{"id":31689,"date":"2024-03-15T12:34:06","date_gmt":"2024-03-15T11:34:06","guid":{"rendered":"https:\/\/dev7.homepage-balingen.de\/?page_id=31689"},"modified":"2025-09-29T08:40:45","modified_gmt":"2025-09-29T06:40:45","slug":"it-security-management","status":"publish","type":"page","link":"https:\/\/cybershield-consulting.com\/en\/our-services\/it-security-management\/","title":{"rendered":"IT-Security Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid headhero vc_custom_1711353137533 vc_row-o-content-bottom vc_row-flex wpex-vc-full-width-row wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\" style=\"min-height:40vh;background-position:50% 50%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"font-size:15px;font-weight:600;text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>OUR SERVICES<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_20 vc_sep_border_width_4 vc_sep_pos_align_center vc_separator_no_text wpb_content_element  wpb_content_element wpb_animate_when_almost_visible wpb_fadeIn fadeIn wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-heading.vcex_69fc46b62c458{animation-duration:2s;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_69fc46b62c458\"><span class=\"vcex-heading-inner wpex-inline-block\">IT-Security Management: Setting up an Information Security Management System (ISMS) in accordance with ISO 27001<\/span><\/h1><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_column-gap-25 vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\">In today's digital world, companies are increasingly reliant on protecting their information and data from cyber threats. Robust IT security management is essential to meet the increasing demands of customers, partners and regulatory requirements. The establishment of an Information Security Management System (ISMS) offers companies a systematic approach to safeguarding their information security and creates the basis for compliance with international standards, in particular the <strong>ISO\/IEC 27001<\/strong>.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\"><strong>Why an ISMS is essential for your company<\/strong><\/p>\n<p style=\"text-align: justify;\">An <strong>Information Security Management System (ISMS)<\/strong> ensures that all of a company's sensitive data - whether personal information, business data or intellectual property - is protected against threats. The aim of an ISMS is to identify and assess risks and implement suitable measures to ensure information security in the long term.<br \/>\nBy introducing an ISMS, companies can not only ensure the confidentiality, integrity and availability of their information, but also be prepared for security incidents and respond more effectively. Especially in industries that have strict regulatory requirements or have to meet high contractual security standards, the establishment of an ISMS is essential.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column ansprechpartnercont vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69fc46b62ccac{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center vcex_69fc46b62ccac\"><span class=\"vcex-heading-inner wpex-inline-block\">Your contact person<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-image.vcex_69fc46b62cf6f .vcex-image-img{border-radius:var(--wpex-rounded-full);height:200px;object-position:down;}.vcex-image.vcex_69fc46b62cf6f .vcex-image-inner{max-width:200px;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center vcex_69fc46b62cf6f\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"2190\" height=\"1569\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Gunter-Hochsteiner5.webp\" class=\"vcex-image-img wpex-align-middle wpex-object-cover\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Gunter-Hochsteiner5.webp 2190w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Gunter-Hochsteiner5-300x215.webp 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Gunter-Hochsteiner5-1024x734.webp 1024w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Gunter-Hochsteiner5-768x550.webp 768w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Gunter-Hochsteiner5-1536x1100.webp 1536w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Gunter-Hochsteiner5-2048x1467.webp 2048w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/08\/Gunter-Hochsteiner5-18x12.webp 18w\" sizes=\"auto, (max-width: 2190px) 100vw, 2190px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p class=\"cw-primaryText-455\" title=\"Gunter Hochsteiner\" data-log-name=\"DisplayName\">Gunter Hochsteiner<\/p>\n<div class=\"cw-container-456\">\n<div class=\"cw-subtitle-457\" title=\"Manager Training and Technical Consulting\" data-log-name=\"JobTitle\">Manager Training and Technical Consulting<\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\"><strong>Regulatory and contractual requirements<\/strong><\/p>\n<p style=\"text-align: justify;\">Many companies have to set up an ISMS in order to meet regulatory requirements. This is often the case in highly regulated sectors such as the financial industry, the healthcare industry or the public sector. Compliance with the ISO 27001 standard not only serves as a proven standard for ensuring information security, but is often also a prerequisite for obtaining certain contracts or entering into partnerships with other companies.<br \/>\nIn addition to regulatory requirements, an ISMS can be defined in contractual agreements to ensure information security in business relationships. Companies that handle sensitive data must ensure that their partners meet the same security requirements. An ISMS clearly demonstrates that your company has implemented the necessary processes and policies to manage data securely.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\"><strong>The ISO 27001 as foundation of your ISMS<\/strong><\/p>\n<p style=\"text-align: justify;\">The <strong>ISO\/IEC 27001<\/strong> is the globally recognized standard for the implementation of an ISMS. It defines the requirements for the introduction, operation, monitoring and continuous improvement of an ISMS. Companies that obtain ISO 27001 certification benefit from a structured approach to their security measures and the opportunity to regularly review and improve their security standards.<br \/>\nThe key benefits of ISO 27001 certification:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>Build trust:<\/strong> By adhering to a globally recognized standard, you can gain the trust of customers and partners.<\/li>\n<li style=\"text-align: justify;\"><strong>Risk management<\/strong> An ISMS helps to identify and manage security risks at an early stage.<\/li>\n<li style=\"text-align: justify;\"><strong>Compliance:<\/strong> You meet regulatory requirements and improve your legal compliance.<\/li>\n<li style=\"text-align: justify;\"><strong>Continual improvement:<\/strong> An ISMS in accordance with ISO 27001 is a living system that is always kept up to date through regular audits and updates.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\"><strong>Our service: Support in setting up an ISMS<\/strong><\/p>\n<p style=\"text-align: justify;\">We are happy to support you in creating a <strong>Information Security Management System (ISMS)<\/strong> for your company that meets the requirements of the <strong>ISO 27001.<\/strong> Our approach is designed not only to help you with implementation, but also to ensure that your ISMS functions effectively in the long term and is regularly optimized.<\/p>\n<p style=\"text-align: justify;\">Our service includes:<\/p>\n<ul>\n<li style=\"text-align: justify;\"><strong>Gap-Analysis<\/strong> Review of your existing security measures and identification of gaps with regard to ISO 27001 requirements.