{"id":31856,"date":"2024-03-21T11:06:13","date_gmt":"2024-03-21T10:06:13","guid":{"rendered":"https:\/\/dev7.homepage-balingen.de\/?page_id=31856"},"modified":"2025-05-13T11:20:24","modified_gmt":"2025-05-13T09:20:24","slug":"security-validation-and-verification","status":"publish","type":"page","link":"https:\/\/cybershield-consulting.com\/en\/our-services\/security-validation-and-verification\/","title":{"rendered":"Security Validation and Verification"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid headhero vc_custom_1711353161182 vc_row-o-content-bottom vc_row-flex wpex-vc-full-width-row wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\" style=\"min-height:40vh;background-position:50% 50%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative bg-fixed-top wpex-vc-bg-fixed wpex-vc-bg-top\" style=\"background-position:50% 0%!important;background-size:cover!important;\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div>\n\t<div style=\"font-size:15px;font-weight:600;text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>OUR SERVICES<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_20 vc_sep_border_width_4 vc_sep_pos_align_center vc_separator_no_text wpb_content_element  wpb_content_element wpb_animate_when_almost_visible wpb_fadeIn fadeIn wpb_animate_when_almost_visible wpb_fadeIn fadeIn\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span style=\"border-color:#bebfcd;\" class=\"vc_sep_line\"><\/span><\/span>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-heading.vcex_6a11dee0ced76{animation-duration:2s;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_6a11dee0ced76\"><span class=\"vcex-heading-inner wpex-inline-block\">Security Validation and Verification<\/span><\/h1><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:40px;\"><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_column-gap-25 vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-8\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p style=\"text-align: justify;\" class=\"translation-block\"><span data-teams=\"true\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\"><strong>Security Validation and Verification<\/strong> is an essential process in cybersecurity that aims to ensure that systems, networks and applications are adequately protected against current threats. This process helps organisations to identify security vulnerabilities at an early stage and validate their security measures effectively. The process comprises two main aspects:<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"text-align: justify;\">1. Security Validation<\/h3>\n<p style=\"text-align: justify;\">Security validation refers to testing the effectiveness of security controls and measures. It serves to ensure that the implemented security solutions actually provide the desired protection and fulfil the defined security requirements. This can be done through the following measures, among others:<\/p>\n<ul>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Pen Tests<\/strong>: These simulate targeted attacks on the system in order to uncover vulnerabilities and check whether the existing protective measures are able to fend off these attacks.<\/li>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Red Teaming<\/strong>: This involves an expert team carrying out an attack scenario to assess how well a company can respond to real threats.<\/li>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Continuous security checks<\/strong>: Regular, automated tests to check security in real time, for example through the use of attack simulation platforms.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><\/div><\/div><\/div><div class=\"wpb_column ansprechpartnercont vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_6a11dee0cf598{animation-duration:2s;}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-center vcex_6a11dee0cf598\"><span class=\"vcex-heading-inner wpex-inline-block\">Your contact person<\/span><\/h3><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-image.vcex_6a11dee0cf844 .vcex-image-img{border-radius:var(--wpex-rounded-full);height:200px;}.vcex-image.vcex_6a11dee0cf844 .vcex-image-inner{max-width:200px;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center vcex_6a11dee0cf844\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"400\" height=\"385\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1.jpg\" class=\"vcex-image-img wpex-align-middle wpex-object-cover\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1.jpg 400w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1-300x289.jpg 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Design-ohne-Titel-79-1-400x385-1-12x12.jpg 12w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:center;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Serhii Salii<\/p>\n<p><span data-teams=\"true\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Cybersecurity Engineer<\/span><\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"text-align: justify;\">1. Security Verification<\/h3>\n<p style=\"text-align: justify;\">Security verification, on the other hand, focuses on the formal confirmation that the systems are developed and operated in a security-compliant manner. This is done by checking compliance with standards, guidelines and legal requirements. These include<\/p>\n<ul>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Code Review<\/strong>: A review of the source code of applications to ensure that there are no security vulnerabilities such as SQL injections or cross-site scripting.<\/li>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Compliance audits<\/strong>: Verification of compliance with security standards and regulations, such as ISO 27001, NIST or GDPR.<\/li>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Vulnerability Scanning<\/strong>: Automated tests that analyse the system for known vulnerabilities and security gaps.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div style=\"text-align:start;\" class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"text-align: justify;\">Benefits of Security Validation and Verification<\/h3>\n<p style=\"text-align: justify;\">Security validation and verification offers considerable advantages for companies:<\/p>\n<ol>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Proactive protection<\/strong>: By recognising vulnerabilities at an early stage, attacks can often be prevented before they are carried out.<\/li>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Optimised security architecture<\/strong>: Verification ensures that the security solutions comply with the state of the art and regulations.<\/li>\n<li style=\"text-align: justify;\" class=\"translation-block\"><strong>Trustworthiness<\/strong>: For customers, partners and supervisory authorities, the use of such measures shows that the company has a high level of security awareness.<\/li>\n<\/ol>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h3 style=\"text-align: justify;\">Solutions from our company<\/h3>\n<p style=\"text-align: justify;\" class=\"translation-block\">We offer comprehensive <strong>validation and verification<\/strong> services to support organisations of all sizes:<\/p>\n<ul style=\"text-align: justify;\">\n<li class=\"translation-block\"><strong>Automated attack simulation and red teaming<\/strong> to identify vulnerabilities and optimise the security strategy.<\/li>\n<li class=\"translation-block\"><strong>Vulnerability management and penetration tests<\/strong> for the continuous improvement of defence measures.<\/li>\n<li class=\"translation-block\"><strong>Compliance checks<\/strong> and <strong>code reviews<\/strong> to ensure that safety standards and best practices are adhered to.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Our aim is to support organizations in ensuring a high level of security and to increase their resilience to cyber threats in the long term.