{"id":2587,"date":"2026-01-19T15:05:57","date_gmt":"2026-01-19T14:05:57","guid":{"rendered":"https:\/\/www.bitformer.net\/?page_id=2587"},"modified":"2026-05-06T12:35:56","modified_gmt":"2026-05-06T10:35:56","slug":"externer-isb","status":"publish","type":"page","link":"https:\/\/www.bitformer.net\/en\/it-security\/externer-isb\/","title":{"rendered":"External ISO"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"2587\" class=\"elementor elementor-2587\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7264766 e-flex e-con-boxed e-con e-parent\" data-id=\"7264766\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/www.bitformer.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/blue-bg-flowing.mp4&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div><div class=\"elementor-element elementor-element-4b70b60 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4b70b60\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e0cc40 elementor-align-left elementor-widget elementor-widget-raven-breadcrumbs\" data-id=\"6e0cc40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"raven-breadcrumbs raven-breadcrumbs-default\"><div class=\"breadcrumb\">\t\t\t\t\t\t\t\t<div class=\"breadcrumb-item active\" aria-current=\"page\"><span>Home<\/span><\/div>\n\n\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20664fa elementor-widget elementor-widget-heading\" data-id=\"20664fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">External ISO<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b9295b elementor-widget elementor-widget-heading\" data-id=\"8b9295b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Expert knowledge without personnel commitment<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc6152c e-con-full e-flex e-con e-child\" data-id=\"fc6152c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f23492 main-layout-vertical raven-nav-alignment-start pointer-none submenu-anim-fade raven-dropdown-stretch raven-nav-menu-align-flex-start raven-nav-menu-align-center elementor-widget elementor-widget-raven-advanced-nav-menu\" data-id=\"3f23492\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;submenu_indicator&quot;:{&quot;value&quot;:&quot;fas fa-angle-down&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;full_width&quot;:&quot;stretch&quot;,&quot;mobile_layout&quot;:&quot;dropdown&quot;,&quot;close_menu_on_scroll&quot;:&quot;yes&quot;}\" data-widget_type=\"raven-advanced-nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- Main Menu -->\n\t\t<nav data-layout=\"vertical\" class=\"raven-adnav-menu-main raven-adnav-menu-vertical\">\n\t\t\t\t\t<ul id=\"menu-3f23492\" class=\"raven-adnav-menu\">\n\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/isms\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tInformation Security Management System\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tCybersecurity\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/quick-audit-it\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tQuick Audit IT\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/nis2\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tNIS2\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/iso27001\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tISO 27001\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f63448e e-con-full e-flex e-con e-parent\" data-id=\"f63448e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b59ff9a e-con-full e-flex e-con e-child\" data-id=\"b59ff9a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48aab4a elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"48aab4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Information Security Officer (ISO) is responsible for your company's information security.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c53cb01 elementor-widget elementor-widget-text-editor\" data-id=\"1c53cb01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div data-subtree=\"aimfl,mfl\" data-sfc-root=\"c\" data-sfc-cb=\"\" data-processed=\"true\"><p class=\"p1\">Information security is no longer a side issue \u2013 not even for SMEs.\u00a0<br \/>Whether filled internally or externally, the role of the ISB is crucial for compliance, resilience and trust. And it should be clearly defined, professionally filled and effectively implemented.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc2ff2b e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"dc2ff2b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17ab4f3 elementor-widget elementor-widget-image\" data-id=\"17ab4f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/compass-white-computer-keyboard-working-direction-concept-1024x576.jpg\" class=\"attachment-large size-large wp-image-6721\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/compass-white-computer-keyboard-working-direction-concept-1024x576.jpg 1024w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/compass-white-computer-keyboard-working-direction-concept-300x169.jpg 300w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/compass-white-computer-keyboard-working-direction-concept-768x432.jpg 768w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/compass-white-computer-keyboard-working-direction-concept-1536x864.jpg 1536w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/compass-white-computer-keyboard-working-direction-concept-2048x1152.jpg 2048w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/compass-white-computer-keyboard-working-direction-concept-18x10.jpg 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a156a5 e-flex e-con-boxed e-con e-parent\" data-id=\"3a156a5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-232e81a elementor-widget elementor-widget-text-editor\" data-id=\"232e81a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>You don't need to build an expert team \u2013 we are happy to be your external Data Security Officer.