{"id":13480,"date":"2022-09-21T16:52:15","date_gmt":"2022-09-21T14:52:15","guid":{"rendered":"https:\/\/www.secify.com\/?page_id=13480"},"modified":"2024-05-27T12:11:45","modified_gmt":"2024-05-27T10:11:45","slug":"ciso-as-a-service","status":"publish","type":"page","link":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/information-security\/ciso-as-a-service\/","title":{"rendered":"CISO as a Service"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none hundred-percent-fullwidth non-hundred-percent-height-scrolling Hero\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-background-image:url(&quot;https:\/\/www.secify.com\/wp-content\/uploads\/2023\/08\/CISOaaS.webp&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column bgh1\" style=\"--awb-padding-top:250px;--awb-padding-bottom:150px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\">CISO as a Service<\/span><\/h1>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2 EyeBrow\" style=\"--awb-text-transform:none;\"><p>Introduktion<\/p>\n<\/div><div class=\"fusion-text fusion-text-3\"><h2>External Security Consultant in Information Security (CISO) for Your Organization<\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:50px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-text-transform:none;\"><p><strong>CISO as a Service<\/strong> is a consulting service where we place an external Chief Information Security Officer (CISO) in your organization. The primary task of the CISO is to enhance security in a cost-effective manner. Enhancing security involves ensuring the secure handling of information and information assets within the organization to minimize risks..<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:320px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-image:linear-gradient(180deg, #fcae8e 0%,#f2e3d2 100%);--awb-bg-size:cover;--awb-border-radius:30px 0px 30px 0px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-image:url(&#039;https:\/\/www.secify.com\/wp-content\/uploads\/2023\/06\/secify-petra-kontakt.jpg&#039;);--awb-bg-size:cover;--awb-border-radius:30px 0px 30px 0px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-empty-column-bg-image fusion-column-has-bg-image\" data-bg-url=\"https:\/\/www.secify.com\/wp-content\/uploads\/2023\/06\/secify-petra-kontakt.jpg\"><img class=\"fusion-empty-dims-img-placeholder fusion-no-large-visibility fusion-no-medium-visibility\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:20px;--awb-padding-right:20px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-5 EyeBrow DarkBlue\"><p>Kontakta oss<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:120px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-6 BoxText\"><p>Vill du veta mer om v\u00e5ra tj\u00e4nster och l\u00f6sningar? Kontakta oss s\u00e5 hj\u00e4lper vi dig.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ffffff;--button_accent_hover_color:#4200ff;--button_border_hover_color:var(--awb-color1);--button-border-radius-top-left:30px;--button-border-radius-top-right:30px;--button-border-radius-bottom-right:30px;--button-border-radius-bottom-left:30px;--button_gradient_top_color:#4200ff;--button_gradient_bottom_color:#4200ff;--button_gradient_top_color_hover:#e9e2ff;--button_gradient_bottom_color_hover:#e9e2ff;--button_font_size:1em;--button_padding-top:20px;--button_padding-bottom:20px;--button_typography-font-family:&quot;Inter&quot;;--button_typography-font-style:normal;--button_typography-font-weight:400;\" target=\"_self\" href=\"#Contact\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Kontakta oss<\/span><\/a><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:60px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7 EyeBrow\" style=\"--awb-text-transform:none;\"><p>About the Service<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\"><h2>An Essential IT Service for Organizations<\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:50px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\"><p>Security has never been more important than it is now. The digital transformation and the shift towards a more modern and open way of working have led to new innovative opportunities, solutions, and services. Along with this transformation, the need for digital security has also increased. Business leaders and decision-makers are demanding higher security and a greater understanding of the threats and risks that can impact the organization.<\/p>\n<\/div><div class=\"fusion-text fusion-text-10\"><p>CISO stands for &#8220;Chief Information Security Officer&#8221;, and the role can encompass many different aspects of security work with a broad underlying range of tasks. Examples of tasks may include:<\/p>\n<ul>\n<li>Providing support in planning processes<\/li>\n<li>Implementing information security programs<\/li>\n<li>Working with incident management<\/li>\n<li>Developing frameworks, policies, and procedures for organizations<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:30px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-padding-top:30px;--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11 EyeBrow\"><p>N\u00e5gra av v\u00e5ra kunder<\/p>\n<\/div><div class=\"LogoMarquee\">\n  <div class=\"LogoTrack\">\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2026\/03\/svenska-ingenjorer-logo.png\" alt=\"Sveriges Ingenj\u00f6rer\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2022\/04\/svedbergs_logo.png\" alt=\"Svedbergs\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/05\/lansforsakringar_jonkoping_logotyp-2.png\" alt=\"L\u00e4nsf\u00f6rs\u00e4kringar J\u00f6nk\u00f6ping\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/05\/if.png\" alt=\"If\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2022\/11\/coop-medmera.png\" alt=\"Coop MedMera\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/10\/infare.png\" alt=\"Infare\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/10\/tidsam.png\" alt=\"Tidsam\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2019\/12\/aleris-logo.png\" alt=\"Aleris\"><\/div>\n  <\/div>\n<\/div>\n\n<script>\ndocument.addEventListener(\"DOMContentLoaded\", function () {\n  document.querySelectorAll(\".LogoTrack\").forEach(function(track) {\n    if (!track.dataset.duplicated) {\n      track.innerHTML += track.innerHTML;\n      track.dataset.duplicated = \"true\";\n    }\n  });\n});\n<\/script><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:60px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12 EyeBrow\" style=\"--awb-text-transform:none;\"><p>Secify as CISO<\/p>\n<\/div><div class=\"fusion-text fusion-text-13\"><h2>External CISO &#8211; great opportunities<\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-14\" style=\"--awb-text-transform:none;\"><p>Our CISOaaS is fully customized based on the organization&#8217;s size, conditions, maturity level, risk profile, and resources. Typically, the CISO consultant leads their own security enhancement projects and works closely with the IT manager. One of the advantages of hiring an external security officer (CISO) from us is that the individual always collaborates with and receives support from other specialists at Secify. This means that we always have an answer, regardless of whether the question falls within the security officer&#8217;s primary area. We have specialists working in <a href=\"https:\/\/www.secify.com\/tjanster\/dataskyddsombud\/\" target=\"_blank\" rel=\"noopener\">IT law<\/a>, <a href=\"https:\/\/www.secify.com\/tjanster\/iso-27001\/\" target=\"_blank\" rel=\"noopener\">information security<\/a>, and <a href=\"https:\/\/www.secify.com\/tjanster\/penetrationstest\/\" target=\"_blank\" rel=\"noopener\">IT security<\/a>.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:60px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-15\"><h2>CISO as a Service-model<\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-16\" style=\"--awb-text-transform:none;\"><p>CISO as a Service model is an outsourcing model for information security services. It means that a company hires an external firm to provide all or part of the company&#8217;s security needs.<br \/>\nThe CISOaaS team typically consists of a CISO, one or more CISO assistants, and a group of specialists who are experts in various areas of information security, such as risk management, incident management, and compliance.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-17\"><h2>Advantages of an External Security Advisor (CISOaaS)<\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column LightBeige Box\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:50px 0px 50px 0px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:25px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-18 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography2-font-size);--awb-line-height:var(--awb-typography2-line-height);--awb-letter-spacing:var(--awb-typography2-letter-spacing);--awb-text-transform:var(--awb-typography2-text-transform);--awb-text-color:#607d8b;--awb-margin-bottom:1,33;--awb-text-font-family:var(--awb-typography2-font-family);--awb-text-font-weight:var(--awb-typography2-font-weight);--awb-text-font-style:var(--awb-typography2-font-style);\"><p><strong>Flexible and Tailored to Your Needs<\/strong><\/p>\n<p>We can adapt to your company&#8217;s unique situation and risk profile with a solution that fits your needs and resources.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_2 1_2 fusion-flex-column LightBeige Box\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:50px 0px 50px 0px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:25px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-19 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography2-font-size);--awb-line-height:var(--awb-typography2-line-height);--awb-letter-spacing:var(--awb-typography2-letter-spacing);--awb-text-transform:var(--awb-typography2-text-transform);--awb-text-color:#607d8b;--awb-margin-bottom:1,33;--awb-text-font-family:var(--awb-typography2-font-family);--awb-text-font-weight:var(--awb-typography2-font-weight);--awb-text-font-style:var(--awb-typography2-font-style);\"><p><strong>No Time Spent on Recruitment<\/strong><\/p>\n<p>When you hire us, we handpick a consultant that best suits your needs. You don&#8217;t need to spend time or resources on costly recruitments.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_2 1_2 fusion-flex-column LightBeige Box\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:50px 0px 50px 0px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:25px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-20 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography2-font-size);--awb-line-height:var(--awb-typography2-line-height);--awb-letter-spacing:var(--awb-typography2-letter-spacing);--awb-text-transform:var(--awb-typography2-text-transform);--awb-text-color:#607d8b;--awb-margin-bottom:1,33;--awb-text-font-family:var(--awb-typography2-font-family);--awb-text-font-weight:var(--awb-typography2-font-weight);--awb-text-font-style:var(--awb-typography2-font-style);\"><p><strong>There When Needed<\/strong><\/p>\n<p>Facing a major transformation, a CISO can assist the organization and provide valuable knowledge, leading to a more efficient and secure transformation.