{"id":76,"date":"2025-07-27T15:31:37","date_gmt":"2025-07-27T15:31:37","guid":{"rendered":"https:\/\/www.atelye.com.tr\/?page_id=76"},"modified":"2025-07-27T15:31:39","modified_gmt":"2025-07-27T15:31:39","slug":"shield-package","status":"publish","type":"page","link":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/","title":{"rendered":"Shield Package"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-73eab25f wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-47c06fe3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.atelye.com.tr\/wp-content\/themes\/raft\/assets\/img\/shape-01.svg\" alt=\"\" class=\"wp-image-283\" style=\"aspect-ratio:1;object-fit:cover\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading\">Shield Package \u2013 Operational Security. Risk-Driven Decisions.<\/h2>\n\n\n\n<p>A security advisory package focused on risk, compliance, and real-world implementation. Designed for growing teams facing regulatory expectations or audit pressure.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s Included \u2013 Monthly Scope<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Feature<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>\u2705 4 consulting days\/month<\/td><td>Dedicated vCISO-level advisory &amp; delivery<\/td><\/tr><tr><td>\u2705 Policy &amp; process development<\/td><td>1 policy + 1 operational workflow\/month<\/td><\/tr><tr><td>\u2705 Technical architecture review<\/td><td>Review of 1 system or project per month<\/td><\/tr><tr><td>\u2705 Compliance alignment tracking<\/td><td>Mapping to ISO, KVKK, PCI DSS, or BDDK frameworks<\/td><\/tr><tr><td>\u2705 Awareness program development<\/td><td>Custom content or strategy for team-wide engagement<\/td><\/tr><tr><td>\u2705 Security performance dashboard<\/td><td>Monthly PDF report with KRI\/KPI trends<\/td><\/tr><tr><td>\u2705 5 CISO Toolkits<\/td><td>Extended access to risk and control resources<\/td><\/tr><tr><td>\u2705 Slack\/Asana\/Email collaboration<\/td><td>Active async communication and tracking<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-784450ff\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-center ticss-c00aadba\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-d0fbfc0a\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<div id=\"wp-block-themeisle-blocks-advanced-columns-f32a2609\" class=\"wp-block-themeisle-blocks-advanced-columns has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-center\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-3567d86b\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 id=\"wp-block-themeisle-blocks-advanced-heading-d5f71f32\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-d5f71f32\">Turn Cybersecurity into a Business Enabler<\/h2>\n\n\n\n<p class=\"has-text-align-center\">You don\u2019t need a full-time CISO \u2014 you need a partner who gets it.<br>Let\u2019s secure what matters, together.<\/p>\n<\/div>\n<\/div><\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-8085ff1f\" class=\"wp-block-themeisle-blocks-advanced-columns has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-top\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-dfb15c39\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<div id=\"wp-block-themeisle-blocks-font-awesome-icons-c5fd27f1\" class=\"wp-block-themeisle-blocks-font-awesome-icons\"><span class=\"wp-block-themeisle-blocks-font-awesome-icons-container\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1800 1800\"><path d=\"M637.655,1373.291c-17.354,0-31.421-14.067-31.421-31.422V834.407c0-17.355,14.067-31.422,31.421-31.422 c17.355,0,31.422,14.067,31.422,31.422v507.462C669.077,1359.224,655.01,1373.291,637.655,1373.291z\"><\/path><path d=\"M633.451,1373.291c-8.041,0-16.081-3.069-22.218-9.2l-180.151-180.139 c-12.27-12.27-12.272-32.167,0-44.437c12.27-12.273,32.162-12.27,44.436-0.005l180.151,180.139 c12.27,12.27,12.272,32.167,0,44.437C649.535,1370.222,641.493,1373.291,633.451,1373.291z\"><\/path><path d=\"M641.859,1373.291c-8.042,0-16.083-3.069-22.218-9.205c-12.272-12.27-12.27-32.167,0-44.437 l180.151-180.139c12.274-12.265,32.171-12.265,44.436,0.005c12.272,12.27,12.27,32.167,0,44.437l-180.151,180.139 