{"id":6504,"date":"2022-04-06T05:36:25","date_gmt":"2022-04-06T03:36:25","guid":{"rendered":"https:\/\/heliview.com\/urity-leadership\/?p=6504"},"modified":"2022-04-06T05:37:30","modified_gmt":"2022-04-06T03:37:30","slug":"wie-raakt-onze-gegevens-aan-en-voor-welk-doel","status":"publish","type":"post","link":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/","title":{"rendered":"Wie raakt onze gegevens aan en voor welk doel?"},"content":{"rendered":"
[vc_row][vc_column width=”2\/3″][vc_column_text]Dit zijn essenti\u00eble vragen die de Chief Operating Officer van een grote internationale financi\u00eble dienstverlener aan zijn beveiligingsteam stelde. Ondanks het feit dat hij een geavanceerde beveiligingsstructuur had met behulp van een toonaangevende MSSP en CrowdStrike ter bescherming tegen externe bedreigingen, stelde de klant een behoefte aan extra zichtbaarheid te onderkennen om zijn gevoelige klantgegevens te beschermen tegen bedreigingen van binnenuit.<\/p>\n

De klant omschreef de uitdaging als volgt: “Met 1000-en werknemers, loggen onze systemen meer dan 6,6 miljard gebeurtenissen per jaar waardoor handmatige inspectie moeilijk, duur en tijdrovend is.<\/p>\n

We hebben al \u00e9\u00e9n fulltime medewerker die e-mails controleert op mogelijke bedreigingen van binnenuit. Dit is duidelijk geen schaalbaar proces, en het is ook nog eens afhankelijk van mensen die fouten kunnen maken. In onze sterk gereguleerde sector is het risico van reputatieschade gewoon te hoog voor ons. Daarom gingen ze op zoek naar een oplossing die een aanvulling zou zijn op onze bestaande beveiligingsinfrastructuur en ons specifiek zou richten op bedreigingen van binnenuit.”<\/p>\n

Lees dit referentieverhaal<\/a> en begrijp waarom ze kozen voor Arcsight Intelligence.[\/vc_column_text][vc_single_image image=”6505″ img_size=””]

\r\n Bezoek Security Leadership<\/span><\/a>\r\n \r\n \r\n <\/div>[vc_empty_space][\/vc_column][vc_column width=”1\/3″][vc_wp_search][vc_wp_posts title=”Ander nieuws” number=”3″]
[vc_row][vc_column][vc_raw_html css=””]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[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"

Dit zijn essenti\u00eble vragen die de Chief Operating Officer van een grote internationale financi\u00eble dienstverlener aan zijn beveiligingsteam stelde. Ondanks het feit dat hij een geavanceerde beveiligingsstructuur had met behulp van een toonaangevende MSSP en CrowdStrike<\/p>\n","protected":false},"author":7,"featured_media":6506,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,16],"tags":[],"class_list":["post-6504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-home"],"yoast_head":"\r\nWie raakt onze gegevens aan en voor welk doel? - Security Leadership<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Wie raakt onze gegevens aan en voor welk doel? - Security Leadership\" \/>\r\n<meta property=\"og:description\" content=\"Dit zijn essenti\u00eble vragen die de Chief Operating Officer van een grote internationale financi\u00eble dienstverlener aan zijn beveiligingsteam stelde. Ondanks het feit dat hij een geavanceerde beveiligingsstructuur had met behulp van een toonaangevende MSSP en CrowdStrike\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Security Leadership\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2022-04-06T03:36:25+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2022-04-06T03:37:30+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2022\/04\/3.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"siham\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"siham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/\",\"url\":\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/\",\"name\":\"Wie raakt onze gegevens aan en voor welk doel? - Security Leadership\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2022\/04\/3.png\",\"datePublished\":\"2022-04-06T03:36:25+00:00\",\"dateModified\":\"2022-04-06T03:37:30+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2022\/04\/3.png\",\"contentUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2022\/04\/3.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/security-leadership\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wie raakt onze gegevens aan en voor welk doel?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\",\"url\":\"https:\/\/heliview.com\/security-leadership\/\",\"name\":\"Security Leadership\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0\",\"name\":\"siham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g\",\"caption\":\"siham\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wie raakt onze gegevens aan en voor welk doel? - Security Leadership","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/","og_locale":"en_GB","og_type":"article","og_title":"Wie raakt onze gegevens aan en voor welk doel? - Security Leadership","og_description":"Dit zijn essenti\u00eble vragen die de Chief Operating Officer van een grote internationale financi\u00eble dienstverlener aan zijn beveiligingsteam stelde. Ondanks het feit dat hij een geavanceerde beveiligingsstructuur had met behulp van een toonaangevende MSSP en CrowdStrike","og_url":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/","og_site_name":"Security Leadership","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2022-04-06T03:36:25+00:00","article_modified_time":"2022-04-06T03:37:30+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2022\/04\/3.png","type":"image\/png"}],"author":"siham","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Written by":"siham","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/","url":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/","name":"Wie raakt onze gegevens aan en voor welk doel? - Security Leadership","isPartOf":{"@id":"https:\/\/heliview.com\/security-leadership\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2022\/04\/3.png","datePublished":"2022-04-06T03:36:25+00:00","dateModified":"2022-04-06T03:37:30+00:00","author":{"@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0"},"breadcrumb":{"@id":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#primaryimage","url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2022\/04\/3.png","contentUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2022\/04\/3.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/security-leadership\/wie-raakt-onze-gegevens-aan-en-voor-welk-doel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/security-leadership\/"},{"@type":"ListItem","position":2,"name":"Wie raakt onze gegevens aan en voor welk doel?"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/security-leadership\/#website","url":"https:\/\/heliview.com\/security-leadership\/","name":"Security Leadership","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/6408bccdad8463385ac324f0e3beaeb0","name":"siham","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86518bc3f7084df2e21b01a46f96da5c6e8b3feafa0612e0da34d295da47f286?s=96&d=mm&r=g","caption":"siham"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/comments?post=6504"}],"version-history":[{"count":2,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6504\/revisions"}],"predecessor-version":[{"id":6508,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/6504\/revisions\/6508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media\/6506"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media?parent=6504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/categories?post=6504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/tags?post=6504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}