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_2 1_2 fusion-flex-column LightBeige Box\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:50px 0px 50px 0px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:25px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-21 fusion-text-no-margin\" style=\"--awb-font-size:var(--awb-typography2-font-size);--awb-line-height:var(--awb-typography2-line-height);--awb-letter-spacing:var(--awb-typography2-letter-spacing);--awb-text-transform:var(--awb-typography2-text-transform);--awb-text-color:#607d8b;--awb-margin-bottom:1,33;--awb-text-font-family:var(--awb-typography2-font-family);--awb-text-font-weight:var(--awb-typography2-font-weight);--awb-text-font-style:var(--awb-typography2-font-style);\"><p><strong>Broad Expertise in a Market with High Skill Shortages<\/strong><\/p>\n<p>A CISO requires many skills and broad knowledge. Our consultants always exchange knowledge with each other. If you have a complicated question or a problem we identify, we have multiple consultants who can collaborate with specialized expertise in their areas.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-22\" style=\"--awb-text-transform:none;\"><h2>FAQ<\/h2>\n<\/div><div class=\"fusion-text fusion-text-23\" style=\"--awb-text-transform:none;\"><p>Here are the answers to the most common questions about external CISO. Do you have a question that is not listed? Use the contact form further down the page.<\/p>\n<\/div><style type=\"text\/css\">.fusion-faqs-wrapper #accordian-1 .fusion-panel { border-color:var(--awb-color6); }.fusion-faqs-wrapper #accordian-1 .fusion-panel:hover{ border-color: var(--awb-color3); }.fusion-accordian #accordian-1 .panel-title a .fa-fusion-box:before{ font-size: 16px;width: 16px;}.fusion-accordian #accordian-1 .panel-title a .fa-fusion-box{ color: var(--awb-color4);}.fusion-accordian  #accordian-1 .panel-title a{font-size:0.8em;line-height:0.8em;font-family:\"Inter\";font-style:normal;font-weight:400;}.fusion-accordian  #accordian-1 .panel-title a:not(:hover){color:var(--awb-color4);}.fusion-accordian  #accordian-1 .toggle-content{color:var(--awb-color4);font-family:var(--awb-typography4-font-family);font-weight:var(--awb-typography4-font-weight);font-style:var(--awb-typography4-font-style);}.fusion-accordian #accordian-1 .fa-fusion-box { background-color: var(--awb-color4) !important;border-color: var(--awb-color4) !important;}.fusion-accordian #accordian-1 .panel-title a:hover,.fusion-accordian #accordian-1 .panel-title a.hover { color: var(--awb-custom_color_2);}.fusion-faq-shortcode .fusion-accordian #accordian-1 .fusion-toggle-boxed-mode:hover .panel-title a { color: var(--awb-custom_color_2);}.fusion-accordian #accordian-1 .panel-title a:hover .fa-fusion-box,.fusion-accordian #accordian-1 .panel-title a.hover .fa-fusion-box { background-color: var(--awb-custom_color_2)!important;border-color: var(--awb-custom_color_2)!important;}.fusion-faqs-wrapper .fusion-accordian #accordian-1 .panel-title a.active{ color: var(--awb-custom_color_2) !important;}.fusion-faqs-wrapper .fusion-accordian #accordian-1 .panel-title .active .fa-fusion-box { background-color: var(--awb-custom_color_2)!important;border-color: var(--awb-custom_color_2)!important;}.fusion-faqs-wrapper .fusion-accordian  #accordian-1 .fusion-panel {padding-top: 10px;padding-bottom: 10px;}<\/style><div class=\"fusion-faq-shortcode\" style=\"\"><div class=\"fusion-faqs-wrapper\"><div class=\"accordian fusion-accordian\"><div class=\"panel-group \" id=\"accordian-1\"><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13975 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">What does our organization need to do in connection with a personal data incident?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:23:51+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13975\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13975\" href=\"#collapse-1-13975\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What does our organization need to do in connection with a personal data incident?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13975\" aria-labelledby=\"faq_1-13975\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-18 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-24\"><p>If the incident could result in data subjects being exposed to serious risks, your organization must notify the regulatory authority if possible within 72 hours of discovery. In some cases, the registered must also be informed of the risks. This is regulated in Articles 33 and 34 of the Data Protection Regulation.<\/p>\n<p>In connection with a personal data incident occurring in your organization, the supervisory authority can carry out an inspection of your business. In that situation, your documentation is an important insurance to reduce the risk of heavy legal sanctions.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13979 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">Who is responsible for personal data?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:23:45+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13979\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13979\" href=\"#collapse-1-13979\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Who is responsible for personal data?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13979\" aria-labelledby=\"faq_1-13979\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-19 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-25\"><p>The personal data controller is the natural or legal person, public authority, institution or other body that alone or together with others determines the purposes and means for the processing of personal data.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13980 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">Whose responsibility is it that GDPR is complied with?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:40+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13980\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13980\" href=\"#collapse-1-13980\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Whose responsibility is it that GDPR is complied with?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13980\" aria-labelledby=\"faq_1-13980\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-20 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-26\"><p>It is the person in charge of personal data who must ensure that the GDPR is followed within the organization.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13981 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">What must an organization do to be allowed to process personal data?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:40+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13981\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13981\" href=\"#collapse-1-13981\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What must an organization do to be allowed to process personal data?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13981\" aria-labelledby=\"faq_1-13981\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-21 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-27\"><p>When personal data is to be processed, the rules for personal data processing in the GDPR must be followed. The starting point is that all personal data processing is prohibited if it does not have a legal basis. When the legal basis for personal data processing is determined and documented, other requirements of the GDPR must be met, for example the basic principles of data protection and informing the persons who will have their personal data processed (about the processing).<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13982 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">Does the organization need to have any special handling of children&#8217;s personal data?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:40+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13982\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13982\" href=\"#collapse-1-13982\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Does the organization need to have any special handling of children&#8217;s personal data?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13982\" aria-labelledby=\"faq_1-13982\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-22 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-28\"><p>Yes, handling children&#8217;s personal data requires special treatment. According to the Data Protection Regulation, children cannot themselves consent to the storage and use of their personal data, instead the guardians&#8217; consent is required. When you inform children about things related to the Data Protection Regulation, you must do it in such a simple way that the children understand.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13978 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">What is personal data?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:41+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13978\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13978\" href=\"#collapse-1-13978\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is personal data?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13978\" aria-labelledby=\"faq_1-13978\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-23 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-29\"><p>All information that can be directly or indirectly linked to a living natural person is considered personal data. Even images (photos) and audio recordings of individuals can be personal data, even if no names are mentioned. Encrypted data and various types of electronic identities, such as IP numbers and user accounts, count as personal data if they can be linked to natural persons.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13977 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">Does the Data Protection Regulation apply to private individuals?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:41+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13977\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13977\" href=\"#collapse-1-13977\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Does the Data Protection Regulation apply to private individuals?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13977\" aria-labelledby=\"faq_1-13977\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-7 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-24 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-30\"><p>Both yes and no: the data protection regulation does not always apply to private individuals.<br \/>\nThe Data Protection Regulation does not apply to private individuals when it comes to things that are of a purely private nature (or that are related to the person&#8217;s household).<br \/>\nBut if the person, for example, has a blog that contains personal data, then (of course) GDPR applies!<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13976 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">Who within my organization should be aware of the Data Protection Regulation?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:41+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13976\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13976\" href=\"#collapse-1-13976\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Who within my organization should be aware of the Data Protection Regulation?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13976\" aria-labelledby=\"faq_1-13976\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-8 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-25 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-31\"><p>The most senior decision makers within your organization should be familiar with the Data Protection Regulation.<br \/>\nAbove all, they should inform themselves about the requirements that the Data Protection Regulation places on the organization, and what consequences there may be from not complying with the law.