{"id":4834,"date":"2023-09-23T09:05:47","date_gmt":"2023-09-23T07:05:47","guid":{"rendered":"https:\/\/www.nlogic.no\/?p=4834"},"modified":"2025-08-20T12:02:17","modified_gmt":"2025-08-20T10:02:17","slug":"4-mater-sikkerhetskonsulenter-bistar-it-avdelingen","status":"publish","type":"post","link":"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/","title":{"rendered":"4 m\u00e5ter sikkerhetskonsulenter bist\u00e5r IT-avdelingen"},"content":{"rendered":"<div class=\"nlogic-hero alignfull with-pattern-cubes with-excerpt is-style-light wp-block-nlogic-hero\">\n\t\t\t<div class=\"hero-content container\">\n\t\t\t\t<svg width=\"1221\" height=\"502\" viewBox=\"0 0 1221 502\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<g opacity=\"0.5\">\n<path d=\"M853.402 388.289L733.648 320.16V183.903\" stroke=\"#111111\" stroke-width=\"0.505025\" stroke-dasharray=\"6.06 6.06\"\/>\n<path d=\"M613.469 388.711L733.646 320.159V183.901\" stroke=\"#111111\" stroke-width=\"0.505025\" stroke-dasharray=\"6.06 6.06\"\/>\n<path d=\"M724.966 185.046C730.337 181.944 736.955 181.944 742.327 185.046L847.051 245.508C852.422 248.609 855.731 254.341 855.731 260.543V381.468C855.731 387.671 852.422 393.402 847.051 396.503L742.327 456.966C736.955 460.067 730.337 460.067 724.966 456.966L620.242 396.503C614.87 393.402 611.561 387.671 611.561 381.468L611.561 260.543C611.561 254.341 614.87 248.609 620.242 245.508L724.966 185.046Z\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M853.293 252.031L736.045 320.391C734.493 321.296 733.539 322.958 733.539 324.754V458.957\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M613.363 252.666L733.648 321.853\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M1095.16 243.27L975.402 175.141V38.883\" stroke=\"#111111\" stroke-width=\"0.505025\" stroke-dasharray=\"6.06 6.06\"\/>\n<path d=\"M855.223 243.691L975.4 175.139V38.8817\" stroke=\"#111111\" stroke-width=\"0.505025\" stroke-dasharray=\"6.06 6.06\"\/>\n<path d=\"M966.724 40.0279C972.095 36.9267 978.713 36.9267 984.084 40.0279L1088.81 100.491C1094.18 103.592 1097.49 109.323 1097.49 115.525V236.451C1097.49 242.653 1094.18 248.384 1088.81 251.485L984.084 311.948C978.713 315.049 972.095 315.049 966.724 311.948L861.999 251.485C856.628 248.384 853.319 242.653 853.319 236.451L853.319 115.525C853.319 109.323 856.628 103.592 862 100.491L966.724 40.0279Z\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M1095.05 107.016L977.799 175.376C976.247 176.281 975.292 177.942 975.292 179.739V313.941\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M855.117 107.641L975.402 176.827\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M1097.7 105.504L1211.26 171.069C1216.73 174.227 1220.1 180.062 1220.1 186.377V307.302C1220.1 313.617 1216.73 319.452 1211.26 322.61L1106.54 383.073C1101.07 386.23 1094.33 386.23 1088.86 383.073L975.301 317.507\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M122.458 252.602L9.76606 316.246C4.2152 319.381 0.782472 325.262 0.782472 331.637V448.439C0.782472 454.814 4.2152 460.695 9.76607 463.83L113.765 522.565C119.16 525.611 125.755 525.611 131.15 522.565L244.133 458.756\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M852.863 234.322L852.864 115.269C852.864 109.011 849.555 103.22 844.165 100.042L741.962 39.7941C736.423 36.529 729.548 36.529 724.009 39.7941L621.807 100.042C616.416 103.22 613.107 109.011 613.107 115.269L613.107 246.506\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M608.391 529.625L488.636 461.496V325.238\" stroke=\"#111111\" stroke-width=\"0.505025\" stroke-dasharray=\"6.06 6.06\"\/>\n<path d=\"M368.457 530.047L488.635 461.495V325.237\" stroke=\"#111111\" stroke-width=\"0.505025\" stroke-dasharray=\"6.06 