C657.942,1370.222,649.898,1373.291,641.859,1373.291z\"><\/path><path d=\"M1649.069,3.258H626.017c-43.336,0-78.584,35.445-78.584,79.022v180.463H150.931 c-43.34,0-78.597,35.454-78.597,79.026v1138.41v20.796v216.749c0,43.576,35.257,79.018,78.597,79.018h1023.053 c43.33,0,78.58-35.441,78.58-79.018v-51.06h396.518c43.332,0,78.584-35.446,78.584-79.022v-474.521V556.8V82.28 C1727.666,38.704,1692.404,3.258,1649.069,3.258z M1194.333,1717.725c0,11.463-9.123,20.786-20.349,20.786H150.931 c-11.226,0-20.371-9.323-20.371-20.786v-216.749v-20.796V341.77c0-11.458,9.145-20.795,20.371-20.795h396.502h58.231h358.975 v178.622c0,16.166,13.072,29.264,29.199,29.264h200.495v951.32v20.796v107.458v58.231V1717.725z M1023.049,470.322V357.77 l124.375,112.552H1023.049z M1669.436,1113.122v474.521c0,11.463-9.123,20.791-20.354,20.791h-396.518v-107.458v-20.796V501.2 v-3.011c-0.418-8.702-4.578-16.421-10.941-21.51l-47.29-42.784l-124.778-112.92l-56.146-50.796 c-5.023-4.542-11.335-7.041-17.814-7.435h-3.313H605.664V82.28c0-11.467,9.127-20.791,20.353-20.791h1023.052 c11.228,0,20.366,9.324,20.366,20.791V556.8V1113.122z\"><\/path><\/svg><\/span><\/div>\n\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-3147d135\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-3147d135\">Who is this for?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FinTech, HealthTech, and RegTech companies<\/li>\n\n\n\n<li>Mid-stage SaaS teams working with sensitive data<\/li>\n\n\n\n<li>Businesses preparing for SOC2, ISO 27001, PCI DSS, and BDDK inspections<\/li>\n\n\n\n<li>Companies with in-house IT but no CISO-level governance<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-vertical is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-9f5e29b6 wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-ec09b220\" class=\"wp-block-themeisle-blocks-advanced-column ticss-ec09b220\">\n<div id=\"wp-block-themeisle-blocks-font-awesome-icons-1225333d\" class=\"wp-block-themeisle-blocks-font-awesome-icons\"><span class=\"wp-block-themeisle-blocks-font-awesome-icons-container\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1800 1800\"><path d=\"M955.577,469.95c0.991-11.551-4.471-23.208-15.062-29.614c-5.422-3.281-11.499-4.721-17.316-4.527 c-11.915,0.347-22.164,7.318-27.2,17.36L616.275,915.595c-5.874,9.714-6.063,21.831-0.487,31.72s16.044,16.004,27.394,16.004 h172.294v399.955c0,14.18,9.498,26.612,23.186,30.342c2.742,0.746,5.519,1.105,8.261,1.105c10.941,0,21.356-5.729,27.104-15.504 l309.898-526.839c5.721-9.722,5.796-21.765,0.193-31.557c-5.598-9.792-16.018-15.833-27.297-15.833H955.577V469.95z M1101.838,867.882l-223.467,379.902V931.871c0-17.373-14.079-31.449-31.447-31.449H698.957l193.726-320.252v256.265 c0,17.369,14.079,31.447,31.448,31.447H1101.838z\"><\/path><path d=\"M1507.236,278.071h-346.672V33.419c0-17.369-14.078-31.447-31.447-31.447H670.883 c-17.369,0-31.447,14.079-31.447,31.447v244.652H292.764c-17.369,0-31.447,14.079-31.447,31.447v1457.061 c0,17.374,14.078,31.448,31.447,31.448h1214.473c17.369,0,31.447-14.074,31.447-31.448V309.519 C1538.684,292.15,1524.605,278.071,1507.236,278.071z M702.33,64.867h395.34v213.205H702.33V64.867z M1475.789,1735.132H324.211 v-182.095h1151.578V1735.132z M1475.789,1490.143H324.211V340.966h346.672h458.234h346.672V1490.143z\"><\/path><\/svg><\/span><\/div>\n\n\n\n<h3 id=\"wp-block-themeisle-blocks-advanced-heading-869a9c1f\" class=\"wp-block-themeisle-blocks-advanced-heading wp-block-themeisle-blocks-advanced-heading-869a9c1f\">How We Work<\/h3>\n\n\n\n<p class=\"has-text-align-left\">We operate like your security management layer \u2014 without the headcount.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monthly Strategy Call (60 min)<\/li>\n\n\n\n<li>Focus Area Execution (Offline) \u2013 Policy, compliance, technical review<\/li>\n\n\n\n<li>Risk Dashboard Delivery<\/li>\n\n\n\n<li>Retrospective &amp; Tactical Plan<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-vertical is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-9f5e29b6 wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-26666c0f wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h2 class=\"wp-block-heading\">Get started today, get in touch!