{"id":5331,"date":"2024-07-01T10:07:02","date_gmt":"2024-07-01T08:07:02","guid":{"rendered":"https:\/\/opensight.indivontwikkelt.nl\/services\/process\/"},"modified":"2024-08-05T14:23:23","modified_gmt":"2024-08-05T12:23:23","slug":"process","status":"publish","type":"page","link":"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/process\/","title":{"rendered":"Process"},"content":{"rendered":"\n<div class=\"wp-block-group p-block h-screen p-header mb-0 h-overflow1 has-white-transparant-color has-dark-blue-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row gy-5 align-items-center\">\n\t\n\n<div class=\"col-12 col-md-8 col-lg-5 indivaos_zoom-in-up\">\n\t\t\t\n\n<h2 class=\"wp-block-heading\">Process<\/h2>\n\n\n\n<p>Tighten your defences by implementing cyber security processes that integrate seamlessly with your business operations. The efficiency of tailor-made cyber security processes ensures timely incident response, compliance and risk control.<\/p>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-primary indiv-block bsbutton btn-custom\" href=\"\/en\/services\/overview\/\" target=\"_self\"> View all services<\/a>\n  <\/div>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6 offset-lg-1\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n<div class=\"wp-block-image img-overflow2\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"887\" height=\"1024\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-geel-887x1024.png\" alt=\"\" class=\"wp-image-3909\" style=\"width:300px\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-geel-887x1024.png 887w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-geel-260x300.png 260w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-geel-768x887.png 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-geel-1330x1536.png 1330w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-geel-1773x2048.png 1773w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-geel.png 1974w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/figure>\n<\/div>\n\t\t<\/div>\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group p-block-mob has-dark-blue-color has-white-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n<div class=\"wp-bootstrap-blocks-row row gx-md-5 justify-content-center\">\n\t\n\n<div class=\"col-5 col-md-3\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"887\" height=\"1024\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-tekst-blauw-887x1024.png\" alt=\"\" class=\"wp-image-3911\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-tekst-blauw-887x1024.png 887w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-tekst-blauw-260x300.png 260w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-tekst-blauw-768x887.png 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-tekst-blauw-1330x1536.png 1330w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-tekst-blauw-1774x2048.png 1774w, https:\/\/opensight.indivontwikkelt.nl\/content\/process-icon-tekst-blauw.png 1973w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-9 col-lg-8 offset-lg-1 text-center text-md-start indivaos_fade-right\">\n\t\t\t\n\n<h2 class=\"wp-block-heading text-center text-md-start\">Strengthen your operations with cyber security processes<\/h2>\n\n\n\n<p class=\"has-text-align-left\">Effective defense against cyber threats starts with well thought-out and seamlessly integrated cyber security processes. Our focus is on strengthening your operations by implementing tailor-made cyber security processes.<\/p>\n\n\n\n<p class=\"has-text-align-left\">By efficiently integrating these processes into your operations, we ensure that your organization is able to respond quickly to incidents, meet compliance requirements and control risks. The tailored approach means that cyber security processes are specifically tailored to your company&#8217;s needs and characteristics, making them more effective and relevant.<\/p>\n\n\n\n<p class=\"has-text-align-left\">Timely response to incidents is essential to limit potential damage, and implementing well-thought-out processes helps. In addition, these processes help ensure compliance with relevant laws and regulations, which is crucial for maintaining the trust of customers and partners.<\/p>\n\n\n\n<p class=\"has-text-align-left\">By keeping risks under control, you help your business become more resilient against ever-evolving cyber threats. In short, effectively strengthening your business operations with tailored cyber security processes is key to protecting your organisation from cyber threats and ensuring a secure digital business environment.<\/p>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group p-block has-white-transparant-color has-dark-blue-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n\n<h4 class=\"wp-block-heading has-text-align-center h4 also-interesting pb-4\">Services in this category<\/h4>\n\n\n  <div class=\"indiv-block diensten-slider mx-4 mx-md-0\">\n    <div class=\"swiper\" id=\"diensten-slider\">\n      <div class=\"swiper-wrapper\">\n                    <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/governance-risk-compliance-grc-tooling\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"man grc tooling\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Governance, Risk  Compliance (GRC) tooling<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-82.