{"id":2504,"date":"2022-01-11T10:39:16","date_gmt":"2022-01-11T09:39:16","guid":{"rendered":"https:\/\/agendarisk.no\/cybersecurity-and-information-security\/"},"modified":"2023-08-18T08:24:16","modified_gmt":"2023-08-18T06:24:16","slug":"cybersecurity-and-information-security","status":"publish","type":"page","link":"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/","title":{"rendered":"Cybersecurity and information security"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Split Section&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0px||0px|&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;4%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; module_class=&#8221; et_pb_row_fullwidth&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;0px||0px|&#8221; custom_padding=&#8221;0px||0px|&#8221; make_fullwidth=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; background_image=&#8221;http:\/\/agendarisk.no\/wp-content\/uploads\/2021\/05\/benjamin-child-GWe0dlVD9e0-unsplash-scaled.jpg&#8221; custom_padding=&#8221;|||&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_image_tablet=&#8221;off&#8221; background_enable_image_phone=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f4f4f4&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;5%|5%|5%|5%|true|true&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|10%|30px|10%|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_cta button_url=&#8221;#&#8221; admin_label=&#8221;Feature 01&#8243; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Montserrat||||&#8221; header_text_color=&#8221;#1f1f1f&#8221; header_font_size=&#8221;30px&#8221; header_line_height=&#8221;1.4em&#8221; body_font_size=&#8221;16&#8243; body_line_height=&#8221;1.9em&#8221; use_background_color=&#8221;off&#8221; text_orientation=&#8221;left&#8221; background_layout=&#8221;light&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;15%&#8221; hover_transition_duration=&#8221;400ms&#8221; button_text_color_hover=&#8221;#6eba01&#8243; button_border_color_hover=&#8221;#6eba01&#8243; button_border_radius_hover=&#8221;0&#8243; button_letter_spacing_hover=&#8221;2&#8243; button_bg_color_hover=&#8221;rgba(0,0,0,0)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#7ebec5&#8243; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#7ebec5&#8243; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;on&#8221; button_border_radius__hover=&#8221;0&#8243; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;on&#8221; button_letter_spacing__hover=&#8221;2&#8243; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;on&#8221; button_bg_color__hover=&#8221;rgba(0,0,0,0)&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]\n<h1>Cybersecurity and information security<\/h1>\n<p>In an evolving risk landscape, cybersecurity and information security are becoming increasingly crucial. Owners, boards, managers, and employees, as well as security architects and system developers, have an important role in protecting the business in an expedient manner. We provide consultancy and relevant services in the field of information security and risk management, both on an operational basis and at a strategic level. With our assistance, the threat landscape can become both more understandable and manageable. A comprehensive understanding of potential threats lays the foundation for conscious administration of information security and a holistic application of <span>security architecture<\/span> and cyber risk at the company. We can help with security management, establishing and developing the business\u2019s information security management system (ISMS), threat modelling, risk and vulnerability assessments, incident handling, personal data privacy\/GDPR, as well as assisting with contractor demands and follow-up.<\/p>\n[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Split Section&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;0px||0px|&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;4%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; module_class=&#8221; et_pb_row_fullwidth&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; make_fullwidth=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f4f4f4&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;5%|5%|5%|5%|true|true&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|10%|30px|10%|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_cta title=&#8221;Tools and methods&#8221; button_url=&#8221;#&#8221; admin_label=&#8221;Feature 01&#8243; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Montserrat||||&#8221; header_text_color=&#8221;#1f1f1f&#8221; header_font_size=&#8221;30px&#8221; header_line_height=&#8221;1.4em&#8221; body_font_size=&#8221;16&#8243; body_line_height=&#8221;1.9em&#8221; use_background_color=&#8221;off&#8221; text_orientation=&#8221;left&#8221; background_layout=&#8221;light&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;15%&#8221; hover_transition_duration=&#8221;400ms&#8221; button_text_color_hover=&#8221;#6eba01&#8243; button_border_color_hover=&#8221;#6eba01&#8243; button_border_radius_hover=&#8221;0&#8243; button_letter_spacing_hover=&#8221;2&#8243; button_bg_color_hover=&#8221;rgba(0,0,0,0)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#7ebec5&#8243; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#7ebec5&#8243; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;on&#8221; button_border_radius__hover=&#8221;0&#8243; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;on&#8221; button_letter_spacing__hover=&#8221;2&#8243; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;on&#8221; button_bg_color__hover=&#8221;rgba(0,0,0,0)&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]\n<p>We