{"id":616,"date":"2025-02-05T09:25:42","date_gmt":"2025-02-05T09:25:42","guid":{"rendered":"https:\/\/phishia.fr\/?page_id=616"},"modified":"2025-11-26T10:11:20","modified_gmt":"2025-11-26T10:11:20","slug":"rssi-ausgelagert","status":"publish","type":"page","link":"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/rssi-ausgelagert\/","title":{"rendered":"Ausgelagerter CISO"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"616\" class=\"elementor elementor-616\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-954e60d e-flex e-con-boxed e-con e-parent\" data-id=\"954e60d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0e1867a e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0e1867a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d86047a elementor-align-left elementor-invisible elementor-widget elementor-widget-breadcrumbs\" data-id=\"d86047a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/phishia.fr\/de\/\">Startseite<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cde1e95 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"cde1e95\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ffc446b e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ffc446b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88e84d7 animated-fast elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"88e84d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ausgelagerter CISO<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a1485d elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"9a1485d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5912e29 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5912e29\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEntdecken Sie den ausgelagerten CIO-\/ISR-Service von Phishia: Fachkenntnisse im Bereich Cybersicherheit, um Ihr Unternehmen vor Bedrohungen zu sch\u00fctzen, die Einhaltung von Vorschriften zu gew\u00e4hrleisten und Ihre digitale Strategie zu optimieren.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fa9afa7 e-con-full e-flex e-con e-child\" data-id=\"fa9afa7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a2f9ce0 elementor-align-right elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"a2f9ce0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/de\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ich habe ein Projekt<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9e0cf2 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"a9e0cf2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a799019 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a799019\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e67cd2 elementor-widget elementor-widget-heading\" data-id=\"9e67cd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RSSI = Verantwortlicher f\u00fcr die Sicherheit von Informationssystemen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc6cff0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bc6cff0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f654175 e-con-full e-flex e-con e-child\" data-id=\"f654175\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-69bd5e3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"69bd5e3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ca79cb elementor-widget elementor-widget-image\" data-id=\"2ca79cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7484492 elementor-widget elementor-widget-text-editor\" data-id=\"7484492\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Hauptrolle<\/strong><\/p><p>Gew\u00e4hrleistet den Schutz von Informationssystemen vor Bedrohungen und Cyberangriffen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7fa2550 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7fa2550\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d87fd8 elementor-widget elementor-widget-image\" data-id=\"4d87fd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84ce594 elementor-widget elementor-widget-text-editor\" data-id=\"84ce594\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Missionen<\/strong><\/p><p>Legt Sicherheitsrichtlinien fest und setzt diese durch, \u00fcberwacht Schwachstellen, verwaltet Vorf\u00e4lle und entwirft Strategien, um die Widerstandsf\u00e4higkeit der IT zu st\u00e4rken.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-636a5b7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"636a5b7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-944572c elementor-widget elementor-widget-image\" data-id=\"944572c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cdc4ca elementor-widget elementor-widget-text-editor\" data-id=\"0cdc4ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Ziele<\/strong><\/p><p>Gew\u00e4hrleistung der Vertraulichkeit, Integrit\u00e4t, Verf\u00fcgbarkeit und Nachvollziehbarkeit der Daten.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7829d49 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"7829d49\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f40762 elementor-widget elementor-widget-image\" data-id=\"8f40762\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d45ec1e elementor-widget elementor-widget-text-editor\" data-id=\"d45ec1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Interaktionen<\/strong><\/p><p>Arbeitet mit IT-Teams, Gesch\u00e4ftsf\u00fchrern, F\u00fchrungskr\u00e4ften und externen Partnern zusammen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1182177 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"1182177\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa0fe26 elementor-widget elementor-widget-image\" data-id=\"fa0fe26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6844f26 elementor-widget elementor-widget-text-editor\" data-id=\"6844f26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Relevanz<\/strong><\/p><p>Unerl\u00e4sslich f\u00fcr Organisationen mit komplexen Systemen, sensiblen Daten oder solchen, die strengen Vorschriften unterliegen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f11956 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"7f11956\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b8cbb90 e-con-full e-flex e-con e-child\" data-id=\"b8cbb90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-706daf6 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"706daf6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a57664d elementor-widget elementor-widget-heading\" data-id=\"a57664d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Was leistet ein ausgelagerter CISO?