{"id":59560,"date":"2025-08-29T11:13:00","date_gmt":"2025-08-29T09:13:00","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=59560"},"modified":"2025-08-29T11:13:04","modified_gmt":"2025-08-29T09:13:04","slug":"cyber-security-check","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-audits\/cyber-security-check\/","title":{"rendered":"Cyber Security Check"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||20px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-cyber-security-check.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"166px|31px|62px|31px|false|true\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" title_text=\"usd-ag-cyber-security-check\" sticky_enabled=\"0\"]<\/p>\n<h1 style=\"text-align: center\">Cyber Security Check<\/h1>\n<p style=\"text-align: center\">Test your processes, technology &amp; security awareness<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"|auto|-14px|auto||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>According to the <a href=\"https:\/\/www.bsi.bund.de\/EN\/Service-Navi\/Publikationen\/Lagebericht\/lagebericht_node.html\" target=\"_blank\" rel=\"noopener\">annual report issued by the Federal Office for Information Security (BSI)<\/a>, the cyber threat level is increasing every year. The financial and reputational damage companies across Germany experienced as a result in 2024 was enormous. So why is this happening?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||-5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Vulnerability due to Insufficient Transparency<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\"on|tablet\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding_tablet=\"0px||||false|false\" custom_padding_phone=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Every day, you process, store and transmit a large amount of sensitive information via your company's various IT systems and applications. At the same time, system and application landscapes are becoming increasingly complex. This quickly leads to the risk of losing track of your own cyber security status, for example due to:<\/p>\n<h2><\/h2>\n<ul>\n<li>Unclear situation in regards to compliance requirements<\/li>\n<li>Overlooked admin or privileged access<\/li>\n<li>Misconfigured firewalls, endpoints or cloud services<\/li>\n<li>Lack of transparency regarding backup status and integrity<\/li>\n<li>Unclear responsibilities in the event of security-related incidents<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||-5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Cyber Security Check: Regain Control and Visibility<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||-15px||false|false\" custom_margin_tablet=\"|auto|-20px|auto|false|false\" custom_margin_phone=\"|auto|-20px|auto|false|false\" custom_margin_last_edited=\"on|desktop\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Our Cyber Security Check is a tailored tool that provides you with clarity about your own security level and the associated risks. This is particularly essential in crucial phases, such as:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" disabled_on=\"off|off|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"17px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>During a change in management<\/li>\n<li>In the context of mergers &amp; acquisitions<\/li>\n<li>When making significant changes to your system or process landscape<\/li>\n<li>In the context of an audit<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-AG-Cyber-Security-Check-Anforderungen.jpg\" title_text=\"usd-AG-Cyber-Security-Check-Anforderungen\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||-5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2 class=\"h-custom-headline h2\">What to Expect from usd Cyber Security Check<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\"on|desktop\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding_tablet=\"\" custom_padding_phone=\"\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Together with you, we tailor the Cyber Security Check to your needs and specific circumstances. Depending on your individual priorities, we examine your security-relevant processes, tools and system configurations in detail.<\/p>\n<p>For this purpose, we apply our specially developed CSC Control Framework. It is based on internationally acknowledged security standards, recommendations from renowned information security organizations and current best practices. The Control Framework covers the four key aspects of your cyber security:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Erfahrung.svg\" title_text=\"Erfahrung\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"23%\" width_tablet=\"25%\" width_phone=\"35%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\">Governance<\/h3>\n<p style=\"text-align: center\">e.g. Asset Management, Third Party Risk Management, Risk Management<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Prevention.svg\" title_text=\"Prevention\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"23%\" width_tablet=\"25%\" width_phone=\"35%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\">Prevention<\/h3>\n<p style=\"text-align: center\">e.g. Cloud Security, Data Protection, Network Security<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Detection.svg\" title_text=\"Detection\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"22%\" width_tablet=\"25%\" width_phone=\"35%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\">Detection<\/h3>\n<p style=\"text-align: center\">e.g. Audit Log Management, Security Event Management<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Response-Recovery.svg\" title_text=\"Response Recovery\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"23%\" width_tablet=\"25%\" width_phone=\"35%\" width_last_edited=\"on|phone\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"70%\" module_alignment=\"center\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\">Response &amp; Recovery<\/h3>\n<p style=\"text-align: center\">e.g. Business Continuity Management, Incident Management<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||-5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Results of the usd Cyber Security Check<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>At the end of the Cyber Security Check, <a href=\"https:\/\/www.usd.de\/en\/security-audits\/our-auditors\/\" target=\"_blank\" rel=\"noopener\">our security auditors<\/a> present detailed assessments based on a proven maturity model. Unlike simple checklists, our approach highlights both your organization\u2019s individual strengths and areas for improvement in every aspect of your cyber security. This results in specific, actionable recommendations for a security roadmap tailored to your needs, enabling you to systematically mitigate the identified risks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||-5%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>We Stay by Your Side!