{"id":6013,"date":"2026-03-23T15:36:00","date_gmt":"2026-03-23T14:36:00","guid":{"rendered":"https:\/\/www.bitformer.net\/?page_id=6013"},"modified":"2026-05-06T12:37:59","modified_gmt":"2026-05-06T10:37:59","slug":"nis2","status":"publish","type":"page","link":"https:\/\/www.bitformer.net\/en\/it-security\/nis2\/","title":{"rendered":"NIS2"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6013\" class=\"elementor elementor-6013\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7264766 e-flex e-con-boxed e-con e-parent\" data-id=\"7264766\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/blue-bg-flowing.mp4&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div><div class=\"elementor-element elementor-element-4b70b60 e-con-full e-flex e-con e-child\" data-id=\"4b70b60\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ede58f2 elementor-align-left elementor-widget elementor-widget-raven-breadcrumbs\" data-id=\"ede58f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"raven-breadcrumbs raven-breadcrumbs-default\"><div class=\"breadcrumb\">\t\t\t\t\t\t\t\t<div class=\"breadcrumb-item active\" aria-current=\"page\"><span>Home<\/span><\/div>\n\n\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63898da elementor-widget elementor-widget-heading\" data-id=\"63898da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">NIS2<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b9295b elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8b9295b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mehr Cybersicherheit in Europa \u2013 <br>und neue Pflichten f\u00fcr Unternehmen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc6152c e-con-full e-flex e-con e-child\" data-id=\"fc6152c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9252f02 main-layout-vertical raven-nav-alignment-start pointer-none submenu-anim-fade raven-dropdown-stretch raven-nav-menu-align-flex-start raven-nav-menu-align-center elementor-widget elementor-widget-raven-advanced-nav-menu\" data-id=\"9252f02\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;submenu_indicator&quot;:{&quot;value&quot;:&quot;fas fa-angle-down&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;full_width&quot;:&quot;stretch&quot;,&quot;mobile_layout&quot;:&quot;dropdown&quot;,&quot;close_menu_on_scroll&quot;:&quot;yes&quot;}\" data-widget_type=\"raven-advanced-nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- Main Menu -->\n\t\t<nav data-layout=\"vertical\" class=\"raven-adnav-menu-main raven-adnav-menu-vertical   \">\n\t\t\t\t\t<ul id=\"menu-9252f02\" class=\"raven-adnav-menu\">\n\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/externer-isb\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tExterner ISB\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/isms\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tISMS\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/cybersicherheit\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tCybersicherheit\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/quick-audit-it\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tQuick Audit IT\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/iso27001\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tISO 27001\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-29bf0f0 e-grid e-con-boxed e-con e-parent\" data-id=\"29bf0f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-41a5927 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"41a5927\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c42f7c8 elementor-widget elementor-widget-heading\" data-id=\"c42f7c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NIS2 - Was nun?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a35e0fa elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"a35e0fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Mit der\u00a0<strong data-start=\"323\" data-end=\"390\">NIS2-Richtlinie (Network and Information Security Directive 2)<\/strong>\u00a0hebt die Europ\u00e4ische Union die Anforderungen an die Cyber- und Informationssicherheit deutlich an. Die Richtlinie erweitert den Anwendungsbereich der bisherigen NIS-Regelung erheblich und verpflichtet k\u00fcnftig\u00a0<strong data-start=\"600\" data-end=\"648\">deutlich mehr Unternehmen und Organisationen<\/strong>, wirksame Sicherheitsma\u00dfnahmen umzusetzen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17ab4f3 elementor-invisible elementor-widget elementor-widget-image\" data-id=\"17ab4f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/1769088361075-1024x576.jpeg\" class=\"attachment-large size-large wp-image-6028\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/1769088361075-1024x576.jpeg 1024w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/1769088361075-300x169.jpeg 300w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/1769088361075-768x432.jpeg 768w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/1769088361075-18x10.jpeg 18w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/1769088361075.jpeg 1279w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23435cea e-flex e-con-boxed e-con e-parent\" data-id=\"23435cea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bc9b2c1 elementor-widget elementor-widget-text-editor\" data-id=\"1bc9b2c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Was oft \u00fcbersehen wird: Sicherheit ist ein umfassendes Konzept, das weit \u00fcber den Schutz vor unbefugtem Zugriff, Datendiebstahl und Datenverlust hinausgeht.