put your concrete goals, users, identity handling, units, and data flow first when mapping the situation and identifying areas that require improvement. As technical references for our cyber and information security services we mainly use ISO27001 and ISO27032 with attached guidelines, NIST Cyber Security Framework (CSF), and IEC 62443. <\/p>\n[\/et_pb_cta][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; background_image=&#8221;http:\/\/agendarisk.no\/wp-content\/uploads\/2022\/01\/markus-spiske-8OyKWQgBsKQ-unsplash.jpg&#8221; background_position=&#8221;top_left&#8221; custom_padding=&#8221;|||&#8221; background_last_edited=&#8221;on|phone&#8221; background_enable_image_tablet=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;1&#8243; make_equal=&#8221;on&#8221; module_class=&#8221; et_pb_row_fullwidth&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;100%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;0px||0px|&#8221; custom_padding=&#8221;0px||0px|&#8221; make_fullwidth=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; use_background_color_gradient=&#8221;on&#8221; background_image=&#8221;http:\/\/agendarisk.no\/wp-content\/uploads\/2022\/01\/andras-vas-Bd7gNnWJBkU-unsplash.jpg&#8221; background_position=&#8221;top_left&#8221; custom_padding=&#8221;||||false|false&#8221; background_last_edited=&#8221;on|phone&#8221; use_background_color_gradient_phone=&#8221;off&#8221; background_enable_image_tablet=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f4f4f4&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;5%|5%|5%|5%|true|true&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;30px|10%|30px|10%|true|true&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_cta title=&#8221;Examples&#8221; button_url=&#8221;#&#8221; admin_label=&#8221;Feature 01&#8243; _builder_version=&#8221;4.16&#8243; header_font=&#8221;Montserrat||||&#8221; header_text_color=&#8221;#1f1f1f&#8221; header_font_size=&#8221;30px&#8221; header_line_height=&#8221;1.4em&#8221; body_font_size=&#8221;16&#8243; body_line_height=&#8221;1.9em&#8221; use_background_color=&#8221;off&#8221; text_orientation=&#8221;left&#8221; background_layout=&#8221;light&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;|||&#8221; custom_padding=&#8221;|||&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;15%&#8221; hover_transition_duration=&#8221;400ms&#8221; button_text_color_hover=&#8221;#6eba01&#8243; button_border_color_hover=&#8221;#6eba01&#8243; button_border_radius_hover=&#8221;0&#8243; button_letter_spacing_hover=&#8221;2&#8243; button_bg_color_hover=&#8221;rgba(0,0,0,0)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;on|hover&#8221; button_text_color__hover=&#8221;#7ebec5&#8243; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;on|hover&#8221; button_border_color__hover=&#8221;#7ebec5&#8243; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;on&#8221; button_border_radius__hover=&#8221;0&#8243; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;on&#8221; button_letter_spacing__hover=&#8221;2&#8243; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;on&#8221; button_bg_color__hover=&#8221;rgba(0,0,0,0)&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;]\n<p>Below you find a few typical examples of how we can assist with cybersecurity and\/or information security services:<\/p>\n<ul>\n<li><a href=\"http:\/\/agendarisk.no\/ciso-for-en-dag-fra-agenda-risk\/\"> \u201cCISO as a Service\u201d \u2013 we cover the business\u2019s need for a dedicated resource, with a flexible scope, which can handle its information security, so that the business does not need to recruit people with this expertise<\/a><\/li>\n<li>Threat modelling or risk analyses<\/li>\n<li>Incident management<\/li>\n<li>Security assessments after anomalies or incidents<\/li>\n<li>Establishing guidelines, for example information security policy or instructions<\/li>\n<li>IT-contractor audits<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<ul><\/ul>\n<ul><\/ul>\n[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; module_id=&#8221;contact-us&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#353535&#8243; background_image=&#8221;http:\/\/agendarisk.no\/wp-content\/uploads\/2021\/02\/nick-gordon-znBnL3niyh8-unsplash-scaled.jpg&#8221; parallax=&#8221;on&#8221; custom_padding=&#8221;50px||50px||false|false&#8221; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row use_custom_gutter=&#8221;on&#8221; gutter_width=&#8221;2&#8243; make_equal=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; max_width=&#8221;900px&#8221; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#ffffff&#8221; background_position=&#8221;top_left&#8221; custom_padding=&#8221;50px|40px|50px|40px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Contact US Title&#8221; _builder_version=&#8221;4.17.4&#8243; header_font=&#8221;Montserrat||||&#8221; header_text_color=&#8221;#1f1f1f&#8221; header_font_size=&#8221;22px&#8221; custom_padding=&#8221;0px|0px|18px|0px||&#8221; animation_style=&#8221;fold&#8221; animation_direction=&#8221;bottom&#8221; animation_intensity_fold=&#8221;20%&#8221; global_colors_info=&#8221;{}&#8221;]\n<h2>Send a request<\/h2>\n<p>Fill out the contact form below, and we will get in touch.