{"id":7061,"date":"2024-03-26T10:16:34","date_gmt":"2024-03-26T09:16:34","guid":{"rendered":"https:\/\/thesitsgroup.com\/__trashed\/"},"modified":"2024-05-10T13:06:54","modified_gmt":"2024-05-10T11:06:54","slug":"__trashed","status":"publish","type":"page","link":"https:\/\/sits.friendventure.dev\/nl\/__trashed\/","title":{"rendered":"Risk Management &#038; Assessment"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Riskmanagement.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Riskmanagement.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Riskmanagement-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Riskmanagement-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Riskmanagement-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Riskmanagement-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_Riskmanagement-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Identifying, Assessing and Preventing Threats \n                <\/div>\n                <h1 class=\"header_headline headline h2\">\n                    Risk Management &amp; Assessment \n                    <div class=\"slider_margin_left h2\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#contact\" class=\"btn-text\">Contact Us<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h2 class=\"summary-headline headline h2\">Closing the Gaps and Minimizing the Risks<\/h2>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>\"Work from anywhere\" and cloud-based working environments open up completely new attack vectors for cyber criminals. Attacks on companies' IT systems can lead to production outages, loss of trust, sanctions and therefore high costs. It is therefore important to prevent risks and comply with current security standards.<\/p>\n<p>Risk Management &amp; Assessment allows company IT threats to be analyzed, assessed and evaluated. Good management includes the following elements:<\/p>\n<ul>\n<li><strong>Assessment of the current status: <\/strong>Identification of vulnerabilities and identification and implementation of compliance requirements and guidelines<\/li>\n<li><strong>Cyber security roadmap: <\/strong>development of a roadmap for regular assessments of the IT infrastructure, 360\u00b0 analysis in the form of a managed service and training programs for employees<\/li>\n<li><strong>Implementation of emergency plans: <\/strong>clearly defined processes for all areas of the company as part of business continuity management in order to maintain ongoing business operations in the case of an emergency<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n                            <div class=\"summary-quote-btn btn-wrapper\">\n                    <div class=\"btn\">\n                        <a href=\"#contact\" class=\"btn-text\" title=\"\">\n                            Talk to our experts                        <\/a>\n                        <div><\/div>\n                    <\/div> \n                <\/div>\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h3  class=\"h2 smx-headline \">Expect the Unexpected<\/h3>[vc_column_text]<\/p>\n<div class=\"subheadline\">Identify unknown vulnerabilities at an early stage<\/div>\n<p>[\/vc_column_text][vc_column_text]Employees working from remote offices, data in the cloud, networked IT structures: these are just some of the many exposed paths that enable attacks on a company's business processes. Risk Management &amp; Assessment helps to assess and evaluate these and other threats and initiate preventive countermeasures.[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"text-image-slider_wrapper clr-primary\">\n        <div class=\"text-image-slider_arrows\">\n            <div class=\"text-image-slider_prev\"><\/div>\n            <div class=\"text-image-slider_next\"><\/div>\n        <\/div>\n    <div class=\"text-image-slider_nav\">\n                                    <div class=\"text-image-slider_nav-single  active\">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step1.svg\" alt=\"icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">What is Risk Management?<\/div>\n                <\/div>\n                                                <div class=\"text-image-slider_nav-single \">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step2.svg\" alt=\"Icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">Top Reasons for Risk Management<\/div>\n                <\/div>\n                                                <div class=\"text-image-slider_nav-single \">\n                    <div class=\"text-image-slider_nav-image\"><img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Step3.svg\" alt=\"Icon\"><\/div>\n                    <div class=\"text-image-slider_nav-title boxheadline\">This is what Risk Management is about<\/div>\n                <\/div>\n                        <\/div>\n    <div class=\"text-image-slider_container\">\n                                    <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement_Riskmanagement.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Identification and evaluation of potential vulnerabilities in your IT                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            Risk management in the field of cyber security means identifying, assessing and controlling digital risks such as vulnerabilities in the infrastructure and among employees, as well as liability and compliance issues.<\/p>\n<p>Careful preparation for an emergency is crucial: this enables companies to reduce serious consequences of attacks such as operational downtime or financial losses, but also to mitigate minor disruptions to operational processes.<\/p>\n<p>The development of risk management processes includes employees, the IT infrastructure and the company's internal processes. Security assessments such as penetration tests are also required to proactively identify and eliminate vulnerabilities.                        <\/div>\n                    <\/div>\n                <\/div>\n                                               <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Riskmanagement.jpg\" alt=\"BILD\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Top motivations for Risk Management                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            1. Strategic preparation for security threats: With over 23,000 new vulnerabilities discovered each year, endpoints, cloud solutions and networks are more vulnerable than ever. This applies to employees, partners and all of a company's technologies.<\/p>\n<p>2. Standards and laws as a strategic compass: Active risk management, anchored in international standards such as NIS2, ISO 27001 or PCI DSS , forms the backbone of corporate management and supports strategic alignment. However, non-compliance with regulations leads to sanctions and unforeseeable financial consequences.<\/p>\n<p>3. Emergency processes: In the event of a cyber attack, predefined processes must take effect and employees must be able to act immediately.