6.06\"\/>\n<path d=\"M479.954 326.381C485.326 323.28 491.944 323.28 497.315 326.381L602.039 386.844C607.411 389.945 610.72 395.676 610.72 401.879V522.804C610.72 529.006 607.411 534.738 602.039 537.839L497.315 598.302C491.944 601.403 485.326 601.403 479.954 598.302L375.23 537.839C369.859 534.738 366.55 529.006 366.55 522.804L366.55 401.879C366.55 395.676 369.859 389.945 375.23 386.844L479.954 326.381Z\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M608.281 393.367L491.033 461.727C489.481 462.632 488.527 464.294 488.527 466.09V600.293\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M368.352 394.002L488.636 463.189\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M363.383 388.289L243.628 320.16V183.903\" stroke=\"#111111\" stroke-width=\"0.505025\" stroke-dasharray=\"6.06 6.06\"\/>\n<path d=\"M123.449 388.711L243.627 320.159V183.901\" stroke=\"#111111\" stroke-width=\"0.505025\" stroke-dasharray=\"6.06 6.06\"\/>\n<path d=\"M234.946 185.046C240.318 181.944 246.936 181.944 252.307 185.046L357.031 245.508C362.403 248.609 365.712 254.341 365.712 260.543V381.468C365.712 387.671 362.403 393.402 357.031 396.503L252.307 456.966C246.936 460.067 240.318 460.067 234.946 456.966L130.222 396.503C124.851 393.402 121.542 387.671 121.542 381.468L121.542 260.543C121.542 254.341 124.851 248.609 130.222 245.508L234.946 185.046Z\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M363.273 252.031L246.026 320.391C244.473 321.296 243.519 322.958 243.519 324.754V458.957\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<path d=\"M123.344 252.666L243.628 321.853\" stroke=\"#111111\" stroke-width=\"0.630441\"\/>\n<\/g>\n<\/svg>\n\n\t\t\t\t<h1>4 m\u00e5ter sikkerhetskonsulenter bist\u00e5r IT-avdelingen<\/h1>\n\t\t\t\t<div class=\"excerpt\"><p>Det er mangel p\u00e5 cybersikkerhetskompetanse i n\u00e6ringslivet, og sikkerhetskonsulenter med spisskompetanse p\u00e5 analyse, arkitektur og l\u00f8sningsdesign er s\u00e6rlig ettertraktede i arbeidsmarkedet. Har du vurdert \u00e5 leie inn en sikkerhetskonsulent? <\/p>\n<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n<p>IT-avdelingen har ofte mange oppgaver p\u00e5 bordet. Det gj\u00f8r det krevende \u00e5 holde seg oppdatert p\u00e5 <strong>cybersikkerhet<\/strong>. Trusselbildet endrer seg hele tiden, og l\u00f8sninger som fungerer i dag kan v\u00e6re utdatert i morgen.<\/p>\n\n\n\n<p>En <strong>sikkerhetskonsulent<\/strong> gir deg fleksibel tilgang p\u00e5 oppdatert kompetanse. R\u00e5dgiveren kan beskytte virksomheten mot cyberangrep og kostbar nedetid gjennom:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regelmessige <strong>risikovurderinger<\/strong> og analyser<\/li>\n\n\n\n<li>R\u00e5dgivning og planlegging av <strong>sikkerhetsarkitektur<\/strong><\/li>\n\n\n\n<li>Implementering av riktig <strong>sikkerhetsteknologi<\/strong><\/li>\n\n\n\n<li><strong>Oppl\u00e6ring<\/strong> av IT-avdelingens ansatte<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"risikovurderinger-og-analyser-med-en-sikkerhetskonsulent\">Risikovurderinger og analyser med en sikkerhetskonsulent<\/h2>\n\n\n\n<p><strong>Sikkerhetskonsulenter<\/strong> hjelper IT-avdelingen med \u00e5 identifisere risiko i systemer, nettverk og applikasjoner. Arbeidet kan omfatte:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>S\u00e5rbarhetsskanninger<\/strong><\/li>\n\n\n\n<li><strong>Trusselvurderinger<\/strong><\/li>\n\n\n\n<li><strong>Risikomatriser<\/strong><\/li>\n\n\n\n<li><strong>Penetrasjonstesting<\/strong> av systemer og nettverk<\/li>\n<\/ul>\n\n\n\n<p>Disse tjenestene avdekker sikkerhetshull og gj\u00f8r det mulig \u00e5 iverksette tiltak som reduserer risikoen for <strong>cyberangrep<\/strong> og kostbar nedetid.