<\/p>\n[\/et_pb_text][et_pb_code _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"wpforms-container wpforms-container-full\" id=\"wpforms-637\"><form id=\"wpforms-form-637\" class=\"wpforms-validate wpforms-form wpforms-ajax-form\" data-formid=\"637\" method=\"post\" enctype=\"multipart\/form-data\" action=\"\/en\/wp-json\/wp\/v2\/pages\/2504\" data-token=\"fd34167de886c3dcffd5461fbd28f468\" data-token-time=\"1777461040\"><noscript class=\"wpforms-error-noscript\">Please enable JavaScript in your browser to complete this form.<\/noscript><div class=\"wpforms-field-container\"><div id=\"wpforms-637-field_3-container\" class=\"wpforms-field wpforms-field-text wpforms-one-half wpforms-first\" data-field-id=\"3\"><label class=\"wpforms-field-label\" for=\"wpforms-637-field_3\">Name <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"text\" id=\"wpforms-637-field_3\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][3]\" placeholder=\"Name\" required><\/div><div id=\"wpforms-637-field_4-container\" class=\"wpforms-field wpforms-field-text wpforms-one-half\" data-field-id=\"4\"><label class=\"wpforms-field-label\" for=\"wpforms-637-field_4\">Company name<\/label><input type=\"text\" id=\"wpforms-637-field_4\" class=\"wpforms-field-large\" name=\"wpforms[fields][4]\" placeholder=\"Company name\" ><\/div><div id=\"wpforms-637-field_1-container\" class=\"wpforms-field wpforms-field-email wpforms-one-half wpforms-first\" data-field-id=\"1\"><label class=\"wpforms-field-label\" for=\"wpforms-637-field_1\">Email <span class=\"wpforms-required-label\">*<\/span><\/label><input type=\"email\" id=\"wpforms-637-field_1\" class=\"wpforms-field-large wpforms-field-required\" name=\"wpforms[fields][1]\" placeholder=\"Email\" spellcheck=\"false\" required><\/div><div id=\"wpforms-637-field_5-container\" class=\"wpforms-field wpforms-field-text wpforms-one-half\" data-field-id=\"5\"><label class=\"wpforms-field-label\" for=\"wpforms-637-field_5\">Phone number<\/label><input type=\"text\" id=\"wpforms-637-field_5\" class=\"wpforms-field-large\" name=\"wpforms[fields][5]\" placeholder=\"Phone number\" ><\/div><div id=\"wpforms-637-field_2-container\" class=\"wpforms-field wpforms-field-textarea\" data-field-id=\"2\"><label class=\"wpforms-field-label\" for=\"wpforms-637-field_2\">Message <span class=\"wpforms-required-label\">*<\/span><\/label><textarea id=\"wpforms-637-field_2\" class=\"wpforms-field-medium wpforms-field-required\" name=\"wpforms[fields][2]\" placeholder=\"Short description of the matter:\" required><\/textarea><div class=\"wpforms-field-description\"> (do not send confidential information through the contact form)<\/div><\/div><\/div><!-- .wpforms-field-container --><div class=\"wpforms-recaptcha-container wpforms-is-recaptcha wpforms-is-recaptcha-type-v3\" ><input type=\"hidden\" name=\"wpforms[recaptcha]\" value=\"\"><\/div><div class=\"wpforms-submit-container\" ><input type=\"hidden\" name=\"wpforms[id]\" value=\"637\"><input type=\"hidden\" name=\"page_title\" value=\"\"><input type=\"hidden\" name=\"page_url\" value=\"https:\/\/agendarisk.no\/en\/wp-json\/wp\/v2\/pages\/2504\"><input type=\"hidden\" name=\"url_referer\" value=\"\"><button type=\"submit\" name=\"wpforms[submit]\" id=\"wpforms-submit-637\" class=\"wpforms-submit\" data-alt-text=\"Sending...\" data-submit-text=\"Send\" aria-live=\"assertive\" value=\"wpforms-submit\">Send<\/button><img decoding=\"async\" data-src=\"https:\/\/agendarisk.no\/wp-content\/plugins\/wpforms\/assets\/images\/submit-spin.svg\" class=\"wpforms-submit-spinner lazyload\" style=\"--smush-placeholder-width: 26px; --smush-placeholder-aspect-ratio: 26\/26;display: none;\" width=\"26\" height=\"26\" alt=\"Loading\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/div><\/form><\/div>  <!-- .wpforms-container -->[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and information security In an evolving risk landscape, cybersecurity and information security are becoming increasingly crucial. Owners, boards, managers, and employees, as well as security architects and system developers, have an important role in protecting the business in an expedient manner. We provide consultancy and relevant services in the field of information security and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2504","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity and information security - Agenda Risk<\/title>\n<meta name=\"description\" content=\"In the realm of cyber and information security, we offer support for everything from comprehensive risk-based security management to smaller-scale audits, actions, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and information security - Agenda Risk\" \/>\n<meta property=\"og:description\" content=\"In the realm of cyber and information security, we