{"id":1238,"date":"2024-02-10T21:41:23","date_gmt":"2024-02-10T14:41:23","guid":{"rendered":"https:\/\/staging.e5h.co.uk\/?page_id=1238"},"modified":"2026-01-07T03:16:43","modified_gmt":"2026-01-07T03:16:43","slug":"downloads","status":"publish","type":"page","link":"https:\/\/icmscyber.com\/ja\/downloads\/","title":{"rendered":"\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9"},"content":{"rendered":"<div class=\"section-wrapper\" data-id=\"FYpthm\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-FYpthm layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Dc7miV\"><div class=\"guten-column-wrapper\" data-id=\"Dc7miV\">\n<h2 class=\"wp-block-heading\">\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/h2>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"guten-element guten-spacer guten-2ECUnv\"><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"VTqZXz\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-VTqZXz layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-x9LSlc animated guten-element-hide desktop-slideInDown\"><div class=\"guten-column-wrapper\" data-id=\"x9LSlc\">\n<h6 class=\"wp-block-heading has-text-align-center has-tiny-font-size\">Download Brochures<\/h6>\n\n\n\n<div class=\"guten-element guten-buttons-wrapper\"><div class=\"guten-element guten-buttons horizontal guten-BLWakF guten-buttons horizontal guten-BLWakF\">\n<div class=\"guten-element guten-button-wrapper guten-1B241x\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/Digital-Forensics-Incident-Response-Services.pdf\" aria-label=\"\"><span><em>\u30c7\u30b8\u30bf\u30eb\u30fb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u30b5\u30fc\u30d3\u30b9<\/em><\/span><\/a><\/div>\n\n\n\n<div class=\"guten-element guten-button-wrapper guten-7YvLl7\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/ICMS-Training-Services.pdf\" aria-label=\"\"><span><em>Training Services<\/em>   <\/span><\/a><\/div>\n\n\n\n<div class=\"guten-element guten-button-wrapper guten-9sxs2M\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/06\/ThreatTrace360-Brochure-TH.pdf\" aria-label=\"\"><span><em>ThreatTrace360<\/em>&#8211;<em>Th<\/em>  <\/span><\/a><\/div>\n\n\n\n<div class=\"guten-element guten-button-wrapper guten-eLlAqj\"><a class=\"guten-button guten-button-sm\" href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/06\/ThreatTrace360-Brochure-EN.pdf\" aria-label=\"\"><span><em>ThreatTrace360<\/em>&#8211;<em>EN<\/em><\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-aGDLt4 animated guten-element-hide desktop-fadeInDown\"><div class=\"guten-column-wrapper\" data-id=\"aGDLt4\">\n<div class=\"wp-block-gutenverse-image guten-element guten-image guten-Pk3AWH\"><div class=\"guten-image-wrapper\"><img decoding=\"async\" class=\"gutenverse-image-box-filled\" src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/02\/tech-news-1.jpg\" height=\"288\" width=\"512\"\/><\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6700\u65b0\u8a18\u4e8b<\/h3>\n\n\n\n<p class=\"translation-block\">\u5f53\u793e\u304c\u63d0\u4f9b\u3059\u308b\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u8a18\u4e8b\u306e\u30e9\u30a4\u30d6\u30e9\u30ea\u3067\u3059\u3002\n\u3053\u3061\u3089\u306e\u30da\u30fc\u30b8\u3067\u306f\u3001\u30c7\u30b8\u30bf\u30eb\u30d5\u30a9\u30ec\u30f3\u30b8\u30c3\u30af\u306e\u5c02\u9580\u77e5\u8b58\u3084\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u767a\u751f\u6642\u306e\u5bfe\u5fdc\u7b56\u3001\u305d\u3057\u3066\u65e5\u3005\u9032\u5316\u3059\u308b\u6700\u65b0\u306e\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u30c8\u30ec\u30f3\u30c9\u306b\u3064\u3044\u3066\u3001\u5b9f\u7528\u7684\u306a\u30d2\u30f3\u30c8\u3084\u6df1\u3044\u6d1e\u5bdf\u3092\u4ea4\u3048\u3066\u89e3\u8aac\u3057\u3066\u3044\u307e\u3059\u3002\n\u63b2\u8f09\u3055\u308c\u3066\u3044\u308b\u30ea\u30bd\u30fc\u30b9\u306f\u3001\u3059\u3079\u3066\u7121\u6599\u3067\u95b2\u89a7\u30fb\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3044\u305f\u3060\u3051\u307e\u3059\u3002\u8cb4\u793e\u306e\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u306e\u5f37\u5316\u3084\u3001\u793e\u5185\u6559\u80b2\u306e\u8cc7\u6599\u3068\u3057\u3066\u305c\u3072\u3054\u6d3b\u7528\u304f\u3060\u3055\u3044\u3002<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-w2OKJa animated guten-element-hide desktop-slideInDown\"><div class=\"guten-column-wrapper\" data-id=\"w2OKJa\">\n<h6 class=\"wp-block-heading\"><a href=\"https:\/\/icmscyber.com\/ja\/software\/\" title=\"Software\">Download Free Forensic Software<\/a><\/h6>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"guten-element guten-spacer guten-0Ip6Iz\"><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"yTdIOX\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-yTdIOX layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-ZJQMsB\"><div class=\"guten-column-wrapper\" data-id=\"ZJQMsB\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-yd9qCP\"><div class=\"guten-column-wrapper\" data-id=\"yd9qCP\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-Wv2B7i\"><div class=\"guten-column-wrapper\" data-id=\"Wv2B7i\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-YUscUp\">\n<div class=\"accordion-item