{"id":10808,"date":"2024-03-27T11:18:25","date_gmt":"2024-03-27T10:18:25","guid":{"rendered":"https:\/\/sits.com\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/"},"modified":"2024-11-22T11:34:07","modified_gmt":"2024-11-22T10:34:07","slug":"detecting-vulnerabilities-focus-on-risk-management-and-assessment","status":"publish","type":"post","link":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/","title":{"rendered":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]En vis grad af risikovillighed kan drive innovation, men i et forretningsmilj\u00f8 er det f\u00f8rst og fremmest n\u00f8dvendigt med fremadrettet planl\u00e6gning. Velplanlagt IT-risikostyring g\u00f8r det muligt for virksomheder at sikre, at de tr\u00e6ffer beslutninger om deres sikkerhedsressourcer p\u00e5 oplyst grundlag. I lyset af de stigende trusler, den tekniske og lovgivningsm\u00e6ssige udvikling bliver risikostyring mere og mere vigtig. If\u00f8lge KPMG m\u00e5ler ca. 72 % af virksomhederne regelm\u00e6ssigt deres cybersikkerhedsstatus p\u00e5 baggrund af KPI'er. Men kun en ud af fire virksomheder bruger Privileged Access Management (PAM) til at beskytte digitale identiteter, og kun en ud af tre virksomheder bruger SIEM (Security Incident and Event Management). En reorganisering af virksomhedens IT-risikostyring er derfor tilr\u00e5delig.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Risikovurderinger som grundlag for sikkerhed<\/h2>[vc_column_text]\"Frygtens bedre s\u00f8ster\u201d er forsigtighed, men \u201dmodets v\u00e6rre bror er overmod.\" Dette citat tilskrives den tyske iv\u00e6rks\u00e6tter Philip Rosenthal. Og han burde vide, hvad han talte om, for Rosenthal har brugt sit liv p\u00e5 at arbejde med skr\u00f8beligt materiale - glas og porcel\u00e6n. Men Rosenthals indsigt b\u00f8r ogs\u00e5 tjene som et vejledende princip for andre virksomheder, myndigheder og organisationer. N\u00e5r alt kommer til alt, kan IT-risici ikke vurderes og prioriteres tilstr\u00e6kkeligt uden kvantitative metoder. Resultatet er ineffektiv brug af ressourcer og utilstr\u00e6kkelig beskyttelse. Utilstr\u00e6kkelige risikovurderinger kan ogs\u00e5 f\u00f8re til \u00f8konomiske tab og skade p\u00e5 omd\u00f8mmet. I dag er IT-risikostyring mere end bare en \"nice to have\" - i tider med konstant nye cybertrusler er det et absolut must for enhver virksomhed, der \u00f8nsker at beskytte sine data, systemer, medarbejdere, partnervirksomheder og virksomhedsaktiver mod IT-risici p\u00e5 den mest effektive m\u00e5de.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Hvad er it-risiko?<\/h2>[vc_column_text]Hvert \u00e5r laver Allianz Risk Barometer en liste over de mest alvorlige forretningsrisici. Cyberh\u00e6ndelser ligger i \u00f8jeblikket p\u00e5 f\u00f8rstepladsen, efterfulgt af driftsforstyrrelser. If\u00f8lge unders\u00f8gelsen er omkostningerne ved et brud p\u00e5 datasikkerheden omkring 4,35 millioner amerikanske dollars og stigende. Effektiv it-risikostyring kan forhindre s\u00e5danne h\u00e6ndelser ved at identificere, vurdere, prioritere og afb\u00f8de potentielle trusler.[\/vc_column_text][vc_column_text]<strong>Top 8 st\u00f8rste it-risici, du b\u00f8r kende:<\/strong><\/p>\n<ol>\n<li><strong>Sikkerhedstrusler <\/strong>som hackerangreb, malware, phishing-angreb og uautoriseret adgang til f\u00f8lsomme data kan f\u00f8re til datatyveri, driftafbrydelser, \u00f8konomiske tab, sanktioner og skade p\u00e5 omd\u00f8mmet.<\/li>\n<li><strong>Str\u00f8mafbrydelser<\/strong>, <strong>naturkatastrofer, <\/strong>brande, oversv\u00f8mmelser eller andre farer kan skade it-infrastrukturen og forstyrre forretningsprocesserne.<\/li>\n<li><strong>System- eller netv\u00e6rksnedbrud <\/strong>og forstyrrelser i infrastrukturen for\u00e5rsager ogs\u00e5 uplanlagt nedetid, som p\u00e5virker driften, produktiviteten og kundetilfredsheden.<\/li>\n<li><strong>Datatab eller -korruption <\/strong>kan skyldes hardwarefejl, softwarefejl, menneskelige fejl eller ondsindede angreb. Det kan f\u00f8re til tab af vigtige forretnings- og kundedata eller intellektuel ejendom.<\/li>\n<li><strong>Nye teknologier som <\/strong>cloud computing, Internet of Things (IoT) eller kunstig intelligens kan udg\u00f8re en risiko for datasikkerhed og overholdelse af lovgivningen.<\/li>\n<li><strong>Manglende overholdelse af <\/strong>regler, databeskyttelseslove eller kontraktlige forpligtelser kan resultere i sanktioner, \u00f8konomiske b\u00f8der og retssager. For eksempel kr\u00e6ver NIS2, PCI DSS og HIPAA regelm\u00e6ssige s\u00e5rbarhedsscanninger for at beskytte f\u00f8lsomme data.<\/li>\n<li><strong>Afh\u00e6ngighed af tredjeparts producenter, <\/strong>leverand\u00f8rer eller serviceudbydere indeb\u00e6rer risici som serviceafbrydelser, databrud eller kontrakttvister.<\/li>\n<li><strong>Insidertrusler<\/strong>, <strong>menneskelige fejl, <\/strong>utilstr\u00e6kkelig tr\u00e6ning eller uagtsom medarbejderadf\u00e6rd kan f\u00f8re til datal\u00e6kager, uautoriseret adgang eller forkert h\u00e5ndtering af f\u00f8lsomme oplysninger.