{"id":7378,"date":"2025-09-23T10:49:05","date_gmt":"2025-09-23T08:49:05","guid":{"rendered":"https:\/\/opensight.indivontwikkelt.nl\/?page_id=7378"},"modified":"2025-09-23T10:55:02","modified_gmt":"2025-09-23T08:55:02","slug":"request-a-risk-assessment","status":"publish","type":"page","link":"https:\/\/opensight.indivontwikkelt.nl\/en\/request-a-risk-assessment\/","title":{"rendered":"Request a Risk Assessment"},"content":{"rendered":"\n<div class=\"wp-block-group px-2 px-md-0 has-white-color has-dark-blue-background-color has-text-color has-background has-link-color wp-elements-3f2c694df9468aa1fd3861d5d23829aa\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer new-contact-spacer-1\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n<div class=\"wp-bootstrap-blocks-row row\">\n\t\n\n<div class=\"col-12 col-md-5\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<h2 class=\"wp-block-heading\">Risk Assessment<\/h2>\n\n\n\n<p>Get clear insight into the risks that may impact your organization. With an OpenSight Risk Assessment, we uncover vulnerabilities and potential threats and translate them into practical next steps. Together, we build a tailored roadmap that matches your business goals, at a pace that works for you.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6 offset-md-1\">\n\t\t\t\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:200px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-2 d-md-block d-none px-2 px-md-0\">\n\t\n\n<h2 class=\"wp-block-heading has-text-align-center has-dark-blue-color has-text-color has-link-color wp-elements-65dac7c17e6f19b49d8a1ba6e686bfaa\">Why choose a Risk Assessment with OpenSight?<\/h2>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t\n\n<p>A Risk Assessment is the first step toward a safer and more resilient organization. During this in-depth analysis, we identify vulnerabilities, evaluate potential threats, and provide you with a clear overview of risks, including actionable recommendations for improvement.<\/p>\n\n\n\n<p>With these insights, you\u2019ll be able to create a roadmap that aligns with your business strategy. Whether your focus is on strengthening operations, protecting sensitive data or ensuring compliance with regulations, we\u2019ll help you set the right priorities and achieve them step by step.<\/p>\n\n\n\n<p>Our experts guide you throughout the process, making sure you don\u2019t have to decide alone which measures matter most. Together, we ensure that improvements are implemented effectively and sustainably.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Key benefits at a glance:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Experienced OpenSight consultants guiding the entire process.<\/li>\n\n\n\n<li>Practical and tailored advice for your specific organization.<\/li>\n\n\n\n<li>Clear insight into current risks and vulnerabilities.<\/li>\n\n\n\n<li>Prioritization of the most urgent and impactful improvements.<\/li>\n\n\n\n<li>A customized roadmap aligned with your business objectives.<\/li>\n\n\n\n<li>Support at the pace that fits your organization best.<\/li>\n<\/ul>\n\n\n\n<p>A Risk Assessment is not the end of the journey, it\u2019s the starting point for continuous improvement. By gaining insight into your risks today, you lay a strong foundation for a secure and future-ready organization. With OpenSight, you\u2019re never on your own. We guide you step by step toward long-term resilience.<\/p>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n\n\n\n<div class=\"wp-block-group px-2 px-md-0 p-block-mob background-with-hexagon-element has-white-transparant-color has-dark-blue-background-color has-text-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-container container mb-2\">\n\t\n<div class=\"wp-bootstrap-blocks-row row justify-content-center align-items-center\">\n\t\n\n<div class=\"col-12 col-md-9 col-lg-6 offset-lg-1 text-center text-md-start indivaos_fade-right\">\n\t\t\t\n\n<h2 class=\"wp-block-heading has-text-align-left mb-1 pb-0 has-large-font-size\">Personal advice<\/h2>\n\n\n\n<p class=\"has-text-align-left\">Cybersecurity doesn\u2019t have to be overwhelming. Unsure which services are the best fit for your situation? We\u2019re here to help. Our team provides personal advice tailored to your needs, goals, and unique context.<\/p>\n\n\n\n<div class=\"wp-block-group mb-4 buttons-demo-row justify-content-center justify-content-md-start is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton mt-3\" href=\"tel:+31853031010\" target=\"_self\"> Call us<\/a>\n  <\/div>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton mt-3\" href=\"mailto:info@opensight.nl\" target=\"_self\"> Email us<\/a>\n  <\/div>\n<\/div>\n\n\t<\/div>\n\n\n\n<div class=\"col-10 col-md-4 offset-lg-1 indivaos_fade-right\">\n\t\t\t\n\n<figure class=\"wp-block-image size-full demo-image\"><img loading=\"lazy\" decoding=\"async\" width=\"503\" height=\"580\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/marcel-ian-mobiel.webp\" alt=\"Marcel &amp;amp; Ian at OpenSight\" class=\"wp-image-5067\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/marcel-ian-mobiel.webp 503w, https:\/\/opensight.indivontwikkelt.nl\/content\/marcel-ian-mobiel-260x300.webp 260w\" sizes=\"auto, (max-width: 503px) 100vw, 503px\" \/><\/figure>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-2 px-2 px-md-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row\">\n\t\n\n<div class=\"col-12 col-md-12 our-services-blok\">\n\t\t\t\n\n<h2 class=\"wp-block-heading has-text-align-center mb-5 has-dark-blue-color has-text-color has-link-color has-large-font-size wp-elements-e139efb23e8f38d6abcae96086fc656c\">Our Services<\/h2>\n\n\n  <div class=\"indiv-block diensten-slider mx-4 mx-md-0\">\n    <div class=\"swiper\" id=\"diensten-slider\">\n      <div class=\"swiper-wrapper\">\n                    <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/zero-trust-for-workloads\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"668\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/zero-trust-voor-workloads-2-e1753885724111.webp\" class=\"img-fluid wp-post-image\" alt=\"zero trust voor workloads\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust for Workloads<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      OpenSight offers a Zero Trust solution designed to protect your organization&#8217;s workloads from cyber threats.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/microsoft-365-compliance-recovery\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/m365-compliance-recovery-header-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"m365 compliance &amp; recovery header\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/m365-compliance-recovery-header-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/m365-compliance-recovery-header-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/m365-compliance-recovery-header-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/m365-compliance-recovery-header.