.5909 3.07087 23.5707 2.97202 23.5305C2.87317 23.4904 2.78319 23.4311 2.70723 23.3562C2.63127 23.2813 2.57081 23.1922 2.52931 23.0939C2.4878 22.9956 2.46606 22.8901 2.46532 22.7834C2.46459 22.6767 2.48487 22.5709 2.52502 22.4721C2.56517 22.3732 2.6244 22.2832 2.69932 22.2073L6.73405 18.117C6.88552 17.9644 7.09132 17.878 7.30636 17.8769C7.52139 17.8757 7.72811 17.9599 7.88121 18.1109C8.03431 18.2619 8.1213 18.4674 8.12312 18.6824C8.12493 18.8975 8.04143 19.1045 7.8909 19.258Z\"\/>\n<\/svg>Your message was sent successfully<\/h2>\n            <p class=\"has-nsw-h-4-font-size u-color-nswc-grey-600\">We will look over your message and get back to you as soon as possible<\/p>\n        <\/div>\n        <div class=\"nsw-o-offer-contact-form__error js-form-error u-hidden\">\n                            <div class=\"nsw-o-process-error \">\n    <div class=\"nsw-o-process-error__default\">\n                <h2 class=\"nsw-o-process-error__title has-nsw-h-3-font-size u-color-nswc-grey-1000\">\n            <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 16 4 C 9.382813 4 4 9.382813 4 16 C 4 22.617188 9.382813 28 16 28 C 22.617188 28 28 22.617188 28 16 C 28 9.382813 22.617188 4 16 4 Z M 16 6 C 21.535156 6 26 10.464844 26 16 C 26 21.535156 21.535156 26 16 26 C 10.464844 26 6 21.535156 6 16 C 6 10.464844 10.464844 6 16 6 Z M 15 10 L 15 18 L 17 18 L 17 10 Z M 15 20 L 15 22 L 17 22 L 17 20 Z\"\/><\/svg>Sorry, something went wrong and your message was not delivered<\/h2>\n                                    <p class=\"subtitle has-nsw-h-4-font-size u-color-nswc-grey-600\">Refresh the page and try again. <a href=\"https:\/\/sii.pl\/en\/contact-us\/\">Contact us<\/a>, if problem occurs again <\/p>\n                    <div class=\"nsw-o-process-error__button-line\">\n                            <a  href=\"\" class=\"nsw-a-button -ghost-primary u-margin-positive-32\"   >\n        <span>Refresh<\/span>\n    <\/a>\n                                <\/div>\n    <\/div>\n    <div class=\"nsw-o-process-error__file-error\">\n        <h2 class=\"nsw-o-process-error__title has-nsw-h-3-font-size u-color-nswc-grey-1000\">\n            <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path d=\"M 16 4 C 9.382813 4 4 9.382813 4 16 C 4 22.617188 9.382813 28 16 28 C 22.617188 28 28 22.617188 28 16 C 28 9.382813 22.617188 4 16 4 Z M 16 6 C 21.535156 6 26 10.464844 26 16 C 26 21.535156 21.535156 26 16 26 C 10.464844 26 6 21.535156 6 16 C 6 10.464844 10.464844 6 16 6 Z M 15 10 L 15 18 L 17 18 L 17 10 Z M 15 20 L 15 22 L 17 22 L 17 20 Z\"\/><\/svg>\n            We\u2019re sorry, but the selected file appears to be damaged and we can&#039;t process it.\n        <\/h2>\n        <p class=\"subtitle has-nsw-h-4-font-size u-color-nswc-grey-600\">\n            Please try uploading a different copy or a new version of the file. \n            <a href=\"mailto:contact@sii.pl\" rel=\"nofollow\" > Contact us<\/a>, if problem occurs again.\n        <\/p>\n        <div class=\"nsw-o-process-error__button-line\">\n            <a  href=\"\" class=\"nsw-a-button -ghost-primary u-margin-positive-32 js-wrong-file-button\"   >\n        <span>Choose another file<\/span>\n    <\/a>\n        <\/div>\n    <\/div>\n<\/div>            \n\n        <\/div>\n        <div class=\"nsw-o-processing d-lg-flex justify-content-between u-hidden js-form-pending\" >\n     <div class=\"nsw-a-preloader\">\n    <div class=\"nsw-a-preloader__spinner\">\n        <span><\/span>\n    <\/div>\n<\/div>\n     <div class=\"nsw-o-processing__txt d-flex align-items-center\">\n                           <div class=\"nsw-m-title-block -h3 -p3 -has-title-color-primary -has-subtitle-color-default\">\n                                <h2 class=\"nsw-m-title-block__title\">Processing&#8230;<\/h2>\n                <\/div>\n     <\/div>\n <\/div>    <\/form>\n<\/div><\/div><\/section><section class=\"wp-block-nsw-block-section nsw-section  section-39f963a6-5f33-43fb-abd8-402d9b8ba05c\" id=\"\"><style type=\"text\/css\">.section-39f963a6-5f33-43fb-abd8-402d9b8ba05c { \n\t\t\n\t\t\t\tpadding-top:120px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:50px;\n\t\t\t  \n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-39f963a6-5f33-43fb-abd8-402d9b8ba05c { \n\t\t\n\t\t\t\tpadding-top:0px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:15px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-ceb6a358-a036-4b55-a543-779a7d9b00ed .nsw-m-title-block__title, .header-ceb6a358-a036-4b55-a543-779a7d9b00ed .nsw-m-title-block__subtitle {  }\n                         @media screen and (max-width: 991px) { .header-ceb6a358-a036-4b55-a543-779a7d9b00ed .nsw-m-title-block__title, .header-ceb6a358-a036-4b55-a543-779a7d9b00ed .