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb69caf e-flex e-con-boxed e-con e-parent\" data-id=\"cb69caf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a0dad1 elementor-widget elementor-widget-spacer\" data-id=\"2a0dad1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b74610 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8b74610\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ziel der NIS2 ist es:<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bac90a8 elementor-widget elementor-widget-text-editor\" data-id=\"bac90a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul data-start=\"716\" data-end=\"941\"><li data-start=\"716\" data-end=\"795\"><p data-start=\"718\" data-end=\"795\">ein\u00a0<strong data-start=\"722\" data-end=\"772\">hohes und einheitliches Cybersicherheitsniveau<\/strong> in der EU zu schaffen,\u00a0<\/p><\/li><li data-start=\"796\" data-end=\"872\"><p data-start=\"798\" data-end=\"872\">die\u00a0<strong data-start=\"802\" data-end=\"846\">Widerstandsf\u00e4higkeit gegen Cyberangriffe<\/strong>\u00a0nachhaltig zu st\u00e4rken und<\/p><\/li><li data-start=\"873\" data-end=\"941\"><p data-start=\"875\" data-end=\"941\"><strong data-start=\"875\" data-end=\"926\">klare Verantwortlichkeiten auf Management-Ebene<\/strong>\u00a0zu etablieren.<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ecb33b4 elementor-widget elementor-widget-spacer\" data-id=\"ecb33b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34cccd0 e-grid e-con-boxed e-con e-parent\" data-id=\"34cccd0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f07dad8 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"f07dad8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-433a6da elementor-widget elementor-widget-heading\" data-id=\"433a6da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wen betrifft die NIS2 Richtlinie?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9626a0 elementor-widget elementor-widget-text-editor\" data-id=\"b9626a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Die NIS2-Richtlinie richtet sich an Unternehmen und Organisationen mit erh\u00f6hter Bedeutung f\u00fcr die Cyber- und Versorgungssicherheit. Der Anwendungsbereich wurde gegen\u00fcber der bisherigen NIS-Richtlinie deutlich ausgeweitet.<\/p><h3>\u00a0<\/h3><h3>Betroffene Unternehmensarten<\/h3><p>Grunds\u00e4tzlich gilt die NIS2 f\u00fcr mittlere und gro\u00dfe Unternehmen, die: mindestens <strong>50 Mitarbeitende<\/strong> besch\u00e4ftigen und\/oder einen Jahresumsatz oder eine Jahresbilanzsumme von <strong>\u00fcber 10 Mio. \u20ac<\/strong> erreichen.<\/p><p>\u00a0<\/p><p><em>(Kleinstunternehmen sind in der Regel ausgenommen \u2013 mit bestimmten Ausnahmen, z. B. bei besonderer Kritikalit\u00e4t.)<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0811efb e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"0811efb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d6c527 elementor-widget elementor-widget-heading\" data-id=\"3d6c527\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Betroffene Branchen (Auswahl)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b5d583 elementor-widget elementor-widget-text-editor\" data-id=\"8b5d583\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"974\" data-end=\"1135\">Die Richtlinie unterscheidet zwischen\u00a0<strong data-start=\"1012\" data-end=\"1037\">\u201ebesonders wichtigen\u201c<\/strong>\u00a0und\u00a0<strong data-start=\"1042\" data-end=\"1071\">\u201ewichtigen\u201c Einrichtungen<\/strong>. Dazu z\u00e4hlen unter anderem Unternehmen aus folgenden Bereichen:<\/p><ul data-start=\"1137\" data-end=\"1677\"><li data-start=\"1137\" data-end=\"1205\"><p data-start=\"1139\" data-end=\"1205\"><strong data-start=\"1139\" data-end=\"1163\">Energie &amp; Versorgung<\/strong><br data-start=\"1163\" data-end=\"1166\" \/>(z. B. Strom, Gas, Wasser, Fernw\u00e4rme)<\/p><\/li><li data-start=\"1206\" data-end=\"1303\"><p data-start=\"1208\" data-end=\"1303\"><strong data-start=\"1208\" data-end=\"1236\">IT- und digitale Dienste<\/strong><br data-start=\"1236\" data-end=\"1239\" \/>(z. B. Rechenzentren, Cloud-Dienste, Managed Service Provider)<\/p><\/li><li data-start=\"1304\" data-end=\"1378\"><p data-start=\"1306\" data-end=\"1378\"><strong