<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p class=\"has-text-align-left\">Let\u2019s secure what matters, together.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.atelye.com.tr\/index.php\/contact\/\">Contact Us<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Shield Package \u2013 Operational Security. Risk-Driven Decisions. A security advisory package focused on risk, compliance, and real-world implementation. Designed for growing teams facing regulatory expectations or audit pressure. What\u2019s Included \u2013 Monthly Scope Feature Description \u2705 4 consulting days\/month Dedicated vCISO-level advisory &amp; delivery \u2705 Policy &amp; process development 1 policy + 1 operational workflow\/month [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-76","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shield Package - Atelye<\/title>\n<meta name=\"description\" content=\"Shield delivers operational security support, regulatory alignment, and monthly risk management insights for scaling and regulated businesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shield Package | Risk-Based Cybersecurity Advisory for SMBs \u2013 Atelye\" \/>\n<meta property=\"og:description\" content=\"Shield delivers operational security support, regulatory alignment, and monthly risk management insights for scaling and regulated businesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/\" \/>\n<meta property=\"og:site_name\" content=\"Atelye\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-27T15:31:39+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Atelye_Logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"437\" \/>\n\t<meta property=\"og:image:height\" content=\"181\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Shield Package | Risk-Based Cybersecurity Advisory for SMBs \u2013 Atelye\" \/>\n<meta name=\"twitter:description\" content=\"Shield delivers operational security support, regulatory alignment, and monthly risk management insights for scaling and regulated businesses.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Atelye_Logo.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/\",\"url\":\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/\",\"name\":\"Shield Package - Atelye\",\"isPartOf\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.atelye.com.tr\/wp-content\/themes\/raft\/assets\/img\/shape-01.svg\",\"datePublished\":\"2025-07-27T15:31:37+00:00\",\"dateModified\":\"2025-07-27T15:31:39+00:00\",\"description\":\"Shield delivers operational security support, regulatory alignment, and monthly risk management insights for scaling and regulated businesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#primaryimage\",\"url\":\"https:\/\/www.atelye.com.tr\/wp-content\/themes\/raft\/assets\/img\/shape-01.svg\",\"contentUrl\":\"https:\/\/www.atelye.com.tr\/wp-content\/themes\/raft\/assets\/img\/shape-01.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.atelye.com.tr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shield Package\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.atelye.com.tr\/#website\",\"url\":\"https:\/\/www.atelye.com.tr\/\",\"name\":\"Atelye\",\"description\":\"Designing Digital Resilience\",\"publisher\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.atelye.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.atelye.com.tr\/#organization\",\"name\":\"Atelye\",\"url\":\"https:\/\/www.atelye.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png\",\"contentUrl\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png\",\"width\":250,\"height\":250,\"caption\":\"Atelye\"},\"image\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/atelye-dr-976413366\/\",\"https:\/\/www.youtube.com\/@AtelyeDR-k5t\"],\"publishingPrinciples\":\"https:\/\/www.atelye.com.tr\/index.php\/about-us\/\",\"ownershipFundingInfo\":\"https:\/\/www.atelye.com.tr\/index.php\/about-us\/\",\"actionableFeedbackPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/faq\/\",\"correctionsPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"ethicsPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"diversityPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"diversityStaffingReport\":\"https:\/\/www.atelye.com.tr\/index.php\/faq\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shield