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13974 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">Does the organization have to carry out impact assessments for handling personal data?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:41+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13974\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13974\" href=\"#collapse-1-13974\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Does the organization have to carry out impact assessments for handling personal data?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13974\" aria-labelledby=\"faq_1-13974\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-9 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-26 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-32\"><p>Before starting a new treatment that involves major integrity risks, you must do a consequence assessment. Impact assessments are described in Article 35 of the Data Protection Regulation.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13973 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">What rights do data subjects have according to the Data Protection Ordinance?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:41+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13973\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13973\" href=\"#collapse-1-13973\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What rights do data subjects have according to the Data Protection Ordinance?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13973\" aria-labelledby=\"faq_1-13973\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-10 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-27 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-33\"><p>The most important rights of registered persons:<\/p>\n<ul>\n<li>right to information about the treatment<\/li>\n<li>right to access their personal data<\/li>\n<li>right to have incorrect information corrected<\/li>\n<li>right to have their personal data deleted<\/li>\n<li>right to object to the use of the personal data<\/li>\n<li>right to restriction of treatment<\/li>\n<li>rights linked to automated decision-making and profiling<\/li>\n<li>right to obtain personal data in machine-readable format (data portability)<\/li>\n<\/ul>\n<p>Together, your organization and your systems must be able to meet the requirements above.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13972 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">Which organizations must comply with the Data Protection Regulation?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:41+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13972\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13972\" href=\"#collapse-1-13972\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Which organizations must comply with the Data Protection Regulation?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13972\" aria-labelledby=\"faq_1-13972\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-11 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-28 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-34\"><p>Anyone who stores or processes information about identifiable natural persons within the EU must comply with the Data Protection Regulation.<br \/>\nThere are some exceptions, including:<\/p>\n<ol>\n<li>certain authorities<\/li>\n<li>private individuals who process personal data for private use<\/li>\n<\/ol>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13971 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">What is the Data Protection Regulation about?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:42+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13971\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13971\" href=\"#collapse-1-13971\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is the Data Protection Regulation about?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13971\" aria-labelledby=\"faq_1-13971\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-12 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-29 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-35\"><p>The Data Protection Regulation is mainly about:<\/p>\n<ul>\n<li>How and when personal data may be handled<\/li>\n<li>What requirements are placed on the person responsible for personal data (\u201cPersonal data controller\u201d)<\/li>\n<li>What requirements are placed on the person who handles personal data on behalf of another (&#8220;Personal data processor&#8221;)<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13970 gdpr-en \"><span class=\"entry-title rich-snippet-hidden\">What does GDPR mean?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:24:42+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13970\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13970\" href=\"#collapse-1-13970\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What does GDPR mean?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13970\" aria-labelledby=\"faq_1-13970\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-13 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-30 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-36\"><p>GDPR is an abbreviation of &#8220;General Data Protection Regulation&#8221;, in Swedish also called the data protection regulation.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13769 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">What do you get after penetration testing?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:26+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13769\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13769\" href=\"#collapse-1-13769\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What do you get after penetration testing?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13769\" aria-labelledby=\"faq_1-13769\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-14 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-31 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-37\"><p>After a completed penetration test, you will receive a report that we will review together with you. You also receive proof in the form of a certificate after a completed test.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13768 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">Are you protected after a pentest?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:27+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13768\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13768\" href=\"#collapse-1-13768\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Are you protected after a pentest?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13768\" aria-labelledby=\"faq_1-13768\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-15 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-32 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-38\"><p>In 2021, 55 new vulnerabilities were identified every day. This means that a system can never be completely free of vulnerabilities. Having said that, you will be more protected if you implement the measures after a penetration test. If you have good basic protection and perform regular penetration tests and actions, attackers will usually not try to get in when there are simpler targets that do not perform penetration tests or actions.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13767 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">What can be penetration tested?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:27+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13767\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13767\" href=\"#collapse-1-13767\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What can be penetration tested?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13767\" aria-labelledby=\"faq_1-13767\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-16 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-33 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-39\"><p>The most common is to penetration test a system that is critical to the business, but a penetration test can be done on basically everything from new products to connections between companies. The purpose of the pen test is to find and test security holes in order to increase security, and security can be increased on many different types of targets.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13765 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">How long does it take to conduct a penetration test?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:27+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13765\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13765\" href=\"#collapse-1-13765\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How long does it take to conduct a penetration test?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13765\" aria-labelledby=\"faq_1-13765\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-17 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-34 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-40\"><p>It of course depends on the conditions of the penetration test and the type of penetration test to be done, but for a standard black box test you can count on it taking about a month from the time the project is started until you have a report in your hand.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13764 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">What is a red team and blue team exercise and why is this carried out?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:27+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13764\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13764\" href=\"#collapse-1-13764\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is a red team and blue team exercise and why is this carried out?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13764\" aria-labelledby=\"faq_1-13764\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-18 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-35 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-41\"><p>A red team and blue team exercise is conducted to simulate a cyber attack. The blue team works on defense and protection measures while the red team is the team that carries out the attack. Read team and blue team exercises are conducted to test the ability to defend and prepare against external attacks.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13763 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">What is the difference between a Blackbox test and a Greybox test?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:27+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13763\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13763\" href=\"#collapse-1-13763\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is the difference between a Blackbox test and a Greybox test?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13763\" aria-labelledby=\"faq_1-13763\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-19 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-36 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-42\"><p>In a Blackbox test, you don&#8217;t know anything about the system or the environment to be attacked and have no authority at all. In a Greybox test, you have access to a user account and certain information about how the system works.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13766 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">What is the most common type of pen test?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:27+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13766\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13766\" href=\"#collapse-1-13766\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is the most common type of pen test?