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"sikkerhetskonsulent-og-planlegging-av-sikkerhetsarkitektur\">Sikkerhetskonsulent og planlegging av sikkerhetsarkitektur<\/h2>\n\n\n\n<p><strong>En sikkerhetskonsulent<\/strong> kan, basert p\u00e5 risikovurderinger, gi r\u00e5dgivning og planlegging av IT-avdelingens <strong>sikkerhetsarkitektur<\/strong>. M\u00e5let er \u00e5 utvikle en robust og helhetlig plan som beskytter systemer og infrastruktur.<\/p>\n\n\n\n<p>Dette kan omfatte design av l\u00f8sninger som:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security Operations Center (SOC)<\/strong><\/li>\n\n\n\n<li><strong>Security Information and Event Management (SIEM)<\/strong><\/li>\n\n\n\n<li><strong>Endpoint Detection and Response (EDR)<\/strong><\/li>\n\n\n\n<li>Andre teknologier for h\u00e5ndtering av sikkerhetshendelser<\/li>\n<\/ul>\n\n\n\n<p>Konsulenten kan ogs\u00e5 utarbeide planer for implementering og drift av sikkerhetsteknologi. I tillegg kan de lage <strong>sikkerhetspolicyer og prosedyrer<\/strong> som sikrer at IT-avdelingen f\u00f8lger gjeldende lover og forskrifter.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"implementering-av-sikkerhetsteknologi\">Implementering av sikkerhetsteknologi<\/h2>\n\n\n\n<p><strong>Sikkerhetskonsulenter<\/strong> hjelper IT-avdelingen med \u00e5 velge riktig teknologi basert p\u00e5 behov. Gjennom sterke samarbeidspartnere kan vi tilby markedets beste <strong>sikkerhetsl\u00f8sninger<\/strong>.<\/p>\n\n\n\n<p>Vi leverer blant annet:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Juniper Networks SRX brannmurer<\/strong><\/li>\n\n\n\n<li><strong>Palo Alto Networks neste generasjons brannmurer<\/strong><\/li>\n\n\n\n<li><strong>Palo Alto Cortex XDR<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Palo Alto Networks<\/strong> regnes som en ledende akt\u00f8r innen <strong>cybersikkerhet<\/strong>. De kombinerer avansert sikkerhet med automatisering og analyse, og utfordrer stadig status quo.<\/p>\n\n\n\n<p>Som <strong>Juniper Networks Elite Plus partner<\/strong> og <strong>Palo Alto-partner i over 15 \u00e5r<\/strong>, har vi opparbeidet dyp erfaring med disse teknologiene.<\/p>\n\n\n\n<p>I tillegg til brannmurer og endepunktsikring bist\u00e5r v\u00e5re konsulenter med:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Krypteringsverkt\u00f8y<\/strong><\/li>\n\n\n\n<li><strong>Antivirusprogramvare<\/strong><\/li>\n\n\n\n<li><strong>Sikkerhetskopiering<\/strong><\/li>\n\n\n\n<li><strong>Skysikkerhet<\/strong><\/li>\n\n\n\n<li>Andre l\u00f8sninger som styrker IT-sikkerheten<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"opplaering-av-avdelingens-ansatte\">Oppl\u00e6ring av avdelingens ansatte<\/h2>\n\n\n\n<p>En sikkerhetskonsulent kan ogs\u00e5 gi ulike typer oppl\u00e6ring avhengig av virksomhetens behov og krav til sikkerhet. Dette kan v\u00e6re oppl\u00e6ring i sikkerhetsbevissthet, teknisk oppl\u00e6ring, deling av beste praksis, eller en innf\u00f8ring i installasjon og konfigurasjon av ulike programvare.&nbsp;<\/p>\n\n\n\n<p>Vi legger vi stor vekt p\u00e5 kunnskapsdeling og kompetanseoverf\u00f8ring, og&nbsp;tilbyr blant annet <a href=\"https:\/\/www.nlogic.no\/losninger\/tjenester\/kurs-og-workshop\/\">kurs, workshops, seminarer, sertifiseringsl\u00f8p og en Proof of Concept (PoC) lab<\/a>. Her bist\u00e5r vi med oppl\u00e6ring og testing i alle faser av en leveranse. Vi holder ogs\u00e5 kurs ute hos kundene v\u00e5re, med skreddersydde opplegg som gj\u00f8r kompetanseoverf\u00f8ringen mest mulig relevant for hver enkelt virksomhet.