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Microsoft 365 Compliance &amp; Recovery<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Microsoft 365 has taken off over the past few years, and with the introduction of Co-Pilot, this is certainly not expected to slow down. While the responsibility for the infrastructure lies with Microsoft, the&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/endpoint-and-cloud-protection\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-computer-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"man achter computer\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-computer-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-computer-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-computer-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-computer.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Endpoint and Cloud Protection<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      In recent years, the time it takes an for attacker to move further inside the network, from initial infiltration, has decreased dramatically. For example, the average time for a cyber attack was 98 minutes&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/zero-trust-for-cyber-asset-attack-surface-management\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/caasm-1.webp\" class=\"img-fluid wp-post-image\" alt=\"caasm\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/caasm-1.webp 1000w, https:\/\/opensight.indivontwikkelt.nl\/content\/caasm-1-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/caasm-1-768x512.webp 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust for Cyber Asset Attack Surface Management<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      CAASM (Cyber Asset Attack Surface Management) enables IT managers to gain insight into coverage and hygiene levels across their entire IT environment.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/awareness-training-courses-and-workshops\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-bij-awareness-training-1024x576.webp\" class=\"img-fluid wp-post-image\" alt=\"man bij awareness training\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-bij-awareness-training-1024x576.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-bij-awareness-training-300x169.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-bij-awareness-training-768x432.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-bij-awareness-training.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Awareness training courses and workshops<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"159\" height=\"184\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/hexagon-red.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Your employees are your first line of defense in the event of a cyber attack. Good awareness among employees is therefore crucial to reduce the likelihood of an attack and its impact.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/zero-trust\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-bureau-op-kantoor-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"man achter bureau op kantoor\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-bureau-op-kantoor-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-bureau-op-kantoor-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-bureau-op-kantoor-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-achter-bureau-op-kantoor.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      A major development in the world of cyber security is Zero Trust. However, Zero Trust is not a solution, it is a security model based on the principle of &#8221;never trust, always verify&#8221;. This&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/governance-risk-compliance-grc-tooling\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"man grc tooling\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/man-grc-tooling.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Governance, Risk  Compliance (GRC) tooling<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-82.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      You are in the process of implementing your cyber security framework or standard. After a good start, you want to take a more pragmatic approach instead of using all kinds of different documentation. At&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/zero-trust-for-ot-and-iot\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"553\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/zero-trust-voor-ot-en-iot.webp\" class=\"img-fluid wp-post-image\" alt=\"zero trust voor ot en iot\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/zero-trust-voor-ot-en-iot.webp 1000w, https:\/\/opensight.indivontwikkelt.nl\/content\/zero-trust-voor-ot-en-iot-300x166.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/zero-trust-voor-ot-en-iot-768x425.webp 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust for OT and IoT<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Our IoT and OT security solutions can help your organization discover, classify, connect and segment devices to protect your operations.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/human-risk-management-hrm\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"623\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/hrm-1024x623.webp\" class=\"img-fluid wp-post-image\" alt=\"\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/hrm-1024x623.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/hrm-300x183.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/hrm-768x468.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/hrm-1536x935.webp 1536w, https:\/\/opensight.indivontwikkelt.nl\/content\/hrm.webp 1544w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Human Risk Management+ (HRM+)<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"159\" height=\"184\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/hexagon-red.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Cybercriminals are increasingly using social engineering and phishing to deceive employees. This makes human behaviour the weakest link in cybersecurity. Human Risk Management+ (HRM+) from OpenSight helps organisations turn this vulnerability into strength.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/cyber-resilience-platform\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"561\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-resiliency-1024x561.webp\" class=\"img-fluid wp-post-image\" alt=\"cyber resiliency\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-resiliency-1024x561.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-resiliency-300x165.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-resiliency-768x421.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-resiliency.