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13766\" aria-labelledby=\"faq_1-13766\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-20 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-37 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-43\"><p>The black box test is the most common form of penetration test. The starting point for the penetration tester is the same as for the attacker. There is a complete lack of information about the underlying network structure and system.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13762 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">What should you consider before buying a pen test?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:28+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13762\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13762\" href=\"#collapse-1-13762\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What should you consider before buying a pen test?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13762\" aria-labelledby=\"faq_1-13762\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-21 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-38 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-44\"><p>Before buying a pen test, it is good to map your systems. This is done to identify which critical information assets and systems you have and where in the network they are located. When you have that overview in front of you, you know what is worth protecting and which system or part of the network that should be tested. When choosing a supplier, you must always ensure that the penetration testers are certified testers who follow the methods and frameworks that apply to the market, such as OWASP and OSSTMM. The result of the penetration test will never be better than the penetration tester himself.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13761 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">How often should you pentest?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:28+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13761\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13761\" href=\"#collapse-1-13761\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How often should you pentest?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13761\" aria-labelledby=\"faq_1-13761\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-22 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-39 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-45\"><p>How often you penetration test depends entirely on what you are testing and how often systems and environments are updated. A rule of thumb is to test at least once a year in cases where you do not make major releases or changes to what is to be tested.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13813 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">Are there other information security management standards?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:12+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13813\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13813\" href=\"#collapse-1-13813\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Are there other information security management standards?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13813\" aria-labelledby=\"faq_1-13813\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-23 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-40 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-46\"><p>Yes, there are more information security management systems, including NIST CSF and ISF.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13812 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">What happens after you become certified within ISO 27001?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:13+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13812\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13812\" href=\"#collapse-1-13812\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What happens after you become certified within ISO 27001?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13812\" aria-labelledby=\"faq_1-13812\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-24 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-41 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-47\"><p>After you have been certified, you undergo annual audits to ensure that the organization continues to meet the requirements of ISO 27001. Every three years, recertification is done, which is a slightly larger audit.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13811 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">What is the purpose of ISO 27001?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:13+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13811\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13811\" href=\"#collapse-1-13811\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is the purpose of ISO 27001?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13811\" aria-labelledby=\"faq_1-13811\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-25 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-42 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-48\"><p>The purpose of ISO 27001 is to increase safety in the organization through the work of the management system.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13810 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">Do you have to have ISO 27001?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:13+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13810\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13810\" href=\"#collapse-1-13810\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Do you have to have ISO 27001?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13810\" aria-labelledby=\"faq_1-13810\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-26 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-43 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-49\"><p>No, not everyone currently needs to have an ISO 27001 certification. But there is a strong indication that some organizations covered by NIS2 will have management systems work as a requirement.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13809 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">What is required to become ISO 27001 certified?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:13+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13809\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13809\" href=\"#collapse-1-13809\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is required to become ISO 27001 certified?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13809\" aria-labelledby=\"faq_1-13809\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-27 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-44 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-50\"><p>In order to be certified, it is required that you work with information security in a systematic way and meet the requirements set by ISO 27001. The word certification itself means approved audit. In order to be certified, it is then required that you first undergo a certification audit.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13808 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">When do you need a management system?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:13+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13808\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13808\" href=\"#collapse-1-13808\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">When do you need a management system?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13808\" aria-labelledby=\"faq_1-13808\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-28 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-45 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-51\"><p>The need for a management system for information security (LIS) often comes in the form of a requirement from a supplier, subcontractor, partner, authority or regulation.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13807 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">How does ISO 27001 increase my security?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:14+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13807\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13807\" href=\"#collapse-1-13807\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How does ISO 27001 increase my security?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13807\" aria-labelledby=\"faq_1-13807\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-29 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-46 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-52\"><p>ISO 27001 gives the organization a standardized way of working with safety. In other words, the organization begins to work from a best-practice way that is developed by IT and information security experts on how best to work with security in their organization.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13806 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">Can you work with ISO 27001 without being certified?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:14+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13806\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13806\" href=\"#collapse-1-13806\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Can you work with ISO 27001 without being certified?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13806\" aria-labelledby=\"faq_1-13806\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-30 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-47 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-53\"><p>It is absolutely possible to work towards a certification without necessarily being certified. What you gain from such work is increased security that permeates all layers of the organization.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13805 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">How do you start working towards an ISO 27001 certification?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:14+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13805\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13805\" href=\"#collapse-1-13805\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How do you start working towards an ISO 27001 certification?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13805\" aria-labelledby=\"faq_1-13805\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-31 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-48 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-54\"><p>It is possible to carry out an ISO work without external help. Unfortunately, that route often takes much longer than hiring a consultant. A good idea is to buy the standard and then read through and build your own framework that you implement in your organization through various efforts such as processes and routines, training and security-enhancing measures.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13804 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">What does the certification process look like?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:14+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13804\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13804\" href=\"#collapse-1-13804\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What does the certification process look like?