<\/p>\n<p>4. Comprehensive risk assessment: This raises awareness of cyber security throughout the company and promotes preventive behavior to strengthen security.                        <\/div>\n                    <\/div>\n                <\/div>\n                                               <div class=\"text-image-slide\">\n                    <div class=\"text-image-slide_image\">\n                        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" alt=\"Image\">\n                    <\/div>\n                    <div class=\"text-image-slide_contents\">\n                        <div class=\"text-image-slide_headline headline h4\">\n                            Successful Risk Management solutions consist of:                        <\/div>\n                        <div class=\"text-image-slide_text\">\n                            1. Detection of vulnerabilities: The RMA identifies security flaws in the IT infrastructure and prepares a risk assessment, recommendations for action and regular reports. Pentesting and red teaming are also used to systematically identify IT security risks.<\/p>\n<p>2. Compliance checks: These ensure compliance with IT security standards, such as ISO standards or NIS.<\/p>\n<p>3. Business continuity in an in an emergency: During and after an attack, business continuity teams ensure the smooth continuation of business operations.<\/p>\n<p>4. Awareness training: Phishing simulations and other awareness training courses sharpen employees' security awareness and are designed to test human factors.                        <\/div>\n                    <\/div>\n                <\/div>\n                       <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"process-slider_wrapper\">\n    <div class=\"process-slider_container\">\n        <div class=\"process-slider_header\">\n            <div class=\"process-slider_headline h2 headline\">Risk towards zero with Risk Management<\/div>\n            <div class=\"process-slider_subheadline subheadline\">Four phases to be prepared for risks<\/div>\n        <\/div>\n        <div class=\"process-slider_inner\">\n            <div class=\"process-slider_navigation-wrapper size--4\">\n                <div class=\"process-slider_navigation\">\n                                            <div class=\"process-slider_nav-single  active\">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                             <div class=\"process-slider_nav-headline subheadline\">Initial Consulting<\/div>\n                            \n                            \n                        <\/div>\n                                            <div class=\"process-slider_nav-single \">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                             <div class=\"process-slider_nav-headline subheadline\">360\u00b0 Vulnerability Scans<\/div>\n                            \n                            \n                        <\/div>\n                                            <div class=\"process-slider_nav-single \">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                            <div class=\"process-slider_nav-topheadline subheadline\"><\/div>\n                                <div class=\"process-slider_nav-headline subheadline\">Establishing an Emergency Plan<\/div>\n                            \n                            \n                        <\/div>\n                                            <div class=\"process-slider_nav-single \">\n                            <div class=\"process-slider_nav-icon\"\n                                style=\"mask-image:url();-webkit-mask-image:url()\"\n                            ><\/div>\n\n                                                            <div class=\"process-slider_nav-topheadline subheadline\"><\/div>\n                                <div class=\"process-slider_nav-headline subheadline\">24\/7 Managed Service & Reportings<\/div>\n                            \n                            \n                        <\/div>\n                                        <div class=\"process-slider_timeline\">                             <div class=\"process-slider_timeline-step active\">\n                                <div class=\"subheadline\">1<\/div>\n                            <\/div>\n                                                    <div class=\"process-slider_timeline-step\">\n                                <div class=\"subheadline\">2<\/div>\n                            <\/div>\n                                                    <div class=\"process-slider_timeline-step\">\n                                <div class=\"subheadline\">3<\/div>\n                            <\/div>\n                                                    <div class=\"process-slider_timeline-step\">\n                                <div class=\"subheadline\">4<\/div>\n                            <\/div>\n                                                <div class=\"process-slider_timeline-line\">\n                            <div class=\"process-slider_timeline-line_left\"><\/div>\n                            <div class=\"process-slider_timeline-line_right\"><\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n                <div class=\"process-slider_arrows\">\n                    <div class=\"process-slider_prev\"><\/div>\n                    <div class=\"process-slider_next\"><\/div>\n                <\/div>\n            <\/div>\n            <div class=\"process-slider_caret\">\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\"><\/div>\n                        <div class=\"process-slider_headline h4\">Initial Consulting<\/div>\n                        <div class=\"process-slider_content\">Straightforward initial consultation and assessment of the vulnerabilities of the IT infrastructure with prioritized recommendations. This is followed by the development of a comprehensive roadmap for implementing the necessary countermeasures.<\/div>\n                                            <\/div>\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\"><\/div>\n                        <div class=\"process-slider_headline h4\">360\u00b0 Vulnerability Scans<\/div>\n                        <div class=\"process-slider_content\">Simulated attacks on the company's infrastructure - both digital and physical, if desired - reveal potential vulnerabilities in networks, applications, apps and devices. IT is subjected to a comprehensive endurance test.\n\nThe SITS experts protect companies today from the threats of tomorrow - and also adopt the hacker perspective. SITS consulting also includes support with professional software solutions that identify and prevent attack vectors in the IT infrastructure.