{"id":24742,"date":"2025-02-06T16:00:25","date_gmt":"2025-02-06T16:00:25","guid":{"rendered":"https:\/\/arba-public-website-wordpress-production.up.railway.app\/?p=24742"},"modified":"2025-02-11T16:53:24","modified_gmt":"2025-02-11T16:53:24","slug":"kompleksiteten-i-hjertet-af-cyber","status":"publish","type":"post","link":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/","title":{"rendered":"Kompleksiteten i hjertet af cyber"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"24742\" class=\"elementor elementor-24742\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49b661a0 e-flex e-con-boxed e-con e-parent\" data-id=\"49b661a0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56def429 elementor-widget elementor-widget-text-editor\" data-id=\"56def429\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Ledelsens involvering i cybersikkerhed<\/h2><p>Mens du l\u00e6ser det her, sidder nogen og kl\u00f8r sig i hovedbunden, mens de overvejer, hvordan de h\u00e6ver informationssikkerheden i deres organisation uden at overskride deres budgetter og s\u00e6nke deres produktivitet. Men det vil formentlig ikke lykkes. Projekter inden for informationssikkerhed fejler alt for ofte ved at levere under m\u00e5l og over budget. En af de v\u00e6sentligste \u00e5rsager er formentlig, at det er en misforst\u00e5et disciplin, som b\u00e6rer p\u00e5 en dyb kompleksitet, der b\u00f8r anerkendes fra starten for at opn\u00e5 varige resultater.<\/p><h3>Misforst\u00e5elsen om informationssikkerhed<\/h3><p>Informationssikkerhed opfattes ofte, som noget man l\u00e6gger oven p\u00e5 en organisation. Man tager udgangspunkt i status quo og s\u00e5 vedtager man regler for brugen af IT, ops\u00e6tter et system, der overv\u00e5ger netv\u00e6rket for mist\u00e6nkelig aktivitet, og et andet system, der hj\u00e6lper med at styre adgangsrettigheder for brugere, og n\u00e5r de ting er tilf\u00f8jet, er man mere sikker end f\u00f8r.<br \/>Det er ikke d\u00e5rlige tiltag, men n\u00e5r du \u201dtilf\u00f8jer\u201d sikkerhed, behandler du blot symptomer \u2013 p\u00e5 en dyr og besv\u00e6rlig m\u00e5de. Behandlingen g\u00e5r ofte i st\u00e5, eller virkningen forsvinder kort tid efter. En varig effekt kr\u00e6ver, at ledelsen tager fat om n\u00e6ldens rod og anerkender, at informationssikkerhed dybest set er en paradoksal disciplin.<\/p><h3>Informationssikkerhed er informationskontrol<\/h3><p>Sl\u00e5r man op i l\u00e6rebogen handler informationssikkerhed om at sikre \u201dfortrolighed, integritet og tilg\u00e6ngelighed\u201d af information og systemer. Snushaner og skurke holdes ude, retskafne ansatte holdes inde, data holdes i ordentlig stand og systemer holdes konstant i gang. Det er med andre ord en disciplin, der g\u00e5r ud p\u00e5 at bevare kontrollen over, hvordan informationer og systemer behandles.<br \/>Behovet for informationssikkerhed h\u00e6nger sammen med behovet for IT. I et land som Danmark indeb\u00e6rer langt de fleste stillinger en stor andel vidensarbejde \u2013 det er resultatet af en udvikling, der har st\u00e5et p\u00e5 i flere hundrede \u00e5r og ikke ser ud til at g\u00e5 den anden vej forel\u00f8big. IT er sat i verden for at optimere vidensarbejdet ved at forbedre mulighederne for lagring, \u00e6ndring, kopiering, deling og adgang til information. Og dertil er informationssikkerhed sat i verden for at sikre b\u00e5de \u00e5benheden ved denne proces (adgangstildeling, redundans og retablering) og lukketheden (adgangskontrol, kryptering og filtrering). Informationssikkerhed kan derfor ikke blot l\u00e6gges oven p\u00e5 en organisation, da informationsprocesserne allerede ligger i organisationens fundament og afspejler kompleksiteten i det moderne samfund.<\/p><h3>Ledelsen skaber sikkerheden<\/h3><p>Foranstaltninger, der blot l\u00e6gges oven p\u00e5, vil hurtigt blive tilgroet, n\u00e5r nye arbejdsgange og systemer g\u00f8r, at informationer bliver delt p\u00e5 nye m\u00e5der, og at systemroller \u00e6ndrer funktion i praksis. Det er derfor langt mere relevant for informationssikkerheden, hvilke v\u00e6rkt\u00f8jer en leder i et nyt stort forretningsomr\u00e5de har t\u00e6nkt sig at indk\u00f8be, og hvordan de skal bruges, end hvor god IT-administratoren er til at konfigurere en firewall. Dem, der for alvor har succes med informationssikkerhed, er typisk dem, der er villige til at tr\u00e6ffe h\u00e5rde beslutninger om arbejdsgange og systemer.<\/p><p>Hvis ledelsen t\u00f8r anerkende, at de b\u00e5de skal sikre \u00e5benhed og lukkethed samtidig (en kompleks opgave, der kr\u00e6ver ressourcer og opm\u00e6rksomhed), og samtidig t\u00f8r sk\u00e6re ind til benet, s\u00e5 de kun har de systemer, som de for alvor er dygtige til at bruge og kan sikre forsvarligt, s\u00e5 har de med denne strategiske beslutning lagt grunden for mere varig og robust informationssikkerhed, end langt de fleste organisationer, og samtidig har de valgt at fokusere deres organisation p\u00e5 at g\u00f8re det, de er bedst til, en forretningsstrategi, der har bevist sit v\u00e6rd gang p\u00e5 gang.