{"id":517768,"date":"2021-04-09T14:38:24","date_gmt":"2021-04-09T14:38:24","guid":{"rendered":"https:\/\/www.capgemini.com\/dk-en\/?page_id=517768"},"modified":"2026-04-10T07:32:46","modified_gmt":"2026-04-10T07:32:46","slug":"continuous-strategy-grc","status":"publish","type":"page","link":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/","title":{"rendered":"Continuous strategy GRC"},"content":{"rendered":"\n<div class=\"wp-block-cg-blocks-hero-picture-card undefined  heroPictureCard\"><div class=\"heroPictureCardBgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\" class=\"desktopImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 37%\" loading=\"eager\"\/><\/picture><picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1.jpg\" class=\"mobileImage\" alt=\"\" style=\"object-fit:cover;object-position:50% 37%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-8 col-lg-6\"><div class=\"heroPictureCardBox\"><div class=\"heroPictureCardBoxTitle\"><h1 data-maxlength=\"144\">Continuous strategy, governance, risk and compliance<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"small-device\"><div class=\"brandLogoWrapper\"> <\/div><\/div><\/div>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para undefined section section--intro\"><div class=\"intro-para\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-8\"><h2 class=\"intro-para-title\">Secure by strategy. Resilient by design.<br><\/h2><p class=\"intro-para-content\">Cybersecurity today is not just about defense \u2013 it\u2019s about enabling secure growth. Continuous Strategy, Governance, Risk and Compliance services by Capgemini help you embed security into the DNA of your organization \u2013 so you can grow with confidence, navigate risk intelligently, and stay ahead of evolving regulatory and technology landscapes.<br><br>Whether you\u2019re building resilience into critical systems, adopting Gen AI responsibly, or preparing for a post-quantum world, we help you define a clear cybersecurity roadmap, align it with business goals, and adapt as your environment changes. Our approach is continuous, data-driven, and proactive \u2013 turning compliance into competitive advantage.<\/p><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-intro-para-video section section--info-2cols section--insights section-video \"><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><h3 class=\"Video-title\" data-maxlength=\"34\">Security for Your SAP Landscape<\/h3><div class=\"video-info\"><p data-maxlength=\"68\"><\/p><\/div><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><div class=\"video-wrapper\"><iframe title=\"video-section\" src=\"https:\/\/www.youtube.com\/embed\/8hWDfbZHfLw?rel=0&amp;modestbranding=1&amp;playsinline=1&amp;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div><\/div><\/div><div class=\"col-md-1\"><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-wrapper-client-stories section-client-stories\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"clientblock-title\">Client story<\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"slider-nav-wrapper smallDevice\"><div class=\"slider-nav\"><button class=\"slider-prev  inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><button class=\"slider-next \" aria-label=\"Slider next\"><\/button><\/div><\/div><div class=\"slider-list\"><div class=\"slide active\">\n\t\t\t<div class=\"slide-bg-wrapper\">\n\t\t\t\t<picture><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=2880&amp;quality=70 2x\"\n\t\t\t\tmedia=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=2880&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=2048&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=480&amp;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg?w=960&amp;quality=70 2x\"\n\t\t\tmedia=\"(min-width: 0)\"\/><img decoding=\"async\" loading=\"lazy\" class=\"slide-bg\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2021\/06\/Capgemini_Client-Stories_Nordic.jpg\" alt=\"\"\n\t\t\tstyle=\"object-position: 50% 50%; object-fit: cover;\"\n\t\t\/><\/picture><div class=\"slide-reveal\"><\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"slide-info-wrapper\">\n\t\t\t\t\t<div class=\"row\">\n\t\t\t\t\t\t<div class=\"col-12 col-lg-6\">\n\t\t\t\t\t\t\t<div class=\"slide-info\">\n\t\t\t\t\t\t\t\t<a aria-label=\"Fighting the rise of cybercrime and online fraud by establishing the Nordic Financial CERT\"\n\t\t\t\t\t\t\t\t   href=\"https:\/\/www.capgemini.com\/dk-en\/news\/client-stories\/fighting-the-rise-of-cybercrime-and-online-fraud-by-establishing-the-nordic-financial-cert\/\">\n\t\t\t\t\t\t\t\t\t<div class=\"box\">\n\t\t\t\t\t\t\t\t\t\t<h3 class=\"client-subtitle\">Fighting the rise of cybercrime and online fraud by establishing the Nordic Financial CERT<\/h3>\n\t\t\t\t\t\t\t\t\t\t<p>Nordic financial institutions worked with Capgemini to establish the first international financial CERT to respond to increasingly sophisticated cybersecurity threats<\/p>\n\t\t\t\t\t\t\t\t\t<\/div><!-- End of box-->\n\t\t\t\t\t\t\t\t<\/a><div class=\"slide-info-footer\">\n                                <div class=\"brand-logo-wrapper\"><\/div>\n\t\t\t<div class=\"content-more\">\n\t\t\t\t<a class=\"cta-button\" href=\"https:\/\/www.capgemini.com\/dk-en\/news\/client-stories\/fighting-the-rise-of-cybercrime-and-online-fraud-by-establishing-the-nordic-financial-cert\/\" aria-label=\"Read more about Fighting the rise of cybercrime and online fraud by establishing the Nordic Financial CERT\"><span>Read more<\/span><\/a>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div><!