{"id":11714,"date":"2021-05-06T15:53:11","date_gmt":"2021-05-06T13:53:11","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-consulting\/informationssicherheit-finanzwesen\/"},"modified":"2025-09-02T09:25:52","modified_gmt":"2025-09-02T07:25:52","slug":"information-security-in-finance","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-consulting\/information-security-in-finance\/","title":{"rendered":"Information Security in Finance"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-consulting-informationssicherheit-im-finanzwesen.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400\">Information Security<\/h1>\n<p style=\"text-align: center;line-height: 130%\">In Finance<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Dr.-Christian-Schwartz_rund-scaled.png\" alt=\"Zitat Dr. Christian Schwartz Managing Consultant zu Informationssicherheit im Finanzwesen\" title_text=\"Dr. Christian Schwartz_rund\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"100%\" width_tablet=\"30%\" width_phone=\"50%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_font_size=\"13px\" text_line_height=\"1.4em\" custom_padding=\"0px|||||\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p style=\"text-align: center\"><strong>Dr. Christian Schwartz<\/strong><br \/>\nHead of InfoSec in Finance<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"-1px|0px|-1px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<p><span>One of the central objectives of BaFin\u2019s regulatory requirements is to ensure effective risk management. Satisfying the increasing number of requirements means more personnel expenditure and organizational and technological effort. We work with our clients to develop cyber security strategies, define long-term goals and guide harmonization with new financial regulatory requirements.\"<br \/><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"1px|0px|26px|0px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<h2>3 Lines-of-Defense Model<\/h2>\n<p><span>The<\/span><span>\u00a0<\/span>3 lines-of-defense model<span>has established itself as a means to identify and manage risks. We specialize in consulting and support services relating to the 1st and 2nd Lines of Defense.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/Security-Consulting-3-Lines-of-Defense-Modell-EN-1.svg\" alt=\"Informationssicherheit im Finanzwesen\" title_text=\"Security-Consulting-3-Lines-of-Defense-Modell-EN\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.18.1\" _module_preset=\"default\" custom_margin=\"||-16px||false|false\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\"><span> European Requirements<\/span><\/h2>\n<div class=\"x-text\">\n<p>In an interconnected Europe, where international cooperation between financial companies is widespread and digitization-related risks have potential cross-border implications, DORA now aims to fill this gap and provide a complementary common legal framework at EU level.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" make_equal=\"on\" _builder_version=\"4.19.4\" _module_preset=\"default\" custom_padding=\"11px||11px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.18.1\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #f07f1d\">DORA<\/span><\/h3>\n<p><span>Digital Operational Resilience Act<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/information-security-in-finance\/dora\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.22.2\" _module_preset=\"default\" custom_margin=\"||20px|20px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.19.4\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" border_color_all=\"#FFFFFF\" box_shadow_style=\"none\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.18.1\" _module_preset=\"default\" custom_margin=\"12px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.18.1\" _module_preset=\"default\" custom_margin=\"||-14px||false|false\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\"><span> BaFin Requirements<\/span><\/h2>\n<div class=\"x-text\">\n<p><span>The topic of IT is a key focus in supervisory special audits. The aim of this approach is to increase IT security in the market and raise the IT risk awareness among the companies affected<\/span>.<\/p>\n<p>The requirements of the German Federal Financial Supervisory Authority <a href=\"https:\/\/www.bafin.de\/EN\/Homepage\/homepage_node.html\" target=\"_blank\" rel=\"noopener\">(BaFin)<\/a> contain an adaptive and practice-oriented framework for the technical and organizational design of IT. With a focus on the management of IT resources and on IT risk management, they entail not inconsiderable adjustments to the internal organizational structure.