{"id":243,"date":"2020-02-21T18:19:51","date_gmt":"2020-02-21T17:19:51","guid":{"rendered":"http:\/\/www.forensee.cz\/?page_id=243"},"modified":"2021-03-30T16:15:15","modified_gmt":"2021-03-30T14:15:15","slug":"sluzby-ciso","status":"publish","type":"page","link":"https:\/\/www.forensee.cz\/en\/sluzby-ciso\/","title":{"rendered":"CISO Services"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_image=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/03\/ben-rosett-WdJkXFQ4VHY-unsplash-Cropped-2.jpg&#8220; height=&#8220;500px&#8220; animation_style=&#8220;fade&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;32px||||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; text_text_color=&#8220;#ffffff&#8220; header_text_color=&#8220;#ffffff&#8220; header_font_size=&#8220;50px&#8220; header_2_text_color=&#8220;#ffffff&#8220; text_orientation=&#8220;center&#8220; header_font_size_tablet=&#8220;45px&#8220; header_font_size_phone=&#8220;40px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; header_2_font_size_tablet=&#8220;22px&#8220; header_2_font_size_phone=&#8220;20px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;1.3em&#8220; header_2_line_height_phone=&#8220;1.3em&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; header_text_shadow_style=&#8220;preset5&#8243; header_2_text_shadow_style=&#8220;preset5&#8243;]<\/p>\n<h1><strong>CISO Services<\/strong><\/h1>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Services from experts in information security and information systems<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;||-25px||false|false&#8220;][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; _builder_version=&#8220;4.0.4&#8243; animation_style=&#8220;fade&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_testimonial quote_icon_color=&#8220;#ff9500&#8243; _builder_version=&#8220;4.0.4&#8243; body_font=&#8220;|600|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; background_color=&#8220;rgba(0,0,0,0.04)&#8220; box_shadow_style=&#8220;preset2&#8243;]<\/p>\n<p><span>We need professional supervision over IT security, but an internal employee will not pay off<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_testimonial quote_icon_color=&#8220;#ff9500&#8243; _builder_version=&#8220;4.0.4&#8243; body_font=&#8220;|600|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; background_color=&#8220;rgba(0,0,0,0.04)&#8220; box_shadow_style=&#8220;preset2&#8243;]<\/p>\n<p><span>We want to make sure that our external IT supplier does its utmost in the field of information security<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_testimonial quote_icon_color=&#8220;#ff9500&#8243; _builder_version=&#8220;4.0.4&#8243; body_font=&#8220;|600|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; background_color=&#8220;rgba(0,0,0,0.04)&#8220; box_shadow_style=&#8220;preset2&#8243;]<\/p>\n<p>We would welcome an independent assessment of planned changes in our IT systems<\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;rgba(0,0,0,0.07)&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; border_color_top=&#8220;#ff9500&#8243; border_color_bottom=&#8220;#ff9500&#8243;][et_pb_row _builder_version=&#8220;4.9.2&#8243;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.9.2&#8243; text_text_color=&#8220;#000000&#8243; text_font_size=&#8220;16px&#8220; header_text_align=&#8220;left&#8220; header_2_text_color=&#8220;#000000&#8243; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;1.3em&#8220; text_orientation=&#8220;justified&#8220;]<\/p>\n<h2>Professional information security management also available for small and medium-sized businesses<\/h2>\n<p>Due to our rich clientele from small and medium-sized enterprises in the Czech Republic, we know that it is not always necessary to have a worker in a position of an information security manager. We can replace its function and thus ensure a reduction in expenses for your company, it only takes a few hours a month to get your data protected. We will also try to prevent possible attacks from various sides in the future. As we have been following information security trends for a long time, we will provide you with the best protection that your company will ever need.