{"id":3471,"date":"2025-06-03T15:20:51","date_gmt":"2025-06-03T13:20:51","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=3471"},"modified":"2025-06-17T07:13:27","modified_gmt":"2025-06-17T05:13:27","slug":"exclusive-business-breakfast","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/exclusive-business-breakfast\/","title":{"rendered":"Exclusive Business Breakfast"},"content":{"rendered":"\n<p>At the exclusive business breakfast together with Pavelka-Denk Personalberatung in the Private Members Club Am Hof \u200b\u200b8, an exciting question was the focus: When do companies need a Chief Information Security Officer (CISO) and when can flexible models such as &#8220;CISO-as-a-Service&#8221; meet the demand?<\/p>\n\n\n\n<p>Details about the event can be found in the coverage of LeadersNet <a href=\"https:\/\/www.leadersnet.at\/news\/90159,fuehrungskraefte-diskutierten-ueber-zukunftsfaehige-ciso-modelle.html\">here<\/a> (only in German).<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"886\" height=\"1024\" data-id=\"3474\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/fdf5ceb8-a9af-4275-8ab3-78d6c0bd6bc5-2-886x1024.jpg\" alt=\"\" class=\"wp-image-3474\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/fdf5ceb8-a9af-4275-8ab3-78d6c0bd6bc5-2-886x1024.jpg 886w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/fdf5ceb8-a9af-4275-8ab3-78d6c0bd6bc5-2-259x300.jpg 259w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/fdf5ceb8-a9af-4275-8ab3-78d6c0bd6bc5-2-768x888.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/fdf5ceb8-a9af-4275-8ab3-78d6c0bd6bc5-2-1328x1536.jpg 1328w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/fdf5ceb8-a9af-4275-8ab3-78d6c0bd6bc5-2-1771x2048.jpg 1771w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"972\" data-id=\"3475\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/1000000893-1-1024x972.jpg\" alt=\"\" class=\"wp-image-3475\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/1000000893-1-1024x972.jpg 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/1000000893-1-300x285.jpg 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/1000000893-1-768x729.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/1000000893-1-1536x1459.jpg 1536w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2025\/06\/1000000893-1-2048x1945.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n","protected":false},"excerpt":{"rendered":"<p>At the exclusive business breakfast together with Pavelka-Denk Personalberatung in the Private Members Club Am Hof \u200b\u200b8, an exciting question was the focus: When do companies need a Chief Information Security Officer (CISO) and when can flexible models such as &#8220;CISO-as-a-Service&#8221; meet the demand? Details about the event can be found in the coverage of [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":3474,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[128],"tags":[672,411],"class_list":["post-3471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press","tag-ciso-as-a-service-en","tag-press-en"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=3471"}],"version-history":[{"count":5,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3471\/revisions"}],"predecessor-version":[{"id":3483,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/3471\/revisions\/3483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/3474"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=3471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=3471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=3471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}