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13804\" aria-labelledby=\"faq_1-13804\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-32 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-49 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-55\"><p>After the management system has been introduced and the organization has passed an internal audit, an independent certification body must review and assess the organization \/ management system to ensure that the requirements are met. If the audit is approved by the independent body, the certification is granted.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13803 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">How long does it take to be certified?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:14+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13803\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13803\" href=\"#collapse-1-13803\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How long does it take to be certified?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13803\" aria-labelledby=\"faq_1-13803\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-33 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-50 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-56\"><p>How long it takes to be certified depends above all on how security mature you are as an organization, i.e. if you have worked with information security before and have certain processes already completed. Other parts that affect are how big you are as a company, what priority the certification has and which scoop we choose to be certified. As a rule, it takes an estimated 6-12 months, but we have had projects that have taken longer.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13760 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">What is the next step after the penetration test?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:28+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13760\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13760\" href=\"#collapse-1-13760\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is the next step after the penetration test?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13760\" aria-labelledby=\"faq_1-13760\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-34 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-51 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-57\"><p>After the pentest, you get a report that shows what the vulnerabilities are and how best to fix them. After the security engineer or system engineer has analyzed the report, they then prioritize and fix those that are relevant to plug the security holes<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13759 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">Who is performing the penetration testing?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:28+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13759\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13759\" href=\"#collapse-1-13759\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Who is performing the penetration testing?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13759\" aria-labelledby=\"faq_1-13759\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-35 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-52 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-58\"><p>A penetration tester is a person who, with their own knowledge and experience, tests systems with the aim of revealing security flaws. The penetration tester is usually called a white hat hacker or an ethical hacker who, unlike the black hat hacker, hacks systems for a good purpose.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13758 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">Can you do a penetration test yourself?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:31:28+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13758\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13758\" href=\"#collapse-1-13758\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Can you do a penetration test yourself?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13758\" aria-labelledby=\"faq_1-13758\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-36 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-53 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-59\"><p>It is absolutely possible to perform a penetration test yourself, on your own environment. But for the pentest to be relevant, it should be performed by a person who has extensive experience and\/or extensive knowledge of methodology, vulnerabilities and data breaches. Otherwise, there is a big risk that the actions after the penetration test are done on the wrong things. If you want to penetration test your systems yourself, we recommend that you buy a vulnerability scan instead.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13756 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">Are there any risks with penetration testing?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:55:30+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13756\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13756\" href=\"#collapse-1-13756\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Are there any risks with penetration testing?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13756\" aria-labelledby=\"faq_1-13756\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-37 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-54 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-60\"><p>Yes, there are risks. Older systems that lack updates or that frequently crash under load are often more likely to also crash during a penetration test. What should be remembered is that that crash is always a sign of a vulnerability in the system, which the penetration test can find and which you can fix afterwards.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13802 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">What do you gain by being certified?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:14+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13802\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13802\" href=\"#collapse-1-13802\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What do you gain by being certified?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13802\" aria-labelledby=\"faq_1-13802\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-38 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-55 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-61\"><p>The entire organization becomes more resilient to cyber attacks. Awareness, technical and organizational measures to increase security are put in focus and permeate the entire organization. In addition to that, a certified organization fulfills many of the requirements that partners can set for a collaboration.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13801 iso-27001-en \"><span class=\"entry-title rich-snippet-hidden\">What is ISO 27001?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T21:44:15+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13801\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13801\" href=\"#collapse-1-13801\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is ISO 27001?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13801\" aria-labelledby=\"faq_1-13801\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-39 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-56 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-62\"><p>ISO 27001 is a management system for information security. By using it in your organization, you get a standardized way of working based on all aspects of security.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13800 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">When is it best to scan for vulnerabilities?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:55:22+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13800\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13800\" href=\"#collapse-1-13800\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">When is it best to scan for vulnerabilities?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13800\" aria-labelledby=\"faq_1-13800\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-40 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-57 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-63\"><p>If you have never scanned the system before, it is a good idea to do the scan after regular working hours. If you have a critical system that you update frequently, you should also ensure that the vulnerability scans take place continuously at regular intervals.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13799 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">What are the disadvantages of a vulnerability scan?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:55:19+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13799\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13799\" href=\"#collapse-1-13799\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What are the disadvantages of a vulnerability scan?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13799\" aria-labelledby=\"faq_1-13799\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-41 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-58 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-64\"><p>The vulnerability scan tests whether the vulnerability exists in the system. If you compare it to a pen test, the penetration test goes deeper and tests whether the vulnerability can be used to penetrate the system.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13798 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">What are the benefits of a vulnerability scan?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:55:14+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13798\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13798\" href=\"#collapse-1-13798\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What are the benefits of a vulnerability scan?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13798\" aria-labelledby=\"faq_1-13798\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-42 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-59 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-65\"><p>The vulnerability scan is an effective and fast way to identify which vulnerabilities exist in systems. It also tests the organization&#8217;s ability and level of maturity to handle the actions that come after a vulnerability scan.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13797 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">What do i do with the results of a vulnerability scan?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:55:07+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13797\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13797\" href=\"#collapse-1-13797\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What do i do with the results of a vulnerability scan?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13797\" aria-labelledby=\"faq_1-13797\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-43 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-60 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-66\"><p>After a vulnerability scan, you get a report in your hand. That report needs to be worked on. Start by reviewing the critical vulnerabilities first and then prioritize the order in which they should be addressed. After that, it is good if you leave the work to a technician to complete.