{"id":7195,"date":"2024-01-29T16:21:14","date_gmt":"2024-01-29T14:21:14","guid":{"rendered":"https:\/\/heliview.com\/security-leadership\/?p=7195"},"modified":"2024-01-30T15:43:09","modified_gmt":"2024-01-30T13:43:09","slug":"whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld","status":"publish","type":"post","link":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/","title":{"rendered":"Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]Het veilig houden van je ICT vereist voortdurende aandacht. InfoSec-professionals kunnen geen moment achterover leunen, omdat de bedreigingen ook geen seconde rust nemen. Het is een voortdurende race om cybercriminelen voor te blijven.<\/p>\n<p>CISO\u2019s lopen continu rond met vragen als: Wat is de status van onze cyberweerbaarheid? Halen we uit onze cyberinvesteringen wel alle mogelijkheden, of moeten investeren in nog een andere oplossing? Voldoet mijn security control raamwerk nog wel? Werken onze incident respons protocollen zoals we verwachten? Kunnen mijn mensen deze ratrace bijhouden? Hebben we voldoende hulpmiddelen en resources om dat vol te houden? Hoe zien de antwoorden op deze vragen er volgende week uit, volgende maand of volgend jaar? BAS \u2013 Breach &amp; Attack Simulation \u2013 kan veel van deze stress en onzekerheid wegnemen. Een pentest of red team actie geeft slechts een momentopname, terwijl je eigenlijk continu wilt weten hoe jouw verdedigingsmaatregelen reageren op cyberaanvallen. Laten we een nader bekijken hoe een BAS-platform in de ideale wereld van de CISO eruit ziet.[\/vc_column_text][vc_empty_space]        <div class=\"lgx-subscriber-area\" >\n            <form class=\"vc-whitepaper-form\">\n                <h3>Download the whitepaper<\/h3>\n                <p class=\"nieuwsbrief-validation-error nieuwsbrief-validation-error--message hidden\">\n                    One or more fields have not been filled in or have been filled in incorrectly.\n                <\/p>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        First name*<br>\n                        <input type=\"text\" name=\"firstname\" maxlength=\"50\" autocomplete=\"given-name\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Last name*<br>\n                        <input type=\"text\" name=\"lastname\" maxlength=\"50\" autocomplete=\"family-name\">\n                    <\/label>\n                <\/div>\n                <div class=\"row\">\n                    <label class=\"col-xs-6\">\n                        Company name*<br>\n                        <input type=\"text\" name=\"companyname\" value=\"\" size=\"50\" autocomplete=\"organization\">\n                    <\/label>\n                    <label class=\"col-xs-6\">\n                        Role*<br>\n                        <input type=\"text\" name=\"workdescription\" value=\"\" size=\"100\" autocomplete=\"organization\">\n                    <\/label>\n                <\/div>\n                <label>\n                    Business email address*\n                    <input type=\"email\" id=\"EmailAddressNewsletter\" name=\"email\" \/>\n                <\/label>\n                <p>By clicking on sign up you give permission to be emailed, you will receive the whitepaper in your mailbox.<\/p>\n                <input onclick=\"Website.SubscribeToNewsletter('851292295237', '75bd9c75-1602-4513-8cf7-03e03db45c8c')\" type=\"button\" class=\"lgx-btn\" value=\"Sign up\">\n                <div id=\"NewsletterSuccess\" class=\"nieuwsbrief-succes hidden\">Thank you, you will receive an email within a few minutes to download the whitepaper.<\/div>\n                <div id=\"NewsletterError\" class=\"nieuwsbrief-error hidden\">Unfortunately something went wrong; your request was not successful. Please try again later.<\/div>\n            <\/form>\n        <\/div>[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_wp_search][vc_wp_posts number=&#8221;5&#8243;]<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_raw_html css=&#8221;&#8221;]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[\/vc_raw_html][\/vc_column][\/vc_row]\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"Het veilig houden van je ICT vereist voortdurende aandacht. InfoSec-professionals kunnen geen moment achterover leunen, omdat de bedreigingen ook geen seconde rust nemen. Het is een voortdurende race om cybercriminelen voor te blijven. CISO\u2019s lopen continu rond met vragen als: Wat is de status van onze cyberweerbaarheid? Halen we uit onze cyberinvesteringen wel alle mogelijkheden, [...]","protected":false},"author":16,"featured_media":7196,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,3,16],"tags":[],"class_list":["post-7195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-branche-nieuws","category-congres-update","category-home"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld? - Security Leadership<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld? - Security Leadership\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Security Leadership\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-01-29T14:21:14+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-01-30T13:43:09+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/01\/Cer2Connect-Header.