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-ceb6a358-a036-4b55-a543-779a7d9b00ed -h2 -uppercase -p1 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \">Our complementary services<\/h2><p class=\"nsw-m-title-block__subtitle \"><\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-fae93974-be75-4598-b540-5ae2967c74f8\"><style type=\"text\/css\">.container-fae93974-be75-4598-b540-5ae2967c74f8 { margin-top:85px; }\n                         @media screen and (max-width: 991px) { .container-fae93974-be75-4598-b540-5ae2967c74f8 { margin-top:40px; } }<\/style><style>\n    .editor-styles-wrapper .nsw-o-plain-menu a:hover,\n    .editor-styles-wrapper .nsw-o-buttons-menu a:hover,\n    .editor-styles-wrapper .nsw-o-card-menu a:hover {\n        text-decoration: none;\n    }\n<\/style>\n\n            <div class=\"nsw-o-plain-menu \">\n    <div class=\"row\">\n                                <div class=\"col-lg-3 col-sm-3 col-6 nsw-o-plain-menu__column\">\n                <div class=\"nsw-o-plain-menu__item\">\n                                            <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/cloud-security\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-mobile\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>Cloud Security<\/span><\/a>\n                        <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/cloud-security\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-desktop\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>Cloud Security<\/span><\/a>\n                                    <\/div>\n            <\/div>\n                                            <div class=\"col-lg-3 col-sm-3 col-6 nsw-o-plain-menu__column\">\n                <div class=\"nsw-o-plain-menu__item\">\n                                            <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/data-security\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-mobile\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>Data Security<\/span><\/a>\n                        <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/data-security\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-desktop\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>Data Security<\/span><\/a>\n                                    <\/div>\n            <\/div>\n                                            <div class=\"col-lg-3 col-sm-3 col-6 nsw-o-plain-menu__column\">\n                <div class=\"nsw-o-plain-menu__item\">\n                                            <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/nis-2-compliance\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-mobile\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>NIS 2 Compliance<\/span><\/a>\n                        <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/nis-2-compliance\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-desktop\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>NIS 2 Compliance<\/span><\/a>\n                                    <\/div>\n            <\/div>\n                                            <div class=\"col-lg-3 col-sm-3 col-6 nsw-o-plain-menu__column\">\n                <div class=\"nsw-o-plain-menu__item\">\n                                            <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/security-verification\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-mobile\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>Security Verification<\/span><\/a>\n                        <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/security-verification\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-desktop\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>Security