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Cyber Resilience Platform<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      In recent years, there has been a shift in the backup market. Where backup used to be something to mainly fix human errors or solve hardware issues, it has now become a very important&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/zero-trust-for-users\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"550\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/zero-trust-voor-gebruikers-1-e1753803035280.webp\" class=\"img-fluid wp-post-image\" alt=\"man met zero trust op zijn telefoon\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Zero Trust for Users<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      OpenSight offers a comprehensive solution to protect your organization from cyber threats, while enabling seamless and secure access to applications and data.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/protection-recovery-for-your-identity\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/identity-protection-and-recovery-1-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"identity protection and recovery 1\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/identity-protection-and-recovery-1-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/identity-protection-and-recovery-1-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/identity-protection-and-recovery-1-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/identity-protection-and-recovery-1-1536x1025.webp 1536w, https:\/\/opensight.indivontwikkelt.nl\/content\/identity-protection-and-recovery-1-2048x1366.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Protection &amp; Recovery For Your Identity<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Today&#8217;s attacks are no longer just about malware. More and more, your actual identity is being used to carry out an attack. To quickly detect, remediate and recover from these attacks, OpenSight has developed&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/nis2-audit\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"NIS2 audit\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/nis2-audit.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>NIS2 audit<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-82.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      The NIS2 European regulation is on the horizon. In October 2024, this legislation will come into effect, and although some details are still unknown, we will be challenged to improve our Network and Information&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/cyber-deception\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"cyber deception\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-1536x1024.webp 1536w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception.webp 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Cyber Deception<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Cyber Deception; with today&#8217;s lightweight agents for Endpoint protection, it almost seems redundant. Yet we still get a lot of people asking about it. And when we get questions, it is time to create&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/ecto-and-eciso-services\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/ecto-en-eciso-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"ecto en eciso\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/ecto-en-eciso-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/ecto-en-eciso-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/ecto-en-eciso-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/ecto-en-eciso.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>eCTO and eCISO services<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"159\" height=\"184\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/hexagon-red.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      A CTO and a CISO are the backbone of your organization and support the organization in making the right choices. However, not everyone has the ability to employ a CTO and\/or a CISO. This&hellip;                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                      <div class=\"swiper-slide\">\n              <a href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/cyber-security-framework-advisory-processes\/\" class=\"stretched-link\"><\/a>\n              <div class=\"post-item h-100\">\n                <div class=\"related-item h-100 d-flex flex-column\">\n                  <div class=\"card-dienst h-100\">\n                    <div class=\"image\">\n                      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten-1024x683.webp\" class=\"img-fluid wp-post-image\" alt=\"2 mannen over cyber security framework advies trajecten\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/2-mannen-over-cyber-security-framework-advies-trajecten.webp 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>                    <\/div>\n                    <div class=\"content justify-content-between d-flex flex-column gap-3\">\n                      <div class=\"d-flex no-gap-class gap-3\">\n                        <h2>Cyber security framework advisory processes<\/h2>                        <img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-82.svg\" class=\"d-block -imgfluid hexagon-header-img hexagon-img\" alt=\"\" \/>                      <\/div>\n                      Are you in the process of implementing a cyber security framework but not getting anywhere? With OpenSight&#8217;s practical attitude and diverse experience, we can help your organization implement your cyber security framework.                      <p class=\"mt-auto mobile-link \">Lees verder ><\/p>\n                    <\/div>\n                  <\/div>\n                <\/div>\n              <\/div>\n            <\/div>\n                <\/div>\n      <div class=\"swiper-pagination\"><\/div>\n    <\/div>\n\n    <div class=\"diensten-slider-pagination\">\n      <div class=\"slider-button button-prev\">\n        <i class=\"fas fa-chevron-left\"><\/i>\n      <\/div>\n      <div class=\"page-info\">\n        <span class=\"current\">1<\/span>\/<span class=\"total\">1<\/span>\n      <\/div>\n      <div class=\"slider-button button-next\">\n        <i class=\"fas fa-chevron-right\"><\/i>\n      <\/div>\n    <\/div>\n  <\/div>\n\n\n  <div class=\"bs-button text-right\">\n        <a class=\"btn btn-custom indiv-block bsbutton mt-3\" href=\"\/en\/services\/overview\/\" target=\"_self\"> All services<\/a>\n  <\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"Risk Assessment %%sep%% %%sitetitle%%","_seopress_titles_desc":"Discover risks and vulnerabilities in your organization with a Risk Assessment by OpenSight. Get clear insights and a tailored roadmap to strengthen security.","_seopress_robots_index":"","footnotes":""},"class_list":["post-7378","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages\/7378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/comments?post=7378"}],"version-history":[{"count":4,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages\/7378\/revisions"}],"predecessor-version":[{"id":7537,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/pages\/7378\/revisions\/7537"}],"wp:attachment":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media?parent=7378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}