<\/li>\n<\/ol>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Hvad er risikovurdering og risikostyring?<\/h2>[vc_column_text]IT-risici henviser til sandsynligheden for uventede, negative forretningsresultater p\u00e5 grund af udnyttelse af s\u00e5rbarheder i hardware og software. En lang r\u00e6kke IT-risikostyringsmetoder kan bruges til at afb\u00f8de disse IT-trusler. Risikostyring er ikke en isoleret og selvst\u00e6ndig tilgang. I stedet involverer den mange forskellige procedurer, retningslinjer og v\u00e6rkt\u00f8jer til at identificere og m\u00e5le potentielle trusler og s\u00e5rbarheder i din it-infrastruktur. De er indbyrdes forbundne og b\u00f8r tilpasses til din virksomheds behov. Det f\u00f8rste skridt er altid risikovurderingen, dvs. den kvantitative og kvalitative evaluering af risici, efterfulgt af specifikke modforanstaltninger.[\/vc_column_text][vc_column_text]For at f\u00e5 en p\u00e5lidelig evaluering af it-risiciene i din virksomhed b\u00f8r du overveje disse <strong>fire hj\u00f8rnesten i risikovurderingen<\/strong>:<\/p>\n<ul>\n<li><strong>Trusler <\/strong>er alle situationer, handlinger eller h\u00e6ndelser, der kan kompromittere systemsikkerheden. Det kan v\u00e6re med vilje eller ved et uheld, f.eks. malwareangreb, udfald af enheder, menneskelige fejl og naturkatastrofer.<\/li>\n<li><strong>S\u00e5rbarheder <\/strong>er svagheder eller huller, som kriminelle udnytter til at stj\u00e6le f\u00f8lsomme oplysninger. Identifikationen af s\u00e5rbarheder i IT-systemer og angrebsmetoder rettet mod dem afg\u00f8r, hvor godt IT-risici kan minimeres.<\/li>\n<li><strong>Aktiver <\/strong>er et bredt begreb, der omfatter b\u00e5de software og hardware, lagrede data, it-sikkerhedsretningslinjer, brugerdata og endda individuelle filmapper, der indeholder f\u00f8lsomme data.<\/li>\n<li><strong>Omkostninger er den <\/strong>samlede skade, som en virksomhed kan lide som f\u00f8lge af en sikkerhedsh\u00e6ndelse - det v\u00e6re sig \u00f8konomisk, omd\u00f8mmem\u00e6ssigt eller i v\u00e6rste fald begge dele.<\/li>\n<\/ul>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<h2  class=\"h2 smx-headline \">Hvorfor er IT-risikostyring s\u00e5 vigtig?<\/h2>[vc_column_text]I sin benchmarkunders\u00f8gelse af risikostyring i 2023 opdagede Deloitte, at mindre end en tredjedel af de adspurgte virksomheder i \u00f8jeblikket opfylder kravene til et holistisk risikostyringssystem.\u00a0 I denne sammenh\u00e6ng viser en nylig unders\u00f8gelse fra Accenture, at risikostyring bliver stadig vigtigere for et stort antal virksomheder, da komplekse og indbyrdes forbundne risici opst\u00e5r stadig hurtigere. Dette blev sagt af 83 procent af de adspurgte. 77 procent sagde ogs\u00e5, at det bliver sv\u00e6rere at identificere og styre risici, og 72 procent var bekymrede for, at deres ekspertise inden for risikostyring ikke kunne holde trit med det hurtigt skiftende it-landskab.[\/vc_column_text][vc_column_text]IT-risikostyring, der er skr\u00e6ddersyet til nutidens krav, er derfor helt afg\u00f8rende:<\/p>\n<ul>\n<li>Konkurrence,<\/li>\n<li>beskyttelse af dine aktiver,<\/li>\n<li>sikre forretningskontinuitet,<\/li>\n<li>tilpasning til og overholdelse af lovgivningen,<\/li>\n<li>beskyttelse af din virksomheds omd\u00f8mme,<\/li>\n<li>optimering af omkostninger og ressourcer og<\/li>\n<li>at styrke tilliden hos alle interessenter.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text]For at beskytte din virksomheds oplysninger p\u00e5 en omfattende m\u00e5de og begr\u00e6nse det stigende antal risici er der ingen vej uden om skr\u00e6ddersyet risikostyring.[\/vc_column_text][vc_column_text]Detekteringssystemerne hos det uafh\u00e6ngige AV-TEST Institute opdager og analyserer 3,9 nye malwarepr\u00f8ver hvert sekund. Det betyder over 322.000 nye malware-varianter om dagen. IT-sikkerhedsh\u00e6ndelser for\u00e5rsaget af malwareangreb, datal\u00e6kager og cyberangreb kan p\u00e5virke tilliden hos kunder, partnere og offentligheden. Proaktiv risikostyring hj\u00e6lper med at minimere risikoen for s\u00e5danne h\u00e6ndelser og beskytte virksomhedens omd\u00f8mme. Ved at identificere og prioritere it-risici kan du ogs\u00e5 bruge ressourcerne mere effektivt og foretage m\u00e5lrettede investeringer i sikkerhedsmekanismer. Det hj\u00e6lper med at minimere potentielle skader og omkostninger i forbindelse med it-sikkerhedsh\u00e6ndelser.