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-067d1fa elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"067d1fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8adf932 elementor-widget elementor-widget-text-editor\" data-id=\"8adf932\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unser Angebot f\u00fcr nachhaltige Cybersicherheit umfasst eine ganze Reihe von Dienstleistungen, die darauf ausgelegt sind, Ihr Unternehmen zu sch\u00fctzen und gleichzeitig die Auswirkungen auf die Umwelt zu minimieren. Folgendes bieten wir an:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7924f5f elementor-widget__width-inherit elementor-widget elementor-widget-ucaddon_unlimited_timeline\" data-id=\"7924f5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_unlimited_timeline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Unlimited Timeline -->\n\t\t<link id='font-awesome-css' href='https:\/\/phishia.fr\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/phishia.fr\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Unlimited Timeline *\/\n\n\n\n#uc_unlimited_timeline_elementor_7924f5f{\n  direction:ltr;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f *{\n  box-sizing:border-box;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item{\n  display:flex;\n  flex-direction:row-reverse;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon{\n  display:flex;\n  flex-direction:column;\n  align-items:center;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon_line{\n  flex-grow:1;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon_line_offset{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon_holder{\n  display:flex;\n  justify-content:center;\n  align-items:center;\n  line-height:1em;\n  flex-direction:column;\n  transition: all 0.4s ease-in-out;\n  text-align: center;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon_holder svg{\n  height:1em;\n  width:1em;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content{\n  flex:1;\n  flex-shrink:0;\n  flex-direction:row-reverse;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_spacer{\n  flex:1;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content_main{\n  flex-grow:1;\n  word-break: break-word;\n  transition: all .3s;\n  position: relative;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content_main_link{\n  position: absolute;\n  width: 100%;\n  height: 100%;\n  left: 0;\n  top: 0;\n  display: block;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content{\n  display:flex;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_pointer_spacer{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_icon{\n  flex-grow:0;\n  flex-shrink:0;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_pointer{  \n  flex-grow:0;\n  flex-shrink:0;\n  margin-top:0px;\n  position:relative;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside{\n  position:relative;\n  clip-path: polygon(0 50%, 100% 0, 100% 100%);\n  transition: all .3s;\n}\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:last-child .ue_timeline_item_icon_line{\n    display:none;\n  }\n\t\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:last-child .ue_timeline_item_content{\n  margin-bottom:0px;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_spacer  {\n  display:none;\n}\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(odd)    {\n   flex-direction:row;\n  }\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(odd) .ue_timeline_item_content{\n   flex-direction:row;\n  } \n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_spacer  {\n    display:block;\n  }\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(odd) .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside{ \n   clip-path: polygon(100% 50%, 0 0, 0 100%);\n  }\n\t\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_button{\n\tdisplay: flex;\n  \talign-items: center;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_link{\n\tcursor: pointer;\n  \ttransition: all .3s;\n}\n\n\n.ue_timeline_item_title{\n  font-size:21px;\n}\n\n.ue_text_one, .ue_text_two, .ue_text_three{\n  font-size:14px;\n  line-height:1.1em;\n}\n\n.ue_timeline_item_icon_line_mask, .ue_timeline_item_icon_line_offset_mask {\n  width: 100%;\n  height: 0%;\n  max-height: 100%;\n  will-change: height;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_line_icon_holder{\n  position: relative;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_line_floating_icon,\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_line_floating_icon-offset{\n  position: absolute;\n  bottom: 0;\n  left: 50%;\n  transform: translate(-50%, 0%);\n  opacity: 0;\n  display: none;\n    display: none !important;\n  }\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_floating_icon{\n  display:flex;\n  opacity: 1;\n  justify-content:center;\n  align-items:center;\n  line-height:1em;\n  flex-direction:column;\n  transition: all 0.4s ease-in-out;\n  text-align: center;\n}\n  \n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_image{\nobject-fit: cover;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content_inside{\n  position:relative;\n}\n\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_content_main{\n  position:relative;\n  