<\/p>\n\n\n<div class=\"t2-featured-content-layout alignwide alignwide wp-block-t2-featured-content-layout\">\n<div class=\"t2-featured-single-post t2-featured-content is-post-type-page wp-block-t2-featured-single-post\"><a class=\"t2-post-link wp-block-t2-post-link\" href=\"https:\/\/www.nlogic.no\/konsulenttjenester\/\">\n<figure  class=\"t2-post-featured-image has-image-ratio-3-2 wp-block-t2-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1708\" src=\"https:\/\/www.nlogic.no\/content\/uploads\/2026\/01\/te_nlogicsummit2025-6335-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Lukaz\" srcset=\"https:\/\/www.nlogic.no\/content\/uploads\/2026\/01\/te_nlogicsummit2025-6335-scaled.jpg 2560w, https:\/\/www.nlogic.no\/content\/uploads\/2026\/01\/te_nlogicsummit2025-6335-300x200.jpg 300w, https:\/\/www.nlogic.no\/content\/uploads\/2026\/01\/te_nlogicsummit2025-6335-1024x683.jpg 1024w, https:\/\/www.nlogic.no\/content\/uploads\/2026\/01\/te_nlogicsummit2025-6335-768x512.jpg 768w, https:\/\/www.nlogic.no\/content\/uploads\/2026\/01\/te_nlogicsummit2025-6335-1536x1025.jpg 1536w, https:\/\/www.nlogic.no\/content\/uploads\/2026\/01\/te_nlogicsummit2025-6335-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/a>\n\n<div class=\"wp-block-group alignfull post-details is-layout-flow wp-block-group-is-layout-flow\">\n\t<a class=\"t2-post-link post-title-link wp-block-t2-post-link\" href=\"https:\/\/www.nlogic.no\/konsulenttjenester\/\">\n\t<h2 class=\"t2-post-title wp-block-t2-post-title\">Konsulenttjenester<\/h2>\n\t<\/a>\n\t<div class=\"t2-post-excerpt wp-block-t2-post-excerpt\"><p>Vi drives av kunnskap. Gjennom h\u00f8y ekspertise og langsiktige ambisjoner gj\u00f8r vi det komplekse enkelt &#8211; og infrastruktur og sikkerhet til konkurransefortrinn.Powered by Knowledge. Driven by Trust.<\/p><\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"t2-featured-single-post t2-featured-content is-post-type-page wp-block-t2-featured-single-post\"><a class=\"t2-post-link wp-block-t2-post-link\" href=\"https:\/\/www.nlogic.no\/losninger\/sikkerhet\/\">\n<figure  class=\"t2-post-featured-image has-image-ratio-3-2 wp-block-t2-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"1366\" src=\"https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/nlogic-konsulent.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"To nLogic-konsulenter snakker sammen.\" srcset=\"https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/nlogic-konsulent.jpg 2048w, https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/nlogic-konsulent-300x200.jpg 300w, https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/nlogic-konsulent-1024x683.jpg 1024w, https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/nlogic-konsulent-768x512.jpg 768w, https:\/\/www.nlogic.no\/content\/uploads\/2023\/08\/nlogic-konsulent-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/figure>\n<\/a>\n\n<div class=\"wp-block-group alignfull post-details is-layout-flow wp-block-group-is-layout-flow\">\n\t<a class=\"t2-post-link post-title-link wp-block-t2-post-link\" href=\"https:\/\/www.nlogic.no\/losninger\/sikkerhet\/\">\n\t<h2 class=\"t2-post-title wp-block-t2-post-title\">Sikkerhet<\/h2>\n\t<\/a>\n\t<div class=\"t2-post-excerpt wp-block-t2-post-excerpt\"><p>Vi sikrer din kritiske infrastruktur. Gjennom kompetanse, partnerskap og ambisjoner trygger vi ditt\u00a0fundament\u00a0i dag \u2013 og \u00e5pner nye muligheter fremover.Security at the Core. Powered by knowledge. Grow together.