-- End of slide info-->\n<\/div>\n<\/div>\n<\/div>\n<\/div><!-- End of container-->\n\n<\/div><!-- End of slide active -->\n<\/div><div class=\"slider-nav-wrapper largeDevice\"><div class=\"slider-nav\"><button class=\"slider-prev  inactive\" aria-label=\"Slider previous\" tabindex=\"-1\"><\/button><button class=\"slider-next\" aria-label=\"Slider next\"><\/button><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-how-we-do-it section section--howwedoit block-howwedoit\"><div class=\"container\"><div><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"72\" class=\"expandable-heading-tag\">What we offer<\/h2><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><p><\/p><\/div><\/div><\/div><div class=\"row\"><div class=\"col-12 col-md-8\"><div class=\"section-content\">\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Strategy and transformation<\/h3><\/div><div class=\"expander-content\"><p>We help you build a long-term, adaptive security strategy that supports innovation and resilience. Our services cover regulatory frameworks such as DORA and NIS2, ensuring your cybersecurity investments are aligned with both compliance and growth.<br><\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Cyber consulting link\" href=\"\/wp-content\/uploads\/2021\/05\/Cybersecurity-Consulting_brochure.pdf \" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Cyber consulting<\/a><a class=\"more2\" aria-label=\"Cyber experience center link\" href=\"\/wp-content\/uploads\/2021\/05\/Brochure-Cyber-Experience-Center.pdf \" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Cyber experience center<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Governance, risk, and compliance (GRC)<\/h3><\/div><div class=\"expander-content\"><p>\u00a0Our GRC services provide a structured, risk-based approach to managing compliance and accountability across your digital enterprise. We help you stay ahead of evolving regulations while embedding governance into your operational fabric.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Digital operational resilience<\/h3><\/div><div class=\"expander-content\"><p>We support financial institutions in meeting and exceeding DORA requirements through automation, rigorous testing, and resilient-by-design architectures. <\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Read more about DORA link\" href=\"https:\/\/www.capgemini.com\/solutions\/digital-operational-resilience-act-dora\/\" target=\"_blank\" title=\"Opens in a new window\" rel=\"noopener noreferrer\">Read more about DORA<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Security maturity accelerators<\/h3><\/div><div class=\"expander-content\"><p>We offer fast-track assessments and improvement plans across critical domains such as zero trust, cloud, 5G, generative AI, and quantum. Our accelerators help you identify gaps, prioritize actions, and strengthen your security maturity.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Gen AI Security Suite<\/h3><\/div><div class=\"expander-content\"><p>Our Gen AI Security Suite ensures safe and responsible use of AI by integrating security controls, data governance, and usage traceability into your AI workflows. <\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"Gen AI Security Suite link\" href=\"https:\/\/www.capgemini.com\/dk-en\/solutions\/gen-ai-security-suite\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">Gen AI Security Suite<\/a><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Post-quantum cryptography advisory<\/h3><\/div><div class=\"expander-content\"><p>We help you assess cryptographic readiness and develop transformation plans to ensure agility and resilience in a post-quantum world \u2013 mitigating long-term risks before they materialize.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Security awareness and culture<\/h3><\/div><div class=\"expander-content\"><p>We help build a strong security culture through tailored training programs, including digital hygiene best practices and Gen AI-specific awareness, empowering your teams to become your first line of defense.<\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-cg-blocks-card-howwedoit expanders\"><div class=\"box card-regulated-agreements card-howwedoit\"><div class=\"expander-box filter-box tag-active \"><div class=\"expander-title\" tabindex=\"0\" role=\"button\" aria-expanded=\"false\"><h3 class=\"expander-heading-title\">Security for SAP landscape<\/h3><\/div><div class=\"expander-content\"><p>Secure your enterprise backbone. We provide deep visibility into your SAP environment, identify vulnerabilities, and guide rapid remediation at both system and application levels. <\/p><div class=\"bg-color video-align-right\"><div class=\"container\"><div class=\"row video-align-left\"><div class=\"col-md-12\"><div class=\"video-align-left row box box--4 box--mini\"><div class=\"col-md-3\"><\/div><div class=\"col-md-8 box-img-wrapper\"><div class=\"video-box\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"content-more\"><a class=\"more2\" aria-label=\"SAP landscape security  link\" href=\"https:\/\/www.capgemini.com\/dk-en\/solutions\/security-for-your-sap-landscape\/\" target=\"\" title=\"\" rel=\"noopener noreferrer\">SAP landscape security <\/a><\/div><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"latest-insights layout-odd \"><div class=\"container\"><div class=\"insight-title\"><h2 class=\"latest-insight-title\">Research and insights<\/h2><\/div><div class=\"layout-single-card\">\n                      <div class=\"row align-items-center w-lg-100\">\n                        <div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/post-quantum-crypto\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=2048&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=1024&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=2048&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=500&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg?w=1000&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/07\/Post-quantum-crypto-web-banner.jpg\" alt=\"Post quantum crypto - hero banner\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div>\n                            <div class=\"col-12 col-md-5 col-lg-7\"><\/div>\n                        <div class=\"col-12 col-md-7 col-lg-5\">\n                            <a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/post-quantum-crypto\/\" aria-label=\"Post quantum crypto\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Capgemini Research Institute<\/div>\n                                <h3 class=\"card-title\">Post quantum crypto<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                     <\/div>\n                    <\/div><div class=\"layout-two-card cards-reversed\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/generative-ai-in-cybersecurity\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Generative-AI-in-cybersecurity_2880X1800.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-md-6 col-lg-4 flex-sm-order-reverse\">\n                            <a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/make-better-security-decisions-faster-with-generative-ai\/\" aria-label=\"Make better security decisions faster with generative AI\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Point of view<\/div>\n                                <h3 class=\"card-title\">Make better security decisions faster with generative AI<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/generative-ai-in-cybersecurity\/\" aria-label=\"Generative AI in cybersecurity\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Capgemini Research Institute<\/div>\n                                <h3 class=\"card-title\">Generative AI in cybersecurity<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><\/div>\n                    <\/div><div class=\"layout-two-card cards-normal\">\n                                <div class=\"row align-items-center\"><div class=\"card-image-wrapper\">\n                                <div class=\"card-image\" data-image-url=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 1500px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 992px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=800&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=800&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 768px)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source srcset=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=350&#038;quality=70 1x, https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg?w=700&#038;quality=70 2x\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tmedia=\"(min-width: 0)\"\/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/02\/AI-powered-Cybersecurity-for-Telecom-hero-banner.jpg\" alt=\"\" style=\"object-position: 50% 50%; object-fit: cover;\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n                                <\/div>\n                            <\/div><div class=\"col-12 col-lg-4 d-md-none d-lg-block\"><\/div><div class=\"col-12 col-md-6 col-lg-4\">\n                           <a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/ai-powered-cybersecurity-for-telecom\/\" aria-label=\"AI-powered cybersecurity for telecom\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-center\">\n                                <div class=\"card-tag\">Capgemini Research Institute<\/div>\n                                <h3 class=\"card-title\">AI-powered cybersecurity for telecom<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <div class=\"col-12 col-md-6 col-lg-4\">\n                            <a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/research-library\/a-conversation-with-corence-klop\/\" aria-label=\"Harnessing AI for cyber resilience: A conversation with Corence Klop\" class=\"card-link-holder\">\n                            <div class=\"insight-card insight-card-start\">\n                                <div class=\"card-tag\">Capgemini Research Institute<\/div>\n                                <h3 class=\"card-title\">Harnessing AI for cyber resilience: A conversation with Corence Klop<\/h3>\n                                <div class=\"insight-card-footer\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute.svg\" alt=\"capgemini-research-institute\" class=\"light\">\n                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/themes\/capgemini2025\/assets\/images\/capgemini-research-institute-white.svg\" alt=\"capgemini-research-institute\" class=\"dark\">\n                                <\/div>\n                            <\/div>\n                            <\/a>\n                        <\/div>\n                    <\/div>\n                    <\/div><\/div><\/section>\n\n<section class=\"section section--expert-perspectives\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"expert-heading\">Expert perspectives<\/h2><\/div><\/div><div class=\"expert-prospective-container\"><div class=\"row\"><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/crypto-agility-the-unsung-hero-in-the-quantum-security-race\/\" aria-label=\"Crypto-agility: The unsung hero in the quantum security race\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/08\/DotCom_Banner_2880X1800_4631b2.