<\/li>\n<li style=\"text-align: justify;\"><strong>Risk Assessment<\/strong> Identification and assessment of potential security risks for your company.<\/li>\n<li style=\"text-align: justify;\"><strong>Documentation and processes:<\/strong> Support in the creation of the necessary guidelines and documentation.<\/li>\n<li style=\"text-align: justify;\"><strong>Trainings and Awareness:<\/strong> Training your employees to create comprehensive security awareness.<\/li>\n<li style=\"text-align: justify;\"><strong>Certification preparation:<\/strong> Support and preparation for ISO 27001 certification.<\/li>\n<\/ul>\n<p>An ISMS in accordance with ISO 27001 is an important step towards strengthening information security in your company and at the same time meeting regulatory and contractual requirements. By systematically managing security risks and continuously improving your processes, you protect your company from the increasing threats in the area of cybercrime.<\/p>\n<p><strong>Contact us<\/strong>to find out more about setting up an ISMS in your company and how we can support you in successfully meeting the requirements of ISO 27001.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><style>.vcex-image.vcex_69fc46b62ddf0{animation-duration:2s;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_69fc46b62ddf0\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"300\" height=\"72\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width-18x4.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"UNSERE LEISTUNGEN IT-Security Management: Aufbau eines Information Security Management Systems (ISMS) nach ISO 27001 In der heutigen digitalen Welt sind Unternehmen zunehmend darauf angewiesen, ihre Informationen und Daten vor Cyberbedrohungen zu sch\u00fctzen. Ein robustes IT-Security Management ist dabei unverzichtbar, um den steigenden Anforderungen von Kunden, Partnern und regulatorischen Vorgaben gerecht zu werden. Der Aufbau eines&hellip;","protected":false},"author":5,"featured_media":31891,"parent":31128,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-31689","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT-Security Management - OT \u2013 CyberSecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/it-security-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Security Management - OT \u2013 CyberSecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybershield-consulting.com\/en\/our-services\/it-security-management\/\" \/>\n<meta property=\"og:site_name\" content=\"OT \u2013 CyberSecurity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-29T06:40:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/IT-OT-Management.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/it-security-management\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/it-security-management\\\/\",\"name\":\"IT-Security Management - OT \u2013 CyberSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/it-security-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/it-security-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IT-OT-Management.webp\",\"datePublished\":\"2024-03-15T11:34:06+00:00\",\"dateModified\":\"2025-09-29T06:40:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/it-security-management\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/it-security-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/it-security-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IT-OT-Management.webp\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/IT-OT-Management.webp\",\"width\":1920,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/it-security-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leistungen\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT-Security Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"name\":\"CyberShield - OT - CyberSecurity\",\"description\":\"Secure every Moment\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybershield-consulting.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\",\"name\":\"CyberShield\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"width\":300,\"height\":72,\"caption\":\"CyberShield\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/linkedin.com\\\/company\\\/cybershield-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT-Security Management - OT \u2013 CyberSecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybershield-consulting.com\/en\/our-services\/it-security-management\/","og_locale":"en_GB","og_type":"article","og_title":"IT-Security Management - OT \u2013 CyberSecurity","og_url":"https:\/\/cybershield-consulting.com\/en\/our-services\/it-security-management\/","og_site_name":"OT \u2013 CyberSecurity","article_modified_time":"2025-09-29T06:40:45+00:00","og_image":[{"width":1920,"height":700,"url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/IT-OT-Management.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybershield-consulting.com\/leistungen\/it-security-management\/","url":"https:\/\/cybershield-consulting.com\/leistungen\/it-security-management\/","name":"IT-Security Management - OT \u2013 CyberSecurity","isPartOf":{"@id":"https:\/\/cybershield-consulting.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/it-security-management\/#primaryimage"},"image":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/it-security-management\/#primaryimage"},"thumbnailUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/IT-OT-Management.webp","datePublished":"2024-03-15T11:34:06+00:00","dateModified":"2025-09-29T06:40:45+00:00","breadcrumb":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/it-security-management\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybershield-consulting.com\/leistungen\/it-security-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/leistungen\/it-security-management\/#primaryimage","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/IT-OT-Management.webp","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/IT-OT-Management.webp","width":1920,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/cybershield-consulting.com\/leistungen\/it-security-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cybershield-consulting.com\/"},{"@type":"ListItem","position":2,"name":"Leistungen","item":"https:\/\/cybershield-consulting.com\/leistungen\/"},{"@type":"ListItem","position":3,"name":"IT-Security Management"}]},{"@type":"WebSite","@id":"https:\/\/cybershield-consulting.com\/#website","url":"https:\/\/cybershield-consulting.com\/","name":"CyberShield - OT - CyberSecurity","description":"Secure every Moment","publisher":{"@id":"https:\/\/cybershield-consulting.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybershield-consulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cybershield-consulting.com\/#organization","name":"CyberShield","url":"https:\/\/cybershield-consulting.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","width":300,"height":72,"caption":"CyberShield"},"image":{"@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/linkedin.com\/company\/cybershield-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=31689"}],"version-history":[{"count":9,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31689\/revisions"}],"predecessor-version":[{"id":34736,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31689\/revisions\/34736"}],"up":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media\/31891"}],"wp:attachment":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=31689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}