guten-Bko7tv\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">ThreatTrace360 vs.Traditional Scanning &#8211; Mapping the Modern Attack Surface<br><br>September 2025<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/09\/ThreatTrace360-vs.Traditional-Scanning-Mapping-the-Modern-Attack-Surface-Eng.pdf\" title=\"ThreatTrace360 vs.Traditional Scanning \u2013 Mapping the Modern Attack Surface \u2013 Eng\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"eYRsNx\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-eYRsNx layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-E03uUp\"><div class=\"guten-column-wrapper\" data-id=\"E03uUp\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-R1KfEg\">\n<div class=\"accordion-item guten-LBjIvC\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Effective Response to Ransomware Attacks: The Crucial Role of Digital Forensics<br><br>September 2025<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p class=\"has-startupzy-primary-color has-text-color has-link-color wp-elements-0aaad6757da4ba8a67f43e08250c152c\"><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/09\/Effective-Response-to-Ransomware-Attacks-The-Crucial-Role-of-Digital-Forensics-Eng.pdf\" title=\"Effective Response to Ransomware Attacks \u2013 The Crucial Role of Digital Forensics \u2013 Eng\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-sd5b6R\"><div class=\"guten-column-wrapper\" data-id=\"sd5b6R\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-0XgCz1\">\n<div class=\"accordion-item guten-iGAZFm\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Vehicle Forensics: Unlocking the Secrets Hidden in Your Car<br><br>January 2025<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/01\/Vehicle-Forensics-Unlocking-the-Secrets-Hidden-in-Your-Car.pdf\" title=\"Vehicle Forensics \u2013 Unlocking the Secrets Hidden in Your Car\">English Version<\/a><\/p>\n\n\n\n<div class=\"guten-element guten-spacer guten-kZT5i4\"><\/div>\n\n\n\n<figure class=\"wp-block-audio alignleft\"><audio controls src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/02\/Vehicle-Forensics-Unlocking-the-Secrets-Hidden-in-Your-Car.mp3\"><\/audio><figcaption class=\"wp-element-caption\">Audio Version<\/figcaption><\/figure>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-saB163\"><div class=\"guten-column-wrapper\" data-id=\"saB163\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-fRXLky\">\n<div class=\"accordion-item guten-ZpYE3Q\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Understanding E-Discovery: Key Differences from Traditional Digital Forensics<br><br>January 2025<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/01\/Understanding-E-Discovery-Key-Differences-from-Traditional-Digital-Forensics.pdf\" title=\"Understanding E-Discovery-Key Differences from Traditional Digital Forensics\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"2DOpeY\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-2DOpeY layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-EfnIdQ\"><div class=\"guten-column-wrapper\" data-id=\"EfnIdQ\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-JzQ4yG\">\n<div class=\"accordion-item guten-4PwYKZ\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Understanding the Current Ransomware Attacks on ESXi Servers<br><br>August 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/Understanding-the-Current-Ransomware-Attacks-on-ESXi-Servers.pdf\" title=\"Understanding the Current Ransomware Attacks on ESXi Servers\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-LlqFUA\"><div class=\"guten-column-wrapper\" data-id=\"LlqFUA\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-MppnTZ\">\n<div class=\"accordion-item guten-CjPIwn\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">How PWA Technology Can Steal Banking Login Credentials from iOS and Android Phones<br><br>August 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/How-PWA-Technology-Can-Steal-Banking-Login-Credentials-from-iOS-and-Android-Phones.pdf\" title=\"How PWA Technology Can Steal Banking Login Credentials from iOS and Android Phones\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-tw08Fa\"><div class=\"guten-column-wrapper\" data-id=\"tw08Fa\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-BXXOv1\">\n<div class=\"accordion-item guten-YZ4aBq\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Mobile Forensics &#8211; Unlocking Critical Evidence<br><br>August 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/08\/Mobile-Forensics-Unlocking-Critical-Evidence.pdf\" title=\"\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"UNXZKx\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-UNXZKx layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-X3JWR8\"><div class=\"guten-column-wrapper\" data-id=\"X3JWR8\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-JOj6e6\">\n<div class=\"accordion-item guten-uvETUt\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Preventing Business Email Fraud<br><br>June 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/06\/Preventing-Business-Email-Fraud-Eng.pdf\" title=\"Preventing Email Bank Transfer