Verification<\/span><\/a>\n                                    <\/div>\n            <\/div>\n                                            <div class=\"col-lg-3 col-sm-3 col-6 nsw-o-plain-menu__column\">\n                <div class=\"nsw-o-plain-menu__item\">\n                                            <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/security-of-medical-devices\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-mobile\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>Security of Medical Devices<\/span><\/a>\n                        <a href=\"https:\/\/sii.pl\/en\/what-we-offer\/cybersecurity\/security-of-medical-devices\/\" class=\"nsw-o-plain-menu__link text-decoration-none d-flex flex-row align-items-baseline u-hidden-on-desktop\">  <svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" viewBox=\"0 0 32 32\" id=\"angle-right\">\n    <title>angle-right<\/title>\n    <path d=\"M12.969 4.281l11 11 .688.719-.688.719-11 11-1.438-1.438L21.812 16 11.531 5.719z\"><\/path>\n  <\/svg><span>Security of Medical Devices<\/span><\/a>\n                                    <\/div>\n            <\/div>\n                        <\/div>\n<\/div><\/div><\/section><section class=\"wp-block-nsw-block-section nsw-section  section-9d031dd0-ee7e-496b-9655-ffcf3cc74f2b\" id=\"\"><style type=\"text\/css\">.section-9d031dd0-ee7e-496b-9655-ffcf3cc74f2b { \n\t\t\n\t\t\t\tpadding-top:80px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:75px;\n\t\t\t  \n\t\t\t\n\t\t\t\tbackground-image:url(https:\/\/sii.pl\/wp-content\/uploads\/2024\/07\/Group-3463-3.png);\n\t\t\t\n\t\t\t\tbackground-repeat:no-repeat;\n\t\t\t\n\t\t\t\tbackground-size:cover;\n\t\t\t }\n                         @media screen and (max-width: 991px) { .section-9d031dd0-ee7e-496b-9655-ffcf3cc74f2b { \n\t\t\n\t\t\t\tpadding-top:23px;\n\t\t\t  \n\t\t\t\n\t\t\n\t\t\t\tpadding-bottom:18px;\n\t\t\t  \n\t\t\t } }<\/style><div class=\"wp-block-sii-nsw-header container\"><style type=\"text\/css\">.header-f0c94265-4d12-4d49-91a0-ba634b7bcb76 .nsw-m-title-block__title, .header-f0c94265-4d12-4d49-91a0-ba634b7bcb76 .nsw-m-title-block__subtitle { color:#ffffff; }\n                         @media screen and (max-width: 991px) { .header-f0c94265-4d12-4d49-91a0-ba634b7bcb76 .nsw-m-title-block__title, .header-f0c94265-4d12-4d49-91a0-ba634b7bcb76 .nsw-m-title-block__subtitle {  } }<\/style><header class=\"nsw-header nsw-m-title-block  header-f0c94265-4d12-4d49-91a0-ba634b7bcb76 -h2 -p1 -at0\"><span class=\"nsw-m-title-block__above-title \"><\/span><h2 class=\"nsw-m-title-block__title \">Join us<\/h2><p class=\"nsw-m-title-block__subtitle \">Become part of the Power People team<\/p><\/header><\/div>\n\n<div class=\"wp-block-sii-nsw-container container container-2e67bb4d-55ee-4bf3-9a71-3329d76018d6\"><style type=\"text\/css\">.container-2e67bb4d-55ee-4bf3-9a71-3329d76018d6 { margin-top:21px; }\n                         @media screen and (max-width: 991px) { .container-2e67bb4d-55ee-4bf3-9a71-3329d76018d6 { margin-top:16px; } }<\/style><div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><div class=\"wp-block-button is-style-nsw-gradient-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sii.pl\/en\/job-ads\/all\/cyber-security\">Apply<\/a><\/div><\/div><\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":109,"featured_media":0,"parent":97928,"menu_order":0,"template":"views\/nsw-blank-page.blade.php","offer-category":[],"class_list":["post-98018","offering-page","type-offering-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/offering-page\/98018"}],"collection":[{"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/offering-page"}],"about":[{"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/types\/offering-page"}],"author":[{"embeddable":true,"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/users\/109"}],"up":[{"embeddable":true,"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/offering-page\/97928"}],"wp:attachment":[{"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/media?parent=98018"}],"wp:term":[{"taxonomy":"offer-category","embeddable":true,"href":"https:\/\/sii.pl\/en\/wp-json\/wp\/v2\/offer-category?post=98018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}