overflow:hidden;\n}\n\n\n@media only screen and (max-width: 768px) {\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item{\n    flex-direction:row-reverse !important;\n  }\n\n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item .ue_timeline_item_content{\n   flex-direction:row-reverse !important;\n  }\n  \n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_spacer  {\n    display:none;\n  }\n  \n  #uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item .ue_timeline_item_content .ue_timeline_item_pointer .ue_timeline_item_pointer_inside  { \n   clip-path: polygon(0 50%, 100% 0, 100% 100%) !important;\n  }  \n}\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item_img_wrapper{\n  display: flex;\n}\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(even) .ue_timeline_item_img_wrapper{\n  justify-content: flex-end;\n}\n#uc_unlimited_timeline_elementor_7924f5f .ue_timeline_item:nth-child(odd) .ue_timeline_item_img_wrapper{\n  justify-content: flex-start;\n}\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\t\n\n\n\n\n\n\n\n<\/style>\n\n<div id=\"uc_unlimited_timeline_elementor_7924f5f\" class=\"uc-items-wrapper\"  >\n  \n<div class=\"ue_timeline_item elementor-repeater-item-e94b2af\" id=\"uc_unlimited_timeline_elementor_7924f5f_item1\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Analyse der Umgebung und Festlegung des ISMS-Umfangs<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>In dieser Phase m\u00fcssen Sie das Unternehmensumfeld verstehen, die wichtigsten Informationswerte ermitteln und den Umfang des ISMS festlegen.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/de\/blog\/cybersecurity\/smsi-implementierung\/\" >ISMS-Implementierung<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-7402c76\" id=\"uc_unlimited_timeline_elementor_7924f5f_item2\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Bewertung von Risiken<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Ermitteln und bewerten Sie die Risiken, die mit jedem Informationsverm\u00f6genswert verbunden sind.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/de\/dienste\/cybersecurity\/pravention\/risikoanalyse\/\" >Risikoanalyse<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-ff164ec\" id=\"uc_unlimited_timeline_elementor_7924f5f_item3\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Entwicklung der Sicherheitspolitik<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Verfassen Sie eine Sicherheitsrichtlinie, in der festgelegt wird, wie das Unternehmen mit der Informationssicherheit umgeht.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/de\/dienste\/cybersecurity\/pravention\/sicherheitspolitiken-interne-chartas\/\" >Verfassen von Sicherheitsrichtlinien<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-9c12d02\" id=\"uc_unlimited_timeline_elementor_7924f5f_item4\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Durchf\u00fchrung von Kontrollen<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Setzen Sie proaktive Sicherheit um, indem Sie Tools zur Netzwerkerkennung und Schwachstellenanalyse einsetzen, um Sicherheitsl\u00fccken schnell zu erkennen und zu beheben und so die Widerstandsf\u00e4higkeit Ihres Informationssystems zu st\u00e4rken.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/de\/blog\/cybersecurity\/einfuhrung-von-erfassungsinstrumenten\/\" >Einf\u00fchrung von Aufdeckungsinstrumenten<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-cf0a2c7\" id=\"uc_unlimited_timeline_elementor_7924f5f_item5\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Bildung und Sensibilisierung<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>Sorgen Sie f\u00fcr die Sicherheit Ihres Unternehmens, indem Sie Mitarbeiter in Sicherheitsrichtlinien schulen, \u00dcbungen zur Bew\u00e4ltigung von Cyberkrisen durchf\u00fchren und Phishing-Kampagnen durchf\u00fchren, um die Bereitschaft und Reaktionsf\u00e4higkeit gegen\u00fcber Cyberbedrohungen zu erh\u00f6hen.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/de\/dienste\/cybersecurity\/pravention\/sensibilisierung-ausbildung\/\" >Unsere Bildungsangebote<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-b3bc6b9\" id=\"uc_unlimited_timeline_elementor_7924f5f_item6\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Audit &amp; Review<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p class=\"zfr3Q CDt4Ke\" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc\">F\u00fchren Sie regelm\u00e4\u00dfige Audits durch, um die Einhaltung der Sicherheitsrichtlinien zu \u00fcberpr\u00fcfen.<\/span><\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/de\/audits\/\" >Unsere Pr\u00fcfungsdienstleistungen<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n\n<div class=\"ue_timeline_item elementor-repeater-item-4286267\" id=\"uc_unlimited_timeline_elementor_7924f5f_item7\">\n    <div class=\"ue_timeline_item_content\">\n      \n      <div class=\"ue_timeline_item_content_main\">\n        \n                \n        <div class=\"ue_timeline_item_content_inside\">\n                <div class=\"ue_timeline_item_title\" >Kontinuierliche Verbesserung<\/div>          <div class=\"ue_timeline_item_subtitle\" ><\/div>\n        <div class=\"ue_timeline_item_text\"><p>\u00dcberpr\u00fcfen und verbessern Sie das ISMS regelm\u00e4\u00dfig auf der Grundlage der Ergebnisse von Audits und \u00c4nderungen im Unternehmensumfeld.