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      You are in the process of implementing your cyber security framework or standard. After a good start, you want to take a more pragmatic approach instead of using all kinds of different documentation. At&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/cyber-security-framework-advisory-processes\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"2 mannen over cyber security framework advies trajecten\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Cyber security framework advisory processes<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-82.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Are you in the process of implementing a cyber security framework but not getting anywhere? With OpenSight&#8217;s practical attitude and diverse experience, we can help your organization implement your cyber security framework.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/nis2-audit\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"NIS2 audit\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>NIS2 audit<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-82.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      The NIS2 European regulation is on the horizon. In October 2024, this legislation will come into effect, and although some details are still unknown, we will be challenged to improve our Network and Information&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                <\/div>\n      <div class=\"swiper-pagination\"><\/div>\n    <\/div>\n\n    <div class=\"diensten-slider-pagination\">\n      <div class=\"slider-button button-prev\">\n        <i class=\"fas fa-chevron-left\"><\/i>\n      <\/div>\n      <div class=\"page-info\">\n        <span class=\"current\">1<\/span>\/<span class=\"total\">1<\/span>\n      <\/div>\n      <div class=\"slider-button button-next\">\n        <i class=\"fas fa-chevron-right\"><\/i>\n      <\/div>\n    <\/div>\n  <\/div>\n\n<\/div>\n<\/div><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-2 p-block why-opensight\">\n\t\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-7\">\n\t\t\t\n\n<h2 class=\"wp-block-heading has-text-align-center text-transform-none has-dark-blue-color has-text-color has-link-color wp-elements-4e4f77994340665f1550eefba7ce4288\">Why OpenSight?<\/h2>\n\n\n\n<p class=\"has-text-align-center has-dark-blue-color has-text-color has-link-color wp-elements-5e40db43545baf4982abb080e9bd484e\">Our focus is on delivering appropriate cybersecurity solutions based on the organization&#8217;s risk profile. In our view, cyber security is not in technology alone, but is a combination of people, processes and technology where technology should be supported in achieving the organization&#8217;s objectives. Because we enter into long-term partnerships with clients, we are not interested in short-term revenue, but in taking the journey together to a risk profile that helps the client grow in a sustainable way.<\/p>\n\n\n\n<div class=\"wp-block-group button-group-dienst\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton btn-minwidth\" href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/contact\/\" target=\"_self\"> Make an appointment<\/a>\n  <\/div>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton btn-minwidth\" href=\"https:\/\/opensight.indivontwikkelt.nl\/certificeringen\/\" target=\"_self\"> Request a demo<\/a>\n  <\/div>\n<\/div><\/div>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n\n\n\n<div class=\"wp-block-group p-block has-white-transparant-color has-dark-blue-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-6 col-lg-4 indivaos_zoom-in-down\">\n\t\t\t\n\n<h2 class=\"wp-block-heading has-text-align-center\">We are at your service!<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Do you have any questions or can we help you with anything? Please contact us.<\/p>\n\n\n  <div class=\"bs-button text-center\">\n        <a class=\"btn btn-primary indiv-block bsbutton mt-4 btn-custom\" href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/contact\/\" target=\"_self\"> Contact<\/a>\n  <\/div>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":492,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"Process | OpenSight","_seopress_titles_desc":"Tighten your defences by implementing cyber security processes that integrate seamlessly with your business operations. OpenSight helps you do just that.","_seopress_robots_index":"","footnotes":""},"class_list":["post-5331","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages\/5331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/comments?post=5331"}],"version-history":[{"count":4,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages\/5331\/revisions"}],"predecessor-version":[{"id":5553,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages\/5331\/revisions\/5553"}],"up":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages\/492"}],"wp:attachment":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media?parent=5331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}