{"id":853,"date":"2024-06-28T08:00:21","date_gmt":"2024-06-28T08:00:21","guid":{"rendered":"https:\/\/www.becybersafe.be\/?post_type=podcasts&#038;p=853"},"modified":"2024-07-18T09:21:46","modified_gmt":"2024-07-18T09:21:46","slug":"wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit","status":"publish","type":"podcasts","link":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/","title":{"rendered":"Wat is een risicoanalyse van je IT en hoe voer je dat uit?"},"content":{"rendered":"\n<p>&#8211; met Jan Guldentops<\/p>\n\n\n\n<p>In deze aflevering van de BeCyberSafe podcastreeks over cybersecurity voor webshops en KMO&#8217;s, leer je hoe je een risico-analyse maakt van je webshop, hoe je de bewaking van kwetsbaarheden kan organiseren en waar je moet op letten.&nbsp; &nbsp;<\/p>\n\n\n\n<div class=\"figure-img\"><\/div>\n\n\n\n<p>Beluister hier de podcast:<\/p>\n\n\n\n<div class=\"figure-img\"><\/div>\n\n\n\n<div id=\"buzzsprout-player-15301466\"><\/div><script src=\"https:\/\/www.buzzsprout.com\/2379178\/15301466-wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit-met-jan-guldentops.js?container_id=buzzsprout-player-15301466&#038;player=small\" type=\"text\/javascript\" charset=\"utf-8\"><\/script>\n","protected":false},"excerpt":{"rendered":"<p>&#8211; met Jan Guldentops In deze aflevering van de BeCyberSafe podcastreeks over cybersecurity voor webshops en KMO&#8217;s, leer je hoe &hellip; <a href=\"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/\">Continued<\/a><\/p>\n","protected":false},"author":6,"featured_media":847,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"podcast_tag":[],"class_list":["post-853","podcasts","type-podcasts","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wat is een risicoanalyse van je IT en hoe voer je dat uit? - BeCyberSafe<\/title>\n<meta name=\"description\" content=\"In deze podcast over cybersecurity voor webshops en KMO&#039;s, leer je hoe je een risico-analyse maakt van je webshop en kwetsbaarheden bewaakt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wat is een risicoanalyse van je IT en hoe voer je dat uit? - BeCyberSafe\" \/>\n<meta property=\"og:description\" content=\"In deze podcast over cybersecurity voor webshops en KMO&#039;s, leer je hoe je een risico-analyse maakt van je webshop en kwetsbaarheden bewaakt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/\" \/>\n<meta property=\"og:site_name\" content=\"BeCyberSafe\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-18T09:21:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/06\/BeCyberSafe-Podcast-Jan-Guldentops-e1719569246690.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\/\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/\",\n\t            \"name\": \"Wat is een risicoanalyse van je IT en hoe voer je dat uit? - BeCyberSafe\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#website\"\n\t            },\n\t            \"primaryImageOfPage\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#primaryimage\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#primaryimage\"\n\t            },\n\t            \"thumbnailUrl\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/06\/BeCyberSafe-Podcast-Jan-Guldentops-e1719569246690.jpg\",\n\t            \"datePublished\": \"2024-06-28T08:00:21+00:00\",\n\t            \"dateModified\": \"2024-07-18T09:21:46+00:00\",\n\t            \"description\": \"In deze podcast over cybersecurity voor webshops en KMO's, leer je hoe je een risico-analyse maakt van je webshop en kwetsbaarheden bewaakt.\",\n\t            \"breadcrumb\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#breadcrumb\"\n\t            },\n\t            \"inLanguage\": \"nl-NL\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"ImageObject\",\n\t            \"inLanguage\": \"nl-NL\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#primaryimage\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/06\/BeCyberSafe-Podcast-Jan-Guldentops-e1719569246690.jpg\",\n\t            \"contentUrl\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/06\/BeCyberSafe-Podcast-Jan-Guldentops-e1719569246690.jpg\",\n\t            \"width\": 250,\n\t            \"height\": 250\n\t        },\n\t        {\n\t            \"@type\": \"BreadcrumbList\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#breadcrumb\",\n\t            \"itemListElement\": [\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 1,\n\t                    \"name\": \"Home\",\n\t                    \"item\": \"https:\/\/www.becybersafe.be\/nl\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 2,\n\t                    \"name\": \"Podcasts\",\n\t                    \"item\": \"https:\/\/www.becybersafe.be\/nl\/podcasts\/\"\n\t                },\n\t                {\n\t                    \"@type\": \"ListItem\",\n\t                    \"position\": 3,\n\t                    \"name\": \"Wat is een risicoanalyse van je IT en hoe voer je dat uit?