<\/p><\/div>\t\n      \t                  \n          <div class=\"ue_timeline_item_button\">\n                        \t<a class=\"ue_timeline_item_link\" href=\"\/de\/kontakt\/\" >Kontaktieren Sie uns<\/a>\n                      <\/div>\n          \n          \n        <\/div>\n              <\/div>\n      \n            <div class=\"ue_timeline_item_pointer\">\n        <div class=\"ue_timeline_item_pointer_inside\"><\/div>\n      <\/div>\n            \n      <div class=\"ue_timeline_item_pointer_spacer\"><\/div>\n      \n    <\/div>\n  \n    <div class=\"ue_timeline_item_icon\">\n      <div class=\"ue_timeline_item_icon_line_offset\">\n      \t<div class=\"ue_timeline_item_icon_line_offset_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon-offset ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      <div class=\"ue_timeline_item_icon_holder\">\n                                      <\/div>\n      \n      <div class=\"ue_timeline_item_icon_line\">\n      \t<div class=\"ue_timeline_item_icon_line_mask ue_timeline_item_line_icon_holder\">\n          <div class=\"ue_timeline_item_line_floating_icon ue_timeline_floating_icon\"><i class='fas fa-rocket'><\/i><\/div>\n        <\/div>\n      <\/div>\n      \n    <\/div>\n    <div class=\"ue_timeline_item_spacer\">\n        \t<\/div>\n  <\/div>\n \n<\/div>\n<!-- end Unlimited Timeline -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-90f6351 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"90f6351\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-afa79c3 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"afa79c3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d54339d elementor-widget elementor-widget-heading\" data-id=\"d54339d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strategie zur Nutzungs- und Kostenoptimierung<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08470ae elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"08470ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1cae8d8 e-con-full e-flex e-con e-child\" data-id=\"1cae8d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c0481ba e-con-full e-flex e-con e-child\" data-id=\"c0481ba\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a8367c elementor-widget elementor-widget-text-editor\" data-id=\"3a8367c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unsere Strategie zur Optimierung von Nutzung und Kosten beruht auf einer <strong>proaktiver und pers\u00f6nlicher Ansatz<\/strong>mit dem Ziel <strong>den Wert von IT-Investitionen maximieren<\/strong> unserer Kunden zu verbessern. Als vertrauensw\u00fcrdiger Partner arbeiten wir eng mit unseren Kunden zusammen, um ihre spezifischen Bed\u00fcrfnisse zu verstehen, ihre bestehende Infrastruktur zu bewerten und <strong>Optimierungsm\u00f6glichkeiten zu identifizieren<\/strong>.<\/p><p>Dank unserer umfassenden Marktkenntnisse und unserer Partnerschaften mit f\u00fchrenden Anbietern von Technologiel\u00f6sungen k\u00f6nnen wir strategische Empfehlungen und ma\u00dfgeschneiderte L\u00f6sungen anbieten, um Kosten zu senken und die betriebliche Effizienz zu steigern. Wir arbeiten eng mit unseren Kunden zusammen, um die IT-Dienstleistungen und -Ressourcen zu ermitteln, die ihren tats\u00e4chlichen Bed\u00fcrfnissen am besten entsprechen, w\u00e4hrend wir gleichzeitig unn\u00f6tige Ausgaben eliminieren und bestehende Investitionen optimieren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58dda74 e-con-full e-flex e-con e-child\" data-id=\"58dda74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c6bd0d elementor-widget elementor-widget-text-editor\" data-id=\"0c6bd0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unser <strong>proaktiver Ansatz erm\u00f6glicht es uns, Marktentwicklungen zu antizipieren<\/strong> und strategische Anpassungen zu empfehlen, um eine optimale Nutzung der IT-Ressourcen zu gew\u00e4hrleisten. Wir sind bestrebt, innovative und kosteneffiziente L\u00f6sungen zu liefern und gleichzeitig ein effektives und langfristiges Kostenmanagement zu gew\u00e4hrleisten.<\/p><p>Indem sie sich f\u00fcr unsere Strategie der Nutzungs- und Kostenoptimierung entscheiden, profitieren unsere Kunden von unserem Fachwissen, unseren privilegierten Partnerschaften und unserem Engagement f\u00fcr ma\u00dfgeschneiderte und kosteneffiziente L\u00f6sungen. Wir sind bestrebt, unseren Kunden dabei zu helfen, ihre Gesch\u00e4ftsziele zu erreichen und gleichzeitig den Wert ihrer IT-Investitionen zu maximieren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-97a4c04 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"97a4c04\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a898d7b e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a898d7b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-984fa94 elementor-widget elementor-widget-heading\" data-id=\"984fa94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ohne Sicherheitsma\u00dfnahmen,<br>hier ein Beispiel f\u00fcr ein Angriffsszenario durch Supply Chain<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-720a068 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"720a068\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c45f665 e-con-full e-flex e-con e-child\" data-id=\"c45f665\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3d537b1 e-con-full e-flex e-con e-child\" data-id=\"3d537b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fcfd820 elementor-widget elementor-widget-image\" data-id=\"fcfd820\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/cybercrime.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1379\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-261ef7c elementor-widget elementor-widget-text-editor\" data-id=\"261ef7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ihr Anbieter von Lohnabrechnungssystemen wird unbemerkt Opfer eines Cyberangriffs<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-906f649 e-transform elementor-widget elementor-widget-image\" data-id=\"906f649\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:45,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:135,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-052e676 e-con-full e-flex e-con e-child\" data-id=\"052e676\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-87c8422 elementor-widget elementor-widget-image\" data-id=\"87c8422\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/animal.