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10d88c8 e-flex e-con-boxed e-con e-parent\" data-id=\"10d88c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4451f21 elementor-widget elementor-widget-spacer\" data-id=\"4451f21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5ccd72 elementor-widget elementor-widget-heading\" data-id=\"f5ccd72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ISMS by the ISO<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a35e0fa elementor-widget elementor-widget-text-editor\" data-id=\"a35e0fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div data-subtree=\"aimfl,mfl\" data-sfc-root=\"c\" data-sfc-cb=\"\" data-processed=\"true\"><p class=\"p1\">Security management by an Information Security Officer (ISO) forms the basis for protecting sensitive information in companies and authorities.\u00a0<\/p><p class=\"p1\">The ISO plays a central role here: it acts as an interface between IT and management and advises both sides on all information security issues. At the same time, it is responsible for establishing and continuously developing appropriate protective measures.<\/p><p class=\"p1\">An ISO sets the <strong>Information security strategy operational<\/strong> um, based on the goals of the management. However, overall responsibility always remains with the company management.<\/p><p class=\"p1\">Overall, the Information Security Officer makes a crucial contribution to the stability, legal certainty, and future viability of a company.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cbdae6e e-flex e-con-boxed e-con e-parent\" data-id=\"cbdae6e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a251a37 elementor-widget elementor-widget-heading\" data-id=\"a251a37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ISO Roles and Responsibilities Overview<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c6e89a elementor-widget elementor-widget-text-editor\" data-id=\"5c6e89a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">An Information Security Officer (ISO) ensures that company-wide information is effectively protected against threats, vulnerabilities, and system failures. They are responsible for the introduction, implementation, and continuous monitoring of a structured Information Security Management System (ISMS). Their core responsibilities include:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cf4ad5 elementor-widget elementor-widget-raven-advanced-accordion\" data-id=\"6cf4ad5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;collapsible&quot;:&quot;false&quot;,&quot;scroll_to_content&quot;:&quot;false&quot;}\" data-widget_type=\"raven-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div id=\"jupiterx-advanced-accordion-wrapper\" class=\"jupiterx-advanced-accordion-wrapper\">\n\t\t\t\t<div class=\"jupiterx-advanced-accordion-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-first  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">1. Development and implementation of an ISMS<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>Information security officers manage an information security management system (ISMS) according to recognised standards such as <strong><a href=\"\/en\/it-security\/iso27001\/\" target=\"_blank\" rel=\"noopener\">I<span style=\"text-decoration: underline\">ISO 27001<\/span><\/a><\/strong> or TISAX<b>\u00ae<\/b> This involves creating comprehensive policies, procedures, and guidelines that serve as the foundation for effective information security. This is particularly important for structuring organisational processes and clearly defining responsibilities.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">2. Monitoring and Control<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>Regular reviews and audits of information security measures are essential. The Information Security Officer (ISO) ensures that legal regulations and internal security policies are consistently adhered to. This continuous monitoring helps to identify potential vulnerabilities early and to react in a timely manner. Furthermore, the security strategy often aligns with the recommendations of the BSI (Federal Office for Information Security) to meet the current standards and best practices in the field of IT security.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">3. Staff training and awareness<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>A key component of the security strategy is the <a href=\"\/en\/sensibilisierung\/\"><span style=\"text-decoration: underline\">Staff awareness<\/span><\/a>. This covers current threats, risks, and best practices to promote a security culture within the company.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">4. Carrying out risk analysis and management<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>The ISO identifies and assesses security risks that may affect the company. It develops tailored proposals for risk mitigation and implements both technical and organisational measures to improve the security posture.<\/p><p>The identification, assessment, and management of information security risks are of great importance. The Information Security Officer (ISO) places particular emphasis on data confidentiality by proposing appropriate measures to prevent unauthorised access to sensitive information. This includes both technical and organisational measures aimed at ensuring the integrity and confidentiality of company data.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">5. Management Consultation<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>As a consultant to senior management, the external ISO provides valuable insights into all information security matters. It produces detailed reports on the current security status and formulates recommendations to improve security strategies in order to strengthen the company's resilience.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">6. Support for Audits and Certifications<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>Consultative information security officers actively support companies in preparing for external audits and certifications, such as <a href=\"\/en\/it-security\/iso27001\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline\">ISO 27001<\/span><\/a>. He accompanies and coordinates the entire audit process, ensuring all requirements are met.