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13796 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">What should i scan for vulnerabilities?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:55:04+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13796\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13796\" href=\"#collapse-1-13796\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What should i scan for vulnerabilities?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13796\" aria-labelledby=\"faq_1-13796\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-44 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-61 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-67\"><p>You should actually vulnerability scan all systems that have an external IP address, even the company&#8217;s website. It is also good to scan the server that holds the information assets. In other words, the server that is most critical to the business.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13795 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">Are servers and systems affected during a vulnerability scan?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:55:01+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13795\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13795\" href=\"#collapse-1-13795\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Are servers and systems affected during a vulnerability scan?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13795\" aria-labelledby=\"faq_1-13795\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-45 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-62 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-68\"><p>If you have a very old system that is unstable, the vulnerability scan can absolutely cause the system to crash. But under controlled conditions and with good planning in advance, the risks are minimized<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13794 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">Who conducts the vulnerability scan?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:54:57+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13794\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13794\" href=\"#collapse-1-13794\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Who conducts the vulnerability scan?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13794\" aria-labelledby=\"faq_1-13794\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-46 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-63 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-69\"><p>A vulnerability scan is carried out using a software according to a pre-configured schedule and scope.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13793 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">What is the difference between vulnerability scanning and penetration testing?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:54:52+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13793\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13793\" href=\"#collapse-1-13793\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is the difference between vulnerability scanning and penetration testing?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13793\" aria-labelledby=\"faq_1-13793\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-47 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-64 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-70\"><p>A vulnerability scan is carried out with software that scans the environments and generates a report of identified vulnerabilities. During a pentest, it is taken one step further and evaluates whether the vulnerabilities can be exploited further and gives recommendations on measures<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13792 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">How often should you scan for vulnerabilities?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:54:47+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13792\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13792\" href=\"#collapse-1-13792\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How often should you scan for vulnerabilities?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13792\" aria-labelledby=\"faq_1-13792\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-48 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-65 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-71\"><p>We recommend that the vulnerability scan takes place continuously. How often depends on which systems you have, but a rule of thumb is that this is carried out at least once a month. It is also important that the remedial work itself also takes place continuously.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13757 penetration-test \"><span class=\"entry-title rich-snippet-hidden\">Why should you do a pentest?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:54:26+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13757\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13757\" href=\"#collapse-1-13757\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Why should you do a pentest?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13757\" aria-labelledby=\"faq_1-13757\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-49 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-66 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-72\"><p>In addition to the fact that all systems have vulnerabilities that you want to identify and remove, the background to the need for a penetration test can come from external requirements from investors, customers, suppliers or as a requirement for, for example, certifications.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13791 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">What is vulnerability scanning?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:54:28+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13791\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13791\" href=\"#collapse-1-13791\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is vulnerability scanning?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13791\" aria-labelledby=\"faq_1-13791\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-50 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-67 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-73\"><p>It is a security test that can be done, among other things, on a firewall, a system, server or web page to find and visualize current vulnerabilities<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13790 vulnerability-scan \"><span class=\"entry-title rich-snippet-hidden\">Why should you scan for vulnerabilities?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-28T06:54:21+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13790\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13790\" href=\"#collapse-1-13790\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Why should you scan for vulnerabilities?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13790\" aria-labelledby=\"faq_1-13790\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-51 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-68 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-74\"><p>55 new vulnerabilities are discovered every day. This means that no system is safe. Attackers attack vulnerabilities in systems on a daily basis to try to gain access to the organization&#8217;s information assets or to perform additional attacks on the system.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13789 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Does the data protection officer need to be employed within the organization?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:50:21+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13789\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13789\" href=\"#collapse-1-13789\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Does the data protection officer need to be employed within the organization?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13789\" aria-labelledby=\"faq_1-13789\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-52 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-69 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-75\"><p>No, not necessarily. A data protection officer can be an employee, but the function can also be filled by an external party, such as a consultant.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13788 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Does the data protection officer have to be a lawyer?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:49:47+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13788\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13788\" href=\"#collapse-1-13788\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Does the data protection officer have to be a lawyer?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13788\" aria-labelledby=\"faq_1-13788\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-53 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-70 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-76\"><p>No, there are no explicit requirements that the data protection officer must have a law degree. However, the data protection officer must have; good knowledge of data protection, good expertise and the business and sufficient resources for their mission.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13787 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Can the data protection officer have multiple roles within the organization?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:49:12+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13787\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13787\" href=\"#collapse-1-13787\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Can the data protection officer have multiple roles within the organization?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13787\" aria-labelledby=\"faq_1-13787\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-54 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-71 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-77\"><p>Yes in theory, but the Data Protection Officer must be able to work independently and independently, without being influenced by others within the organization. It is therefore important that the data protection officer does not have other tasks that may conflict with the role of data protection officer.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13786 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Is it possible to have a common data protection officer for several companies?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:48:10+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13786\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13786\" href=\"#collapse-1-13786\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Is it possible to have a common data protection officer for several companies?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13786\" aria-labelledby=\"faq_1-13786\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-55 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-72 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-78\"><p>It is possible within groups and also for independent companies. What is required is that the data protection officer must be able to put in the resources required to reach what is prescribed in the GDPR&#8217;s articles. this also applies to public organisations<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13785 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">What are the duties of a data protection officer?