{"id":11663,"date":"2021-05-06T17:16:23","date_gmt":"2021-05-06T15:16:23","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-consulting\/isms-iso27001-beratung\/"},"modified":"2026-03-16T08:51:47","modified_gmt":"2026-03-16T07:51:47","slug":"isms-iso27001-consulting","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-consulting\/isms-iso27001-consulting\/","title":{"rendered":"ISMS \/ ISO 27001 Consulting"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-consulting-header-isms.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400\">ISMS \/ ISO 27001 Consulting<\/h1>\n<p style=\"text-align: center;line-height: 130%\">Conception and Establishment<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"11px|auto||auto||\" custom_padding=\"3px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"-1px|0px|-1px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>Today, the security of information is an elementary prerequisite for the success of a company, since information is a component of almost all transactions of a company. A holistic approach to the management of information security is necessary.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||3px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span>A so-called information security management system defines the rules and methods for a holistic business and IT security management in order to initiate procedures for information security, to implement concrete measures, to monitor them and to improve them continuously.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"38px|auto||auto||\" custom_padding=\"3px||22px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/isms-zitat-mm.jpg\" title_text=\"isms-zitat-mm\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"80%\" width_tablet=\"30%\" width_phone=\"50%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" text_font_size=\"13px\" text_line_height=\"1.4em\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p style=\"text-align: center;\"><strong>Maximilian M\u00fcller<\/strong><br \/>Principal usd Security Consulting<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"-1px|0px|-1px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>\"The way to get started is typically through an ISMS scope workshop or gap analysis. These workshops at the beginning are important to better estimate the scope and effort of an ISMS implementation project.\"<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||3px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.23.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2><span>Our Consulting Offer<\/span><\/h2>\n<div class=\"x-text\">\n<p style=\"margin-top: 2%\">We advise and support you in the conception and establishment of an information security management system based on <a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_blank\" rel=\"noopener\">ISO 27001<\/a>. The introduction of the ISMS is based on process-, organization- and technology-related security measures, which include the entire company (or the defined scope) and start from the company management according to the top-down approach<\/p>\n<p>Depending on the customer\u2019s needs, our services include an internal audit, a conception of the necessary organizational structure, a definition of the processes and the creation of necessary documentation. The ideal preparation for a successful certification.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||4px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-18px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e34888-24 x-section\">\n<div class=\"e34888-25 x-container max width\">\n<div class=\"e34888-26 x-column x-sm x-1-1\">\n<h2 class=\"h-custom-headline h2\"><span>Information Security Management<\/span><\/h2>\n<div class=\"x-text\">\n<p style=\"margin-top: 2%\"><span>We advise you on the initial introduction of an ISMS and support you in the implementation of concrete measures<\/span>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"x-feature-box-content x-feature-box-align-v-middle\">\n<p>1. <span>Definition of the relevant ISMS processes based on best practices, adapted to your company<\/span><\/p>\n<p>2. <span>Support of the 1st and 2nd Line-of-Defence, e.g. in the creation of guidelines or selection of measures<\/span><\/p>\n<p>3. <span>Verification of the implementation of defined requirements within the framework of control activities<\/span><\/p>\n<p>4. <span>Identification of improvement potentials and implementation of measures for the continuous improvement of the ISMS<\/span><\/p>\n<\/div>\n<div class=\"x-feature-box-graphic square x-feature-box-align-v-middle\">\n<div class=\"x-feature-box-graphic-outer square\">\n<div class=\"x-feature-box-graphic-inner square\"><i class=\"number w-h square\"><\/i><\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-consulting-isms-titel.jpg\" title_text=\"usd-security-consulting-isms-titel\" _builder_version=\"4.16\" _module_preset=\"default\" width_tablet=\"50%\" width_phone=\"70%\" width_last_edited=\"on|tablet\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline cs-ta-left h2\">Setting Up and Maintaining Your ISMS<\/h2>\n<div class=\"x-text\">\n<p style=\"margin-top: 2%\"><span>Whether you are just starting out or have already implemented initial measures, we will support you in every phase with our experienced consultants in the field of information security management systems. Our services include<\/span>:<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/isms-aufbau-pflege-1.svg\" title_text=\"isms-aufbau-pflege-1\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"47%\" width_tablet=\"22%\" width_phone=\"35%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: left\">Definition of relevant ISMS processes based on best practices, adapted to your company.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/isms-aufbau-pflege-2-1.svg\" alt=\"ISMS\" title_text=\"isms-aufbau-pflege-2\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"47%\" width_tablet=\"22%\" width_phone=\"35%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: left\">Support in the creation of guidelines or selection of measures.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/isms-aufbau-pflege-3-1.svg\" alt=\"ISMS Definition\" title_text=\"isms-aufbau-pflege-3\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"47%\" width_tablet=\"22%\" width_phone=\"35%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: left\">Execution of risk analyses and protection needs assessments.