{"id":12021,"date":"2021-05-07T17:48:12","date_gmt":"2021-05-07T15:48:12","guid":{"rendered":"https:\/\/usd.formwandler.rocks\/security-audits\/unsere-auditoren\/"},"modified":"2025-06-30T16:02:19","modified_gmt":"2025-06-30T14:02:19","slug":"our-auditors","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-audits\/our-auditors\/","title":{"rendered":"Our auditors"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||38px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ueber-uns-header.jpg\" custom_margin=\"-31px||0px||false|false\" custom_padding=\"166px|60px|62px|60px|false|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Security Audits<\/h1>\n<p style=\"text-align: center\">Our auditors<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<h2 class=\"h-custom-headline h2\">Who we are<\/h2>\n<div class=\"x-text\">\n<p>Our security auditors have comprehensive expertise from a wide range of IT security disciplines and extensive auditing experience with companies of all sizes and industries. Our experts are happy to assist you with your audit project, too \u2013 as your partner and auditor.<\/p>\n<\/div>\n<div class=\"x-text\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"e17459-13 x-section\">\n<div class=\"e17459-14 x-row x-container max width\">\n<div class=\"x-row-inner\">\n<div class=\"e17459-15 x-col\">\n<div class=\"x-text\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_slider _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||60px|||\" custom_padding=\"104px||104px||true|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-jk.jpg\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" hover_enabled=\"0\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p><strong>Jan Kemper<\/strong><br \/>Head of Security Audits<\/p>\n<p>\u201cTogether with my clients, I solve complex cyber security problems and provide them with reliable statements on the status of their security level \u2013 pragmatically, humanely and efficiently. That\u2019s my mission with the Cyber Security Check.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Vinzent-Ratermann-1_PPT-Kontakt.jpg\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" hover_enabled=\"0\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\" title_text=\"Vinzent Ratermann 1_PPT-Kontakt\" sticky_enabled=\"0\"]<\/p>\n<p><strong>Vinzent Ratermann<\/strong><br \/>Managing Consultant<\/p>\n<p>\u201cOperators of critical infrastructures must ensure special protection against disruptions or failures. I am glad to assist these companies with my expertise and experience from various IT security audits in their KRITIS audit.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Tobias-Weber_PPT-Kontakt.jpg\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" hover_enabled=\"0\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\" title_text=\"Tobias Weber_PPT-Kontakt\" sticky_enabled=\"0\"]<\/p>\n<p><strong>Tobias Weber<\/strong><br \/>Managing Consultant<\/p>\n<p>\u201cOutsourcing processes to experts is part of day-to-day business for many companies. It\u2019s important to me to help them not lose sight of their own responsibilities and security issues in the process. In the service provider audit, we efficiently find answers together.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/kontakt-ar.jpg\" _builder_version=\"4.27.4\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" hover_enabled=\"0\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<p><strong>Andrea Rupprich<\/strong><br \/>Managing Consultant<\/p>\n<p>\u201cWith the auditor\u2019s perspective, I can point out potential improvements to their ISMS to companies in a compact and concise manner after a short and intensive audit. My own horizons are broadened by seeing how diverse an ISMS can be implemented.\u201d<\/p>\n<p>[\/et_pb_slide][et_pb_slide image=\"https:\/\/www.usd.de\/wp-content\/uploads\/Christopher-Kristes_SecAudits.jpg\" _builder_version=\"4.16\" _module_preset=\"default\" header_level=\"h3\" header_font=\"|300|||||||\" body_font=\"|300|||||||\" background_enable_color=\"off\" custom_button=\"on\" button_text_size=\"16px\" button_text_color=\"#FFFFFF\" button_bg_color=\"#F07F1D\" button_border_width=\"0px\" button_font=\"|300|||||||\" box_shadow_style_button=\"preset1\" box_shadow_spread_button=\"-2px\" global_colors_info=\"{}\" sticky_transition=\"on\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Dr. Kai Schubert<\/strong><br \/>Managing Consultant<\/p>\n<p>\u201cEspecially when sensitive customer or company data is processed in the cloud, enduring answers must be found to security questions. As an independent consultant and auditor, I accompany our clients on their way into the cloud with a critical eye on all relevant security aspects.\u201d<\/p>\n<p>[\/et_pb_slide][\/et_pb_slider][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"e17459-7 x-section\">\n<div class=\"e17459-8 x-container max width\">\n<div class=\"e17459-9 x-column x-sm x-1-1\">\n<div class=\"e35896-21 x-container max width\">\n<div class=\"e35896-22 x-column x-sm x-1-1\">\n<h2 class=\"h-custom-headline h2\">What we offer<\/h2>\n<div class=\"x-text\">\n<p>As auditors, we always act independently and with the highest standards of quality. We bear a great responsibility towards our clients in every respect. Our auditors have the following certifications, among others:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>QSA (Qualified Security Assessor)<\/li>\n<li>CISM (Certified Information Security Manager)<\/li>\n<li>CISSP (Certified Information Systems Security Professional)<\/li>\n<li>CISA (Certified Information Security Auditor)<\/li>\n<li>ISMS-Auditor (Information Security Management System)<\/li>\n<li>GSNA (GIAC Systems and Network Auditor)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"x-text\"><\/div>\n<div class=\"x-text\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"e17459-13 x-section\">\n<div class=\"e17459-14 x-row x-container max width\">\n<div class=\"x-row-inner\">\n<div class=\"e17459-15 x-col\">\n<div class=\"x-text\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Audits Our auditors Who we are Our security auditors have comprehensive expertise from a wide range of IT security disciplines and extensive auditing experience with companies of all sizes and industries. Our experts are happy to assist you with your audit project, too \u2013 as your partner and auditor. Jan KemperHead of Security Audits [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":0,"parent":11896,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-12021","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/12021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=12021"}],"version-history":[{"count":4,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/12021\/revisions"}],"predecessor-version":[{"id":59588,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/12021\/revisions\/59588"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11896"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=12021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}