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurity<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/crypto-agility-the-unsung-hero-in-the-quantum-security-race\/\" aria-label=\"Crypto-agility: The unsung hero in the quantum security race\"><h3 class=\"expert-subtitle\">Crypto-agility: The unsung hero in the quantum security race<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/11\/Marco-Pereira-1.jpg?w=400\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Marco Pereira<\/div><div class=\"date-text\">Jul 29, 2025<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/capgemini-is-the-microsoft-global-financial-services-partner-of-the-year\/\" aria-label=\"Capgemini is the Microsoft Global Financial Services Partner of the Year\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/09\/Capgemini_Awards-and-recognition.jpg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Customer experience, Cybersecurity, Data and AI, Sustainability<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/capgemini-is-the-microsoft-global-financial-services-partner-of-the-year\/\" aria-label=\"Capgemini is the Microsoft Global Financial Services Partner of the Year\"><h3 class=\"expert-subtitle\">Capgemini is the Microsoft Global Financial Services Partner of the Year<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"Abhaya-Gupta\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2023\/05\/Abhaya-Gupta.jpg?w=490\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Abhaya Gupta<\/div><div class=\"date-text\">Jun 25, 2024<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"col-12 col-md-4 row-space\"><div class=\"box\"><div class=\"box-img-wrapper\"><a href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/a-digital-edge-for-financial-services-navigating-cybersecurity-in-the-era-of-the-digital-operational-resilience-act-dora\/\" aria-label=\"A digital edge for financial services: Navigating cybersecurity in the era of the Digital Operational Resilience Act (DORA)\" tabindex=\"-1\"><img decoding=\"async\" class=\"box-img\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/04\/GettyImages-1254825709.jpeg?w=600&#038;quality=70\" style=\"object-position: 50% 50%; object-fit: cover;\" loading=\"lazy\" \/><\/a><\/div><div class=\"box-inner\"><div class=\"box-tag\">Cybersecurity, Technology<\/div><a class=\"content-box-title\" href=\"https:\/\/www.capgemini.com\/dk-en\/insights\/expert-perspectives\/a-digital-edge-for-financial-services-navigating-cybersecurity-in-the-era-of-the-digital-operational-resilience-act-dora\/\" aria-label=\"A digital edge for financial services: Navigating cybersecurity in the era of the Digital Operational Resilience Act (DORA)\"><h3 class=\"expert-subtitle\">A digital edge for financial services: Navigating cybersecurity in the era of the Digital Operational Resilience Act (DORA)<\/h3><\/a><div class=\"box-bottom\">\n\t\t   <div class=\"box-logo\"><img decoding=\"async\" class=\"\" loading=\"lazy\" alt=\"\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2024\/04\/Christiaan-Koopman.jpg?w=389\" \/><\/div><div class=\"date-name-info\"><div class=\"author-text\">Christiaan Koopman<\/div><div class=\"date-text\">Mar 22, 2024<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n<section class=\"wp-block-cg-blocks-wrapper-partners undefined section section--partners-small\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 class=\"partner-heading\">Partners<\/h2><\/div><\/div><div class=\"row\">\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/dk-en\/about-us\/technology-partners\/ibm\/\" class=\"partner-box-title\" aria-label=\"IBM puts smart to work. Capgemini helps you make the most of it.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/Partners-ibm.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/dk-en\/about-us\/partnerships\/microsoft\/\" class=\"partner-box-title\" aria-label=\"Working together to help companies boost business value with cloud-powered solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/Partners-microsoft.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/dk-en\/about-us\/technology-partners\/oracle\/\" class=\"partner-box-title\" aria-label=\"Business with imagination. We shape powerful Oracle technology to create winning solutions.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/Partners-oracle.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n\n\n\n<div class=\"col-6 col-md-4 col-lg-2 small\">\n            <a href=\"https:\/\/www.capgemini.com\/dk-en\/about-us\/partnerships\/sap\/\" class=\"partner-box-title\" aria-label=\"Unlock growth, agility and value with a proven partner. 40+ years of SAP expertise.