<\/p><\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"t2-featured-single-post t2-featured-content is-post-type-page wp-block-t2-featured-single-post\"><a class=\"t2-post-link wp-block-t2-post-link\" href=\"https:\/\/www.nlogic.no\/om-oss\/karriere\/vi-soker-konsulenter-innen-nettverk-og-it-sikkerhet\/\">\n<figure  class=\"t2-post-featured-image has-image-ratio-3-2 wp-block-t2-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1708\" src=\"https:\/\/www.nlogic.no\/content\/uploads\/2025\/05\/204_te_nLogicNorway-9590-scaled.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Datautstyr med ledninger.\" srcset=\"https:\/\/www.nlogic.no\/content\/uploads\/2025\/05\/204_te_nLogicNorway-9590-scaled.jpg 2560w, https:\/\/www.nlogic.no\/content\/uploads\/2025\/05\/204_te_nLogicNorway-9590-300x200.jpg 300w, https:\/\/www.nlogic.no\/content\/uploads\/2025\/05\/204_te_nLogicNorway-9590-1024x683.jpg 1024w, https:\/\/www.nlogic.no\/content\/uploads\/2025\/05\/204_te_nLogicNorway-9590-768x512.jpg 768w, https:\/\/www.nlogic.no\/content\/uploads\/2025\/05\/204_te_nLogicNorway-9590-1536x1025.jpg 1536w, https:\/\/www.nlogic.no\/content\/uploads\/2025\/05\/204_te_nLogicNorway-9590-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure>\n<\/a>\n\n<div class=\"wp-block-group alignfull post-details is-layout-flow wp-block-group-is-layout-flow\">\n\t<a class=\"t2-post-link post-title-link wp-block-t2-post-link\" href=\"https:\/\/www.nlogic.no\/om-oss\/karriere\/vi-soker-konsulenter-innen-nettverk-og-it-sikkerhet\/\">\n\t<h2 class=\"t2-post-title wp-block-t2-post-title\">Vi s\u00f8ker konsulenter innen nettverk og IT-sikkerhet<\/h2>\n\t<\/a>\n\t<div class=\"t2-post-excerpt wp-block-t2-post-excerpt\"><p>Brenner du for innovasjon, har lyst til \u00e5 p\u00e5virke egen arbeidshverdag og er p\u00e5 jakt etter \u00e5 jobbe med noen av menneskene med h\u00f8yest kompetanse innen nettverk- og IT-sikkerhet? Da \u00f8nsker Vebj\u00f8rn og resten av oss i nLogic at du tar kontakt.<\/p><\/div>\n<\/div>\n\n<\/div>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"opplaering-av-avdelingens-ansatte\"><br><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Det er mangel p\u00e5 cybersikkerhetskompetanse i n\u00e6ringslivet, og sikkerhetskonsulenter med spisskompetanse p\u00e5 analyse, arkitektur og l\u00f8sningsdesign er s\u00e6rlig ettertraktede i arbeidsmarkedet. Har du vurdert \u00e5 leie inn en sikkerhetskonsulent? <\/p>\n","protected":false},"author":5,"featured_media":2780,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"dk_card_image_id":0,"display_contact_person_section":false,"person_post_id":0,"person_post_title":"","person_cta_url":"","person_cta_label":"","exclude_from_listing":0,"footnotes":""},"categories":[254],"class_list":["post-4834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sikkerhetskonsulent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 m\u00e5ter en sikkerhetskonsulent bist\u00e5r IT-avdelingen - nLogic<\/title>\n<meta name=\"description\" content=\"En sikkerhetskonsulent gir deg fleksibel tilgang p\u00e5 oppdatert kompetanse, og kan beskytte virksomheten din mot cyberangrep og kostbar nedetid\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 m\u00e5ter sikkerhetskonsulenter bist\u00e5r IT-avdelingen\" \/>\n<meta property=\"og:description\" content=\"En sikkerhetskonsulent gir deg fleksibel tilgang p\u00e5 oppdatert kompetanse, og kan beskytte virksomheten din mot cyberangrep og kostbar nedetid\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/\" \/>\n<meta property=\"og:site_name\" content=\"nLogic - Powered by Knowledge. Driven by Trust.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nLogicAS\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-23T07:05:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-20T10:02:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/08\/Nlogic_Landskap_1458.