{"id":11655,"date":"2021-05-06T15:18:44","date_gmt":"2021-05-06T13:18:44","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/unsere-experten\/"},"modified":"2023-06-05T13:14:38","modified_gmt":"2023-06-05T11:14:38","slug":"our-experts","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-consulting\/our-experts\/","title":{"rendered":"Our Experts"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||38px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-consulting-header.jpg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"166px|60px|62px|60px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Security Consulting<\/h1>\n<p style=\"text-align: center\">Our consultants<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<h2 class=\"h-custom-headline h2\">Who we are<\/h2>\n<div class=\"x-text\">\n<p>We are a flexible and interdisciplinary team consisting of experienced senior consultants, dedicated juniors, technical IT security experts and a network of long-standing, specialized partners who complement our expertise in the project business. Our team has more than 50 members with the goal to incorporate security into your company holistically.<\/p>\n<p>We share our experience and know-how in various publications, lectures, research projects and specialist groups. To name just a few examples: We are a founding member of the CAST Forum, a partner of ATHENE and are involved in various ISACA specialist groups.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"5px|||||\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slider _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"58px||58px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-cs.jpeg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Dr. Christian Schwartz<\/strong><br \/>Managing Consultant<\/p>\n<p>\u201cOur clients\u2019 security is the focus of my daily work. Together with them I develop information security strategies, define long-term goals and accompany the harmonization with new financial regulatory requirements. However, I also help with operative tasks where necessary.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-ar.jpeg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Andrea Rupprich<\/strong><br \/>Managing Consultant<\/p>\n<p>\u201cMy work with our clients is characterized by many years of trust and mutual appreciation. The introduction and implementation of complex information security management systems (ISMS) are my core competencies.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-esw.jpeg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Ester Widera<\/strong><br \/>Senior Consultant<\/p>\n<p>\u201cGuidelines that adhere to compliance requirements while still being practical play an increasingly important role today. The documentation requires know-how and time \u2013 in addition to their day-to-day business, this task poses a major challenge to many companies. I\u2019m glad that I\u2019m able to provide hands-on support with that.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-mm.jpeg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Maximilian M\u00fcller<\/strong><br \/>Managing Consultant<\/p>\n<p>\u201cI accompany companies in their day-to-day business and help them improve the security of their processual, organizational and technical structures. My work is varied and interesting, no day is like the other. That\u2019s challenging and I enjoy it a lot.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-audit-kachel-1.jpg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Andreas Borgwart<\/strong><br \/>Managing Consultant<\/p>\n<p>\u201cIn order to organize ISMS processes in companies more efficiently, I help with the introduction of suitable tools. For example, workflows for protection needs assessments and security assessments can be automated. Furthermore, I advise our customers on the topic of risk management. I enjoy finding a suitable solution even for the most complex contexts.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt_sw.jpg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Simon Weickart<\/strong><br \/>Consultant<\/p>\n<p>\u201cI feel most at home where technology meets compliance. ISO 27001, BAIT, MaRisk and a growing number of new regulations present companies with ever new challenges with regard to their IT organization and documentation. My motivation is to implement these in an efficient and practical way.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-tm.jpeg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Tanja Misic<\/strong><br \/>Senior Consultant<\/p>\n<p>\u201cI support companies in achieving and maintaining their ISO 27001 certification. The phases of planning, implementation, review and improvement must interlock perfectly. This is why it is always a pleasure to share with my clients the joy of being awarded for the first time or maintain a certificate.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-rg.jpg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<h4><strong>Dr. Richard Grewe<br \/><\/strong><\/h4>\n<p><span>Managing Consultant<\/span><\/p>\n<p>\"In addition to a structured, professional onboarding program for our new colleagues, we continuously invest in our continuing education and the achievement of internationally recognized certifications.\"<\/p>\n<p>[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||6px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"||74px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\">What matters to us<\/h2>\n<div class=\"x-text\">\n<p>Security Consulting is about processes, technology and people and can therefore never be a standardized service. Getting to know our clients and their individual situation and help them directly and pragmatically \u2013 that\u2019s what drives us.<\/p>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"||-2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline usd-small-letters h2\">What we offer<\/h2>\n<div class=\"x-text\">\n<div class=\"x-text\">\n<p>Our consultants bring several years of experience in relevant information security projects. In addition to experience in finance, we have industry expertise in tourism and retail. Our expertise in information security is rounded off with project management know-how.<\/p>\n<\/div>\n<p><span><\/span><\/p>\n<p><span><\/span><\/p>\n<p><span><\/span><\/p>\n<h3 class=\"h-custom-headline h3\">Our certification<\/h3>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-4px|auto||auto||\" custom_padding=\"5px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul class=\"x-ul-icons\">\n<li>CISA (Certified Information Security Auditor)<\/li>\n<li>CISM (Certified Information Security Manager)<\/li>\n<li>CRISC (Certified in Risk and Information Systems Control)<\/li>\n<li>PECB Certified ISO 22301 Implementer<br \/>(Topic BCMS)<\/li>\n<li>ISO 27001 Lead Auditor<\/li>\n<li>CompTIA Security+<\/li>\n<li>ITIL v3 Foundation<\/li>\n<li>Public Administration IT Security Officer<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul class=\"x-ul-icons\">\n<li>PMP (Project Management Professional)<\/li>\n<li>Prince2 Foundation<\/li>\n<li>Qualys Certified Specialist (Vulnerability Management)<\/li>\n<li>QSA (Qualified Security Assessor)<\/li>\n<li>Scrum Master<\/li>\n<li>Certified Economic Security Officer<\/li>\n<li>IHK Foreign Language Correspondent<\/li>\n<li>IHK Certified Project Lead<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_5,1_5,1_5,1_5,1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/logo-cissp-1.jpg\" title_text=\"logo-cissp\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"71%\" width_tablet=\"50%\" width_phone=\"40%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/logo-iso-27001.jpg\" title_text=\"logo-iso-27001\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"70%\" width_tablet=\"50%\" width_phone=\"40%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/logo-crisc.jpg\" title_text=\"logo-crisc\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"70%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/logo-cism.jpg\" title_text=\"logo-cism\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"73%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" width__hover_enabled=\"off|desktop\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"1_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/logo-cisa.jpg\" title_text=\"logo-cisa\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width_tablet=\"82%\" width_phone=\"72%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Consulting Our consultants Who we are We are a flexible and interdisciplinary team consisting of experienced senior consultants, dedicated juniors, technical IT security experts and a network of long-standing, specialized partners who complement our expertise in the project business. Our team has more than 50 members with the goal to incorporate security into your [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":11659,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11655","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11655"}],"version-history":[{"count":0,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11655\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11659"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}