{"id":61657,"date":"2025-10-29T11:39:42","date_gmt":"2025-10-29T10:39:42","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=61657"},"modified":"2026-02-11T14:35:37","modified_gmt":"2026-02-11T13:35:37","slug":"ai","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/security-consulting\/ai\/","title":{"rendered":"AI with Security in Mind"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_color=\"RGBA(255,255,255,0)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-AI-with-Security-in-Mind-Header.jpg\" background_blend=\"multiply\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400\">AI with Security in Mind<\/h1>\n<p style=\"text-align: center;line-height: 130%\"><span>Right from the Start.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" disabled_on=\"on|on|off\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||7%||false|false\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-AI-with-Security-in-Mind-Kachel.jpg\" alt=\"Bild in dem eine Hand ein virtuelles Schild mit dem Text AI h\u00e4lt, w\u00e4hrend man im Hintergrund Code sieht\" title_text=\"usd-AI-with-Security-in-Mind-Kachel\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>AI is changing processes<span>\u00a0\u2013\u00a0<\/span>quickly, profoundly, and very often under a tight schedule. Many companies are under pressure to integrate AI solutions so they don't fall behind. But implementing AI amid uncertainty brings not only opportunities but also risks: security gaps, compliance violations, and strategic missteps.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"scriptor-paragraph\"><\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" disabled_on=\"off|off|on\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>AI is changing processes<span>\u00a0\u2013\u00a0<\/span>quickly, profoundly, and very often under a tight schedule. Many companies are under pressure to integrate AI solutions so they don't fall behind. But implementing AI amid uncertainty brings not only opportunities but also risks: security gaps, compliance violations, and strategic missteps.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"scriptor-paragraph\"><\/div>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-AI-with-Security-in-Mind-Kachel.jpg\" alt=\"Bild in dem eine Hand ein virtuelles Schild mit dem Text AI h\u00e4lt, w\u00e4hrend man im Hintergrund Code sieht\" title_text=\"usd-AI-with-Security-in-Mind-Kachel\" _builder_version=\"4.27.4\" _module_preset=\"default\" width_tablet=\"80%\" width_phone=\"100%\" width_last_edited=\"on|tablet\" module_alignment_tablet=\"center\" module_alignment_phone=\"center\" module_alignment_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Thinking AI with a Trusted Partner<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"||-20px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>As your Cyber Security partner, we accompany you from your initial choice and integration to the secure and trustworthy use of AI \u2013 individually, practically, and with your regulatory requirements in mind.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/ki-governance-frameworks.svg\" title_text=\"ki-governance-frameworks\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"52%\" width_tablet=\"20%\" width_phone=\"35%\" width_last_edited=\"on|phone\" custom_margin=\"|8%|||false|false\" module_alignment_tablet=\"center\" module_alignment_phone=\"center\" module_alignment_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"|10%|||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Establishment of an AI governance framework<\/strong><\/p>\n<p>We lay the foundation for your company to use AI securely, compliantly, and trustworthily.<\/p>\n<p><!--ScriptorEndFragment--><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/ki-technologieauswahl.svg\" title_text=\"ki-technologieauswahl\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"52%\" width_tablet=\"20%\" width_phone=\"35%\" width_last_edited=\"on|phone\" custom_margin=\"|8%|||false|false\" module_alignment_tablet=\"center\" module_alignment_phone=\"center\" module_alignment_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"|10%|||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Far-sighted technology selection<\/strong><\/p>\n<p>We help you evaluate AI solutions from a security and compliance perspective.<span><\/span><\/p>\n<p><!--ScriptorEndFragment--><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/ki-sichere-integration-infrastruktur.svg\" title_text=\"ki-sichere-integration-infrastruktur\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"52%\" width_tablet=\"20%\" width_phone=\"35%\" width_last_edited=\"on|phone\" custom_margin=\"|8%|||false|false\" module_alignment_tablet=\"center\" module_alignment_phone=\"center\" module_alignment_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"|10%|||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Ensuring secure integration into your infrastructure<\/strong><\/p>\n<p><span>Architecture, interfaces, and data flows \u2013 we consider security in every aspect.<\/span><\/p>\n<p><!