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1366\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"mortenpedersen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dekode\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mortenpedersen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/\"},\"author\":{\"name\":\"mortenpedersen\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#\/schema\/person\/bf8f8ef0c201390a4867afd5f2c1d9c9\"},\"headline\":\"4 m\u00e5ter sikkerhetskonsulenter bist\u00e5r IT-avdelingen\",\"datePublished\":\"2023-09-23T07:05:47+00:00\",\"dateModified\":\"2025-08-20T10:02:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/\"},\"wordCount\":443,\"publisher\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/#organization\"},\"articleSection\":[\"Sikkerhetskonsulent\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/\",\"url\":\"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/\",\"name\":\"4 m\u00e5ter en sikkerhetskonsulent bist\u00e5r IT-avdelingen - nLogic\",\"isPartOf\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/#website\"},\"datePublished\":\"2023-09-23T07:05:47+00:00\",\"dateModified\":\"2025-08-20T10:02:17+00:00\",\"description\":\"En sikkerhetskonsulent gir deg fleksibel tilgang p\u00e5 oppdatert kompetanse, og kan beskytte virksomheten din mot cyberangrep og kostbar nedetid\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#website\",\"url\":\"https:\/\/www.nlogic.no\/english\/\",\"name\":\"nLogic - Powered by Knowledge. Driven by Trust.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nlogic.no\/english\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#organization\",\"name\":\"nLogic - Powered by Knowledge. Driven by Trust.\",\"url\":\"https:\/\/www.nlogic.no\/english\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-logo-1.svg\",\"contentUrl\":\"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-logo-1.svg\",\"caption\":\"nLogic - Powered by Knowledge. Driven by Trust.\"},\"image\":{\"@id\":\"https:\/\/www.nlogic.no\/english\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nLogicAS\",\"https:\/\/www.linkedin.com\/company\/nlogic-as\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#\/schema\/person\/bf8f8ef0c201390a4867afd5f2c1d9c9\",\"name\":\"mortenpedersen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nlogic.no\/english\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9afbe8946b0d6bbeadfcdca35bba6e4d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9afbe8946b0d6bbeadfcdca35bba6e4d?s=96&d=mm&r=g\",\"caption\":\"mortenpedersen\"},\"sameAs\":[\"https:\/\/twitter.com\/dekode\"],\"url\":\"https:\/\/www.nlogic.no\/english\/aktuelt\/author\/mortenpedersen\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"4 m\u00e5ter en sikkerhetskonsulent bist\u00e5r IT-avdelingen - nLogic","description":"En sikkerhetskonsulent gir deg fleksibel tilgang p\u00e5 oppdatert kompetanse, og kan beskytte virksomheten din mot cyberangrep og kostbar nedetid","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"4 m\u00e5ter sikkerhetskonsulenter bist\u00e5r IT-avdelingen","og_description":"En sikkerhetskonsulent gir deg fleksibel tilgang p\u00e5 oppdatert kompetanse, og kan beskytte virksomheten din mot cyberangrep og kostbar nedetid","og_url":"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/","og_site_name":"nLogic - Powered by Knowledge. Driven by Trust.","article_publisher":"https:\/\/www.facebook.com\/nLogicAS","article_published_time":"2023-09-23T07:05:47+00:00","article_modified_time":"2025-08-20T10:02:17+00:00","og_image":[{"width":2048,"height":1366,"url":"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/08\/Nlogic_Landskap_1458.jpg","type":"image\/jpeg"}],"author":"mortenpedersen","twitter_card":"summary_large_image","twitter_creator":"@dekode","twitter_misc":{"Written