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">7. Information Security Incident Management<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>An important aspect of the security strategy is the development of emergency plans and incident response processes. The ISO provides support in responding to security incidents, whether it's a data breach or a cyber attack, ensuring that the company can act quickly and efficiently.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-last  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">8. Documentation and Reporting<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li data-start=\"38\" data-end=\"344\">main area of responsibility for the information security officer is the <strong data-start=\"116\" data-end=\"147\">Document and Report<\/strong> all safety-relevant processes. This task ensures <strong data-start=\"214\" data-end=\"250\">Transparency, traceability<\/strong> and the <strong data-start=\"259\" data-end=\"291\">continuous improvement<\/strong> of an information security management system (ISMS).<\/li><\/ul><p data-start=\"346\" data-end=\"374\">The ISO regularly produces:<\/p><ul data-start=\"376\" data-end=\"1043\"><li data-start=\"376\" data-end=\"617\"><p data-start=\"378\" data-end=\"617\"><strong data-start=\"378\" data-end=\"401\">Security reports<\/strong>These reports document the current state of information security, identified vulnerabilities, audit findings, and the status of ongoing measures. They serve as a basis for management decisions.<\/p><\/li><li data-start=\"618\" data-end=\"790\"><p data-start=\"620\" data-end=\"790\"><strong data-start=\"620\" data-end=\"638\">Action plans<\/strong>Following the risk assessment, the ISO defines specific measures for risk mitigation, prioritises them, and sets deadlines and responsibilities.<\/p><\/li><li data-start=\"791\" data-end=\"1043\"><p data-start=\"793\" data-end=\"1043\"><strong data-start=\"793\" data-end=\"832\">Security policies and concepts<\/strong>The ISO develops binding rules and regulations, e.g. password policies, access policies or the overarching security concept. These documents form the rulebook for secure behaviour within the company.<\/p><\/li><\/ul><p data-start=\"793\" data-end=\"1043\">Through consistent documentation, the information security officer ensures that <strong data-start=\"1136\" data-end=\"1156\">File audits<\/strong>, statutory requirements are met and safety objectives are systematically pursued.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b856ea9 elementor-widget elementor-widget-spacer\" data-id=\"b856ea9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d0a19f9 e-flex e-con-boxed e-con e-parent\" data-id=\"d0a19f9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d7f110 elementor-widget elementor-widget-heading\" data-id=\"6d7f110\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Internal or external? When an external Information Security Officer makes sense<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12ba473 elementor-widget elementor-widget-text-editor\" data-id=\"12ba473\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In our experience, the internal staffing of the ISO is fundamentally sensible if it possesses the necessary skills and if the required budget is available. \u00a0<\/p><p>However, many SMEs try to cover the tasks of an information security officer in addition to their duties through IT managers or other specialists. This often leads to <strong>Conflict of interest<\/strong> (e.g. checking one's own processes) or. <strong>lack of independence<\/strong> or <strong>Resource shortages<\/strong> (Time, Staff, Prioritisation, Expertise)<\/p><p>One <strong>External Information Security Officer<\/strong> offers an effective alternative here.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-baa3b5b e-flex e-con-boxed e-con e-parent\" data-id=\"baa3b5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4294a elementor-widget elementor-widget-heading\" data-id=\"1b4294a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Advantages of an external ISO\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50896c4 elementor-widget elementor-widget-text-editor\" data-id=\"50896c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Fast availability<\/strong> without lengthy recruiting<\/li><li><strong>Objectivity<\/strong> and a neutral external perspective<\/li><li>High <strong>Professional qualifications and experience<\/strong><\/li><li>Planable, <strong>Scalable cost structure<\/strong><\/li><li>Clear <strong>Methodical approach<\/strong><\/li><li>Smooth <strong>Collaboration with internal IT and management<\/strong><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fbefa4 elementor-widget elementor-widget-button\" data-id=\"5fbefa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#kontaktralph\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Arrange a free initial consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab2d9cb e-flex e-con-boxed e-con e-parent\" data-id=\"ab2d9cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5264d30 elementor-widget elementor-widget-spacer\" data-id=\"5264d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bfc507 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"2bfc507\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a9af574 elementor-widget elementor-widget-heading\" data-id=\"a9af574\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tasks, duties, and role of the ISO<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-190d962 e-flex e-con-boxed e-con e-parent\" data-id=\"190d962\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e476968 e-con-full e-flex e-con e-child\" data-id=\"e476968\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ab3b5f elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8ab3b5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"257\" data-end=\"564\">An Information Security Officer ensures clear responsibilities, structured risk management, and legally compliant processes for handling information. They analyse security vulnerabilities, coordinate cross-departmental protection measures, and monitor compliance with internal and external regulations. From implementing effective security policies to training staff, the ISO plays a central role in protecting sensitive data and systems.