{"id":25192,"date":"2025-02-11T15:44:43","date_gmt":"2025-02-11T15:44:43","guid":{"rendered":"https:\/\/arba-public-website-wordpress-production.up.railway.app\/?p=25192"},"modified":"2025-02-11T16:53:43","modified_gmt":"2025-02-11T16:53:43","slug":"why-arba-relies-on-maturity-scores","status":"publish","type":"post","link":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/","title":{"rendered":"Why Arba relies on maturity scores"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"25192\" class=\"elementor elementor-25192\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34029ef0 e-flex e-con-boxed e-con e-parent\" data-id=\"34029ef0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42335d2d elementor-widget elementor-widget-text-editor\" data-id=\"42335d2d\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">When you use the Arba platform, you choose a standard or framework to work with and fill out a questionnaire regarding how far you have already come with implementing that standard.<\/p><p style=\"font-weight: 400;\">The situation might remind you of an audit situation or of writing a statement of applicability, where you decide for each control: Has this been implemented?<\/p><p style=\"font-weight: 400;\">But there is one important difference. Arba asks for your level of maturity, and not whether you have implemented the control, yes or no.<\/p><p style=\"font-weight: 400;\">But what is maturity and how and why does Arba use it?<\/p><h3>What maturity is<\/h3><p style=\"font-weight: 400;\">In the context of the tech industry and cyber and information security, maturity refers to how well-developed a certain capability is within an organization. Is it barely more than a thought and a thing that the organization might be able to do? Or is it part of a well-oiled machinery of educated professionals with processes, practices and supporting tools?<\/p><p>Any organization must be interested in the questions: Are we doing the right things? And: Are we doing things right? Understanding the maturity of core capabilities is a great help when figuring this out.<\/p><p style=\"font-weight: 400;\">As part of their work with helping organizations measure and mature capabilities, the University of Carnegie Mellon once developed the Capability Maturity Model Integration (now owned by ISACA), which is a program to advance organizational capabilities. From their work, we get the CMMI scale, a widely recognized way of measuring maturity on a five-point scale.<\/p><p style=\"font-weight: 400;\">There are many different formulations of what the five levels mean, we offer an instructive, but improvised description here:<\/p><ol><li><strong>Initial:<\/strong><br \/>When we perform the tasks related to this capability, we do so on our own bottom-up initiative without training, standardization, governance or strategic considerations.<\/li><li><strong>Managed:<\/strong><br \/>The tasks related to this capability are placed under named managers who have made and perhaps documented key decisions regarding the topic. But our ways of working remain unstandardized, under-strategized, and incomplete.<\/li><li><strong>Defined:<\/strong><br \/>The capability is defined with governance, standards and clear expectations under responsible well-defined management. This is the level many of us associates with compliance, we\u2019re good on paper, perhaps in the real world as well.<\/li><li><strong>Quantitatively managed:<\/strong><br \/>The capability is well-defined and documented, and the effectiveness of the related controls are known from data being collected and analyzed.<\/li><li><strong>Optimizing:<\/strong><br \/>Building on a quantitatively managed capability, we are now focusing on optimizing and ensuring that we discover opportunities for improvements, adjustments, savings and proactive action.<\/li><\/ol><h3>How does Arba use maturity and why?<\/h3><p style=\"font-weight: 400;\">Arba is a platform that provides automated cyber and information security consulting. By basing the advice within the platform on a measure of maturity rather than a yes\/no, Arba can provide advice that does not simply consist of a series of overwhelmingly large and expensive implementation projects, instead Arba provides advice for bite-sized, prioritized tasks that help organizations build their maturity incrementally.<\/p><p style=\"font-weight: 400;\">Within large organizations, we have often seen that projects for cyber and information security have been seen as failures by management because the people responsible for implementation come back time and again to address the very same controls, they addressed several times before. This is frustrating to those responsible for allocating budgets and hiring professionals.<\/p><p style=\"font-weight: 400;\">The unwelcome truth to the managers accountable is that iteration over the same controls is indeed best practice. And the unwelcome truth to the professionals responsible is that they should be able to plan for this in a transparent way when asking for resources in the first place. Arba addresses this pain by providing up front action plans for addressing the controls several times over through subtasks, allowing for more transparent and cost-effective planning in the first go.<\/p><p style=\"font-weight: 400;\">A final truth which is sometimes welcomed with open arms, and sometimes begrudgingly ignored, is that all organizations should not strive for maximum security maturity.<\/p><p style=\"font-weight: 400;\">Based on first assessing your company risk profile, Arba suggests a target level of maturity fit for your organization. You can accept the suggestion or pick a different target, but you must pick a target to go on. Based on a combination of where you are (your maturity) and where you want to go (your target), Arba identifies the many relevant tasks which will be relevant to your security journey.