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\r\n\t<meta property=\"og:image:height\" content=\"350\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"miki\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"miki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/\",\"url\":\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/\",\"name\":\"Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld? - Security Leadership\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/01\/Cer2Connect-Header.png\",\"datePublished\":\"2024-01-29T14:21:14+00:00\",\"dateModified\":\"2024-01-30T13:43:09+00:00\",\"author\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\"},\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#primaryimage\",\"url\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/01\/Cer2Connect-Header.png\",\"contentUrl\":\"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/01\/Cer2Connect-Header.png\",\"width\":1140,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/security-leadership\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#website\",\"url\":\"https:\/\/heliview.com\/security-leadership\/\",\"name\":\"Security Leadership\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d\",\"name\":\"miki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g\",\"caption\":\"miki\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld? - Security Leadership","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/","og_locale":"en_GB","og_type":"article","og_title":"Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld? - Security Leadership","og_url":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/","og_site_name":"Security Leadership","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_published_time":"2024-01-29T14:21:14+00:00","article_modified_time":"2024-01-30T13:43:09+00:00","og_image":[{"width":1140,"height":350,"url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/01\/Cer2Connect-Header.png","type":"image\/png"}],"author":"miki","twitter_card":"summary_large_image","twitter_creator":"@HeliviewConf","twitter_site":"@HeliviewConf","twitter_misc":{"Written by":"miki","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/","url":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/","name":"Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld? - Security Leadership","isPartOf":{"@id":"https:\/\/heliview.com\/security-leadership\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#primaryimage"},"image":{"@id":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#primaryimage"},"thumbnailUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/01\/Cer2Connect-Header.png","datePublished":"2024-01-29T14:21:14+00:00","dateModified":"2024-01-30T13:43:09+00:00","author":{"@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d"},"breadcrumb":{"@id":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#primaryimage","url":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/01\/Cer2Connect-Header.png","contentUrl":"https:\/\/heliview.com\/security-leadership\/wp-content\/uploads\/sites\/19\/2024\/01\/Cer2Connect-Header.png","width":1140,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/security-leadership\/whitepaperhoe-ziet-aanvalssimulatie-eruit-in-de-ideale-ciso-wereld\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/security-leadership\/"},{"@type":"ListItem","position":2,"name":"Whitepaper: Hoe ziet aanvalssimulatie eruit in de ideale CISO-wereld?"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/security-leadership\/#website","url":"https:\/\/heliview.com\/security-leadership\/","name":"Security Leadership","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/security-leadership\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/23de5087e16c5804417bbcf834dc1a3d","name":"miki","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/heliview.com\/security-leadership\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2072894c7d31a87cfcb8ffc4168a4302d3f97f0927b9f9d897e41a34a857d26?s=96&d=mm&r=g","caption":"miki"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/7195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/comments?post=7195"}],"version-history":[{"count":4,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/7195\/revisions"}],"predecessor-version":[{"id":7200,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/posts\/7195\/revisions\/7200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media\/7196"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/media?parent=7195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/categories?post=7195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heliview.com\/security-leadership\/wp-json\/wp\/v2\/tags?post=7195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}