by":"mortenpedersen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/#article","isPartOf":{"@id":"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/"},"author":{"name":"mortenpedersen","@id":"https:\/\/www.nlogic.no\/english\/#\/schema\/person\/bf8f8ef0c201390a4867afd5f2c1d9c9"},"headline":"4 m\u00e5ter sikkerhetskonsulenter bist\u00e5r IT-avdelingen","datePublished":"2023-09-23T07:05:47+00:00","dateModified":"2025-08-20T10:02:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/"},"wordCount":443,"publisher":{"@id":"https:\/\/www.nlogic.no\/english\/#organization"},"articleSection":["Sikkerhetskonsulent"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/","url":"https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/","name":"4 m\u00e5ter en sikkerhetskonsulent bist\u00e5r IT-avdelingen - nLogic","isPartOf":{"@id":"https:\/\/www.nlogic.no\/english\/#website"},"datePublished":"2023-09-23T07:05:47+00:00","dateModified":"2025-08-20T10:02:17+00:00","description":"En sikkerhetskonsulent gir deg fleksibel tilgang p\u00e5 oppdatert kompetanse, og kan beskytte virksomheten din mot cyberangrep og kostbar nedetid","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nlogic.no\/english\/aktuelt\/4-mater-sikkerhetskonsulenter-bistar-it-avdelingen\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nlogic.no\/english\/#website","url":"https:\/\/www.nlogic.no\/english\/","name":"nLogic - Powered by Knowledge. Driven by Trust.","description":"","publisher":{"@id":"https:\/\/www.nlogic.no\/english\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nlogic.no\/english\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nlogic.no\/english\/#organization","name":"nLogic - Powered by Knowledge. Driven by Trust.","url":"https:\/\/www.nlogic.no\/english\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nlogic.no\/english\/#\/schema\/logo\/image\/","url":"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-logo-1.svg","contentUrl":"https:\/\/www.nlogic.no\/content\/uploads\/sites\/6\/2023\/09\/nlogic-logo-1.svg","caption":"nLogic - Powered by Knowledge. Driven by Trust."},"image":{"@id":"https:\/\/www.nlogic.no\/english\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nLogicAS","https:\/\/www.linkedin.com\/company\/nlogic-as\/"]},{"@type":"Person","@id":"https:\/\/www.nlogic.no\/english\/#\/schema\/person\/bf8f8ef0c201390a4867afd5f2c1d9c9","name":"mortenpedersen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nlogic.no\/english\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9afbe8946b0d6bbeadfcdca35bba6e4d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9afbe8946b0d6bbeadfcdca35bba6e4d?s=96&d=mm&r=g","caption":"mortenpedersen"},"sameAs":["https:\/\/twitter.com\/dekode"],"url":"https:\/\/www.nlogic.no\/english\/aktuelt\/author\/mortenpedersen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/posts\/4834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/comments?post=4834"}],"version-history":[{"count":4,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/posts\/4834\/revisions"}],"predecessor-version":[{"id":8813,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/posts\/4834\/revisions\/8813"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/media\/2780"}],"wp:attachment":[{"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/media?parent=4834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nlogic.no\/english\/wp-json\/wp\/v2\/categories?post=4834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}