<br \/>S\u00e5 med det in mente, hvis du vil tale strategiske beslutninger om informationssikkerhed, s\u00e5 r\u00e6k ud til Niklas Rendboe p\u00e5 niklas.rendboe@arbasecurity.com<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9817ba6 elementor-widget elementor-widget-spacer\" data-id=\"9817ba6\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d595a0b e-flex e-con-boxed e-con e-parent\" data-id=\"2d595a0b\" data-element_type=\"container\" id=\"download\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-227866f2 e-con-full e-flex e-con e-child\" data-id=\"227866f2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dbba2ee e-con-full radial-gradient animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"dbba2ee\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:100,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:24391,&quot;url&quot;:&quot;https:\\\/\\\/arbasecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/bg-arba-bottom-2.png&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t<div class=\"elementor-element elementor-element-3585da18 e-con-full e-flex e-con e-child\" data-id=\"3585da18\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-722a3b8a animated-fast elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"722a3b8a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-text_center   ekit_heading_mobile-text_left\"><h6 class=\"elementskit-section-subtitle   ekit-heading__subtitle-has-border\">\n\t\t\t\t\t\tGet in touch\n\t\t\t\t\t<\/h6><h3 class=\"ekit-heading--title elementskit-section-title text_fill\">Cybersecurity starts at the top<\/h3>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Strong security requires leadership. Arba equips management with the tools and insights needed to drive risk-based decisions and build a resilient organization.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0059564 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"0059564\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/schedule-demo\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book discovery call<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ede1e6a e-con-full e-flex e-con e-child\" data-id=\"7ede1e6a\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ledelsens involvering i cybersikkerhed Mens du l\u00e6ser det her, sidder nogen og kl\u00f8r sig i hovedbunden, mens de overvejer, hvordan de h\u00e6ver informationssikkerheden i deres organisation uden at overskride deres budgetter og s\u00e6nke deres produktivitet. Men det vil formentlig ikke lykkes. Projekter inden for informationssikkerhed fejler alt for ofte ved at levere under m\u00e5l og [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25178,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-24742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Kompleksiteten i hjertet af cyber - Arba Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kompleksiteten i hjertet af cyber - Arba Security\" \/>\n<meta property=\"og:description\" content=\"Ledelsens involvering i cybersikkerhed Mens du l\u00e6ser det her, sidder nogen og kl\u00f8r sig i hovedbunden, mens de overvejer, hvordan de h\u00e6ver informationssikkerheden i deres organisation uden at overskride deres budgetter og s\u00e6nke deres produktivitet. Men det vil formentlig ikke lykkes. Projekter inden for informationssikkerhed fejler alt for ofte ved at levere under m\u00e5l og [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"Arba Security\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-06T16:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T16:53:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2392\" \/>\n\t<meta property=\"og:image:height\" content=\"1344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Niklas Rendboe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"Niklas Rendboe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/\"},\"author\":{\"name\":\"Niklas Rendboe\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/2ee4a534499787255fa28da49ff2485b\"},\"headline\":\"Kompleksiteten i hjertet af cyber\",\"datePublished\":\"2025-02-06T16:00:25+00:00\",\"dateModified\":\"2025-02-11T16:53:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/\"},\"wordCount\":686,\"publisher\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/\",\"url\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/\",\"name\":\"Kompleksiteten i hjertet af cyber - Arba Security\",\"isPartOf\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg\",\"datePublished\":\"2025-02-06T16:00:25+00:00\",\"dateModified\":\"2025-02-11T16:53:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#primaryimage\",\"url\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg\",\"contentUrl\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg\",\"width\":2392,\"height\":1344},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/arbasecurity.com\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kompleksiteten i hjertet af cyber\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#website\",\"url\":\"https:\/\/arbasecurity.com\/da\/\",\"name\":\"Arba Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/arbasecurity.com\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#organization\",\"name\":\"Arba Security\",\"url\":\"https:\/\/arbasecurity.com\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2023\/11\/site-logo.png\",\"contentUrl\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2023\/11\/site-logo.png\",\"width\":350,\"height\":121,\"caption\":\"Arba Security\"},\"image\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/2ee4a534499787255fa28da49ff2485b\",\"name\":\"Niklas Rendboe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9f341e932a3424a259e2a7fb559eab62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9f341e932a3424a259e2a7fb559eab62?s=96&d=mm&r=g\",\"caption\":\"Niklas Rendboe\"},\"description\":\"Niklas Rendboe is an information security expert specializing in governance, risk, and compliance. He serves as the Chief Information Security Officer (CISO) at Arba Security and works as a cybersecurity consultant at Trustworks Cyber Security. Additionally, he is a member of a research group at the Royal Danish Defence College, where he studies Russian military capabilities, and he has served in several advisory roles concerning private actors in security politics. Niklas earned his MSc in International Security &amp; Law from the University of Southern Denmark in 2019 and holds multiple certifications related to information security and risk management.