{"id":27,"date":"2021-09-29T14:19:58","date_gmt":"2021-09-29T14:19:58","guid":{"rendered":"http:\/\/www.secur-it-y.nl\/?page_id=27"},"modified":"2021-09-29T15:12:32","modified_gmt":"2021-09-29T15:12:32","slug":"home","status":"publish","type":"page","link":"https:\/\/www.secur-it-y.nl\/","title":{"rendered":"Home"},"content":{"rendered":"\n<p class=\"has-black-color has-text-color has-large-font-size\">Secur-it-<span style=\"color:#5eb1e4\" class=\"has-inline-color\">y<\/span><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Secure IT,\u00a0<span style=\"color:#5eb1e4\" class=\"has-inline-color\">Why<\/span>? Simple question, but not always (easily) answered.\u00a0For more than 20 years I\u2019ve been involved in evaluating, managing and improving information security measures for multiple organizations. What I\u2019ve noticed is that\u00a0successful security projects heavily rely on the organization\u2019s true understanding\u00a0<span style=\"color:#5eb1e4\" class=\"has-inline-color\">why<\/span>\u00a0change is needed. Without the answer, working on the \u2018what\u2019 and the \u2018how\u2019 will often lead to disappointments or suboptimal security solutions. It\u2019s my personal drive to help and motivate those who want to understand and improve their information security levels, hence that\u2019s\u00a0<span style=\"color:#5eb1e4\" class=\"has-inline-color\">why<\/span>\u00a0I get up every morning.<br><br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secur-it-y Secure IT,\u00a0Why? Simple question, but not always (easily) answered.\u00a0For more than 20 years I\u2019ve been involved in evaluating, managing and improving information security measures for multiple organizations. What I\u2019ve noticed is that\u00a0successful security projects heavily rely on the organization\u2019s<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.secur-it-y.nl\/index.php?rest_route=\/wp\/v2\/pages\/27","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.secur-it-y.nl\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.secur-it-y.nl\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.secur-it-y.nl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.secur-it-y.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27"}],"version-history":[{"count":17,"href":"https:\/\/www.secur-it-y.nl\/index.php?rest_route=\/wp\/v2\/pages\/27\/revisions"}],"predecessor-version":[{"id":69,"href":"https:\/\/www.secur-it-y.nl\/index.php?rest_route=\/wp\/v2\/pages\/27\/revisions\/69"}],"wp:attachment":[{"href":"https:\/\/www.secur-it-y.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}