<\/div>\n                                            <\/div>\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\"><\/div>\n                        <div class=\"process-slider_headline h4\">Establishing an Emergency Plan<\/div>\n                        <div class=\"process-slider_content\">Companies can only respond quickly and appropriately to an incident or IT emergency with a well designed emergency management system. This is how we set up reliable business continuity management:\n<ul>\n<li>In our workshops, we introduce the topic and analyze the current state of the company's IT.<\/li>\n<li>We identify and secure critical business processes and IT assets.<\/li>\n<li>We set up emergency simulations.<\/li>\n<li>We create structures to rebuild the IT systems. <\/li>\n<\/ul>\nWe comply with international standards such as BSI 200-4 and ISO 22301.\n<\/div>\n                                            <\/div>\n                                    <div class=\"process-slider_contents\">\n                        <div class=\"process-slider_subheadline boxheadline\"><\/div>\n                        <div class=\"process-slider_headline h4\">24\/7 Managed Service & Reportings<\/div>\n                        <div class=\"process-slider_content\">After implementation, 24\/7 operation starts to secure your business IT. Our specialist teams provide training, continuously monitor your IT for vulnerabilities and are available immediately in the event of an emergency. The service also includes the provision of regular reports and guidance. <\/div>\n                                            <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-xs\"><\/div>\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\" full_width=\"stretch_row_content_no_spaces\"][vc_column]<div class=\"quote_section\" >\n        <div class=\"quote_section_background\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"850\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory.png\" class=\"fullWidthImg_background\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory.png 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-300x100.png 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-1024x341.png 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-768x256.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-1536x512.png 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/ContactPersonBreaker_Assessmentandadvisory-2048x683.png 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>        <div class=\"bg_filter\"><\/div>\n    <\/div>\n    <div class=\"quote_section_content\">\n        <div class=\"quote_section_content_inner\">\n                            <div class=\"quote h2 custom_icon\">\n                                            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/04\/Quote-Icon.png\" class=\"zitate_icon\" alt=\"\">\n                                        Security just one click away!                <\/div>\n                <div class=\"quote_person_block\">\n                    <div class=\"quote_person_img\">\n                                            <\/div>\n                                            <div class=\"quote_person_text\">\n                            <div class=\"quote_autor\">\n                                Our experts for Assessment &amp; Advisory will be at your side: From penetration tests to compliance - we build tailor-made strategies to take your IT security to the next level.                            <\/div>\n                                                    <\/div>\n                                    <\/div>\n                                    <div class=\"quote_button btn-wrapper\">\n                        <div class=\"btn\">\n                            <a href=\"#contact\"\n                               target=\"_blank\"\n                               class=\"btn-text\">Contact Us<\/a>\n                            <div><\/div>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n    <\/div>\n    <\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-xs\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n            <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/fighting-ai-attacks-how-to-protect-data-and-systems\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2550\" height=\"1419\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI.jpg 2550w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-300x167.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1024x570.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-768x427.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-1536x855.jpg 1536w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Header_SecureAI-2048x1140.jpg 2048w\" sizes=\"auto, (max-width: 2550px) 100vw, 2550px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Fighting AI attacks: How to protect data and systems                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/iso-27001-zertifizierung-ohne-umwege\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory8-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            ISO 27001 Certification without delay                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/managed-services-to-counter-the-shortage-of-manpower\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement3_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Managed Services to counter the shortage of manpower                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/workload-security-with-sase-this-is-how-it-works\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/SecurityITSolutions1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Security &amp; IT Solutions<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Workload Security with SASE, this is how it works                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/devops-security-stress-test-for-culture-and-technology\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_CPS-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            DevOps security: Stress test for culture and technology                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/biometrics-better-security-without-passwords\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/IAM1-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Biometrics - better security without passwords?