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:47:24+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13785\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13785\" href=\"#collapse-1-13785\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What are the duties of a data protection officer?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13785\" aria-labelledby=\"faq_1-13785\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-56 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-73 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-79\"><p>The data protection officer must:<\/p>\n<ul>\n<li>Advise on impact assessments<\/li>\n<li>Be the contact person for the countrys authority for Privacy Protection<\/li>\n<li>Be the contact person for the registered and the staff within the organization<\/li>\n<li>Cooperate with the authority for Privacy Protection, for example during inspections.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13783 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">What are the responsibilities of a data protection officer?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:44:58+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13783\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13783\" href=\"#collapse-1-13783\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What are the responsibilities of a data protection officer?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13783\" aria-labelledby=\"faq_1-13783\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-57 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-74 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-80\"><p>The data protection officer has no personal responsibility for the organization&#8217;s compliance with the data protection regulation. That responsibility always rests with the person in charge of personal data or with the personal data assistant. The data controller may also not punish the data protection officer for having performed his duties.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13784 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">What is the difference between a DPO and a DOM?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:44:28+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13784\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13784\" href=\"#collapse-1-13784\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is the difference between a DPO and a DOM?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13784\" aria-labelledby=\"faq_1-13784\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-58 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-75 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-81\"><p>Unlike a DPO, the DOM has a more operational role.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13782 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">What are the advantages of an external data protection officer?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:43:42+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13782\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13782\" href=\"#collapse-1-13782\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What are the advantages of an external data protection officer?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13782\" aria-labelledby=\"faq_1-13782\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-59 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-76 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-82\"><p>The external representative&#8217;s advantages are that the person usually brings skills from several organizations and knowledge of current practices. An external representative is also not bound by any place in the organizational hierarchy and does not risk being limited in practice because of this.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13781 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Can our CEO, CISO, CIO or similar be a data protection officer for our company?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:42:45+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13781\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13781\" href=\"#collapse-1-13781\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Can our CEO, CISO, CIO or similar be a data protection officer for our company?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13781\" aria-labelledby=\"faq_1-13781\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-60 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-77 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-83\"><p>No, it is important that the data protection officer is objective in his task. For example, it is not appropriate for the data protection officer to sit in the organization&#8217;s management or to be involved in making strategic decisions about the core business that includes personal data processing.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13780 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Can a group of individuals act as data protection officers?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:41:40+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13780\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13780\" href=\"#collapse-1-13780\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Can a group of individuals act as data protection officers?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13780\" aria-labelledby=\"faq_1-13780\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-61 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-78 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-84\"><p>Yes, a group can act as a data protection officer, but an appointed contact person is always required.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13779 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Which authority must the data protection officer register with?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:41:03+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13779\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13779\" href=\"#collapse-1-13779\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Which authority must the data protection officer register with?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13779\" aria-labelledby=\"faq_1-13779\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-62 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-79 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-85\"><p>The data protection officer needs register to the authority that handles privacy and GDPR questions in their country.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13778 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Can an organization have a data protection officer, even if there is no legal requirement for their business?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:37:50+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13778\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13778\" href=\"#collapse-1-13778\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Can an organization have a data protection officer, even if there is no legal requirement for their business?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13778\" aria-labelledby=\"faq_1-13778\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-63 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-80 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-86\"><p>Yes, the fact is that the supervisory authority encourages all organizations to appoint a data protection officer. This is to be able to communicate more easily when necessary with the supervisory authority, as well as to organize the work with data protection.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13775 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Can organizations be fined for not appointing a data protection officer?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T17:18:56+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13775\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13775\" href=\"#collapse-1-13775\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Can organizations be fined for not appointing a data protection officer?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13775\" aria-labelledby=\"faq_1-13775\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-64 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-81 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-87\"><p>The short answer is yes. Organizations that are obliged by law to have a data protection officer (for example government agencies, or socially important actors), may receive sanctions if they have not employed or alternatively implemented a data protection officer function.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13518 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">What is a CISO?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:31+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13518\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13518\" href=\"#collapse-1-13518\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is a CISO?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13518\" aria-labelledby=\"faq_1-13518\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-65 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-82 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-88\"><p>A CISO (our service) is a security advisor who can help fill functions within the organization where it is needed at the moment. It can be about short-term support to the CTO\/CIO for smaller projects, but also as a long-term skills solution that aims to reduce the burden on other staff.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13516 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">When do you need a CISO?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:31+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13516\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13516\" href=\"#collapse-1-13516\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">When do you need a CISO?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13516\" aria-labelledby=\"faq_1-13516\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-66 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-83 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-89\"><p>An organization can benefit from a CISO in many different situations, for example during temporary work, special projects or to alleviate the workload.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13514 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">What standards do you work based on?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:31+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13514\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13514\" href=\"#collapse-1-13514\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What standards do you work based on?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13514\" aria-labelledby=\"faq_1-13514\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-67 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-84 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-90\"><p>We work based on ISO 27001 but can also support organizations that are certified within NIST CSF.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13511 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">What is included in the CISO service?