{"id":977,"date":"2020-06-25T15:09:15","date_gmt":"2020-06-25T13:09:15","guid":{"rendered":"https:\/\/fin2ition.nl\/ciso-as-a-service\/"},"modified":"2020-06-25T15:09:15","modified_gmt":"2020-06-25T13:09:15","slug":"ciso-as-a-service","status":"publish","type":"page","link":"https:\/\/fin2ition.nl\/en\/cyber-security\/ciso-as-a-service\/","title":{"rendered":"CISO as a Service"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><script type=\"text\/javascript\">jQuery(function() { _initLayerSlider( '#layerslider_24_1vj9m3f4yvf1', {sliderVersion: '6.7.6', responsiveUnder: 950, layersContainer: 0, allowFullscreen: true, slideBGSize: 'auto', hideUnder: 0, hideOver: 100000, pauseOnHover: 1, twoWaySlideshow: true, skin: 'noskin', sliderFadeInDuration: 350, globalBGColor: '#ffffff', useSrcset: true, skinsPath: 'https:\/\/fin2ition.nl\/wp-content\/plugins\/LayerSlider\/assets\/static\/layerslider\/skins\/', performanceMode: true}); });<\/script><link href=\"https:\/\/fonts.googleapis.com\/css?family=Antic+Slab:100,100i,200,200i,300,300i,400,400i,500,500i,600,600i,700,700i,800,800i,900,900i\" rel=\"stylesheet\"><div id=\"layerslider_24_1vj9m3f4yvf1\"  class=\"ls-wp-container fitvidsignore ls-selectable\" style=\"width:950px;height:275px;margin:0 auto;margin-bottom: 20x;\"><div class=\"ls-slide\" data-ls=\"duration:4000;\"><img decoding=\"async\" width=\"975\" height=\"275\" src=\"https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/CISOv2.jpg\" class=\"ls-bg\" alt=\"\" srcset=\"https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/CISOv2-200x56.jpg 200w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/CISOv2-300x85.jpg 300w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/CISOv2-400x113.jpg 400w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/CISOv2-600x169.jpg 600w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/CISOv2-768x217.jpg 768w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/CISOv2-800x226.jpg 800w, https:\/\/fin2ition.nl\/wp-content\/uploads\/2020\/06\/CISOv2.jpg 975w\" sizes=\"(max-width: 975px) 100vw, 975px\" \/><p style=\"padding-top:10px;padding-right:10px;padding-bottom:10px;padding-left:10px;font-family:Antic Slab;font-size:35px;color:#ffffff;background:#85b815;top:100px;left:66px;white-space:normal;\" class=\"ls-l ls-text-layer\" data-ls=\"offsetxin:right;fadein:false;scalexin:1.0;scaleyin:1.0;offsetxout:right;fadeout:false;scalexout:1.0;scaleyout:1.0;parallaxlevel:0;\">CISO as a Service<\/p><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-first\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p class=\"p1\"><span class=\"s1\">The Chief Information Security Officer (CISO) is the focal point in any organisation when it comes to protecting the valuable data that flows through the organisation. This very broad role requires both strategic and management skills to support business goals as well as a good understanding of today\u2019s technical developments and how to use them to the organisation\u2019s advantage in protecting the core information assets.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In a globally connected society, cyber security is a top priority for many businesses and organizations. Corporations are not only working to protect themselves, their staff, and their customers from a variety of hazards and criminal threats but are also concerned about the integrity and availability of their information systems.<\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-one-third\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );margin-right: 4%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><p class=\"p1\"><span class=\"s1\">The role of a CISO has extended and has changed. It is increasingly hard get one person and keep them connected to the organisation, who has the breath of exposure and knowledge to bring together and react to:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\">Threats and countermeasures given the constant evolution, as this has become diverse and complex- in technology, people, and process<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Compliance needs as compliance and privacy are complex and evolving<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Cross border issues, where multinational compliance requirements and internal operating standards can interfere, while relying on a stable provisioning of IT services.<\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">There is an alternative to seeking the needle in the haystack and going for that \u2018perfect fit\u2019 CISO. Using a \u201cCISO as a Service\u201d approach will support your organisation in reaching its cyber security goals while not relying on the knowledge and experience of only one person. Let FIN2ITion support you on this important role. <\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-one-third fusion-column-last\" style=\"--awb-bg-size:cover;width:33.333333333333%;width:calc(33.333333333333% - ( ( 4% + 4% ) * 0.33333333333333 ) );\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\"><p class=\"p1\"><span class=\"s1\">It will give you a single access point for your organisation to a balanced network of cyber security specialists with a global reach, offering our services anywhere, focusing on Europe, the UK &amp; USA. While knowledgeable in all key domains, in a rounded way, we know:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>Security<\/b> domains including areas we commonly see very quick changes <span class=\"Apple-converted-space\">\u00a0 <\/span>\u2013 Cloud, End User Computing, and Identity<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\"><b>Frameworks and compliance standards<\/b>, and can make it work in practice like CobIT, ISO 27K, PCI-DSS as well as country (Dutch) specific frameworks like BIO, ROSA, NEN7510 etc. <\/span><\/li>\n<li class=\"li1\"><span class=\"s1\"><b>Privacy<\/b> (GDPR)\u2013 Certified to the highest level by the International Association of Privacy Professionals. <\/span><\/li>\n<li class=\"li1\"><span class=\"s1\"><b>Technology<\/b> \u2013 Our core team holds over 40 technical certifications as well as over 30 security, architecture, and framework certifications.<\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">For more information go to contact page for information on how <a href=\"https:\/\/fin2ition.nl\/contact\/\">to engage us<\/a>.<\/span><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"parent":973,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-977","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/pages\/977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/comments?post=977"}],"version-history":[{"count":0,"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/pages\/977\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/pages\/973"}],"wp:attachment":[{"href":"https:\/\/fin2ition.nl\/en\/wp-json\/wp\/v2\/media?parent=977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}