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/threat-intelligence-knowledge-is-power-security\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_Cyber_Defense-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Threat Intelligence - Knowledge is power & security                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/nis2-iso-iec-270012022-new-controls-to-fulfill-both-standards\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Recover1_NIS2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & ISO\/IEC 27001:2022: New controls to fulfill both standards                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/how-preferred-access-management-increases-security\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1193\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM.jpg 1193w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-249x300.jpg 249w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-848x1024.jpg 848w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/FAQ-Element_IAM-768x927.jpg 768w\" sizes=\"auto, (max-width: 1193px) 100vw, 1193px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Identity &amp; Access Management<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            How Privileged Access Management increases security                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/vciso-more-it-security-through-customizable-support\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/AssessmentAdvisory2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            vCISO - more IT Security through customizable support                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/ai-from-microsoft-is-your-company-copilot-ready\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement1_CPS-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div><div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            AI from Microsoft: Is your company Copilot Ready?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/nis2-risk-management-are-cyber-risks-really-manageable\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Protect2_NIS2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>NIS2<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            NIS2 & Risk Management: Are cyber risks really manageable?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/protective-shield-for-your-cloud-platforms-tips-tricks-pitfalls\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CloudPlatform2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cloud Platform Security<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Protective shield for your cloud platforms: Tips, Tricks, Pitfalls                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/security-all-rounder-ciso-outsource-or-hire-yourself\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Challenge_VulnerabilityScanning-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Assessment &amp; Advisory<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Security all-rounder CISO: Outsource or hire yourself?                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/management-of-cyber-security-risks-in-industrial-iot-and-ot\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"805\" height=\"1435\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2.jpg 805w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-168x300.jpg 168w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-574x1024.jpg 574w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/03\/CyberDefense2-768x1369.jpg 768w\" sizes=\"auto, (max-width: 805px) 100vw, 805px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>Cyber Defense<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Management of cyber security risks in industrial IoT and OT                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/nl\/blog\/ai-generated-deepfakes-attack-on-democracy-and-the-global-economy\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/WhyElement2_Cyber_Defense-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                <div class='cat_item'>AI<\/div>            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                Blog                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            AI-generated deepfakes - attack on democracy and the global economy                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column][vc_column_text]<\/p>\n<div class=\"headline h2\" style=\"text-align: center;\">The SITS Services<\/div>\n<div class=\"subheadline\" style=\"text-align: center;\">Risk Management &amp; Assessment<\/div>\n<div class=\"text\" style=\"text-align: center;\">From dealing with hidden threats to employee training and secure emergency management: SITS Risk Management &amp; Assessment closes security gaps before they lead to problems and ensures maximum security.<\/div>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-6 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/assessment-advisory\/vulnerability-scan\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Vulnerability Scan as a Service                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our Vulnerability Scan provides continuous monitoring and assessment of the security of your network resources.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read More                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/assessment-advisory\/attack-path-management\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Attack Path Management                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    A new approach to cyber threats: Our Attack Path Service automatically uncovers vulnerabilities, checks and evaluates attack paths, identifies risks and supports you in solving them.                                 <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"\/nl\/assessment-advisory\/pentesting\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Pentesting                                 <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our exposure management teams uncover vulnerabilities from the point of view of hackers. This enables them to identify gaps and solve security problems quickly and reliably.                                 <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/assessment-advisory\/business-continuity-management\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Business Continuity Management                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Cyber attacks lead to high risks and costs. The implementation of our business continuity management protects your IT with clearly defined processes. We follow international standards such as BSI 200-4 and ISO 22301.                                <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-5  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            05\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                             <a href=\"https:\/\/sits.com\/nl\/assessment-advisory\/security-awareness\/\">                                <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Phishing Simulation & Awareness                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Test and train your staff's knowledge on phishing attacks! Due to rising phishing rates, it is becoming increasingly important to sensitize employees to this form of attack.                                 <\/div>\n                                                                    <div class=\"iconbox--link\">\n                                        Read more                                    <\/div>\n                                                                                                <\/a>                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-6  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            06\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                                                    <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Red Teaming                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Our \"Red Teaming\" experts simulate targeted attacks on your IT infrastructure and test whether existing defensive measures can withstand real cyber attacks and whether they are identified in a timely manner.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <h4 class=\"h2 smx-headline\">\n            Your Advantages        <\/h4>\n    <\/div>\n    <div class=\"subheadline\">\n        Risk-free Security    <\/div>\n    <div class=\"text\">\n        The SITS experts will analyze and secure your company's IT infrastructure for you. Our \"Risk &amp; Assessment\" services include:<\/p>\n<ul>\n<li>24\/7\/365 prevention and assessments by experienced professionals and with approved solutions<\/li>\n<li>Full compliance: NIS2, PCI DSS and HIPAA require regular vulnerability scans to protect sensitive data.<\/li>\n<li>Save time and resources - so you can focus on what you know and do best: Your business<\/li>\n<li>Access to our specialist team: Our security experts reduce downtime and save your company internal costs.<\/li>\n<li>Safety net for emergencies: Our BCM also ensures that your business operations are maintained or restored in the event of an emergency or crisis.<\/li>\n<\/ul>\n<p>    <\/div>\n                <div class=\"btn-wrapper\">\n                <div class=\"btn \">\n                    <a href=\"#contact\" class=\"btn-text\" target=\"_blank\">Contact us<\/a>\n                    <div><\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"1334\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_Riskmanagement.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_Riskmanagement.jpg 1334w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_Riskmanagement-278x300.jpg 278w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_Riskmanagement-949x1024.jpg 949w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/TextElement_Riskmanagement-768x829.jpg 768w\" sizes=\"auto, (max-width: 1334px) 100vw, 1334px\" \/>    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"contact\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Your digital stronghold is just a click away.        <\/div>\n        <div class=\"subheadline\">\n            Contact us for customized security strategies.        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    region: 'eu1',\n    portalId: '26142091',\n    formId: 'b51d36e8-4e12-471c-8239-84c3e1b517fe'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_AssessmentAdvisory-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Jonas Fischer                    <\/div>\n                                            <div class=\"person_description\">\n                            Account Manager, SITS Group                        <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row enable_black_background_for_row=\"yes\"][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; el_id=&#8221;header&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] Identify unknown vulnerabilities at an early stage [\/vc_column_text][vc_column_text]Employees working from remote offices, data in the cloud, networked IT structures: these are just some of the many exposed paths that enable attacks on a company&#8217;s business processes. Risk Management &amp; Assessment helps to assess and evaluate these and other threats and initiate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-7061","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Risk Management &amp; Assessment | SITS<\/title>\n<meta name=\"description\" content=\"Risk Management &amp; Assessment \u00bb Jetzt informieren!\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk Management &amp; Assessment | SITS\" \/>\n<meta property=\"og:description\" content=\"Risk Management &amp; Assessment \u00bb Jetzt informieren!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/nl\/__trashed\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-10T11:06:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/__trashed\/\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/__trashed\/\",\"name\":\"Risk Management & Assessment | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\"},\"datePublished\":\"2024-03-26T09:16:34+00:00\",\"dateModified\":\"2024-05-10T11:06:54+00:00\",\"description\":\"Risk Management & Assessment \u00bb Jetzt informieren!\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/__trashed\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/nl\/__trashed\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/__trashed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk Management &#038; Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risk Management & Assessment | SITS","description":"Risk Management & Assessment \u00bb Jetzt informieren!","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"nl_NL","og_type":"article","og_title":"Risk Management & Assessment | SITS","og_description":"Risk Management & Assessment \u00bb Jetzt informieren!","og_url":"https:\/\/sits.friendventure.dev\/nl\/__trashed\/","og_site_name":"SITS","article_modified_time":"2024-05-10T11:06:54+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"7 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/nl\/__trashed\/","url":"https:\/\/sits.friendventure.dev\/nl\/__trashed\/","name":"Risk Management & Assessment | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#website"},"datePublished":"2024-03-26T09:16:34+00:00","dateModified":"2024-05-10T11:06:54+00:00","description":"Risk Management & Assessment \u00bb Jetzt informieren!","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/nl\/__trashed\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/nl\/__trashed\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/nl\/__trashed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/nl\/"},{"@type":"ListItem","position":2,"name":"Risk Management &#038; Assessment"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/nl\/#website","url":"https:\/\/sits.friendventure.dev\/nl\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/nl\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages\/7061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/comments?post=7061"}],"version-history":[{"count":1,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages\/7061\/revisions"}],"predecessor-version":[{"id":14448,"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/pages\/7061\/revisions\/14448"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/nl\/wp-json\/wp\/v2\/media?parent=7061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}