<\/p><p data-start=\"257\" data-end=\"564\"><strong>The goal: To make information security measurable \u2013 through defined KPIs, documented measures, and continuous security assessment within the company.<\/strong><\/p><p>Another important aspect is risk assessment and management: The ISO conducts regular security assessments and risk analyses to identify potential threats and implement appropriate risk mitigation measures. Furthermore, it is responsible for responding to security incidents and initiating suitable measures in the event of security breaches. This also includes continuous monitoring of security alerts and the implementation of new technologies to improve the security infrastructure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd91117 e-con-full e-flex e-con e-child\" data-id=\"fd91117\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-148f1eb elementor-widget elementor-widget-text-editor\" data-id=\"148f1eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\"><strong>Duties of an Information Security Officer<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-064066c elementor-invisible elementor-widget elementor-widget-image\" data-id=\"064066c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ISB-1-500x500.png\" class=\"attachment-Image Size 500x500 size-Image Size 500x500 wp-image-6054\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ISB-1-500x500.png 500w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ISB-1-300x300.png 300w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ISB-1-150x150.png 150w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ISB-1-12x12.png 12w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ISB-1.png 673w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70dcf9f e-flex e-con-boxed e-con e-parent\" data-id=\"70dcf9f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2a238a elementor-widget elementor-widget-spacer\" data-id=\"e2a238a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9db4c35 e-flex e-con-boxed e-con e-parent\" data-id=\"9db4c35\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a56bda3 elementor-widget elementor-widget-heading\" data-id=\"a56bda3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Legal requirements and competences of an ISB<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf3bd57 elementor-widget elementor-widget-text-editor\" data-id=\"cf3bd57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Below is an overview of the key legal requirements and the sectors in which the appointment of an Information Security Officer (ISO) may be required.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8ecc3d elementor-widget elementor-widget-raven-advanced-accordion\" data-id=\"d8ecc3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;collapsible&quot;:&quot;false&quot;,&quot;scroll_to_content&quot;:&quot;false&quot;}\" data-widget_type=\"raven-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div id=\"jupiterx-advanced-accordion-wrapper\" class=\"jupiterx-advanced-accordion-wrapper\">\n\t\t\t\t<div class=\"jupiterx-advanced-accordion-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-first  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Critical Infrastructure (KRITIS)<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>Businesses that operate critical infrastructures (KRITIS) are subject to <a href=\"https:\/\/www.bsi.bund.de\/DE\/Das-BSI\/Auftrag\/Gesetze-und-Verordnungen\/IT-SiG\/it_sig_node.html\" target=\"_blank\" rel=\"noopener\"><b><span style=\"text-decoration: underline\">IT Security Act<\/span><\/b><\/a> obliged to implement information security measures. These companies, which include areas such as <b>Energy<\/b>, <b>Healthcare<\/b>, <b>Transport<\/b> and <b>Finance<\/b> bear a special responsibility. As a failure of their IT systems would have far-reaching consequences for society, it is mandatory for them to ensure IT security at the highest level.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">2. NIS2 Directive<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>With the <a href=\"\/en\/it-security\/nis2\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline\">NIS2 Directive<\/span>e<\/a> The EU is significantly expanding the security requirements for companies in essential sectors. This directive, aiming to improve the security of network and information systems, requires companies in certain industries to strengthen their IT security. This often includes the necessity to appoint information security officers, who are responsible for implementing and monitoring information security measures. The NIS2 directive affects a wide range of industries, from utilities and transport to communications and healthcare facilities.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">3. ISO 27001 and Certifications<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>Companies that have an Information Security Management System (ISMS) according to <a href=\"\/en\/it-security\/iso27001\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline\">ISO 27001<\/span>\u00a0<\/a>Whether introducing or seeking certification for an Information Security Management System (ISMS), organisations face the task of defining clear responsibilities for information security. While the standard does not explicitly require the appointment of an Information Security Officer (ISO), in practice, it is sensible to entrust a central person with the management and supervision of the ISMS. This person usually takes on a similar role to an information security officer and contributes to ensuring security standards.