{"id":11933,"date":"2019-07-29T21:17:15","date_gmt":"2019-07-29T20:17:15","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11933"},"modified":"2020-01-02T11:21:54","modified_gmt":"2020-01-02T10:21:54","slug":"cybersecurity-in-an-agile-world","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/","title":{"rendered":"Cybersecurity in an agile world"},"content":{"rendered":"<p><em>Organisations are deploying agile operating models and new ways of working in order to facilitate IS projects and build better products. Therefore, cybersecurity has to be taken into account into these new methods. What does cybersecurity mean in an agile world ? This infographic brings an anwser to that.<br \/>\n<\/em><\/p>\n<figure><\/figure>\n<figure id=\"post-11972 media-11972\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11972\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/Agile-cyber-infographic-vs-4_01.png\" alt=\"\" width=\"797\" height=\"2476\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/Agile-cyber-infographic-vs-4_01.png 797w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/Agile-cyber-infographic-vs-4_01-61x191.png 61w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/Agile-cyber-infographic-vs-4_01-768x2386.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/Agile-cyber-infographic-vs-4_01-13x39.png 13w\" sizes=\"auto, (max-width: 797px) 100vw, 797px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"post-11934 media-11934\" class=\"align-center\"><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Organisations are deploying agile operating models and new ways of working in order to facilitate IS projects and build better products. Therefore, cybersecurity has to be taken into account into these new methods. What does cybersecurity mean in an agile&#8230;<\/p>\n","protected":false},"author":1332,"featured_media":11235,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,2777],"tags":[3163,2772,3165,3166,3164],"coauthors":[3146],"class_list":["post-11933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-cybersecurity-digital-trust","tag-agile","tag-cybersecurity","tag-infographic","tag-uk-office","tag-world"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in an agile world - RiskInsight<\/title>\n<meta name=\"description\" content=\"Organisations are deploying agile operating models in order to facilitate IS projects. What does cybersecurity mean in an agile world?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in an agile world - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Organisations are deploying agile operating models in order to facilitate IS projects. What does cybersecurity mean in an agile world?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-29T20:17:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T10:21:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1356\" \/>\n\t<meta property=\"og:image:height\" content=\"1402\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laura Gordon\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laura Gordon\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/\"},\"author\":{\"name\":\"Laura Gordon\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0f4935dd081bc794ce62c89a4d44e460\"},\"headline\":\"Cybersecurity in an agile world\",\"datePublished\":\"2019-07-29T20:17:15+00:00\",\"dateModified\":\"2020-01-02T10:21:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/\"},\"wordCount\":54,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg\",\"keywords\":[\"agile\",\"cybersecurity\",\"infographic\",\"UK office\",\"world\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/\",\"name\":\"Cybersecurity in an agile world - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg\",\"datePublished\":\"2019-07-29T20:17:15+00:00\",\"dateModified\":\"2020-01-02T10:21:54+00:00\",\"description\":\"Organisations are deploying agile operating models in order to facilitate IS projects. What does cybersecurity mean in an agile world?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg\",\"width\":1356,\"height\":1402,\"caption\":\"Digital marketing concept. Human hand with a megaphone surrounded by media icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in an agile world\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0f4935dd081bc794ce62c89a4d44e460\",\"name\":\"Laura Gordon\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/laura-gordon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in an agile world - RiskInsight","description":"Organisations are deploying agile operating models in order to facilitate IS projects. What does cybersecurity mean in an agile world?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in an agile world - RiskInsight","og_description":"Organisations are deploying agile operating models in order to facilitate IS projects. What does cybersecurity mean in an agile world?","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/","og_site_name":"RiskInsight","article_published_time":"2019-07-29T20:17:15+00:00","article_modified_time":"2020-01-02T10:21:54+00:00","og_image":[{"width":1356,"height":1402,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Laura Gordon","twitter_misc":{"Written by":"Laura Gordon"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/"},"author":{"name":"Laura Gordon","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0f4935dd081bc794ce62c89a4d44e460"},"headline":"Cybersecurity in an agile world","datePublished":"2019-07-29T20:17:15+00:00","dateModified":"2020-01-02T10:21:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/"},"wordCount":54,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg","keywords":["agile","cybersecurity","infographic","UK office","world"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/","name":"Cybersecurity in an agile world - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg","datePublished":"2019-07-29T20:17:15+00:00","dateModified":"2020-01-02T10:21:54+00:00","description":"Organisations are deploying agile operating models in order to facilitate IS projects. What does cybersecurity mean in an agile world?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/08\/Fotolia_81247764_Subscription_Monthly_M.jpg","width":1356,"height":1402,"caption":"Digital marketing concept. Human hand with a megaphone surrounded by media icons"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/07\/cybersecurity-in-an-agile-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in an agile world"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/0f4935dd081bc794ce62c89a4d44e460","name":"Laura Gordon","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/laura-gordon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1332"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11933"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11933\/revisions"}],"predecessor-version":[{"id":12011,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11933\/revisions\/12011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/11235"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11933"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}