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1378\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae1acc5 elementor-widget elementor-widget-text-editor\" data-id=\"ae1acc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEinschleusen eines Trojaners in die f\u00fcr Ihren Anbieter gelieferte Software\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8af4f8 e-transform elementor-widget elementor-widget-image\" data-id=\"e8af4f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:45,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:135,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-266f9ac e-con-full e-flex e-con e-child\" data-id=\"266f9ac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8573e49 elementor-widget elementor-widget-image\" data-id=\"8573e49\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/big-data.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1377\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-464e41c elementor-widget elementor-widget-text-editor\" data-id=\"464e41c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Einsatz des Trojaners innerhalb Ihres IS<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7d400c e-transform elementor-widget elementor-widget-image\" data-id=\"a7d400c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:45,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:135,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f9b0223 e-con-full e-flex e-con e-child\" data-id=\"f9b0223\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc6b230 elementor-widget elementor-widget-image\" data-id=\"dc6b230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/malware.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1376\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aac0311 elementor-widget elementor-widget-text-editor\" data-id=\"aac0311\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ihr gesamtes IS ist infiziert<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74d4fa0 e-transform elementor-widget elementor-widget-image\" data-id=\"74d4fa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:45,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:135,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1368\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05d949b e-con-full e-flex e-con e-child\" data-id=\"05d949b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-870a51e elementor-widget elementor-widget-image\" data-id=\"870a51e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"128\" height=\"128\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/dollar.png\" class=\"attachment-thumbnail size-thumbnail wp-image-1375\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbd660b elementor-widget elementor-widget-text-editor\" data-id=\"dbd660b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Sie sind Opfer einer L\u00f6segeldforderung geworden<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-481e649 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"481e649\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0c9be1f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0c9be1f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16ac04a elementor-widget elementor-widget-heading\" data-id=\"16ac04a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Warum sollten Sie sich f\u00fcr unseren Outsourcing-Service entscheiden?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-657a36f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"657a36f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4631da6 e-con-full e-flex e-con e-child\" data-id=\"4631da6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8dbcc15 e-con-full e-flex e-con e-child\" data-id=\"8dbcc15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16517fb elementor-widget elementor-widget-heading\" data-id=\"16517fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">1.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7fee4b elementor-widget elementor-widget-text-editor\" data-id=\"c7fee4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Spezialisiertes Fachwissen<\/strong><\/p><p>Wenn Sie Ihren CIO und CISO auslagern, profitieren Sie vom Fachwissen und der Erfahrung von Fachleuten, die im Bereich Informationssystem-Management und IT-Sicherheit qualifiziert sind. Sie haben Zugang zu hochspezialisierten F\u00e4higkeiten und fundiertem Wissen, um den Schutz und den reibungslosen Betrieb Ihrer IT-Infrastruktur zu gew\u00e4hrleisten.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b94740d e-con-full e-flex e-con e-child\" data-id=\"b94740d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dfd9d14 elementor-widget elementor-widget-heading\" data-id=\"dfd9d14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">2.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c746db4 elementor-widget elementor-widget-text-editor\" data-id=\"c746db4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Kosten senken<\/strong><\/p><p>Die Auslagerung Ihrer CIO und Ihres CISO kann Ihnen im Vergleich zur Einstellung und Verwaltung eines internen Teams erhebliche Einsparungen erm\u00f6glichen. Sie k\u00f6nnen Ihre Kosten optimieren, indem Sie nur f\u00fcr die Dienstleistungen zahlen, die Sie ben\u00f6tigen, und nicht die Fixkosten tragen m\u00fcssen, die mit Vollzeitkr\u00e4ften verbunden sind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8fbe712 e-con-full e-flex e-con e-child\" data-id=\"8fbe712\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74d1c27 elementor-widget elementor-widget-heading\" data-id=\"74d1c27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">3.