{"id":31547,"date":"2024-03-12T14:53:16","date_gmt":"2024-03-12T13:53:16","guid":{"rendered":"https:\/\/dev7.homepage-balingen.de\/?page_id=31547"},"modified":"2025-05-05T15:53:55","modified_gmt":"2025-05-05T13:53:55","slug":"transport","status":"publish","type":"page","link":"https:\/\/cybershield-consulting.com\/en\/our-areas\/transport\/","title":{"rendered":"Transport"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid headhero vc_custom_1710251558173 vc_row-o-content-bottom vc_row-flex wpex-vc-full-width-row wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\" style=\"min-height:40vh;background-position:50% 70%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"font-size:15px;font-weight:600;text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>OUR AREAS<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_20 vc_sep_border_width_4 vc_sep_pos_align_center vc_separator_no_text wpb_content_element  wpb_content_element wpb_animate_when_almost_visible wpb_fadeIn fadeIn wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-heading.vcex_6a11e9d449d4d{animation-duration:2s;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_6a11e9d449d4d\"><span class=\"vcex-heading-inner wpex-inline-block\">Transport (Rail)<\/span><\/h1><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_column-gap-25 vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_6a11e9d44a486{animation-duration:2s;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_6a11e9d44a486\"><span class=\"vcex-heading-inner wpex-inline-block\">Rail \u2013 Cybersecurity driven by TS 50701<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Modern public transport infrastructure increasingly depends on ICS and interconnected systems across various domains, and railways are no exception. While this approach enhances efficiency, it also expands the threat landscape and introduces vulnerabilities within railway infrastructure, both trackside and onboard, necessitating robust cybersecurity measures and solutions.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><style>.vcex-heading.vcex_6a11e9d44aad6{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_6a11e9d44aad6\"><span class=\"vcex-heading-inner wpex-inline-block\">Security engineering and services for railway companies<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>As a Manufacturer, Operator, or System Integrator in the railway industry, you face significant challenges in delivering and operating your railway products. Increasingly, customers and projects demand that you incorporate robust cybersecurity measures into your operational processes and product development lifecycle, ensuring a strong cybersecurity posture for both your organization and your railway products.<br \/>\nTo help you efficiently and smoothly address all cybersecurity-related challenges,\nCYBERSHIELD offers cutting-edge solutions based on internationally recognized railway standards such as TS 50701 and IEC 62443. As a leading contributor to the development of these standards, we ensure that your processes and railway products are fully compliant with TS 50701 and IEC 62443. Additionally, we support you in establishing a comprehensive cybersecurity framework within your organization, providing the full scope of necessary documentation and engineering activities to safeguard your railway products and grant theirs compliance.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><\/div><\/div><\/div><div class=\"wpb_column ansprechpartnercont vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_6a11e9d44b227{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center vcex_6a11e9d44b227\"><span class=\"vcex-heading-inner wpex-inline-block\">Your contact person<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-image.vcex_6a11e9d44b504 .vcex-image-img{border-radius:var(--wpex-rounded-full);height:200px;}.vcex-image.vcex_6a11e9d44b504 .vcex-image-inner{max-width:200px;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center vcex_6a11e9d44b504\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"400\" height=\"385\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1.jpg\" class=\"vcex-image-img wpex-align-middle wpex-object-cover\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1.jpg 400w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1-300x289.jpg 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1-12x12.jpg 12w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p>Serhii Salii<\/p>\n<p><span data-teams=\"true\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Cybersecurity Engineer<\/span><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top wpex-has-overlay wpex-has-overlay--6a11e9d44bd64\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpex-bg-overlay-wrap wpex-absolute wpex-inset-0 wpex-rounded-inherit\"><style class=\"wpex-bg-overlay-css\">.wpex-has-overlay--6a11e9d44bd64 > .wpex-bg-overlay-wrap .wpex-bg-overlay{background-color:#ffffff;opacity:10%;}<\/style><span class=\"wpex-bg-overlay color wpex-absolute wpex-inset-0 wpex-rounded-inherit wpex-duration-500 wpex-opacity-60 wpex-bg-black\"><\/span><\/div><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_column-gap-25 vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column sideimg vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"590\" height=\"670\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Product-development-lifecycle.webp\" class=\"vcex-image-img wpex-align-middle\" alt=\"Product-development-lifecycle\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Product-development-lifecycle.webp 590w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Product-development-lifecycle-264x300.webp 264w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Product-development-lifecycle-11x12.webp 11w\" sizes=\"auto, (max-width: 590px) 100vw, 590px\" \/><\/div><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_6a11e9d44cba5{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_6a11e9d44cba5\"><span class=\"vcex-heading-inner wpex-inline-block\">CyberSecurity Management Plan<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p class=\"translation-block\">To achieve compliance with TS 50701 and IEC 62443, it is essential to develop and implement a comprehensive cybersecurity management plan that is specifically tailored to your product's development processes (lifecycle). This important document serves as the backbone of your cybersecurity strategy by carefully addressing all cybersecurity aspects of your product and ensuring that cybersecurity activities are seamlessly integrated into every stage of the product development lifecycle, from initial design through deployment and beyond to decommissioning. By entrusting this task to CYBERSHIELD's experienced experts, you can avoid potential gaps and non-compliance issues. Our team will ensure that your cybersecurity management plan is not only comprehensive, but also compliant with industry best practices and regulatory standards so that you have confidence in your product's cybersecurity.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><style>.vcex-heading.vcex_6a11e9d44d043{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_6a11e9d44d043\"><span class=\"vcex-heading-inner wpex-inline-block\">Cybersecurity Risk Analysis<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p class=\"translation-block\">There is no safety on the tracks without cybersecurity! A thorough cybersecurity risk analysis is fundamental to identifying effective measures to protect your rail product from potential threats. A well-conducted risk analysis does more than just identify threats.  It helps you to ensure that your resources (time, money and manpower) are used efficiently by focusing on the most important risks first. The analysis also considers different attack scenarios, from general threats to sophisticated, targeted attacks, and outlines the necessary countermeasures for all identified risks. CYBERSHIELD's experts, who have years of experience in this field, will guide you through this process and ensure that your risk analysis is thorough, realistic and actionable. Our approach takes into account the modern threat landscape and the specific resources available within your organization, allowing you to implement cybersecurity measures that are both effective and economically feasible.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear visible-phone\" style=\"height:30px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top wpex-has-overlay wpex-has-overlay--6a11e9d44d5ad\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpex-bg-overlay-wrap wpex-absolute wpex-inset-0 wpex-rounded-inherit\"><style class=\"wpex-bg-overlay-css\">.wpex-has-overlay--6a11e9d44d5ad > .wpex-bg-overlay-wrap .wpex-bg-overlay{background-color:transparent;opacity:10%;}<\/style><span class=\"wpex-bg-overlay color wpex-absolute wpex-inset-0 wpex-rounded-inherit wpex-duration-500 wpex-opacity-60 wpex-bg-black\"><\/span><\/div><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_column-gap-25 vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_6a11e9d44db8b{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_6a11e9d44db8b\"><span class=\"vcex-heading-inner wpex-inline-block\">CyberSecurity Design<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Development of a design for a detailed description of the security measures.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><style>.vcex-heading.vcex_6a11e9d44e02f{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_6a11e9d44e02f\"><span class=\"vcex-heading-inner wpex-inline-block\">CyberSecurity Case<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p class=\"translation-block\">The Cybersecurity Case is the culmination of all your cybersecurity efforts and summarizes the essence of your product's compliance with TS 50701 and IEC 62443 standards. This document is more than just a formality; it is a comprehensive record of all cybersecurity engineering activities, decisions and results that demonstrate the security of your rail product.\nDeveloping a solid cybersecurity case requires thorough documentation of all cybersecurity measures implemented throughout the product's lifecycle. This should clearly outline how each aspect of the product meets the required standards and provide evidence that it is compliant and ready to withstand cyber threats. This document not only fulfills regulatory requirements, but also serves as a valuable resource for internal audits, customer warranties and future product development.