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-last  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">4. Sector-specific requirements<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p>In specialised sectors, such as the automotive industry, additional safety requirements apply, which may necessitate the appointment of an ISB. One example of this is the TISAX\u00ae standard, which was developed specifically for suppliers in the automotive industry to ensure information security for confidential data along the supply chain. In such cases, an Information Security Officer helps to meet industry-specific security requirements and support certification.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1c128a e-flex e-con-boxed e-con e-parent\" data-id=\"c1c128a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c9892c elementor-widget elementor-widget-spacer\" data-id=\"5c9892c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47033a0 e-flex e-con-boxed e-con e-parent\" data-id=\"47033a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c58c26 elementor-widget elementor-widget-heading\" data-id=\"6c58c26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">When is the appointment of an information security officer required?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3e6d2a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a3e6d2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">The appointment of an Information Security Officer (ISO) is not legally required for all companies. Nevertheless, various regulatory requirements \u2013 for example, under the IT Security Act, the GDPR, or certifications such as ISO 27001 \u2013 may make the appointment of an ISO necessary. Industry-specific standards like TISAX\u00ae may also require the use of an Information Security Officer.<\/p><p class=\"p1\">Operators of critical infrastructures are thus obliged, for example, under the IT Security Act to implement appropriate measures to ensure IT security in certain areas such as energy, water, food, and information technology and telecommunications. In this context, the appointment of an ISB may also be necessary.<\/p><p data-start=\"2663\" data-end=\"2963\">Therefore, it is advisable to carefully analyse the individual legal frameworks and the specific requirements of the respective industry. This will not only help to avoid possible legal risks and sanctions but also to improve information security within the company in a targeted and sustainable manner.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-929be07 elementor-widget elementor-widget-button\" data-id=\"929be07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#kontaktralph\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Arrange a free initial consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b7c0aa elementor-widget elementor-widget-spacer\" data-id=\"7b7c0aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3073823 e-flex e-con-boxed e-con e-parent\" data-id=\"3073823\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a84f352 elementor-widget elementor-widget-heading\" data-id=\"a84f352\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Distinction from the Data Protection Officer\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87528d6 elementor-widget elementor-widget-text-editor\" data-id=\"87528d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3013\" data-end=\"3243\">Furthermore, the European Union's General Data Protection Regulation (GDPR) requires certain companies to appoint a data protection officer. This person may have similar or overlapping duties to an ISO.<\/p><p data-start=\"3245\" data-end=\"3541\">A data protection officer is required if the company's main activities involve the extensive, regular and systematic monitoring of individuals or if special categories of data or data relating to criminal convictions and offences are processed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf63de3 elementor-widget elementor-widget-spacer\" data-id=\"bf63de3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-167ed21 e-flex e-con-boxed e-con e-parent\" data-id=\"167ed21\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4a1f7c elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"e4a1f7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why an ISB is useful even without a legal obligation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9098bbf elementor-widget elementor-widget-text-editor\" data-id=\"9098bbf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3609\" data-end=\"3817\">Even if there is no explicit legal obligation to appoint an ISO, it can still be beneficial for many organisations, particularly if they process sensitive or personal data.<\/p><p data-start=\"3819\" data-end=\"4089\">An ISO helps to minimise the risk of data breaches, ensure compliance with laws and regulations, and thereby avoid potential fines. Furthermore, it strengthens customer trust in the company's security practices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e5627b elementor-widget elementor-widget-spacer\" data-id=\"2e5627b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b904fa4 e-flex e-con-boxed e-con e-parent\" data-id=\"b904fa4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5015c5f elementor-widget elementor-widget-spacer\" data-id=\"5015c5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27c9211 elementor-widget elementor-widget-menu-anchor\" data-id=\"27c9211\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"kontaktralph\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16ea6722 e-flex e-con-boxed e-con e-parent\" data-id=\"16ea6722\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-64f38971 e-con-full e-flex e-con e-child\" data-id=\"64f38971\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ff5dbd5 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"7ff5dbd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">YOUR CONTACT PERSON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15e99bb9 elementor-widget elementor-widget-text-editor\" data-id=\"15e99bb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Connect with our expert.