<\/p><p style=\"font-weight: 400;\">Without maturity, Arba would be selling one-size-fits-none security advice in a nice wrapping. Hopefully, you\u2019ll find that Arba is in fact tailored and prioritized for your needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-355ae0e elementor-widget elementor-widget-spacer\" data-id=\"355ae0e\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52a4fe0b e-flex e-con-boxed e-con e-parent\" data-id=\"52a4fe0b\" data-element_type=\"container\" id=\"download\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5b10e46a e-con-full e-flex e-con e-child\" data-id=\"5b10e46a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-17e3222f e-con-full radial-gradient animated-fast e-flex elementor-invisible e-con e-child\" data-id=\"17e3222f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:100,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:24391,&quot;url&quot;:&quot;https:\\\/\\\/arbasecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/bg-arba-bottom-2.png&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t<div class=\"elementor-element elementor-element-2eb4fb0e e-con-full e-flex e-con e-child\" data-id=\"2eb4fb0e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-186fb562 animated-fast elementor-invisible elementor-widget elementor-widget-elementskit-heading\" data-id=\"186fb562\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:200,&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"elementskit-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" ><div class=\"ekit-heading elementskit-section-title-wraper text_left   ekit_heading_tablet-text_center   ekit_heading_mobile-text_left\"><h6 class=\"elementskit-section-subtitle   ekit-heading__subtitle-has-border\">\n\t\t\t\t\t\tGet in touch\n\t\t\t\t\t<\/h6><h3 class=\"ekit-heading--title elementskit-section-title text_fill\">Measure, improve, secure<\/h3>\t\t\t\t<div class='ekit-heading__description'>\n\t\t\t\t\t<p>Arba uses maturity scores to track progress, prioritize risks, and strengthen cybersecurity with a structured, data-driven approach.<\/p>\n\t\t\t\t<\/div>\n\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d91ff3d elementor-align-left elementor-widget elementor-widget-button\" data-id=\"d91ff3d\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/schedule-demo\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-calendar-alt\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Book discovery call<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-14b4506c e-con-full e-flex e-con e-child\" data-id=\"14b4506c\" data-element_type=\"container\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>When you use the Arba platform, you choose a standard or framework to work with and fill out a questionnaire regarding how far you have already come with implementing that standard. The situation might remind you of an audit situation or of writing a statement of applicability, where you decide for each control: Has this [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25221,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-25192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Arba relies on maturity scores - Arba Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Arba relies on maturity scores - Arba Security\" \/>\n<meta property=\"og:description\" content=\"When you use the Arba platform, you choose a standard or framework to work with and fill out a questionnaire regarding how far you have already come with implementing that standard. The situation might remind you of an audit situation or of writing a statement of applicability, where you decide for each control: Has this [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/\" \/>\n<meta property=\"og:site_name\" content=\"Arba Security\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-11T15:44:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-11T16:53:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2392\" \/>\n\t<meta property=\"og:image:height\" content=\"1344\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Niklas Rendboe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"Niklas Rendboe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/\"},\"author\":{\"name\":\"Niklas Rendboe\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/2ee4a534499787255fa28da49ff2485b\"},\"headline\":\"Why Arba relies on maturity scores\",\"datePublished\":\"2025-02-11T15:44:43+00:00\",\"dateModified\":\"2025-02-11T16:53:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/\",\"url\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/\",\"name\":\"Why Arba relies on maturity scores - Arba Security\",\"isPartOf\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg\",\"datePublished\":\"2025-02-11T15:44:43+00:00\",\"dateModified\":\"2025-02-11T16:53:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#primaryimage\",\"url\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg\",\"contentUrl\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg\",\"width\":2392,\"height\":1344},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/arbasecurity.com\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Arba relies on maturity scores\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#website\",\"url\":\"https:\/\/arbasecurity.com\/da\/\",\"name\":\"Arba Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/arbasecurity.com\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#organization\",\"name\":\"Arba Security\",\"url\":\"https:\/\/arbasecurity.com\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2023\/11\/site-logo.png\",\"contentUrl\":\"https:\/\/arbasecurity.com\/wp-content\/uploads\/2023\/11\/site-logo.png\",\"width\":350,\"height\":121,\"caption\":\"Arba Security\"},\"image\":{\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/2ee4a534499787255fa28da49ff2485b\",\"name\":\"Niklas Rendboe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9f341e932a3424a259e2a7fb559eab62?