\nCYBERSHIELD is more than well-equipped to integrate a comprehensive cybersecurity framework into your organization. Our expertise ensures that your cybersecurity case is complete, accurate and aligned with the latest standards so that your organization is cybersecure and compliant from start to finish. Let us take care of all your challenges so you can focus on what's important - delivering secure, reliable rail products.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear visible-phone\" style=\"height:30px;\"><\/div><\/div><\/div><\/div><div class=\"wpb_column sideimg vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-image.vcex_6a11e9d44e4dd .vcex-image-inner{max-width:70%;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center vcex_6a11e9d44e4dd\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"1920\" height=\"800\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/OT-\u2013-CyberSecurity.webp\" class=\"vcex-image-img wpex-align-middle wpex-aspect-3-4 wpex-object-cover\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/OT-\u2013-CyberSecurity.webp 1920w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/OT-\u2013-CyberSecurity-300x125.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/OT-\u2013-CyberSecurity-1024x427.webp 1024w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/OT-\u2013-CyberSecurity-768x320.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/OT-\u2013-CyberSecurity-1536x640.webp 1536w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/OT-\u2013-CyberSecurity-18x8.webp 18w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/div><\/figure><\/div><\/div><\/div><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top wpex-has-overlay wpex-has-overlay--6a11e9d44e9e6\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpex-bg-overlay-wrap wpex-absolute wpex-inset-0 wpex-rounded-inherit\"><style class=\"wpex-bg-overlay-css\">.wpex-has-overlay--6a11e9d44e9e6 > .wpex-bg-overlay-wrap .wpex-bg-overlay{background-color:#fefefe;opacity:10%;}<\/style><span class=\"wpex-bg-overlay color wpex-absolute wpex-inset-0 wpex-rounded-inherit wpex-duration-500 wpex-opacity-60 wpex-bg-black\"><\/span><\/div><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_column-gap-25 vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column sideimg vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module wpex-text-center\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"368\" height=\"550\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/canva-MADyRHH1MCQ.jpg\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/canva-MADyRHH1MCQ.jpg 368w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/canva-MADyRHH1MCQ-201x300.jpg 201w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/canva-MADyRHH1MCQ-8x12.jpg 8w\" sizes=\"auto, (max-width: 368px) 100vw, 368px\" \/><\/div><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_6a11e9d44f41c{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_6a11e9d44f41c\"><span class=\"vcex-heading-inner wpex-inline-block\">NIS-Directive<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>You are an operator of critical or essential infrastructure and fall under the IT Security Act or the NIS Directive? You are not sure how to meet the requirements of the authorities or you lack personnel resources to handle the requirements?<\/p>\n<p>Then we can help you. Our employees are experienced in communicating with the authorities and have the relevant contacts to help you fulfil the regulatory requirements that apply to you.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:30px;\"><\/div><style>.vcex-heading.vcex_6a11e9d44f839{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_6a11e9d44f839\"><span class=\"vcex-heading-inner wpex-inline-block\">CyberSecurity Manager as a Service<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>The Cybersecurity Manager plays a central role in the cybersecurity aspects of a railway project. If you do not yet have a Cybersecurity Manager in your project or if you need short-term support for your existing Cybersecurity Manager to cover a peak load within projects, our experts are available to assist you.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear visible-phone\" style=\"height:30px;\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><style>.vcex-image.vcex_6a11e9d44ff92{animation-duration:2s;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_6a11e9d44ff92\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"300\" height=\"72\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width-18x4.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"UNSERE BEREICHE Transport (Rail)Rail \u2013 Cybersecurity auf Grundlage von TS 50701 Die moderne \u00f6ffentliche Verkehrsinfrastruktur h\u00e4ngt zunehmend von ICS und vernetzten Systemen in verschiedenen Bereichen ab, und Bahnsysteme sind da keine Ausnahme. Dieser Ansatz steigert zwar die Effizienz, erweitert aber auch die Bedrohungslandschaft und f\u00fchrt zu Schwachstellen in der Eisenbahninfrastruktur, sowohl auf der Strecke als&hellip;","protected":false},"author":5,"featured_media":31829,"parent":31772,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-31547","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Transport - OT \u2013 CyberSecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybershield-consulting.com\/en\/our-areas\/transport\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Transport - OT \u2013 CyberSecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybershield-consulting.com\/en\/our-areas\/transport\/\" \/>\n<meta property=\"og:site_name\" content=\"OT \u2013 CyberSecurity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-05T13:53:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Railroas_900.