\",\"url\":\"https:\/\/arbasecurity.com\/da\/blog\/author\/niklas-rendboearbasecurity-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kompleksiteten i hjertet af cyber - Arba Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/","og_locale":"da_DK","og_type":"article","og_title":"Kompleksiteten i hjertet af cyber - Arba Security","og_description":"Ledelsens involvering i cybersikkerhed Mens du l\u00e6ser det her, sidder nogen og kl\u00f8r sig i hovedbunden, mens de overvejer, hvordan de h\u00e6ver informationssikkerheden i deres organisation uden at overskride deres budgetter og s\u00e6nke deres produktivitet. Men det vil formentlig ikke lykkes. Projekter inden for informationssikkerhed fejler alt for ofte ved at levere under m\u00e5l og [&hellip;]","og_url":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/","og_site_name":"Arba Security","article_published_time":"2025-02-06T16:00:25+00:00","article_modified_time":"2025-02-11T16:53:24+00:00","og_image":[{"width":2392,"height":1344,"url":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg","type":"image\/jpeg"}],"author":"Niklas Rendboe","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"Niklas Rendboe","Estimeret l\u00e6setid":"3 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#article","isPartOf":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/"},"author":{"name":"Niklas Rendboe","@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/2ee4a534499787255fa28da49ff2485b"},"headline":"Kompleksiteten i hjertet af cyber","datePublished":"2025-02-06T16:00:25+00:00","dateModified":"2025-02-11T16:53:24+00:00","mainEntityOfPage":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/"},"wordCount":686,"publisher":{"@id":"https:\/\/arbasecurity.com\/da\/#organization"},"image":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg","articleSection":["Insights"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/","url":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/","name":"Kompleksiteten i hjertet af cyber - Arba Security","isPartOf":{"@id":"https:\/\/arbasecurity.com\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#primaryimage"},"image":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg","datePublished":"2025-02-06T16:00:25+00:00","dateModified":"2025-02-11T16:53:24+00:00","breadcrumb":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#primaryimage","url":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg","contentUrl":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/kompleksiteten-i-hjertet-af-cyber.jpg","width":2392,"height":1344},{"@type":"BreadcrumbList","@id":"https:\/\/arbasecurity.com\/da\/blog\/kompleksiteten-i-hjertet-af-cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arbasecurity.com\/da\/"},{"@type":"ListItem","position":2,"name":"Kompleksiteten i hjertet af cyber"}]},{"@type":"WebSite","@id":"https:\/\/arbasecurity.com\/da\/#website","url":"https:\/\/arbasecurity.com\/da\/","name":"Arba Security","description":"","publisher":{"@id":"https:\/\/arbasecurity.com\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arbasecurity.com\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/arbasecurity.com\/da\/#organization","name":"Arba Security","url":"https:\/\/arbasecurity.com\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/logo\/image\/","url":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2023\/11\/site-logo.png","contentUrl":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2023\/11\/site-logo.png","width":350,"height":121,"caption":"Arba Security"},"image":{"@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/2ee4a534499787255fa28da49ff2485b","name":"Niklas Rendboe","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9f341e932a3424a259e2a7fb559eab62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9f341e932a3424a259e2a7fb559eab62?s=96&d=mm&r=g","caption":"Niklas Rendboe"},"description":"Niklas Rendboe is an information security expert specializing in governance, risk, and compliance. He serves as the Chief Information Security Officer (CISO) at Arba Security and works as a cybersecurity consultant at Trustworks Cyber Security. Additionally, he is a member of a research group at the Royal Danish Defence College, where he studies Russian military capabilities, and he has served in several advisory roles concerning private actors in security politics. Niklas earned his MSc in International Security &amp; Law from the University of Southern Denmark in 2019 and holds multiple certifications related to information security and risk management.","url":"https:\/\/arbasecurity.com\/da\/blog\/author\/niklas-rendboearbasecurity-com\/"}]}},"_links":{"self":[{"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/posts\/24742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/comments?post=24742"}],"version-history":[{"count":17,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/posts\/24742\/revisions"}],"predecessor-version":[{"id":25280,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/posts\/24742\/revisions\/25280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/media\/25178"}],"wp:attachment":[{"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/media?parent=24742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/categories?post=24742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/tags?post=24742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}