<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" make_equal=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"11px||11px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #f07f1d\">BAIT<\/span><\/h3>\n<p><span>Supervisory Requirements for IT in Financial Institutions<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #f07f1d\">KAIT<\/span><\/h3>\n<p><span>Supervisory Requirements for IT in German Asset Managers<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" make_equal=\"on\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"11px||11px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #f07f1d\">ZAIT<\/span><\/h3>\n<p><span>Supervisory Requirements for IT in Payment and E-Money Institutions<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.16\" _module_preset=\"1a299e91-b23e-46f3-95c9-eca2a8e477bc\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"21px|21px|21px|21px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #f07f1d\">VAIT<\/span><\/h3>\n<p><span>Supervisory Requirements for IT in Insurance Undertakings<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_4,1_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"38px|auto||auto||\" custom_padding=\"3px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"-1px|0px|-1px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>\"For a successful harmonization project, it is important for institutions to choose the right partner for implementation. We combine the required expert knowledge in information security with extensive experience in regulatory projects in the banking environment. We look forward to assisting you with our expertise.\"<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/finanzwesen-zitat-kr.jpg\" title_text=\"finanzwesen-zitat-kr\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"65%\" width_tablet=\"30%\" width_phone=\"50%\" width_last_edited=\"on|phone\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_font_size=\"13px\" text_line_height=\"1.4em\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"text-align: center\"><strong>Kerstin Ritter<\/strong><br \/>\nSenior Consultant<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"58px||3px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<div class=\"x-text\">\n<h2 class=\"h-custom-headline h2\"><span>Project Support for Information Security in Finance<\/span><\/h2>\n<div class=\"x-text\">\n<p><span>The impact a new project will have on information security in finance must be considered as early as possible.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_3,1_3,1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/finanzwesen-projektunterstuetzung-1.svg\" title_text=\"finanzwesen-projektunterstuetzung-1\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e24744-49 x-column x-sm x-1-3\">\n<div class=\"x-text cs-ta-left\">\n<p style=\"text-align: center\">Ensuring information security while selecting, prioritizing and planning projects<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/finanzwesen-projektunterstuetzung-2-1.svg\" title_text=\"finanzwesen-projektunterstuetzung-2\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e23896-52 x-column x-sm x-1-3\">\n<div class=\"x-text cs-ta-left\">\n<div class=\"e23896-52 x-column x-sm x-1-3\">\n<div class=\"x-text cs-ta-left\">\n<div class=\"e24744-52 x-column x-sm x-1-3\">\n<div class=\"x-text cs-ta-left\">\n<p style=\"text-align: center\">Project management with a special focus on information security<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_3\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/finanzwesen-projektunterstuetzung-3.svg\" title_text=\"finanzwesen-projektunterstuetzung-3\" align=\"center\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"45%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e23896-43 x-section\">\n<div class=\"e23896-48 x-container max width\">\n<div class=\"e23896-55 x-column x-sm x-1-3\">\n<div class=\"x-text cs-ta-left\">\n<div class=\"e23896-43 x-section\">\n<div class=\"e23896-48 x-container max width\">\n<div class=\"e23896-55 x-column x-sm x-1-3\">\n<div class=\"x-text cs-ta-left\">\n<div class=\"e23896-43 x-section\">\n<div class=\"e23896-48 x-container max width\">\n<div class=\"e23896-55 x-column x-sm x-1-3\">\n<div class=\"x-text cs-ta-left\">\n<div class=\"e24744-43 x-section\">\n<div class=\"e24744-48 x-container max width\">\n<div class=\"e24744-55 x-column x-sm x-1-3\">\n<div class=\"x-text cs-ta-left\">\n<p style=\"text-align: center\">Working on concrete work packages that are part of the project<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-consulting-kachel-unsere-berater-beraterinnen.jpg\" alt=\"Unsere Beraterinnen und Berater\" title_text=\"usd-security-consulting-kachel-unsere-berater-beraterinnen\" url=\"https:\/\/www.usd.de\/security-consulting\/unsere-experten\/\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3>Our Consultants<\/h3>\n<p style=\"margin-bottom: 4%\">Our experts are a flexible and interdisciplinary team consisting of experienced managing consultants, senior consultants and dedicated juniors.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-consulting\/our-experts\/\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.16\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security In FinanceDr. Christian Schwartz Head of InfoSec in Finance One of the central objectives of BaFin\u2019s regulatory requirements is to ensure effective risk management. Satisfying the increasing number of requirements means more personnel expenditure and organizational and technological effort. We work with our clients to develop cyber security strategies, define long-term goals and [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":11659,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-11714","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=11714"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11714\/revisions"}],"predecessor-version":[{"id":60778,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11714\/revisions\/60778"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11659"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=11714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}