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"478\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/transport\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/transport\\\/\",\"name\":\"Transport - OT \u2013 CyberSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/transport\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/transport\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Railroas_900.webp\",\"datePublished\":\"2024-03-12T13:53:16+00:00\",\"dateModified\":\"2025-05-05T13:53:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/transport\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/transport\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/transport\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Railroas_900.webp\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Railroas_900.webp\",\"width\":900,\"height\":478},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/transport\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bereiche\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/bereiche\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Transport\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"name\":\"CyberShield - OT - CyberSecurity\",\"description\":\"Secure every Moment\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybershield-consulting.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\",\"name\":\"CyberShield\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"width\":300,\"height\":72,\"caption\":\"CyberShield\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/linkedin.com\\\/company\\\/cybershield-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Transport - OT \u2013 CyberSecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybershield-consulting.com\/en\/our-areas\/transport\/","og_locale":"en_GB","og_type":"article","og_title":"Transport - OT \u2013 CyberSecurity","og_url":"https:\/\/cybershield-consulting.com\/en\/our-areas\/transport\/","og_site_name":"OT \u2013 CyberSecurity","article_modified_time":"2025-05-05T13:53:55+00:00","og_image":[{"width":900,"height":478,"url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Railroas_900.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybershield-consulting.com\/bereiche\/transport\/","url":"https:\/\/cybershield-consulting.com\/bereiche\/transport\/","name":"Transport - OT \u2013 CyberSecurity","isPartOf":{"@id":"https:\/\/cybershield-consulting.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybershield-consulting.com\/bereiche\/transport\/#primaryimage"},"image":{"@id":"https:\/\/cybershield-consulting.com\/bereiche\/transport\/#primaryimage"},"thumbnailUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Railroas_900.webp","datePublished":"2024-03-12T13:53:16+00:00","dateModified":"2025-05-05T13:53:55+00:00","breadcrumb":{"@id":"https:\/\/cybershield-consulting.com\/bereiche\/transport\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybershield-consulting.com\/bereiche\/transport\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/bereiche\/transport\/#primaryimage","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Railroas_900.webp","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Railroas_900.webp","width":900,"height":478},{"@type":"BreadcrumbList","@id":"https:\/\/cybershield-consulting.com\/bereiche\/transport\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cybershield-consulting.com\/"},{"@type":"ListItem","position":2,"name":"Bereiche","item":"https:\/\/cybershield-consulting.com\/bereiche\/"},{"@type":"ListItem","position":3,"name":"Transport"}]},{"@type":"WebSite","@id":"https:\/\/cybershield-consulting.com\/#website","url":"https:\/\/cybershield-consulting.com\/","name":"CyberShield - OT - CyberSecurity","description":"Secure every Moment","publisher":{"@id":"https:\/\/cybershield-consulting.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybershield-consulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cybershield-consulting.com\/#organization","name":"CyberShield","url":"https:\/\/cybershield-consulting.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","width":300,"height":72,"caption":"CyberShield"},"image":{"@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/linkedin.com\/company\/cybershield-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=31547"}],"version-history":[{"count":4,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31547\/revisions"}],"predecessor-version":[{"id":34304,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31547\/revisions\/34304"}],"up":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31772"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media\/31829"}],"wp:attachment":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=31547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}