Package - Atelye","description":"Shield delivers operational security support, regulatory alignment, and monthly risk management insights for scaling and regulated businesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/","og_locale":"en_US","og_type":"article","og_title":"Shield Package | Risk-Based Cybersecurity Advisory for SMBs \u2013 Atelye","og_description":"Shield delivers operational security support, regulatory alignment, and monthly risk management insights for scaling and regulated businesses.","og_url":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/","og_site_name":"Atelye","article_modified_time":"2025-07-27T15:31:39+00:00","og_image":[{"width":437,"height":181,"url":"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Atelye_Logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Shield Package | Risk-Based Cybersecurity Advisory for SMBs \u2013 Atelye","twitter_description":"Shield delivers operational security support, regulatory alignment, and monthly risk management insights for scaling and regulated businesses.","twitter_image":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Atelye_Logo.png","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/","url":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/","name":"Shield Package - Atelye","isPartOf":{"@id":"https:\/\/www.atelye.com.tr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#primaryimage"},"image":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#primaryimage"},"thumbnailUrl":"https:\/\/www.atelye.com.tr\/wp-content\/themes\/raft\/assets\/img\/shape-01.svg","datePublished":"2025-07-27T15:31:37+00:00","dateModified":"2025-07-27T15:31:39+00:00","description":"Shield delivers operational security support, regulatory alignment, and monthly risk management insights for scaling and regulated businesses.","breadcrumb":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.atelye.com.tr\/index.php\/shield-package\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#primaryimage","url":"https:\/\/www.atelye.com.tr\/wp-content\/themes\/raft\/assets\/img\/shape-01.svg","contentUrl":"https:\/\/www.atelye.com.tr\/wp-content\/themes\/raft\/assets\/img\/shape-01.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.atelye.com.tr\/index.php\/shield-package\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.atelye.com.tr\/"},{"@type":"ListItem","position":2,"name":"Shield Package"}]},{"@type":"WebSite","@id":"https:\/\/www.atelye.com.tr\/#website","url":"https:\/\/www.atelye.com.tr\/","name":"Atelye","description":"Designing Digital Resilience","publisher":{"@id":"https:\/\/www.atelye.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.atelye.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.atelye.com.tr\/#organization","name":"Atelye","url":"https:\/\/www.atelye.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png","contentUrl":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png","width":250,"height":250,"caption":"Atelye"},"image":{"@id":"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/atelye-dr-976413366\/","https:\/\/www.youtube.com\/@AtelyeDR-k5t"],"publishingPrinciples":"https:\/\/www.atelye.com.tr\/index.php\/about-us\/","ownershipFundingInfo":"https:\/\/www.atelye.com.tr\/index.php\/about-us\/","actionableFeedbackPolicy":"https:\/\/www.atelye.com.tr\/index.php\/faq\/","correctionsPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","ethicsPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","diversityPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","diversityStaffingReport":"https:\/\/www.atelye.com.tr\/index.php\/faq\/"}]}},"_links":{"self":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/76","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=76"}],"version-history":[{"count":1,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/76\/revisions"}],"predecessor-version":[{"id":77,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/76\/revisions\/77"}],"wp:attachment":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}