offer support for everything from comprehensive risk-based security management to smaller-scale audits, actions, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Agenda Risk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AgendaRisk\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-18T06:24:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AgendaRisk\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/cybersecurity-and-information-security\\\/\",\"url\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/cybersecurity-and-information-security\\\/\",\"name\":\"Cybersecurity and information security - Agenda Risk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/#website\"},\"datePublished\":\"2022-01-11T09:39:16+00:00\",\"dateModified\":\"2023-08-18T06:24:16+00:00\",\"description\":\"In the realm of cyber and information security, we offer support for everything from comprehensive risk-based security management to smaller-scale audits, actions, and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/cybersecurity-and-information-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/agendarisk.no\\\/en\\\/cybersecurity-and-information-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/cybersecurity-and-information-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/\",\"name\":\"Agenda Risk\",\"description\":\"Leverand\u00f8r av Risk Advisory tjenester\",\"publisher\":{\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/#organization\",\"name\":\"Agenda Risk\",\"url\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/agendarisk.no\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/agenda-risk-logo.png\",\"contentUrl\":\"https:\\\/\\\/agendarisk.no\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/agenda-risk-logo.png\",\"width\":600,\"height\":470,\"caption\":\"Agenda Risk\"},\"image\":{\"@id\":\"https:\\\/\\\/agendarisk.no\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/AgendaRisk\",\"https:\\\/\\\/x.com\\\/AgendaRisk\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/72157870\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity and information security - Agenda Risk","description":"In the realm of cyber and information security, we offer support for everything from comprehensive risk-based security management to smaller-scale audits, actions, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity and information security - Agenda Risk","og_description":"In the realm of cyber and information security, we offer support for everything from comprehensive risk-based security management to smaller-scale audits, actions, and more.","og_url":"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/","og_site_name":"Agenda Risk","article_publisher":"https:\/\/www.facebook.com\/AgendaRisk","article_modified_time":"2023-08-18T06:24:16+00:00","twitter_card":"summary_large_image","twitter_site":"@AgendaRisk","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/","url":"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/","name":"Cybersecurity and information security - Agenda Risk","isPartOf":{"@id":"https:\/\/agendarisk.no\/en\/#website"},"datePublished":"2022-01-11T09:39:16+00:00","dateModified":"2023-08-18T06:24:16+00:00","description":"In the realm of cyber and information security, we offer support for everything from comprehensive risk-based security management to smaller-scale audits, actions, and more.","breadcrumb":{"@id":"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/agendarisk.no\/en\/cybersecurity-and-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/agendarisk.no\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and information security"}]},{"@type":"WebSite","@id":"https:\/\/agendarisk.no\/en\/#website","url":"https:\/\/agendarisk.no\/en\/","name":"Agenda Risk","description":"Leverand\u00f8r av Risk Advisory tjenester","publisher":{"@id":"https:\/\/agendarisk.no\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/agendarisk.no\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/agendarisk.no\/en\/#organization","name":"Agenda Risk","url":"https:\/\/agendarisk.no\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/agendarisk.no\/en\/#\/schema\/logo\/image\/","url":"https:\/\/agendarisk.no\/wp-content\/uploads\/2023\/08\/agenda-risk-logo.png","contentUrl":"https:\/\/agendarisk.no\/wp-content\/uploads\/2023\/08\/agenda-risk-logo.png","width":600,"height":470,"caption":"Agenda Risk"},"image":{"@id":"https:\/\/agendarisk.no\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AgendaRisk","https:\/\/x.com\/AgendaRisk","https:\/\/www.linkedin.com\/company\/72157870\/"]}]}},"_links":{"self":[{"href":"https:\/\/agendarisk.no\/en\/wp-json\/wp\/v2\/pages\/2504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/agendarisk.no\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/agendarisk.no\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/agendarisk.no\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/agendarisk.no\/en\/wp-json\/wp\/v2\/comments?post=2504"}],"version-history":[{"count":0,"href":"https:\/\/agendarisk.no\/en\/wp-json\/wp\/v2\/pages\/2504\/revisions"}],"wp:attachment":[{"href":"https:\/\/agendarisk.no\/en\/wp-json\/wp\/v2\/media?parent=2504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}