{"id":106,"date":"2017-02-08T17:43:51","date_gmt":"2017-02-08T16:43:51","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=106"},"modified":"2017-02-08T17:43:51","modified_gmt":"2017-02-08T16:43:51","slug":"cyber-resilience-its-not-a-fairytale-but-reality","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/02\/08\/cyber-resilience-its-not-a-fairytale-but-reality\/","title":{"rendered":"Cyber Resilience It&#8217;s not a fairytale but reality&#8230;"},"content":{"rendered":"<p>We all hearing in our childhood from the fairytale from Anton Pieck the tale of Tom Thumb (Dutch: Klein Duimpje)<\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-middle\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone  wp-image-1671\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/download.jpeg\" alt=\"download\" width=\"846\" height=\"573\" \/><\/div>\n<p>You can remember what this little guy could do with these giant boots and how fast he could walk with this.<\/p>\n<p>Imagine that you had these giant boots and could make <strong>seven giant big steps<\/strong> to implement a 99.99% secure environment secure?<\/p>\n<p>I want to show you how to do this in following overview<\/p>\n<p>Seven giants steps to Triple\u2019A Framework<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-1675\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/aaeaaqaaaaaaaagraaaajgqwntjjytdiltvlmtutndzmny04zji0ltzhymuwmgi3mjfmyg.jpg\" alt=\"AAEAAQAAAAAAAAgRAAAAJGQwNTJjYTdiLTVlMTUtNDZmNy04ZjI0LTZhYmUwMGI3MjFmYg\" width=\"698\" height=\"400\" \/><\/p>\n<p>As you can read above is following these seven steps a mayor step forwards to a real secure environment and we of P@ssport can assure you that this can be implemented at your premises.<\/p>\n<p>If you want to apply to all the current ongoing security demand than it is getting time to dress yourself with the giants boots\u2026<\/p>\n<h2>How do I increase my technical readiness?<\/h2>\n<h2><img decoding=\"async\" class=\"alignnone size-full wp-image-1670\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/0639e35e307238ae472a734e5c40e146.jpg\" alt=\"0639e35e307238ae472a734e5c40e146\" width=\"600\" height=\"315\" \/><\/h2>\n<h2>How do I get from level 1 to level 5 in 7 steps?<\/h2>\n<p>You want to have a peace of mind to feel yourself secure and be also compliant to the ongoing GDPR regulation.<\/p>\n<h3>Remember time is running out and we do HAVE a fast track to implement this for you!<\/h3>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-left\">Crafts a response in conjunction with their customer compliancy EU programs. The increased cyber opportunities and decreased security liabilities will be good for your business, your brand, and your profits.<\/div>\n<p>Hire a Cyber Investigation Architecture Professional to set your roadmap to provability without the technology burden and myriad that brings costly complex point-to-point security solutions. Is it that simple, yes it is that simple. <strong>P@ssport we keep it simple.<\/strong><\/p>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-1678\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/aaeaaqaaaaaaaaidaaaajdy3ywvmzde5ltvlmtutndzjos05otg2ltk1ywmxotrkodi2mg.png\" alt=\"AAEAAQAAAAAAAAidAAAAJDY3YWVmZDE5LTVlMTUtNDZjOS05OTg2LTk1YWMxOTRkODI2Mg\" width=\"822\" height=\"550\" \/><\/div>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-left\"><\/div>\n<p><span style=\"font-size:inherit;\">I was being asked several times how long a \u201cnormal&#8221; IAM (Identity Access Management) tool would take in time to be implemented.<\/span><\/p>\n<p>Let me give you two examples:<\/p>\n<p>1.\u00a0\u00a0\u00a0\u00a0P@ssport implemented an IAM framework for Honeywell; time from start to delivery for implementation was more then six months?<\/p>\n<p>2.\u00a0\u00a0\u00a0\u00a0I implemented for Vodafone ForgeRock\u00a0IAM (Identity Access Management) from start till delivery was taken me one year!<\/p>\n<p>So my conclusion is that our Triple\u2019A Framework solution is taken less time, less investment and less FTE to secure a 99.99% environment.<\/p>\n<h3>Technical readiness<\/h3>\n<div class=\"slate-resizable-image-embed slate-image-embed__resize-full-width\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1680\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/aaeaaqaaaaaaaaljaaaajdkyogjjzge3lthmywitndezys04mmy0ltvkztk3mdg3mtiynq.jpg\" alt=\"AAEAAQAAAAAAAAljAAAAJDkyOGJjZGE3LThmYWItNDEzYS04MmY0LTVkZTk3MDg3MTIyNQ\" width=\"564\" height=\"752\" \/><\/div>\n<h2>Be aware that a breach is costing you much more then when you had the right protection from our Triple\u2019A framework<\/h2>\n<p>Remember awareness is the first step after this you notice and see the vulnerabilities within your own environment!<\/p>\n<p>When this is all clear to you act and contact. It is better to prevent that to suffer from the consequences\u2026<\/p>\n<p>P@ssport\u00a0proud defender of critical infrastructure since 2012<\/p>\n<p><a href=\"http:\/\/mailto:jansen.henkjan@gmail.com\/\" target=\"_blank\" rel=\"nofollow noopener\">Prof. Dr. Ir. Henk Jan Jansen<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all hearing in our childhood from the fairytale from Anton Pieck the tale of Tom Thumb (Dutch: Klein Duimpje) You can remember what this little guy could do with these giant boots and how fast he could walk with this. Imagine that you had these giant boots and could make seven giant big steps &#8230; <a title=\"Cyber Resilience It&#8217;s not a fairytale but reality&#8230;\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/02\/08\/cyber-resilience-its-not-a-fairytale-but-reality\/\">Read more<span class=\"screen-reader-text\">Cyber Resilience It&#8217;s not a fairytale but reality&#8230;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1672,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[20,25],"tags":[33,47],"class_list":["post-106","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr","category-security","tag-compliancy","tag-triple-a"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=106"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/106\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}