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9f341e932a3424a259e2a7fb559eab62?s=96&d=mm&r=g\",\"caption\":\"Niklas Rendboe\"},\"description\":\"Niklas Rendboe is an information security expert specializing in governance, risk, and compliance. He serves as the Chief Information Security Officer (CISO) at Arba Security and works as a cybersecurity consultant at Trustworks Cyber Security. Additionally, he is a member of a research group at the Royal Danish Defence College, where he studies Russian military capabilities, and he has served in several advisory roles concerning private actors in security politics. Niklas earned his MSc in International Security &amp; Law from the University of Southern Denmark in 2019 and holds multiple certifications related to information security and risk management.\",\"url\":\"https:\/\/arbasecurity.com\/da\/blog\/author\/niklas-rendboearbasecurity-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Arba relies on maturity scores - Arba Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/","og_locale":"da_DK","og_type":"article","og_title":"Why Arba relies on maturity scores - Arba Security","og_description":"When you use the Arba platform, you choose a standard or framework to work with and fill out a questionnaire regarding how far you have already come with implementing that standard. The situation might remind you of an audit situation or of writing a statement of applicability, where you decide for each control: Has this [&hellip;]","og_url":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/","og_site_name":"Arba Security","article_published_time":"2025-02-11T15:44:43+00:00","article_modified_time":"2025-02-11T16:53:43+00:00","og_image":[{"width":2392,"height":1344,"url":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg","type":"image\/jpeg"}],"author":"Niklas Rendboe","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"Niklas Rendboe","Estimeret l\u00e6setid":"4 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#article","isPartOf":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/"},"author":{"name":"Niklas Rendboe","@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/2ee4a534499787255fa28da49ff2485b"},"headline":"Why Arba relies on maturity scores","datePublished":"2025-02-11T15:44:43+00:00","dateModified":"2025-02-11T16:53:43+00:00","mainEntityOfPage":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/"},"wordCount":765,"publisher":{"@id":"https:\/\/arbasecurity.com\/da\/#organization"},"image":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#primaryimage"},"thumbnailUrl":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg","articleSection":["Insights"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/","url":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/","name":"Why Arba relies on maturity scores - Arba Security","isPartOf":{"@id":"https:\/\/arbasecurity.com\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#primaryimage"},"image":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#primaryimage"},"thumbnailUrl":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg","datePublished":"2025-02-11T15:44:43+00:00","dateModified":"2025-02-11T16:53:43+00:00","breadcrumb":{"@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#primaryimage","url":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg","contentUrl":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2025\/02\/cmmi-cover-photo.jpg","width":2392,"height":1344},{"@type":"BreadcrumbList","@id":"https:\/\/arbasecurity.com\/da\/blog\/why-arba-relies-on-maturity-scores\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arbasecurity.com\/da\/"},{"@type":"ListItem","position":2,"name":"Why Arba relies on maturity scores"}]},{"@type":"WebSite","@id":"https:\/\/arbasecurity.com\/da\/#website","url":"https:\/\/arbasecurity.com\/da\/","name":"Arba Security","description":"","publisher":{"@id":"https:\/\/arbasecurity.com\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arbasecurity.com\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/arbasecurity.com\/da\/#organization","name":"Arba Security","url":"https:\/\/arbasecurity.com\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/logo\/image\/","url":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2023\/11\/site-logo.png","contentUrl":"https:\/\/arbasecurity.com\/wp-content\/uploads\/2023\/11\/site-logo.png","width":350,"height":121,"caption":"Arba Security"},"image":{"@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/2ee4a534499787255fa28da49ff2485b","name":"Niklas Rendboe","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/arbasecurity.com\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9f341e932a3424a259e2a7fb559eab62?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9f341e932a3424a259e2a7fb559eab62?s=96&d=mm&r=g","caption":"Niklas Rendboe"},"description":"Niklas Rendboe is an information security expert specializing in governance, risk, and compliance. He serves as the Chief Information Security Officer (CISO) at Arba Security and works as a cybersecurity consultant at Trustworks Cyber Security. Additionally, he is a member of a research group at the Royal Danish Defence College, where he studies Russian military capabilities, and he has served in several advisory roles concerning private actors in security politics. Niklas earned his MSc in International Security &amp; Law from the University of Southern Denmark in 2019 and holds multiple certifications related to information security and risk management.","url":"https:\/\/arbasecurity.com\/da\/blog\/author\/niklas-rendboearbasecurity-com\/"}]}},"_links":{"self":[{"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/posts\/25192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/comments?post=25192"}],"version-history":[{"count":12,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/posts\/25192\/revisions"}],"predecessor-version":[{"id":25275,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/posts\/25192\/revisions\/25275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/media\/25221"}],"wp:attachment":[{"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/media?parent=25192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/categories?post=25192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arbasecurity.com\/da\/wp-json\/wp\/v2\/tags?post=25192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}