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b750729 elementor-widget elementor-widget-text-editor\" data-id=\"b750729\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Flexibilit\u00e4t und Skalierbarkeit<\/strong><\/p><p>Unser Outsourcing-Service bietet Ihnen ein hohes Ma\u00df an Flexibilit\u00e4t, sodass Sie Ihre Ressourcen schnell an die sich \u00e4ndernden Bed\u00fcrfnisse Ihres Unternehmens anpassen k\u00f6nnen. Egal, ob Sie einmaliges Fachwissen f\u00fcr ein bestimmtes Projekt oder eine kontinuierliche Verwaltung Ihrer Informationssysteme ben\u00f6tigen, wir stehen Ihnen mit Rat und Tat zur Seite und stellen Ihnen die erforderlichen Ressourcen zur Verf\u00fcgung.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-479cb1a e-con-full e-flex e-con e-child\" data-id=\"479cb1a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d9fbec3 e-con-full e-flex e-con e-child\" data-id=\"d9fbec3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00fb26d elementor-widget elementor-widget-heading\" data-id=\"00fb26d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">4.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92f76a9 elementor-widget elementor-widget-text-editor\" data-id=\"92f76a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Konzentration auf das Kerngesch\u00e4ft<\/strong><\/p><p>Wenn Sie die Verwaltung Ihrer ISD und Ihres CISO an externe Experten abgeben, k\u00f6nnen Sie sich voll und ganz auf Ihr Kerngesch\u00e4ft und die Entwicklung Ihres Gesch\u00e4fts konzentrieren. Sie gewinnen mehr Ruhe, weil Sie Ihre IT-Systeme in guten H\u00e4nden wissen, und werden gleichzeitig von den administrativen und technischen Aufgaben befreit, die mit der Verwaltung der IT-Systeme verbunden sind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0300f9a e-con-full e-flex e-con e-child\" data-id=\"0300f9a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1f79bc elementor-widget elementor-widget-heading\" data-id=\"a1f79bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">5.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3f0748 elementor-widget elementor-widget-text-editor\" data-id=\"e3f0748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Zugang zu modernster Technologie<\/strong><\/p><p>Wenn Sie mit einem externen Dienstleister zusammenarbeiten, haben Sie Zugang zu den neuesten Sicherheitstechnologien und -tools, sodass Sie in Sachen Cybersicherheit immer auf dem neuesten Stand sind und Ihre digitalen Verm\u00f6genswerte wirksam sch\u00fctzen k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1aacbae e-con-full e-flex e-con e-child\" data-id=\"1aacbae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-91c1d8c e-con-full e-flex e-con e-child\" data-id=\"91c1d8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3928724 elementor-widget elementor-widget-heading\" data-id=\"3928724\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Derzeit bietet Phishia kostenlose organisatorische Audits zur Cybersicherheit an.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0ac918 elementor-align-right elementor-tablet-align-center elementor-widget elementor-widget-button\" data-id=\"e0ac918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/de\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kontaktieren Sie uns<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68b7689 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"68b7689\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a5f79c7 e-con-full e-flex e-con e-child\" data-id=\"a5f79c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ab4d80c e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ab4d80c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89b3903 elementor-widget elementor-widget-heading\" data-id=\"89b3903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Unser Blog<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-667cfed elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"667cfed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5febd83 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5febd83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Informieren Sie sich \u00fcber die neuesten Nachrichten und Trends im Bereich Steuerung und Einhaltung von Vorschriften.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9b7d7e elementor-grid-tablet-1 elementor-widget-tablet__width-initial elementor-grid-3 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"b9b7d7e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;template_id&quot;:208,&quot;masonry&quot;:&quot;yes&quot;,&quot;columns_tablet&quot;:1,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-loop-container elementor-grid\" role=\"list\">\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4300 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4300 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2026\/02\/SECTEUR-PUBLIC-COLLECTIVITES.png\");}<\/style><style id=\"loop-208\">.elementor-208 .elementor-element.elementor-element-5df6e6f{--display:flex;--min-height:0px;--flex-direction:column;--container-widget-width:100%;--container-widget-height:initial;--container-widget-flex-grow:0;--container-widget-align-self:initial;--flex-wrap-mobile:wrap;}.elementor-widget-post-info .elementor-icon-list-item:not(:last-child):after{border-color:var( --e-global-color-text );}.elementor-widget-post-info .elementor-icon-list-icon i{color:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-icon svg{fill:var( --e-global-color-primary );}.elementor-widget-post-info .elementor-icon-list-text, .elementor-widget-post-info .elementor-icon-list-text a{color:var( --e-global-color-secondary );}.elementor-widget-post-info .elementor-icon-list-item{font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon{width:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon i{font-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-icon svg{--e-icon-list-icon-size:14px;}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text, .elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-text