<br \/>Non-binding, uncomplicated, but always with<br \/>added value for you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50b56fe3 e-con-full e-flex e-con e-child\" data-id=\"50b56fe3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-402faed5 elementor-widget elementor-widget-heading\" data-id=\"402faed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RALPH D\u00d6RFLER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-443e567b elementor-widget elementor-widget-text-editor\" data-id=\"443e567b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Head of IT Security<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f503164 e-transform elementor-widget elementor-widget-image\" data-id=\"6f503164\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.7,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"857\" height=\"1024\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-857x1024.png\" class=\"attachment-large size-large wp-image-7423\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-857x1024.png 857w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-251x300.png 251w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-768x918.png 768w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-10x12.png 10w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2.png 1080w\" sizes=\"(max-width: 857px) 100vw, 857px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-318c518f e-con-full e-flex e-con e-child\" data-id=\"318c518f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88d3233 elementor-widget elementor-widget-shortcode\" data-id=\"88d3233\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-2470 forminator-design--material  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-2470\" data-uid=\"69fc4bd2592d5\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-2470\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-2470 forminator-design--material  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"2470\"\n\t\t\t\t data-color-option=\"theme\" data-design=\"material\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69fc4bd2592d5\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-3\" class=\"forminator-field-name forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-name-3_69fc4bd2592d5\" id=\"forminator-field-name-3_69fc4bd2592d5-label\" class=\"forminator-label\">Your company <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-3\" value=\"\" placeholder=\"\" id=\"forminator-field-name-3_69fc4bd2592d5\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69fc4bd2592d5\" id=\"forminator-field-name-1_69fc4bd2592d5-label\" class=\"forminator-label\">Your name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"\" id=\"forminator-field-name-1_69fc4bd2592d5\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69fc4bd2592d5\" id=\"forminator-field-email-1_69fc4bd2592d5-label\" class=\"forminator-label\">Email address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"\" id=\"forminator-field-email-1_69fc4bd2592d5\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69fc4bd2592d5\" id=\"forminator-field-phone-1_69fc4bd2592d5-label\" class=\"forminator-label\">Phone number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"\" id=\"forminator-field-phone-1_69fc4bd2592d5\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"text-1\" class=\"forminator-field-text forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-text-1_69fc4bd2592d5\" id=\"forminator-field-text-1_69fc4bd2592d5-label\" class=\"forminator-label\">Subject<\/label><input type=\"text\" name=\"text-1\" value=\"\" placeholder=\"\" id=\"forminator-field-text-1_69fc4bd2592d5\" class=\"forminator-input forminator-name--field\" data-required=\"\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69fc4bd2592d5\" id=\"forminator-field-textarea-1_69fc4bd2592d5-label\" class=\"forminator-label\">Message<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69fc4bd2592d5\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69fc4bd2592d5\" id=\"forminator-field-consent-1_69fc4bd2592d5-label\" class=\"forminator-label\">Consent <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69fc4bd2592d5__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69fc4bd2592d5\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69fc4bd2592d5-label\" aria-describedby=\"forminator-field-consent-1_69fc4bd2592d5__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69fc4bd2592d5__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>I have the information on <a href=\"\/en\/datenschutz\/\">Data protection<\/a> Read and agree to the processing and storage of my data in the context of case processing.<\/p><\/div><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\"><span>Send<\/span><span aria-hidden=\"true\"><\/span><\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"9c75c93b76\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/2587\" \/><input type=\"hidden\" name=\"form_id\" value=\"2470\"><input type=\"hidden\" name=\"page_id\" value=\"2587\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/www.bitformer.net\/en\/it-security\/externer-isb\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_8\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_8\" type=\"text\" name=\"input_8\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Home Externer ISB Expertenwissen ohne Personalbindung ISMS Cybersicherheit Quick Audit IT NIS2 ISO 27001 Der Informationssicherheitsbeauftragte (ISB) ist f\u00fcr die Informationssicherheit Ihres Unternehmens verantwortlich Informationssicherheit ist kein Nebenthema mehr \u2013 auch nicht f\u00fcr KMU.\u00a0Ob intern oder extern besetzt: Die Rolle des ISB ist entscheidend f\u00fcr Compliance, Resilienz und Vertrauen. Und sie sollte klar definiert, professionell [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2320,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2587","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/comments?post=2587"}],"version-history":[{"count":10,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2587\/revisions"}],"predecessor-version":[{"id":9330,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2587\/revisions\/9330"}],"up":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2320"}],"wp:attachment":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/media?parent=2587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}