--ScriptorEndFragment--><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/ki-verantwortungsvolle-nutzung-betrieb.svg\" title_text=\"ki-verantwortungsvolle-nutzung-betrieb\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"52%\" width_tablet=\"20%\" width_phone=\"35%\" width_last_edited=\"on|phone\" custom_margin=\"|8%|||false|false\" module_alignment_tablet=\"center\" module_alignment_phone=\"center\" module_alignment_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"|10%|||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Ensuring responsible use in operations<\/strong><\/p>\n<p><span>We provide transparency and control through security analyses, pentests and AI governance consulting.<\/span><\/p>\n<p><!--ScriptorEndFragment--><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/ki-Pruefung-nutzung-dienstleister.svg\" title_text=\"ki-Pr\u00fcfung-nutzung-dienstleister\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"52%\" width_tablet=\"20%\" width_phone=\"35%\" width_last_edited=\"on|phone\" custom_margin=\"|8%|||false|false\" module_alignment_tablet=\"center\" module_alignment_phone=\"center\" module_alignment_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"|10%|||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Assessing your service providers' use of AI<\/strong><\/p>\n<p><span>Processes that are outsourced to your service providers can also be carried out using AI. We make sure that AI is used in line with your requirements.<\/span><\/p>\n<p><!--ScriptorEndFragment--><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/ki-kontinuierliche-verbesserung.svg\" title_text=\"ki-kontinuierliche-verbesserung\" align=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" width=\"52%\" width_tablet=\"20%\" width_phone=\"35%\" width_last_edited=\"on|phone\" custom_margin=\"|8%|||false|false\" module_alignment_tablet=\"center\" module_alignment_phone=\"center\" module_alignment_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.24.1\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"|10%|||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Continuous improvement<\/strong><\/p>\n<p><span>We review your processes, documentation, and integration of AI into your company, creating transparency and trust in the use of AI.<\/span><\/p>\n<p><!--ScriptorEndFragment--><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"0px||15px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"45px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>AI Initiatives That are Secure and Compliant<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"||-32px|||\" custom_padding=\"||29px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Whether it's the <a href=\"https:\/\/www.usd.de\/en\/eu-ai-act-the-7-most-important-questions\/\">EU AI Act<\/a>, <a href=\"https:\/\/www.usd.de\/en\/the-7-most-important-questions-about-iso-42001\/\" target=\"_blank\" rel=\"noopener\">ISO 42001<\/a>, or industry-specific requirements, we help you design AI that is secure, compliant, and transparent. Through targeted governance, security, and audit services, we build trust in the responsible use of Artificial Intelligence.<\/p>\n<p><span><!--ScriptorEndFragment--><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.0\" _module_preset=\"default\" border_color_all=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_testimonial portrait_url=\"https:\/\/www.usd.de\/wp-content\/uploads\/Tubach-Andrea-1.jpg\" quote_icon_color=\"#F07F1D\" quote_icon_background_color=\"#FFFFFF\" font_icon=\"&#xe06a;||divi||400\" portrait_width=\"150px\" portrait_height=\"150px\" use_icon_font_size=\"on\" icon_font_size=\"35px\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_padding=\"3%||0%||false|false\" animation_style=\"fade\" border_width_all=\"2px\" border_color_all=\"#F07F1D\" border_radii_portrait=\"on|100%|100%|100%|100%\" border_color_all_portrait=\"RGBA(255,255,255,0)\" box_shadow_style_image=\"preset4\" box_shadow_horizontal_image=\"0px\" box_shadow_vertical_image=\"0px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span style=\"font-size: 16px;font-weight: 300\">The implementation of AI opens up significant potential for companies to enhance efficiency and quality in nearly all areas of business. At the same time, there is increasing pressure to quickly tap into this potential in order to remain competitive. Those who hesitate will lose out. It is therefore crucial for sustainable success to embed security and compliance as an integral part of every AI initiative from the very beginning. Anything that comes later costs time and, ultimately, the competitive edge.<\/span><\/p>\n<p>Andrea Tubach, CEO of usd AG<\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" custom_padding=\"||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"|auto|18px|auto||\" custom_padding=\"0px||1px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"9px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>More Insights on AI with Security in Mind<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"4px|auto||auto||\" custom_padding=\"0px|7px|32px|7px|false|true\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-BSI-KI-Kriterienkatalog-Finanzsektor-Verwaltung.