a{color:var( --e-global-color-ae5c0d5 );}.elementor-208 .elementor-element.elementor-element-5a4044e .elementor-icon-list-item{font-family:\"Space Grotesk\", Sans-serif;font-size:14px;font-weight:600;text-transform:uppercase;letter-spacing:2.2px;}.elementor-208 .elementor-element.elementor-element-5a4044e > .elementor-widget-container{margin:0px 0px 0px 0px;padding:7px 10px 4px 10px;background-color:#1446A066;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-ae5c0d5 );border-radius:8px 8px 8px 8px;}.elementor-208 .elementor-element.elementor-element-5a4044e.elementor-element{--align-self:flex-start;}body:not(.rtl) .elementor-208 .elementor-element.elementor-element-5a4044e{left:10px;}body.rtl .elementor-208 .elementor-element.elementor-element-5a4044e{right:10px;}.elementor-208 .elementor-element.elementor-element-5a4044e{top:10px;}.elementor-208 .elementor-element.elementor-element-cafbeac{--display:flex;--min-height:300px;--border-radius:5px 5px 5px 5px;box-shadow:0px 8px 24px 0px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.2);}.elementor-208 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .elementor-208 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-secondary );background-repeat:no-repeat;background-size:cover;}.elementor-208 .elementor-element.elementor-element-cafbeac:hover{box-shadow:0px 8px 24px 8px rgba(148.99999999999997, 156.99999999999997, 164.99999999999997, 0.3);}.elementor-208 .elementor-element.elementor-element-466dfd9{--display:flex;--flex-direction:row;--container-widget-width:calc( ( 1 - var( --container-widget-flex-grow ) ) * 100% );--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--justify-content:flex-start;--align-items:flex-start;--gap:25px 25px;--row-gap:25px;--column-gap:25px;}.elementor-widget-image .widget-image-caption{color:var( --e-global-color-text );font-family:var( --e-global-typography-text-font-family ), Sans-serif;font-weight:var( --e-global-typography-text-font-weight );}.elementor-208 .elementor-element.elementor-element-c50e89f img{width:30px;filter:brightness( 100% ) contrast( 100% ) saturate( 0% ) blur( 0px ) hue-rotate( 0deg );}.elementor-208 .elementor-element.elementor-element-c50e89f > .elementor-widget-container{margin:-5px 15px 0px 0px;padding:0px 0px 0px 0px;}.elementor-widget-heading .elementor-heading-title{font-family:var( --e-global-typography-primary-font-family ), Sans-serif;font-weight:var( --e-global-typography-primary-font-weight );color:var( --e-global-color-primary );}.elementor-208 .elementor-element.elementor-element-0dd511b{text-align:start;}.elementor-208 .elementor-element.elementor-element-0dd511b .elementor-heading-title{font-family:\"Montserrat\", Sans-serif;font-size:16px;font-weight:500;color:var( --e-global-color-text );}@media(max-width:767px){.elementor-208 .elementor-element.elementor-element-466dfd9{--flex-direction:row;--container-widget-width:initial;--container-widget-height:100%;--container-widget-flex-grow:1;--container-widget-align-self:stretch;--flex-wrap-mobile:wrap;--flex-wrap:nowrap;}}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4300 post-4300 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/aipd-warum-die-dimpact-analyse-das-rechtliche-schild-der-gemeinden-im-jahr-2026-ist\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/aipd-warum-die-dimpact-analyse-das-rechtliche-schild-der-gemeinden-im-jahr-2026-ist\/\">AIPD: Warum die Folgenabsch\u00e4tzung 2026 der rechtliche Schutzschild f\u00fcr Gemeinden ist<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-4123 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-4123 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/12\/EASA_Headquarters_-_EASA_Direktion.jpg\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-4123 post-4123 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite category-surveillance tag-aeronautique\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/de\/blog\/tag\/luftfahrt\/\" class=\"elementor-post-info__terms-list-item\">Luft- und Raumfahrt<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/der-dominoeffekt-von-cyber-warum-leasa-und-part-is-sie-zwingen-ihre-lieferanten-zu-uberwachen\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/der-dominoeffekt-von-cyber-warum-leasa-und-part-is-sie-zwingen-ihre-lieferanten-zu-uberwachen\/\">Der Dominoeffekt von Cyber. Warum EASA und Part IS Sie verpflichten, Ihre Lieferanten zu \u00fcberwachen.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<style id=\"loop-dynamic-208\">.e-loop-item-3854 .elementor-element.elementor-element-cafbeac:not(.elementor-motion-effects-element-type-background), .e-loop-item-3854 .elementor-element.elementor-element-cafbeac > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-image:url(\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/11\/Capture-decran-2024-10-03-a-17.32.55.png\");}<\/style>\t\t<div data-elementor-type=\"loop-item\" data-elementor-id=\"208\" class=\"elementor elementor-208 e-loop-item e-loop-item-3854 post-3854 post type-post status-publish format-standard has-post-thumbnail hentry category-pilotage-conformite tag-sante\" data-elementor-post-type=\"elementor_library\" data-custom-edit-handle=\"1\">\n\t\t\t<div class=\"elementor-element elementor-element-5df6e6f article-blog e-flex e-con-boxed e-con e-parent\" data-id=\"5df6e6f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a4044e elementor-absolute elementor-widget elementor-widget-post-info\" data-id=\"5a4044e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-cc6ad9f elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/phishia.fr\/de\/blog\/tag\/gesundheit\/\" class=\"elementor-post-info__terms-list-item\">Gesundheit<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<a class=\"elementor-element elementor-element-cafbeac e-con-full e-flex