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:31+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13511\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13511\" href=\"#collapse-1-13511\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What is included in the CISO service?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13511\" aria-labelledby=\"faq_1-13511\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-68 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-85 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-91\"><p>All information security-related work is included in the service. You get a security-savvy advisor who can go into various IT projects in your organization and assist with knowledge.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13509 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">How much time do we need to invest internally?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:32+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13509\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13509\" href=\"#collapse-1-13509\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How much time do we need to invest internally?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13509\" aria-labelledby=\"faq_1-13509\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-69 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-86 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-92\"><p>The largest part of the investment takes place in the introduction, after which the CISO advisor must be able to manage the projects to a large extent by themselves, or together with his contact person depending on the arrangement.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13507 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">What are the first steps?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:32+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13507\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13507\" href=\"#collapse-1-13507\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What are the first steps?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13507\" aria-labelledby=\"faq_1-13507\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-70 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-87 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-93\"><p>It largely depends on the role our CISO will have in your organization. If there is no IT manager or security manager, the CISO advisor produces a current situation analysis.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13505 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">What happens if the CISO advisor gets sick?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:32+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13505\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13505\" href=\"#collapse-1-13505\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What happens if the CISO advisor gets sick?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13505\" aria-labelledby=\"faq_1-13505\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-71 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-88 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-94\"><p>We always have alternative back-up resources available in the event that the CISO advisor becomes ill or absent from work.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13502 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">How does the CISO operate in practice?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:32+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13502\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13502\" href=\"#collapse-1-13502\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How does the CISO operate in practice?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13502\" aria-labelledby=\"faq_1-13502\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-72 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-89 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-95\"><p>Yes, our CISO advisors can make contact with customers and suppliers.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13497 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">How does the CISO operate in practice?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:32+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13497\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13497\" href=\"#collapse-1-13497\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">How does the CISO operate in practice?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13497\" aria-labelledby=\"faq_1-13497\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-73 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-90 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-96\"><p>It largely depends on the place our CISO will have in your organization. If your organization lacks an IT or security manager, the CISO advisor will primarily fill that role, e.t.c.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13496 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">Can we hire your CISO for a temporary position?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:32+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13496\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13496\" href=\"#collapse-1-13496\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Can we hire your CISO for a temporary position?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13496\" aria-labelledby=\"faq_1-13496\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-74 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-91 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-97\"><p>Yes, our CISOs can be hired as a substitute in your projects.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13491 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">In which areas of responsibility can your CISOs work?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:33+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13491\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13491\" href=\"#collapse-1-13491\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">In which areas of responsibility can your CISOs work?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13491\" aria-labelledby=\"faq_1-13491\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-75 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-92 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-98\"><p>Our CISO advisors can in essence fulfill all areas of responsibility within IT security and information security.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13489 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">What are the upsides of hiring a CISO?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:33+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13489\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13489\" href=\"#collapse-1-13489\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What are the upsides of hiring a CISO?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13489\" aria-labelledby=\"faq_1-13489\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-76 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-93 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-99\"><p>There are many advantages to hiring an external CISO. Among other things, you avoid investing resources and energy on a recruitment process. Our colleagues who work externally also have the right knowledge and prerequisites to support your organization. If there are questions that our external CISO does not have the answer to, the probability is high that other staff here will. We also have many IT lawyers working with data protection who can answer complex legal questions.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13487 ciso-as-a-service-en \"><span class=\"entry-title rich-snippet-hidden\">What are the downsides of hiring a CISO?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-09-22T09:56:33+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13487\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13487\" href=\"#collapse-1-13487\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What are the downsides of hiring a CISO?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13487\" aria-labelledby=\"faq_1-13487\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-77 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-94 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-100\"><p>A disadvantage could be that an external CISO can sometimes become a temporary solution to a permanent problem.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider panel-default fusion-faq-post fusion-faq-post-13772 dataskyddsombud-en \"><span class=\"entry-title rich-snippet-hidden\">Do all organizations need a data protection officer?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/author\/henrik-petterson-secify\/\" title=\"Posts by Henrik Petterson\" rel=\"author\">Henrik Petterson<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2022-10-27T16:53:23+02:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-13772\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-parent=\"#accordian-1\" data-target=\"#collapse-1-13772\" href=\"#collapse-1-13772\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Do all organizations need a data protection officer?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-13772\" aria-labelledby=\"faq_1-13772\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10-78 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-95 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-101\"><p>No, not all organizations are required by law to have a data protection officer, but almost all must comply with the GDPR. It can therefore be of great value to a business to have someone who ensures that the ordinance is followed.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-11 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-96 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:0px 50px 0px 50px;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-text fusion-text-102 EyeBrow White\"><p><a id=\"Contact\"><\/a>Get in Touch!<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:60px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-103 BoxText White WhiteLink\"><p>If this sounds interesting for your company, you can either send a message using the contact function, or simply pick up the phone and call 020-66 99 00. We also offer services in <a href=\"https:\/\/www.secify.com\/tjanster\/iso-27001\/\" target=\"_blank\" rel=\"noopener\"><strong>ISO 27001<\/strong><\/a> and as your <a href=\"https:\/\/www.secify.com\/tjanster\/dataskyddsombud\/\" target=\"_blank\" rel=\"noopener\"><strong>external Data Protection Officer<\/strong><\/a>!<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-radius:0px 50px 0px 0px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\">[gravityform id=\"1\" field_values=\"sa_sida_namn=CISO as a Service\" title=\"false\"]<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":0,"parent":8845,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"staatic_meta_publish":"","footnotes":""},"class_list":["post-13480","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages\/13480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/comments?post=13480"}],"version-history":[{"count":0,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages\/13480\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages\/8845"}],"wp:attachment":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/media?parent=13480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}