\">\n        <div class=\"partner-box\">\n                                                     <div class=\"partner-box-bottom\">\n                        <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/07\/sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo light\">\n\n                                                    <img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2025\/10\/Partners-sap.png?w=350&#038;quality=70\" alt=\"\" class=\"partner-box-logo dark\">\n\n                            \n                    <\/div>\n                                                    <\/div>\n            <\/a>\n    <\/div>\n\n<\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":119,"featured_media":875021,"parent":517716,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"cg_dt_proposed_to":[8,18,5,30,10,14,17,7,26,6,28,23,29,20,24],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"e3a4d96c-967e-400d-a768-2bd19a31e0f8\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":false,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":true,"_yoast_wpseo_primary_brand":"","footnotes":"","featured_focal_points":"","partner_card_description":"","gsap_animation":0},"brand":[],"partner_type":[],"service":[],"industry":[],"partners":[],"page-type":[162],"content-group":[],"class_list":["post-517768","page","type-page","status-publish","has-post-thumbnail","hentry","page-type-service"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Consulting And Risk Assessment Services | Capgemini<\/title>\n<meta name=\"description\" content=\"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Continuous strategy GRC\" \/>\n<meta property=\"og:description\" content=\"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Denmark\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T07:32:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2880\" \/>\n\t<meta property=\"og:image:height\" content=\"1800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/\",\"name\":\"Cybersecurity Consulting And Risk Assessment Services | Capgemini\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\",\"datePublished\":\"2021-04-09T14:38:24+00:00\",\"dateModified\":\"2026-04-10T07:32:46+00:00\",\"description\":\"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Services\",\"item\":\"https:\/\/www.capgemini.com\/dk-en\/services\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Continuous strategy GRC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/dk-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/dk-en\/\",\"name\":\"Capgemini Denmark\",\"description\":\"Capgemini\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/dk-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Consulting And Risk Assessment Services | Capgemini","description":"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/","og_locale":"en_US","og_type":"article","og_title":"Continuous strategy GRC","og_description":"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.","og_url":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/","og_site_name":"Capgemini Denmark","article_modified_time":"2026-04-10T07:32:46+00:00","og_image":[{"width":2880,"height":1800,"url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/","url":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/","name":"Cybersecurity Consulting And Risk Assessment Services | Capgemini","isPartOf":{"@id":"https:\/\/www.capgemini.com\/dk-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","datePublished":"2021-04-09T14:38:24+00:00","dateModified":"2026-04-10T07:32:46+00:00","description":"Capgemini helps companies define business priorities, assess maturity levels and implement a risk mitigation strategy that is both continuous and effective.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#primaryimage","url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","contentUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Services","item":"https:\/\/www.capgemini.com\/dk-en\/services\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Continuous strategy GRC"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/dk-en\/#website","url":"https:\/\/www.capgemini.com\/dk-en\/","name":"Capgemini Denmark","description":"Capgemini","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/dk-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"WebPage","headline":"Continuous strategy GRC","url":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Denmark","logo":""},"keywords":[],"dateCreated":"2021-04-09T14:38:24Z","datePublished":"2021-04-09T14:38:24Z","dateModified":"2026-04-10T07:32:46Z"},"rendered":"<meta name=\"parsely-title\" content=\"Continuous strategy GRC\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/dk-en\/services\/cybersecurity\/continuous-strategy-grc\/\" \/>\n<meta name=\"parsely-type\" content=\"index\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2021-04-09T14:38:24Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/dk-en\/wp-content\/uploads\/sites\/7\/2026\/04\/Cybersecurity-web-banner-2026-1_c8ab70.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Denmark","distributor_original_site_url":"https:\/\/www.capgemini.com\/dk-en","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/517768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/comments?post=517768"}],"version-history":[{"count":19,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/517768\/revisions"}],"predecessor-version":[{"id":875025,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/517768\/revisions\/875025"}],"up":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/pages\/517716"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/media\/875021"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/media?parent=517768"}],"wp:term":[{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/brand?post=517768"},{"taxonomy":"partner_type","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/partner_type?post=517768"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/service?post=517768"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/industry?post=517768"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/partners?post=517768"},{"taxonomy":"page-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/page-type?post=517768"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/dk-en\/wp-json\/wp\/v2\/content-group?post=517768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}