<\/p>\n<p>Vyu\u017e\u00edv\u00e1te ke spr\u00e1v\u011b IT extern\u00ed firmu, kter\u00e1 dr\u017e\u00ed kontrolu nad cel\u00fdm syst\u00e9mem? Za\u017eili jsme u\u017e p\u0159\u00edpady, kdy spr\u00e1vci IT napomohli k\u00a0\u00faniku citliv\u00fdch dat z\u00a0r\u016fzn\u00fdch spole\u010dnost\u00ed. Je vhodn\u00e9 se nad t\u011bmito riziky zamyslet a p\u0159em\u00fd\u0161let i nad t\u00edm, jak tomu p\u0159edej\u00edt. P\u0159esn\u011b v\u00a0t\u00e9to situaci V\u00e1m m\u016f\u017eeme pomoci, budeme kontrolovat zp\u016fsob zabezpe\u010den\u00ed va\u0161\u00ed intern\u00ed IT s\u00edt\u011b, z\u0159\u00edzen\u00ed p\u0159\u00edstupu k\u00a0r\u016fzn\u00fdm typ\u016fm dat a budeme schopni o situac\u00edch pod\u00e1vat pr\u016fb\u011b\u017en\u00e9 zpr\u00e1vy a hledat tak mo\u017en\u00e1 rizika a nov\u00e9 zp\u016fsoby zabezpe\u010den\u00ed va\u0161\u00ed s\u00edt\u011b. D\u016fle\u017eit\u00e9 je poznamenat, \u017ee p\u0159i vhodn\u00e9 kombinaci r\u016fzn\u00fdch n\u00e1stroj\u016f nedr\u017e\u00edme kontrolu nad va\u0161imi daty, ani k\u00a0nim nem\u00e1me p\u0159\u00edstup a tak jsme schopni poskytnout nutnou z\u00e1ruku d\u016fv\u011brnosti.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;||||false|false&#8220;][et_pb_row _builder_version=&#8220;4.0.4&#8243; width=&#8220;100%&#8220; max_width=&#8220;250px&#8220; custom_margin=&#8220;||-70px||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; text_text_color=&#8220;#ffffff&#8220; header_text_color=&#8220;#ffffff&#8220; header_4_text_color=&#8220;#ffffff&#8220; header_4_font_size=&#8220;36px&#8220; background_color=&#8220;#ff9500&#8243; width=&#8220;100%&#8220; custom_margin=&#8220;-70px|||400px|false|false&#8220; custom_margin_tablet=&#8220;|||240px|false|false&#8220; custom_margin_phone=&#8220;||50px|100px|false|false&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;20px|15px|20px|15px|false|false&#8220; animation_style=&#8220;fade&#8220; border_color_all=&#8220;#ff9500&#8243;]<\/p>\n<h4><strong>Did you know that...<\/strong><\/h4>\n<p>Many IT administrators purposefully avoid applying basic security measures to save their time?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_row _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;-70px||||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.0.4&#8243; text_font_size=&#8220;16px&#8220; header_2_text_color=&#8220;#000000&#8243; header_2_font_size=&#8220;35px&#8220;]<\/p>\n<h2>How We Proceed<\/h2>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8220;4.0.4&#8243; animation_style=&#8220;fade&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_blurb title=&#8220;Zhodnot\u00edme situaci&#8220; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; border_radii=&#8220;on|2px|2px|2px|2px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#d6d6d6&#8243; box_shadow_style=&#8220;preset1&#8243;]<\/p>\n<p><span>Our expert will evaluate the current state of information infrastructure security, identify the most serious shortcomings and present a list of recommended measures, including priorities.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_blurb title=&#8220;V\u0161e vysv\u011btl\u00edme&#8220; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; border_radii=&#8220;on|2px|2px|2px|2px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#d6d6d6&#8243; box_shadow_style=&#8220;preset1&#8243;]<\/p>\n<p><span>The assigned expert serves as an independent expert between the organization's management and the IT department or an external IT service provider.