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]En vis grad af risikovillighed kan drive innovation, men i et forretningsmilj\u00f8 er det f\u00f8rst og fremmest n\u00f8dvendigt med fremadrettet planl\u00e6gning. Velplanlagt IT-risikostyring g\u00f8r det muligt for virksomheder at sikre, at de tr\u00e6ffer beslutninger om deres sikkerhedsressourcer p\u00e5 oplyst grundlag. I lyset af de stigende trusler, den tekniske og lovgivningsm\u00e6ssige udvikling bliver risikostyring mere og [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":10810,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[269],"tags":[],"class_list":["post-10808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-assessment-advisory-en-da"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments | SITS<\/title>\n<meta name=\"description\" content=\"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments | SITS\" \/>\n<meta property=\"og:description\" content=\"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-27T10:18:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-22T10:34:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1193\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ilackinger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"ilackinger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/\"},\"author\":{\"name\":\"ilackinger\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\"},\"headline\":\"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments\",\"datePublished\":\"2024-03-27T10:18:25+00:00\",\"dateModified\":\"2024-11-22T10:34:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/\"},\"wordCount\":1192,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg\",\"articleSection\":[\"Assessment &amp; Advisory\"],\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/\",\"name\":\"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg\",\"datePublished\":\"2024-03-27T10:18:25+00:00\",\"dateModified\":\"2024-11-22T10:34:07+00:00\",\"description\":\"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg\",\"width\":1193,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d\",\"name\":\"ilackinger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g\",\"caption\":\"ilackinger\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments | SITS","description":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"da_DK","og_type":"article","og_title":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments | SITS","og_description":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/","og_site_name":"SITS","article_published_time":"2024-03-27T10:18:25+00:00","article_modified_time":"2024-11-22T10:34:07+00:00","og_image":[{"width":1193,"height":1440,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg","type":"image\/jpeg"}],"author":"ilackinger","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"ilackinger","Estimeret l\u00e6setid":"5 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#article","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/"},"author":{"name":"ilackinger","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d"},"headline":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments","datePublished":"2024-03-27T10:18:25+00:00","dateModified":"2024-11-22T10:34:07+00:00","mainEntityOfPage":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/"},"wordCount":1192,"commentCount":0,"publisher":{"@id":"https:\/\/sits.friendventure.dev\/da\/#organization"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg","articleSection":["Assessment &amp; Advisory"],"inLanguage":"da-DK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/","url":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/","name":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg","datePublished":"2024-03-27T10:18:25+00:00","dateModified":"2024-11-22T10:34:07+00:00","description":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Assessmentandadvisory.jpg","width":1193,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/da\/blog\/detecting-vulnerabilities-focus-on-risk-management-and-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/da\/"},{"@type":"ListItem","position":2,"name":"Detektering af s\u00e5rbarheder: Fokus p\u00e5 risikostyring og -assessments"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/da\/#website","url":"https:\/\/sits.friendventure.dev\/da\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/da\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/1c8a57badeeb21935ae47de41016610d","name":"ilackinger","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/sits.friendventure.dev\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4374b5318c3e575f35b3cfa5e1c98e1d?s=96&d=mm&r=g","caption":"ilackinger"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/comments?post=10808"}],"version-history":[{"count":4,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10808\/revisions"}],"predecessor-version":[{"id":18128,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/posts\/10808\/revisions\/18128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/media\/10810"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/media?parent=10808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/categories?post=10808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/da\/wp-json\/wp\/v2\/tags?post=10808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}