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" link_option_url=\"https:\/\/www.usd.de\/en\/bsi-ai-criteria-catalogue-finance-administration\/\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" min_height=\"128.8px\" custom_margin=\"27px||-1px||false|false\" custom_padding=\"6px|30px|28px|30px|false|true\" link_option_url=\"https:\/\/www.usd.de\/en\/bsi-ai-criteria-catalogue-finance-administration\/\" link_option_url_new_window=\"on\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #ffffff\">New BSI Criteria Catalogues: Guidelines for the Use of AI in the Financial and Administrative Sectors<\/span><span style=\"color: #ffffff\"><\/span><\/h3>\n<p><span style=\"color: #ffffff\"><\/span><\/p>\n<p><span style=\"color: #ffffff\"><\/span>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-usd-ag-eu-ai-act.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" link_option_url=\"https:\/\/www.usd.de\/en\/eu-ai-act-the-7-most-important-questions\/\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" min_height=\"128.8px\" custom_margin=\"27px||-1px||false|false\" custom_padding=\"6px|30px|28px|30px|false|true\" link_option_url=\"https:\/\/www.usd.de\/en\/eu-ai-act-the-7-most-important-questions\/\" link_option_url_new_window=\"on\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #ffffff\">EU AI Act: The 7 Most Important Questions about the EU Regulation<\/span><span style=\"color: #ffffff\"><\/span><\/h3>\n<p><span style=\"color: #ffffff\"><\/span><\/p>\n<p><span style=\"color: #ffffff\"><\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" use_custom_gutter=\"on\" gutter_width=\"2\" make_equal=\"on\" _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"4px|auto||auto||\" custom_padding=\"0px|7px|32px|7px|false|true\" hover_enabled=\"0\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/AI-Security-Kachelbild.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" link_option_url=\"https:\/\/www.usd.de\/en\/the-7-most-important-questions-about-iso-42001\/\" hover_enabled=\"0\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\" theme_builder_area=\"post_content\" title_text=\"AI-Security-Kachelbild\" sticky_enabled=\"0\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" min_height=\"128.8px\" custom_margin=\"27px||-1px||false|false\" custom_padding=\"6px|30px|28px|30px|false|true\" link_option_url=\"https:\/\/www.usd.de\/en\/the-7-most-important-questions-about-iso-42001\/\" link_option_url_new_window=\"on\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #ffffff\">Key Topics, Implementation, and Challenges: The 7 Most Important Questions About ISO 42001<\/span><span style=\"color: #ffffff\"><\/span><\/h3>\n<p><span style=\"color: #ffffff\"><\/span><\/p>\n<p><span style=\"color: #ffffff\"><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"rgba(46,53,61,0.86)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/AdobeStock_126274269_edit-scaled.jpg\" background_blend=\"multiply\" background_enable_video_mp4=\"off\" custom_padding=\"0px|0px|0px|0px|true|true\" link_option_url=\"https:\/\/www.usd.de\/en\/contact-form-academy\/\" hover_enabled=\"0\" background_last_edited=\"off|desktop\" border_radii=\"on|5px|5px|5px|5px\" border_width_all=\"1px\" border_color_all=\"#F6F6F6\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" background_enable_color__hover=\"off\" background_image__hover=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-success-story-cashpoint.jpeg\" background_enable_image__hover=\"on\" theme_builder_area=\"post_content\" title_text=\"Presentation and training in business office\" sticky_enabled=\"0\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"51ae1141-d3aa-4d8e-88be-0448f8284f54\" background_color=\"RGBA(0,0,0,0)\" min_height=\"128.8px\" custom_margin=\"27px||-1px||false|false\" custom_padding=\"6px|30px|28px|30px|false|true\" link_option_url=\"https:\/\/www.usd.de\/en\/contact-form-academy\/\" link_option_url_new_window=\"on\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h3><span style=\"color: #ffffff\"><br \/>usd Basic Seminar:<br \/>AI Security<\/span><span style=\"color: #ffffff\"><\/span><\/h3>\n<p><span style=\"color: #ffffff\"><\/span><\/p>\n<p><span style=\"color: #ffffff\"><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI with Security in Mind Right from the Start.AI is changing processes\u00a0\u2013\u00a0quickly, profoundly, and very often under a tight schedule. Many companies are under pressure to integrate AI solutions so they don't fall behind. But implementing AI amid uncertainty brings not only opportunities but also risks: security gaps, compliance violations, and strategic missteps. &nbsp; AI [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":0,"parent":11659,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-61657","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/61657","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=61657"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/61657\/revisions"}],"predecessor-version":[{"id":64078,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/61657\/revisions\/64078"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/11659"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=61657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}