e-con e-child\" data-id=\"cafbeac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\" href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/programme-care-domaine-2-eine-finanzierung-fur-ihre-sozialmedizinische-einrichtung\/\">\n\t\t\t\t<\/a>\n\t\t<div class=\"elementor-element elementor-element-466dfd9 e-con-full e-flex e-con e-child\" data-id=\"466dfd9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c50e89f icon-read elementor-widget elementor-widget-image\" data-id=\"c50e89f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"72\" height=\"72\" src=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/arrow-right-up-line-1.png\" class=\"attachment-thumbnail size-thumbnail wp-image-267\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd511b elementor-widget elementor-widget-heading\" data-id=\"0dd511b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/phishia.fr\/de\/blog\/steuerung-der-konformitat\/programme-care-domaine-2-eine-finanzierung-fur-ihre-sozialmedizinische-einrichtung\/\">CaRE-Programm - Bereich 2: Eine Finanzierung f\u00fcr Ihr Pflegeheim.<\/a><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d6c4b7 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2d6c4b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/de\/blog\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Entdecken Sie alle unsere Artikel<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>RSSI Externalis\u00e9 D\u00e9couvrez le service DSI\/RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique. J&rsquo;ai un projet RSSI = Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d&rsquo;Information R\u00f4le principal Garantit la protection des syst\u00e8mes d&rsquo;information contre les menaces et cyberattaques. Missions [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":3799,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-616","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RSSI Externalis\u00e9 - Phishia<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez le service DSI \/ RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/rssi-ausgelagert\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RSSI Externalis\u00e9 - Phishia\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez le service DSI \/ RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/rssi-ausgelagert\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-26T10:11:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"72\" \/>\n\t<meta property=\"og:image:height\" content=\"72\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"10\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/\",\"name\":\"RSSI Externalis\u00e9 - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/arrow-right-up-line-2.png\",\"datePublished\":\"2025-02-05T09:25:42+00:00\",\"dateModified\":\"2025-11-26T10:11:20+00:00\",\"description\":\"D\u00e9couvrez le service DSI \\\/ RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/arrow-right-up-line-2.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/arrow-right-up-line-2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/rssi-externalise\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/pilotage-et-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RSSI Externalis\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ausgelagerter CISO - Phishia","description":"Entdecken Sie den ausgelagerten CIO \/ CISO-Service von Phishia: Fachkenntnisse im Bereich Cybersicherheit, um Ihr Unternehmen vor Bedrohungen zu sch\u00fctzen, die Einhaltung von Vorschriften zu gew\u00e4hrleisten und Ihre digitale Strategie zu optimieren.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/rssi-ausgelagert\/","og_locale":"de_DE","og_type":"article","og_title":"RSSI Externalis\u00e9 - Phishia","og_description":"D\u00e9couvrez le service DSI \/ RSSI externalis\u00e9 de Phishia : une expertise en cybers\u00e9curit\u00e9 pour prot\u00e9ger votre entreprise contre les menaces, assurer la conformit\u00e9 et optimiser votre strat\u00e9gie num\u00e9rique.","og_url":"https:\/\/phishia.fr\/de\/steuerung-und-konformitat\/rssi-ausgelagert\/","og_site_name":"Phishia","article_modified_time":"2025-11-26T10:11:20+00:00","og_image":[{"width":72,"height":72,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"10\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/","url":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/","name":"Ausgelagerter CISO - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png","datePublished":"2025-02-05T09:25:42+00:00","dateModified":"2025-11-26T10:11:20+00:00","description":"Entdecken Sie den ausgelagerten CIO \/ CISO-Service von Phishia: Fachkenntnisse im Bereich Cybersicherheit, um Ihr Unternehmen vor Bedrohungen zu sch\u00fctzen, die Einhaltung von Vorschriften zu gew\u00e4hrleisten und Ihre digitale Strategie zu optimieren.","breadcrumb":{"@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/02\/arrow-right-up-line-2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/pilotage-et-conformite\/rssi-externalise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/pilotage-et-conformite\/"},{"@type":"ListItem","position":3,"name":"RSSI Externalis\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"IT-Beratung, Cybersicherheit, Nachhaltigkeit","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages\/616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/comments?post=616"}],"version-history":[{"count":42,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages\/616\/revisions"}],"predecessor-version":[{"id":4061,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages\/616\/revisions\/4061"}],"up":[{"embeddable":true,"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/pages\/3799"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/de\/wp-json\/wp\/v2\/media?parent=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}