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/isms-aufbau-pflege-4.svg\" title_text=\"isms-aufbau-pflege-4\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"47%\" width_tablet=\"22%\" width_phone=\"35%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||7px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: left\">Verification of the implementation of defined guidelines in the context of control actions.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/isms-aufbau-pflege-5.svg\" alt=\"ISMS Pflege\" title_text=\"isms-aufbau-pflege-5\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"47%\" width_tablet=\"22%\" width_phone=\"35%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: left\"><span>Identification of improvement potentials and implementation of measures for continuous improvement of the ISMS.<\/span><\/p>\n<p style=\"text-align: left\">[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/isms-aufbau-pflege-6.svg\" title_text=\"isms-aufbau-pflege-6\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"47%\" width_tablet=\"22%\" width_phone=\"35%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: left\">Performance of internal audits.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_4,1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"38px|auto||auto||\" custom_padding=\"3px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"-1px|0px|-1px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>\"Whether your company is still at the very beginning or has already implemented initial measures, I will accompany you in every phase in the area of information security management systems. I am pleased to be able to support you here in a very concrete way with my expertise.\"<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/isms-zitat-ew.jpg\" title_text=\"isms-zitat-ew\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"80%\" width_tablet=\"30%\" width_phone=\"50%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_font_size=\"13px\" text_line_height=\"1.4em\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Ester Widera<\/strong><br \/>\nSenior Consultant<\/p>\n<p>[\/et_pb_text][et_pb_text disabled_on=\"off|off|on\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"1px||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" min_height=\"77.2px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: left\">Operation of your ISMS \u2013 Virtual ISO<\/h3>\n<p style=\"margin-top: 2%\">With usd's Virtual Information Security Office you receive customized and efficient support in managing your information security.<\/p>\n<p>Based on your regulatory requirements and industry best practice standards, we provide you with the appropriate organization and services. With an appointed Information Security Officer on our side or as a pure Security Office with supporting services for your own ISO organization. The focus is on the strategic development of information security as well as the further development and improvement of the information security management system. This means that you do not have to build up the necessary know-how yourself <span>\u2013<\/span> our team brings along bundled cyber security expertise and up-to-date qualifications.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"38px|auto|21px|auto||\" custom_padding=\"3px||21px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/isms-zitat-ab.jpg\" title_text=\"isms-zitat-ab\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"80%\" width_tablet=\"30%\" width_phone=\"50%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_font_size=\"13px\" text_line_height=\"1.4em\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Andreas Borgwart<\/strong><br \/>Managing Consultant<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"-1px|0px|-1px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>\"With our Virtual ISO, an entire team of highly qualified security experts supports you right away - with a dedicated contact person for you. We look forward to supporting you with our years of experience in ISMS projects.\"<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.23.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e34888-90 x-section\">\n<div class=\"e34888-91 x-row x-container max width\">\n<div class=\"x-row-inner\">\n<div class=\"e34888-92 x-col\">\n<div class=\"e34888-91 x-row x-container max width\">\n<div class=\"x-row-inner\">\n<div class=\"e34888-92 x-col\">\n<h2 class=\"h-custom-headline cs-ta-left h2\"><span>Internal Audit According to ISO 27001<\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"e34888-94 x-row x-container max width\">\n<div class=\"x-row-inner\">\n<div class=\"e34888-95 x-col\">\n<div class=\"x-text\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"e34888-94 x-row x-container max width\">\n<div class=\"x-row-inner\">\n<div class=\"e34888-95 x-col\">\n<div class=\"x-text\">\n<p style=\"margin-top: 2%\"><span>With an internal audit according to <\/span>ISO 27001\u00a0<span>we check the maturity level of your ISMS \u2013 as preparation and prerequisite for your successful certification<\/span>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-consulting-kachel-unsere-berater-beraterinnen.jpg\" alt=\"Unsere Beraterinnen und Berater\" title_text=\"usd-security-consulting-kachel-unsere-berater-beraterinnen\" url=\"https:\/\/www.usd.de\/security-consulting\/unsere-experten\/\" _builder_version=\"4.16\" _module_preset=\"default\" width_tablet=\"60%\" width_phone=\"100%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Our Consultants<\/h3>\n<p style=\"margin-bottom: 4%\"><span>Our experts are a flexible and interdisciplinary team consisting of experienced managing consultants, senior consultants and dedicated juniors.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/our-experts\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.16\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISMS \/ ISO 27001 Consulting Conception and EstablishmentToday, the security of information is an elementary prerequisite for the success of a company, since information is a component of almost all transactions of a company. A holistic approach to the management of information security is necessary.A so-called information security management system defines the rules and methods [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":11659,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11663","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11663","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11663"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11663\/revisions"}],"predecessor-version":[{"id":64694,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11663\/revisions\/64694"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11659"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}