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><style>.vcex-image.vcex_6a11dee0d0875{animation-duration:2s;}<\/style><figure class=\"vcex-image vcex-module wpex-text-center  wpb_animate_when_almost_visible wpb_fadeInUp fadeInUp vcex_6a11dee0d0875\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"300\" height=\"72\" src=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png 300w, https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width-18x4.png 18w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/div><\/figure><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:50px;\"><\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"UNSERE LEISTUNGEN Security Validation and Verification Security Validation and Verification (Sicherheitsvalidierung und -verifizierung) ist ein essenzieller Prozess in der Cybersecurity, der darauf abzielt, sicherzustellen, dass Systeme, Netzwerke und Anwendungen gegen aktuelle Bedrohungen ausreichend gesch\u00fctzt sind. Dieser Prozess hilft Unternehmen, Sicherheitsl\u00fccken fr\u00fchzeitig zu erkennen und ihre Sicherheitsma\u00dfnahmen effektiv zu validieren. Der Prozess umfasst zwei Hauptaspekte: 1.&hellip;","protected":false},"author":5,"featured_media":31881,"parent":31128,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-31856","page","type-page","status-publish","has-post-thumbnail","hentry","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Validation and Verification - OT \u2013 CyberSecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-validation-and-verification\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Validation and Verification - OT \u2013 CyberSecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybershield-consulting.com\/en\/our-services\/security-validation-and-verification\/\" \/>\n<meta property=\"og:site_name\" content=\"OT \u2013 CyberSecurity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-13T09:20:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Validation-and-Verification.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/security-validation-and-verification\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/security-validation-and-verification\\\/\",\"name\":\"Security Validation and Verification - OT \u2013 CyberSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/security-validation-and-verification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/security-validation-and-verification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Validation-and-Verification.webp\",\"datePublished\":\"2024-03-21T10:06:13+00:00\",\"dateModified\":\"2025-05-13T09:20:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/security-validation-and-verification\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/security-validation-and-verification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/security-validation-and-verification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Validation-and-Verification.webp\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Validation-and-Verification.webp\",\"width\":1920,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/security-validation-and-verification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leistungen\",\"item\":\"https:\\\/\\\/cybershield-consulting.com\\\/leistungen\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Validation and Verification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#website\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"name\":\"CyberShield - OT - CyberSecurity\",\"description\":\"Secure every Moment\",\"publisher\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cybershield-consulting.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#organization\",\"name\":\"CyberShield\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"contentUrl\":\"https:\\\/\\\/cybershield-consulting.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/logo_coloredwhite_300width.png\",\"width\":300,\"height\":72,\"caption\":\"CyberShield\"},\"image\":{\"@id\":\"https:\\\/\\\/cybershield-consulting.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/linkedin.com\\\/company\\\/cybershield-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Validation and Verification - OT \u2013 CyberSecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybershield-consulting.com\/en\/our-services\/security-validation-and-verification\/","og_locale":"en_GB","og_type":"article","og_title":"Security Validation and Verification - OT \u2013 CyberSecurity","og_url":"https:\/\/cybershield-consulting.com\/en\/our-services\/security-validation-and-verification\/","og_site_name":"OT \u2013 CyberSecurity","article_modified_time":"2025-05-13T09:20:24+00:00","og_image":[{"width":1920,"height":700,"url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Validation-and-Verification.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cybershield-consulting.com\/leistungen\/security-validation-and-verification\/","url":"https:\/\/cybershield-consulting.com\/leistungen\/security-validation-and-verification\/","name":"Security Validation and Verification - OT \u2013 CyberSecurity","isPartOf":{"@id":"https:\/\/cybershield-consulting.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/security-validation-and-verification\/#primaryimage"},"image":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/security-validation-and-verification\/#primaryimage"},"thumbnailUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Validation-and-Verification.webp","datePublished":"2024-03-21T10:06:13+00:00","dateModified":"2025-05-13T09:20:24+00:00","breadcrumb":{"@id":"https:\/\/cybershield-consulting.com\/leistungen\/security-validation-and-verification\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybershield-consulting.com\/leistungen\/security-validation-and-verification\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/leistungen\/security-validation-and-verification\/#primaryimage","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Validation-and-Verification.webp","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/03\/Validation-and-Verification.webp","width":1920,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/cybershield-consulting.com\/leistungen\/security-validation-and-verification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cybershield-consulting.com\/"},{"@type":"ListItem","position":2,"name":"Leistungen","item":"https:\/\/cybershield-consulting.com\/leistungen\/"},{"@type":"ListItem","position":3,"name":"Security Validation and Verification"}]},{"@type":"WebSite","@id":"https:\/\/cybershield-consulting.com\/#website","url":"https:\/\/cybershield-consulting.com\/","name":"CyberShield - OT - CyberSecurity","description":"Secure every Moment","publisher":{"@id":"https:\/\/cybershield-consulting.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybershield-consulting.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/cybershield-consulting.com\/#organization","name":"CyberShield","url":"https:\/\/cybershield-consulting.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","contentUrl":"https:\/\/cybershield-consulting.com\/wp-content\/uploads\/2024\/11\/logo_coloredwhite_300width.png","width":300,"height":72,"caption":"CyberShield"},"image":{"@id":"https:\/\/cybershield-consulting.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/linkedin.com\/company\/cybershield-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=31856"}],"version-history":[{"count":14,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31856\/revisions"}],"predecessor-version":[{"id":34314,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31856\/revisions\/34314"}],"up":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/pages\/31128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media\/31881"}],"wp:attachment":[{"href":"https:\/\/cybershield-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=31856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}