{"id":11659,"date":"2021-04-28T08:38:30","date_gmt":"2021-04-28T06:38:30","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-consulting\/"},"modified":"2025-07-03T15:12:29","modified_gmt":"2025-07-03T13:12:29","slug":"security-consulting","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-consulting\/","title":{"rendered":"Security Consulting"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-consulting-header.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px|16px|60px|16px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 150%\">Security Consulting<\/h1>\n<p style=\"text-align: center;line-height: 130%\">We Incorporate Security Holistically in Your Company.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\"><span>Information Security Sustainably Anchored<\/span><\/h2>\n<div class=\"x-text\">\n<p style=\"margin-top: 2%\">Our consultants have been supporting companies in all industries in the area of information security for many years. Starting with the development of a cyber security strategy suitable for your company, the resulting guidelines, processes and organizational structures of your ISMS up to the operational management of your security organization as an external information security officer.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||27px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\"><span>Our Focus of Security Consulting<\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.22.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Information Security in Finance<\/h3>\n<p style=\"margin-bottom: 4%\">We combine industry know-how on regulatory requirements such as DORA, BAIT or MaRisk with expert knowledge from information security and advise financial institutions on issues from the 1st or 2nd line of defense.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"\/en\/security-consulting\/information-security-in-finance\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.16\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-consulting-kachel-informationssicherheit-finanzwesen.jpg\" title_text=\"usd-security-consulting-kachel-informationssicherheit-finanzwesen\" url=\"https:\/\/www.usd.de\/en\/security-consulting\/information-security-in-finance\/\" _builder_version=\"4.16\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-consulting-kachel-isms-iso-beratung.jpg\" title_text=\"usd-security-consulting-kachel-isms-iso-beratung\" url=\"https:\/\/www.usd.de\/en\/security-consulting\/isms-iso27001-consulting\/\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Consulting for an ISMS according to ISO 27001<\/h3>\n<p style=\"margin-bottom: 4%\">We support you in setting up and optimizing your management systems for information security \u2013 from the conception of necessary organizational structures to the definition of processes and the creation of necessary documentation.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/isms-iso27001-consulting\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|off|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" disabled_on=\"off|off|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Part-IS<\/h3>\n<p style=\"margin-bottom: 4%\">Part-IS requires affected organizations to take effective measures to protect against information security risks that could affect aviation security. We are here to provide you with advice and support.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/part-is\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.4\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-pci-security-services-kachel-part-is.jpg\" title_text=\"usd-pci-security-services-kachel-part-is\" url=\"https:\/\/www.usd.de\/en\/security-consulting\/part-is\/\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#aaaaaa\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-consulting-kachel-cyber-security-strategie.jpg\" title_text=\"usd-security-consulting-kachel-cyber-security-strategie\" url=\"https:\/\/www.usd.de\/en\/contact-form-security-consulting\/\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Cyber Security Strategy<\/h3>\n<p style=\"margin-bottom: 4%\">Based on specific cyber security risks for your company, we jointly develop goals, strategic fields of action, suitable initiatives and entirely operational tasks.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/contact-form-security-consulting\/\" button_text=\"Contact us\" _builder_version=\"4.16\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"5px||16px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" min_height=\"9px\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>What We Care About<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,2_3\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-2px|auto||auto||\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Andrea-Tubach-Business_rund.png\" alt=\"Zitat Andrea Tubach Head of Security Consulting\" title_text=\"Andrea Tubach Business_rund\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"80%\" width_tablet=\"30%\" width_phone=\"50%\" width_last_edited=\"on|phone\" custom_padding=\"|14px||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font_size=\"13px\" text_line_height=\"1.4em\" text_orientation=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Andrea Tubach<\/strong><br \/>Executive Board Member<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"|||-12px||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>\"When they hear the term cyber security, many people spontaneously think of complex technology, unclear external specifications and unbudgeted extra work. They sense the threat and at the same time fear that they will lose valuable time in their IT projects. Together, we must resolve this apparent contradiction. After all, you don't install the best brakes in a racing car to bring it to a standstill, but to make it go faster.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Cyber security is becoming a trivial part of the digitization of our world. It starts with management awareness and motivated experts. Technical competence, best tools and an efficient organization are essential. Let's work together. Together we are better and your business will be faster.\"<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Consulting We Incorporate Security Holistically in Your Company.Information Security Sustainably Anchored Our consultants have been supporting companies in all industries in the area of information security for many years. Starting with the development of a cyber security strategy suitable for your company, the resulting guidelines, processes and organizational structures of your ISMS up to [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11659","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11659"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11659\/revisions"}],"predecessor-version":[{"id":59645,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11659\/revisions\/59645"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}