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_blurb title=&#8220;Pom\u00e1h\u00e1me ostatn\u00edm&#8220; _builder_version=&#8220;4.0.4&#8243; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; border_radii=&#8220;on|2px|2px|2px|2px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#d6d6d6&#8243; box_shadow_style=&#8220;preset1&#8243;]<\/p>\n<p><span>We pass on ongoing recommendations to the existing IT department and consult their intentions with regard to security. We provide the company's management with expert arguments to support its vision in the field of IT.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_blurb title=&#8220;Informujeme&#8220; _builder_version=&#8220;4.9.2&#8243; custom_padding=&#8220;10px|10px|10px|10px|false|false&#8220; border_radii=&#8220;on|2px|2px|2px|2px&#8220; border_width_all=&#8220;2px&#8220; border_color_all=&#8220;#d6d6d6&#8243; box_shadow_style=&#8220;preset1&#8243;]<\/p>\n<p><span>We regularly report to the company's management on the security of the company's information assets, on persistent vulnerabilities and on the progress of the IT department in eliminating them.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; background_color=&#8220;#ff9500&#8243; animation_style=&#8220;fade&#8220;][et_pb_row column_structure=&#8220;1_3,2_3&#8243; _builder_version=&#8220;4.0.4&#8243; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_image src=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/tech-20.jpg&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.0.4&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;2_3&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_text _builder_version=&#8220;4.9.2&#8243; text_text_color=&#8220;#ffffff&#8220; text_font_size=&#8220;16px&#8220; header_2_text_color=&#8220;#ffffff&#8220; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;1.5em&#8220; text_orientation=&#8220;justified&#8220; custom_margin=&#8220;0px||-45px||false|false&#8220; custom_padding=&#8220;0px||0px||false|false&#8220;]<\/p>\n<h2><strong>Case Study<\/strong><\/h2>\n<p><strong>Client:<\/strong>\u00a0Retail intermediary<\/p>\n<p><strong>Problem:<\/strong>\u00a0The IT service provider ignores security issues<\/p>\n<p><strong>Our solution:<\/strong><\/p>\n<p><span>Complete management of information technologies of our client is solved by outsourcing. Although the client was not 100% convinced that the supplier took care of the security of the information system, he could not oppose it at a professional level. Based on the input analysis, we identified a number of vulnerabilities, paradoxically, in the vast majority of cases, these were problems that did not require virtually any additional investment, only different system and processes settings and some time. Within a few months, we managed to eliminate most of the most serious problems without noticeable interference in the operation of the organization and without changing the scope of work of the IT supplier.<\/span><br \/> <span>We now provide the client with regular supervision over the status of the system and compliance with the set policies.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.0.4&#8243; animation_style=&#8220;fade&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_image src=&#8220;http:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/DSC06489-2-1.jpg&#8220; _builder_version=&#8220;4.0.4&#8243; max_height=&#8220;460px&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.0.4&#8243;][et_pb_team_member name=&#8220;Mari\u00e1n Svetl\u00edk&#8220; position=&#8220;Vedouc\u00ed konzultant&#8220; _builder_version=&#8220;4.0.4&#8243; header_font=&#8220;|600|||||||&#8220; header_text_color=&#8220;#000000&#8243; header_font_size=&#8220;25px&#8220; position_text_color=&#8220;#000000&#8243; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;100px||0px||false|false&#8220;][\/et_pb_team_member][et_pb_text _builder_version=&#8220;4.0.4&#8243; header_2_font_size=&#8220;20px&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Do you need to use the services of an information security expert?