{"id":10,"date":"2026-04-26T09:48:40","date_gmt":"2026-04-26T09:48:40","guid":{"rendered":"https:\/\/cyberstrategytranslator.com\/?page_id=10"},"modified":"2026-04-27T07:24:08","modified_gmt":"2026-04-27T07:24:08","slug":"home","status":"publish","type":"page","link":"https:\/\/cyberstrategytranslator.com\/","title":{"rendered":"Home"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<section style=\"\nwidth:100vw;\nmargin-left:calc(50% - 50vw);\nbackground:#0f1720;\ncolor:#ffffff;\npadding:0px 30px 70px 30px;\nbox-sizing:border-box;\n\">\n\n  <div style=\"\n  max-width:1320px;\n  margin:0 auto;\n  display:grid;\n  grid-template-columns:0.9fr 1.1fr;\n  gap:60px;\n  align-items:center;\n  \">\n\n    <!-- LEFT -->\n    <div>\n\n      <p style=\"\n      color:#C8A96A;\n      text-transform:uppercase;\n      letter-spacing:0.18em;\n      font-weight:700;\n      font-size:12px;\n      margin:0 0 14px 0;\n      \">\n      Cyber Strategy Translation\n      <\/p>\n\n      <h1 style=\"\n      font-family:Georgia, serif;\n      font-size:clamp(40px, 5vw, 64px);\n      line-height:1.02;\n      margin:0 0 18px 0;\n      \">\n      Cyber Security That Drives Board-Level Decisions\n      <\/h1>\n\n      <p style=\"\n      font-size:18px;\n      line-height:1.65;\n      color:#BFC7D1;\n      max-width:580px;\n      margin:0 0 26px 0;\n      \">\n      Dr John McCarthy translates technical cyber risk into clear executive decisions, ownership, and investment priorities.\n      <\/p>\n\n      <div style=\"\n      display:flex;\n      gap:16px;\n      flex-wrap:wrap;\n      margin-bottom:26px;\n      \">\n\n        <a href=\"#contact\" style=\"\n        background:#C8A96A;\n        color:#0f1720;\n        padding:14px 26px;\n        text-decoration:none;\n        font-weight:700;\n        border-radius:6px;\n        \">\n        Book a Discussion \u2192\n        <\/a>\n\n        <a href=\"https:\/\/cyberstrategytranslator.com\/?page_id=42\" style=\"\n        border:1px solid rgba(255,255,255,0.7);\n        color:#ffffff;\n        padding:13px 26px;\n        text-decoration:none;\n        font-weight:700;\n        border-radius:6px;\n        \">\n        View Masterclass \u2192\n        <\/a>\n\n      <\/div>\n\n      <p style=\"\n      color:#9AA4AF;\n      font-size:14px;\n      line-height:1.7;\n      max-width:680px;\n      margin:0;\n      \">\n      Chartered Cyber Security Professional | Board Advisory | Critical National Infrastructure | Aviation Cyber Security | Executive Masterclasses\n      <\/p>\n\n    <\/div>\n\n    <!-- RIGHT -->\n    <div style=\"\n    position:relative;\n    min-height:620px;\n    background:url('https:\/\/cyberstrategytranslator.com\/wp-content\/uploads\/2026\/04\/djm-1.jpg') center 30%\/cover no-repeat;\n    \">\n\n      <div style=\"\n      position:absolute;\n      inset:0;\n      background:\n      linear-gradient(90deg, rgba(15,23,32,0.45), rgba(15,23,32,0.05)),\n      linear-gradient(180deg, rgba(15,23,32,0.15), rgba(15,23,32,0.15));\n      \"><\/div>\n\n    <\/div>\n\n  <\/div>\n\n<\/section>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Strategy Translation Cyber Security That Drives Board-Level Decisions Dr John McCarthy translates technical cyber risk into clear executive decisions, ownership, and investment priorities. Book a Discussion \u2192 View Masterclass \u2192 Chartered Cyber Security Professional | Board Advisory | Critical National Infrastructure | Aviation Cyber Security | Executive Masterclasses<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-clean-canvas.php","meta":{"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberstrategytranslator.com\/index.php?rest_route=\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberstrategytranslator.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberstrategytranslator.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberstrategytranslator.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberstrategytranslator.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10"}],"version-history":[{"count":34,"href":"https:\/\/cyberstrategytranslator.com\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":147,"href":"https:\/\/cyberstrategytranslator.com\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions\/147"}],"wp:attachment":[{"href":"https:\/\/cyberstrategytranslator.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}