<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>We are happy to support you beyond our Cyber Security Check:<\/p>\n<ul>\n<li>Implementation of recommended measures<\/li>\n<li>Follow-up assessments after the implementation of recommended measures<\/li>\n<li>Annual Cyber Security Checks: This way, you can identify changes and maintain a consistently high level of security<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\"1\" disabled_on=\"on|on|on\" _builder_version=\"4.21.0\" _module_preset=\"default\" disabled=\"on\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Wie gehen wir bei einem Cyber Security Check vor?<\/h2>\n<p>Wir gestalten jeden Cyber Security Check individuell nach Ihren Bed\u00fcrfnissen und Gegebenheiten. Die Ergebnisse zum Sicherheitsniveau in Ihrem Unternehmen stellen wir Ihnen auf die Weise und in der Detailtiefe zur Verf\u00fcgung, die Sie w\u00fcnschen. In der Regel umfasst unser Cyber Security Check die folgenden Phasen:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0px;border: none;border-width: 0px;height: 23px\">\n<tbody>\n<tr style=\"height: 23px\">\n<td style=\"width: 20%;padding-left: 5px;padding-right: 0px;border: none;border-width: 0px;vertical-align: top;height: 23px\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icons_Wie-gehen-wir-vor-10.png\" width=\"300\" height=\"300\" alt=\"\" class=\"wp-image-23670 alignnone size-medium\" \/><\/td>\n<td style=\"width: 80%;padding-left: 15px;padding-right: 0px;padding-top: 0px;border: none;border-width: 0px;height: 23px\">\n<h4>Phase 1<\/h4>\n<p>Definition des Pr\u00fcfumfangs und des groben Zeitplans im gemeinsamen Kick-off-Meeting.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0px;border: none;border-width: 0px;height: 23px\">\n<tbody>\n<tr style=\"height: 23px\">\n<td style=\"width: 20%;padding-left: 5px;padding-right: 0px;border: none;border-width: 0px;vertical-align: top;height: 23px\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-2022-01-27-um-09.32.51.png\" width=\"300\" height=\"300\" alt=\"\" class=\"wp-image-23670 alignnone size-medium\" \/><\/td>\n<td style=\"width: 80%;padding-left: 15px;padding-right: 0px;padding-top: 0px;border: none;border-width: 0px;height: 23px\">\n<h4>Phase 2<\/h4>\n<p>Festlegung der Agenda f\u00fcr die \u00dcberpr\u00fcfung durch unsere Security Auditor*innen<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0px;border: none;border-width: 0px;height: 23px\">\n<tbody>\n<tr style=\"height: 23px\">\n<td style=\"width: 20%;padding-left: 5px;padding-right: 0px;border: none;border-width: 0px;vertical-align: top;height: 23px\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-2022-01-27-um-09.32.38.png\" width=\"300\" height=\"300\" alt=\"\" class=\"wp-image-23670 alignnone size-medium\" \/><\/td>\n<td style=\"width: 80%;padding-left: 15px;padding-right: 0px;padding-top: 0px;border: none;border-width: 0px;height: 23px\">\n<h4>Phase 3<\/h4>\n<p>Ihrerseits erfolgt die Identifizierung Ihrer Fachexperten sowie die Planung des Zeitrahmens.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0px;border: none;border-width: 0px;height: 23px\">\n<tbody>\n<tr style=\"height: 23px\">\n<td style=\"width: 20%;padding-left: 5px;padding-right: 0px;border: none;border-width: 0px;vertical-align: top;height: 23px\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-2022-01-27-um-09.48.07.png\" width=\"300\" height=\"300\" alt=\"\" class=\"wp-image-23670 alignnone size-medium\" \/><\/td>\n<td style=\"width: 80%;padding-left: 15px;padding-right: 0px;padding-top: 0px;border: none;border-width: 0px;height: 23px\">\n<h4>Phase 4<\/h4>\n<p>Durchf\u00fchrung von Interviews auf der Grundlage des CSC Control Frameworks.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0px;border: none;border-width: 0px;height: 23px\">\n<tbody>\n<tr style=\"height: 23px\">\n<td style=\"width: 20%;padding-left: 5px;padding-right: 0px;border: none;border-width: 0px;vertical-align: top;height: 23px\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icons_Wie-gehen-wir-vor-01-1.png\" width=\"300\" height=\"300\" alt=\"\" class=\"wp-image-23670 alignnone size-medium\" \/><\/td>\n<td style=\"width: 80%;padding-left: 15px;padding-right: 0px;padding-top: 0px;border: none;border-width: 0px;height: 23px\">\n<h4>Phase 5<\/h4>\n<p>Festlegung der Entwicklungsstufen und Ermittlung Ihres Risikos durch unsere Security Auditor*innen.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.21.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<table border=\"0\" style=\"border-collapse: collapse;width: 100%;padding: 0px;border: none;border-width: 0px;height: 23px\">\n<tbody>\n<tr style=\"height: 23px\">\n<td style=\"width: 20%;padding-left: 5px;padding-right: 0px;border: none;border-width: 0px;vertical-align: top;height: 23px\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.usd.de\/wp-content\/uploads\/Icon-2022-01-27-um-09.48.03.png\" width=\"300\" height=\"300\" alt=\"\" class=\"wp-image-23670 alignnone size-medium\" \/><\/td>\n<td style=\"width: 80%;padding-left: 15px;padding-right: 0px;padding-top: 0px;border: none;border-width: 0px;height: 23px\">\n<h4>Phase 6<\/h4>\n<p>Pr\u00e4sentation der Ergebnisse<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Check Test your processes, technology &amp; security awarenessAccording to the annual report issued by the Federal Office for Information Security (BSI), the cyber threat level is increasing every year. The financial and reputational damage companies across Germany experienced as a result in 2024 was enormous. So why is this happening?Vulnerability due to Insufficient [&hellip;]<\/p>\n","protected":false},"author":117,"featured_media":0,"parent":11896,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-59560","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/59560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=59560"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/59560\/revisions"}],"predecessor-version":[{"id":60735,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/59560\/revisions\/60735"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11896"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=59560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}