\"\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#website\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/nl\/\",\n\t            \"name\": \"BeCyberSafe\",\n\t            \"description\": \"\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#organization\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\/\/www.becybersafe.be\/nl\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"nl-NL\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#organization\",\n\t            \"name\": \"BeCyberSafe\",\n\t            \"url\": \"https:\/\/www.becybersafe.be\/nl\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"nl-NL\",\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#\/schema\/logo\/image\/\",\n\t                \"url\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png\",\n\t                \"contentUrl\": \"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png\",\n\t                \"width\": 1104,\n\t                \"height\": 463,\n\t                \"caption\": \"BeCyberSafe\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\/\/www.becybersafe.be\/nl\/#\/schema\/logo\/image\/\"\n\t            }\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wat is een risicoanalyse van je IT en hoe voer je dat uit? - BeCyberSafe","description":"In deze podcast over cybersecurity voor webshops en KMO's, leer je hoe je een risico-analyse maakt van je webshop en kwetsbaarheden bewaakt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/","og_locale":"nl_NL","og_type":"article","og_title":"Wat is een risicoanalyse van je IT en hoe voer je dat uit? - BeCyberSafe","og_description":"In deze podcast over cybersecurity voor webshops en KMO's, leer je hoe je een risico-analyse maakt van je webshop en kwetsbaarheden bewaakt.","og_url":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/","og_site_name":"BeCyberSafe","article_modified_time":"2024-07-18T09:21:46+00:00","og_image":[{"width":250,"height":250,"url":"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/06\/BeCyberSafe-Podcast-Jan-Guldentops-e1719569246690.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/","url":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/","name":"Wat is een risicoanalyse van je IT en hoe voer je dat uit? - BeCyberSafe","isPartOf":{"@id":"https:\/\/www.becybersafe.be\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#primaryimage"},"image":{"@id":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/06\/BeCyberSafe-Podcast-Jan-Guldentops-e1719569246690.jpg","datePublished":"2024-06-28T08:00:21+00:00","dateModified":"2024-07-18T09:21:46+00:00","description":"In deze podcast over cybersecurity voor webshops en KMO's, leer je hoe je een risico-analyse maakt van je webshop en kwetsbaarheden bewaakt.","breadcrumb":{"@id":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#primaryimage","url":"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/06\/BeCyberSafe-Podcast-Jan-Guldentops-e1719569246690.jpg","contentUrl":"https:\/\/www.becybersafe.be\/app\/uploads\/2024\/06\/BeCyberSafe-Podcast-Jan-Guldentops-e1719569246690.jpg","width":250,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.becybersafe.be\/nl\/podcasts\/wat-is-een-risicoanalyse-van-je-it-en-hoe-voer-je-dat-uit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.becybersafe.be\/nl\/"},{"@type":"ListItem","position":2,"name":"Podcasts","item":"https:\/\/www.becybersafe.be\/nl\/podcasts\/"},{"@type":"ListItem","position":3,"name":"Wat is een risicoanalyse van je IT en hoe voer je dat uit?"}]},{"@type":"WebSite","@id":"https:\/\/www.becybersafe.be\/nl\/#website","url":"https:\/\/www.becybersafe.be\/nl\/","name":"BeCyberSafe","description":"","publisher":{"@id":"https:\/\/www.becybersafe.be\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.becybersafe.be\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.becybersafe.be\/nl\/#organization","name":"BeCyberSafe","url":"https:\/\/www.becybersafe.be\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.becybersafe.be\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png","contentUrl":"https:\/\/www.becybersafe.be\/app\/uploads\/2023\/08\/BCS_Logo_black@2x-e1693488227698.png","width":1104,"height":463,"caption":"BeCyberSafe"},"image":{"@id":"https:\/\/www.becybersafe.be\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/podcasts\/853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/podcasts"}],"about":[{"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/types\/podcasts"}],"author":[{"embeddable":true,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":4,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/podcasts\/853\/revisions"}],"predecessor-version":[{"id":873,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/podcasts\/853\/revisions\/873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/media\/847"}],"wp:attachment":[{"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/media?parent=853"}],"wp:term":[{"taxonomy":"podcast_tag","embeddable":true,"href":"https:\/\/www.becybersafe.be\/nl\/wp-json\/wp\/v2\/podcast_tag?post=853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}