<\/h2>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8220;on&#8220; font_icon=&#8220;%%238%%&#8220; icon_color=&#8220;#ff9500&#8243; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.0.4&#8243; body_text_color=&#8220;#ff9500&#8243; body_font_size=&#8220;20px&#8220; body_link_text_color=&#8220;#ff9500&#8243;]<\/p>\n<p><a href=\"mailto:svetlik@forensee.cz\">svetlik@forensee.cz<\/a>\u00a0<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8220;on&#8220; font_icon=&#8220;%%264%%&#8220; icon_color=&#8220;#ff9500&#8243; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.0.4&#8243; body_text_color=&#8220;#ff9500&#8243; body_font_size=&#8220;20px&#8220; body_link_text_color=&#8220;#ff9500&#8243;]<\/p>\n<p>+420 776 740 482<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>Slu\u017eby CISO &nbsp; &nbsp; Slu\u017eby expert\u016f na bezpe\u010dnost informac\u00ed a informa\u010dn\u00edch syst\u00e9m\u016fPot\u0159ebujeme odborn\u00fd dohled nad bezpe\u010dnost\u00ed IT, ale intern\u00ed zam\u011bstnanec se n\u00e1m nevyplat\u00edChceme m\u00edt jistotu, \u017ee n\u00e1\u0161 extern\u00ed dodavatel IT d\u011bl\u00e1 v oblasti bezpe\u010dnosti informac\u00ed maximumUv\u00edtali bychom nez\u00e1visl\u00e9 posouzen\u00ed pl\u00e1novan\u00fdch zm\u011bn v na\u0161ich IT syst\u00e9mechProfesion\u00e1ln\u00ed \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed dostupn\u00e9 i pro mal\u00e9 a st\u0159edn\u00ed podniky [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-243","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Slu\u017eby CISO - slu\u017eby expert\u016f na bezpe\u010dnost informac\u00ed - forensee<\/title>\n<meta name=\"description\" content=\"Vzhledem k na\u0161\u00ed bohat\u00e9 klientele z mal\u00fdch a st\u0159edn\u00edch podnik\u016f v \u010cR v\u00edme, \u017ee ne v\u017edy je nutn\u00e9 m\u00edt obsazenou pozici mana\u017eera informa\u010dn\u00ed...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forensee.cz\/en\/sluzby-ciso\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Slu\u017eby CISO - slu\u017eby expert\u016f na bezpe\u010dnost informac\u00ed - forensee\" \/>\n<meta property=\"og:description\" content=\"Vzhledem k na\u0161\u00ed bohat\u00e9 klientele z mal\u00fdch a st\u0159edn\u00edch podnik\u016f v \u010cR v\u00edme, \u017ee ne v\u017edy je nutn\u00e9 m\u00edt obsazenou pozici mana\u017eera informa\u010dn\u00ed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forensee.cz\/en\/sluzby-ciso\/\" \/>\n<meta property=\"og:site_name\" content=\"forensee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/forensee\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-30T14:15:15+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@forensee\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forensee.cz\/sluzby-ciso\/\",\"url\":\"https:\/\/www.forensee.cz\/sluzby-ciso\/\",\"name\":\"Slu\u017eby CISO - slu\u017eby expert\u016f na bezpe\u010dnost informac\u00ed - forensee\",\"isPartOf\":{\"@id\":\"https:\/\/www.forensee.cz\/#website\"},\"datePublished\":\"2020-02-21T17:19:51+00:00\",\"dateModified\":\"2021-03-30T14:15:15+00:00\",\"description\":\"Vzhledem k na\u0161\u00ed bohat\u00e9 klientele z mal\u00fdch a st\u0159edn\u00edch podnik\u016f v \u010cR v\u00edme, \u017ee ne v\u017edy je nutn\u00e9 m\u00edt obsazenou pozici mana\u017eera informa\u010dn\u00ed...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forensee.cz\/sluzby-ciso\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forensee.cz\/sluzby-ciso\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forensee.cz\/sluzby-ciso\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\/\/www.forensee.cz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Slu\u017eby CISO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forensee.cz\/#website\",\"url\":\"https:\/\/www.forensee.cz\/\",\"name\":\"forensee\",\"description\":\"\u0158e\u0161en\u00ed a slu\u017eby v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy a \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed\",\"publisher\":{\"@id\":\"https:\/\/www.forensee.cz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forensee.cz\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forensee.cz\/#organization\",\"name\":\"forensee\",\"url\":\"https:\/\/www.forensee.cz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png\",\"contentUrl\":\"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png\",\"width\":300,\"height\":75,\"caption\":\"forensee\"},\"image\":{\"@id\":\"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/forensee\",\"https:\/\/twitter.com\/forensee\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Slu\u017eby CISO - slu\u017eby expert\u016f na bezpe\u010dnost informac\u00ed - forensee","description":"Vzhledem k na\u0161\u00ed bohat\u00e9 klientele z mal\u00fdch a st\u0159edn\u00edch podnik\u016f v \u010cR v\u00edme, \u017ee ne v\u017edy je nutn\u00e9 m\u00edt obsazenou pozici mana\u017eera informa\u010dn\u00ed...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forensee.cz\/en\/sluzby-ciso\/","og_locale":"en_US","og_type":"article","og_title":"Slu\u017eby CISO - slu\u017eby expert\u016f na bezpe\u010dnost informac\u00ed - forensee","og_description":"Vzhledem k na\u0161\u00ed bohat\u00e9 klientele z mal\u00fdch a st\u0159edn\u00edch podnik\u016f v \u010cR v\u00edme, \u017ee ne v\u017edy je nutn\u00e9 m\u00edt obsazenou pozici mana\u017eera informa\u010dn\u00ed...","og_url":"https:\/\/www.forensee.cz\/en\/sluzby-ciso\/","og_site_name":"forensee","article_publisher":"https:\/\/www.facebook.com\/forensee","article_modified_time":"2021-03-30T14:15:15+00:00","twitter_card":"summary_large_image","twitter_site":"@forensee","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forensee.cz\/sluzby-ciso\/","url":"https:\/\/www.forensee.cz\/sluzby-ciso\/","name":"Slu\u017eby CISO - slu\u017eby expert\u016f na bezpe\u010dnost informac\u00ed - forensee","isPartOf":{"@id":"https:\/\/www.forensee.cz\/#website"},"datePublished":"2020-02-21T17:19:51+00:00","dateModified":"2021-03-30T14:15:15+00:00","description":"Vzhledem k na\u0161\u00ed bohat\u00e9 klientele z mal\u00fdch a st\u0159edn\u00edch podnik\u016f v \u010cR v\u00edme, \u017ee ne v\u017edy je nutn\u00e9 m\u00edt obsazenou pozici mana\u017eera informa\u010dn\u00ed...","breadcrumb":{"@id":"https:\/\/www.forensee.cz\/sluzby-ciso\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forensee.cz\/sluzby-ciso\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forensee.cz\/sluzby-ciso\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/www.forensee.cz\/"},{"@type":"ListItem","position":2,"name":"Slu\u017eby CISO"}]},{"@type":"WebSite","@id":"https:\/\/www.forensee.cz\/#website","url":"https:\/\/www.forensee.cz\/","name":"forensee","description":"\u0158e\u0161en\u00ed a slu\u017eby v oblasti digit\u00e1ln\u00ed forenzn\u00ed anal\u00fdzy a \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed","publisher":{"@id":"https:\/\/www.forensee.cz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forensee.cz\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forensee.cz\/#organization","name":"forensee","url":"https:\/\/www.forensee.cz\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/","url":"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png","contentUrl":"https:\/\/www.forensee.cz\/wp-content\/uploads\/2020\/05\/image.png","width":300,"height":75,"caption":"forensee"},"image":{"@id":"https:\/\/www.forensee.cz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/forensee","https:\/\/twitter.com\/forensee"]}]}},"_links":{"self":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/comments?post=243"}],"version-history":[{"count":28,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/243\/revisions"}],"predecessor-version":[{"id":1800,"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/pages\/243\/revisions\/1800"}],"wp:attachment":[{"href":"https:\/\/www.forensee.cz\/en\/wp-json\/wp\/v2\/media?parent=243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}