{"id":23818,"date":"2026-03-13T13:07:44","date_gmt":"2026-03-13T12:07:44","guid":{"rendered":"https:\/\/coreit.se\/tjanster\/security-risk-management"},"modified":"2026-03-31T07:46:51","modified_gmt":"2026-03-31T05:46:51","slug":"security-risk-management","status":"publish","type":"tjanster","link":"https:\/\/coreit.se\/en\/services\/security-risk-management","title":{"rendered":"Security &amp; risk management"},"excerpt":{"rendered":"<p>Secure and controlled IT environment with clear follow-up Security &amp; risk management Security and risk management are a basic prerequisite for the stable and long-term functioning of the organization&#8217;s IT environment. As the demands on information management increase and the threat picture changes, security work needs to be structured, continuous and adapted to the needs [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":0,"template":"","meta":{"_acf_changed":false},"utseende":[40],"class_list":["post-23818","tjanster","type-tjanster","status-publish","hentry","utseende-omrade"],"acf":[],"_links":{"self":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster\/23818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster"}],"about":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/types\/tjanster"}],"version-history":[{"count":0,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/tjanster\/23818\/revisions"}],"wp:attachment":[{"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/media?parent=23818"}],"wp:term":[{"taxonomy":"utseende","embeddable":true,"href":"https:\/\/coreit.se\/en\/wp-json\/wp\/v2\/utseende?post=23818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}