Fraud-Eng\">English Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-ljVtzM\"><div class=\"guten-column-wrapper\" data-id=\"ljVtzM\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-ifeMEd\">\n<div class=\"accordion-item guten-cClqWg\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">The Challenges of Private Phones in the Workplace<br><br>May 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/05\/The-Challenges-of-Private-Phones-in-the-Workplace-Eng.pdf\" title=\"The-Challenges-of-Private-Phones-in-the-Workplace-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<div class=\"guten-element guten-spacer guten-S9zOJ3\"><\/div>\n\n\n\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2025\/02\/The-Challenges-of-Private-Phones-in-the-Workplace.mp3\"><\/audio><figcaption class=\"wp-element-caption\">Audio Version<\/figcaption><\/figure>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-GpEZ7c\"><div class=\"guten-column-wrapper\" data-id=\"GpEZ7c\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-KlW9kM\">\n<div class=\"accordion-item guten-gDiRaS\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Exploring the Various Types of Crypto Wallets A Comprehensive Guide <br><br>March 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Exploring-the-Various-Types-of-Crypto-Wallets-A-Comprehensive-Guide-Eng.pdf\" title=\"Exploring-the-Various-Types-of-Crypto-Wallets-A-Comprehensive-Guide-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Exploring-the-Various-Types-of-Crypto-Wallets-A-Comprehensive-Guide-TH.pdf\" title=\"Exploring-the-Various-Types-of-Crypto-Wallets-A-Comprehensive-Guide-TH.pdf\">Thai Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>\n\n\n\n<div class=\"section-wrapper\" data-id=\"9VS997\"><section class=\"wp-block-gutenverse-section guten-element guten-section guten-9VS997 layout-boxed align-stretch\"><div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-nq5pxZ\"><div class=\"guten-column-wrapper\" data-id=\"nq5pxZ\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-g5PWZa\">\n<div class=\"accordion-item guten-6ZOBqn\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Forming an Incident Response Team A Step-by-Step Guide <br><br>February 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Forming-an-Incident-Response-Team-A-Step-by-Step-Guide-Eng.pdf\" title=\"Forming-an-Incident-Response-Team-A-Step-by-Step-Guide-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Forming-an-Incident-Response-Team-A-Step-by-Step-Guide-TH.pdf\" title=\"Forming-an-Incident-Response-Team-A-Step-by-Step-Guide-TH.pdf\">Thai Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-E5T57S\"><div class=\"guten-column-wrapper\" data-id=\"E5T57S\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-UJShyl\">\n<div class=\"accordion-item guten-Zwjvx4\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">Understanding the Chain of Custody and its Relevance in Handling Electronic Evidence <br><br>February 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Understanding-the-Chain-of-Custody-and-its-Relevance-in-Handling-Electronic-Evidence-Eng.pdf\" title=\"Understanding-the-Chain-of-Custody-and-its-Relevance-in-Handling-Electronic-Evidence-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/Understanding-the-Chain-of-Custody-and-its-Relevance-in-Handling-Electronic-Evidence-TH.pdf\" title=\"Understanding-the-Chain-of-Custody-and-its-Relevance-in-Handling-Electronic-Evidence-TH.pdf\">Thai Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-mS6GY3\"><div class=\"guten-column-wrapper\" data-id=\"mS6GY3\">\n<div class=\"guten-element guten-accordions-wrapper\"><div class=\"guten-accordions guten-u1obCQ\">\n<div class=\"accordion-item guten-zmjDaG\"><div class=\"accordion-heading\"><div class=\"accordion-icon\"><span class=\"accordion-icon-open\"><i class=\"fas fa-minus\"><\/i><\/span><span class=\"accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span><\/div><span class=\"accordion-text\">The Latest Cybercrime Trends in Thailand &#8211; Staying Vigilant in the Digital Age<br><br>February 2024<\/span><\/div><div class=\"accordion-body\"><div class=\"accordion-content\">\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/The-Latest-Cybercrime-Trends-in-Thailand-Staying-Vigilant-in-the-Digital-Age-Eng.pdf\" title=\"The-Latest-Cybercrime-Trends-in-Thailand-Staying-Vigilant-in-the-Digital-Age-Eng.pdf\">English Version<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/icmscyber.com\/wp-content\/uploads\/2024\/03\/The-Latest-Cybercrime-Trends-in-Thailand-Staying-Vigilant-in-the-Digital-Age-TH.pdf\" title=\"The-Latest-Cybercrime-Trends-in-Thailand-Staying-Vigilant-in-the-Digital-Age-TH.pdf\">Thai Version<\/a><\/p>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/section><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-1238","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages\/1238","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/comments?post=1238"}],"version-history":[{"count":0,"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/pages\/1238\/revisions"}],"wp:attachment":[{"href":"https:\/\/icmscyber.com\/ja\/wp-json\/wp\/v2\/media?parent=1238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}