data-start=\"1306\" data-end=\"1332\">Industrie &amp; Produktion<\/strong><br data-start=\"1332\" data-end=\"1335\" \/>(insbesondere bei systemrelevanter Rolle)<\/p><\/li><li data-start=\"1379\" data-end=\"1446\"><p data-start=\"1381\" data-end=\"1446\"><strong data-start=\"1381\" data-end=\"1405\">Transport &amp; Logistik<\/strong><br data-start=\"1405\" data-end=\"1408\" \/>(z. B. Verkehr, Lager, Lieferketten)<\/p><\/li><li data-start=\"1447\" data-end=\"1529\"><p data-start=\"1449\" data-end=\"1529\"><strong data-start=\"1449\" data-end=\"1469\">Gesundheitswesen<\/strong><br data-start=\"1469\" data-end=\"1472\" \/>(z. B. Krankenh\u00e4user, Labore, Gesundheitsdienstleister)<\/p><\/li><li data-start=\"1530\" data-end=\"1566\"><p data-start=\"1532\" data-end=\"1566\"><strong data-start=\"1532\" data-end=\"1566\">Finanz- und Versicherungswesen<\/strong><\/p><\/li><li data-start=\"1567\" data-end=\"1677\"><p data-start=\"1569\" data-end=\"1677\"><strong data-start=\"1569\" data-end=\"1610\">\u00d6ffentliche und private Infrastruktur<\/strong><br data-start=\"1610\" data-end=\"1613\" \/>(z. B. Abfallwirtschaft, Abwasser, kritische Dienstleistungen)<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df5b549 e-flex e-con-boxed e-con e-parent\" data-id=\"df5b549\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e71f89f e-con-full e-flex e-con e-child\" data-id=\"e71f89f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89a559c elementor-widget elementor-widget-spacer\" data-id=\"89a559c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ba3b3c5 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"ba3b3c5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/www.bitformer.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/blue-bg-flowing.mp4&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div>\t\t<div class=\"elementor-element elementor-element-c3362f5 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"c3362f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Layer_1\" height=\"512\" viewBox=\"0 0 100 100\" width=\"512\"><path d=\"m50 97.5c-26.1913795 0-47.5-21.3081207-47.5-47.5s21.3086205-47.5 47.5-47.5 47.5 21.3081245 47.5 47.5-21.3086166 47.5-47.5 47.5zm0-91.44385c-24.2307358 0-43.9438505 19.7136101-43.9438505 43.94385s19.7131147 43.9438477 43.9438505 43.9438477 43.9438477-19.7136078 43.9438477-43.9438477-19.7131119-43.94385-43.9438477-43.94385z\"><\/path><path d=\"m50 63.1321564c-4.2536888 0-7.7984276-3.3249626-8.0707932-7.5697174l-1.8683662-29.192379c-.174633-2.7355766.8002319-5.4503155 2.6755447-7.4496574 1.8748169-1.999342 4.522583-3.1453667 7.2636147-3.1453667s5.3887978 1.1460247 7.2636147 3.1453667c1.8753128 1.999342 2.8501778 4.7140808 2.6755447 7.4496574l-1.8683662 29.1913834c-.2723656 4.2457504-3.8171044 7.570713-8.0707932 7.570713zm0-43.800972c-1.7884941 0-3.4470062.7183743-4.6699257 2.0221634-1.2234192 1.3037891-1.834137 3.0054626-1.7200317 4.7904835l1.8683701 29.1913853c.1523055 2.3773803 2.1382522 4.2407874 4.5215873 4.2407874s4.3692818-1.8634071 4.5215874-4.2417793l1.8683701-29.1903934c.1141052-1.7850208-.4966125-3.4866943-1.7200317-4.7904835-1.2229196-1.3037892-2.8814317-2.0221634-4.6699258-2.0221634z\"><\/path><path d=\"m50 84.224968c-4.7741127 0-8.6581917-3.8835907-8.6581917-8.6581955s3.884079-8.6581955 8.6581917-8.6581955 8.6581917 3.8835907 8.6581917 8.6581955-3.884079 8.6581955-8.6581917 8.6581955zm0-13.7602387c-2.8134651 0-5.1020432 2.2890701-5.1020432 5.1020432s2.2885781 5.1020431 5.1020432 5.1020431 5.1020432-2.2890701 5.1020432-5.1020432-2.2885781-5.1020431-5.1020432-5.1020431z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68cd483 elementor-widget elementor-widget-text-editor\" data-id=\"68cd483\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Sofern Sie intern bereits eine Pr\u00fcfung durchgef\u00fchrt haben und als \u201ewichtiges\u201c oder \u201ebesonders wichtiges\u201c Unternehmen eingestuft wurden, k\u00f6nnen Sie die Registrierung vornehmen. VORAUSSETZUNG: Sie ben\u00f6tigen vorab ein \u201eELSTER-Unternehmenskonto\u201c und ein hier\u00fcber ausgestelltes Organisationszertifikat.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9da2862 e-grid e-con-boxed e-con e-parent\" data-id=\"9da2862\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a624675 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a624675\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef891cc elementor-widget elementor-widget-heading\" data-id=\"ef891cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Registrierung beginnen:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19f06e1 elementor-widget elementor-widget-button\" data-id=\"19f06e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/portal.bsi.bund.de\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Zum BSI-Portal<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9fd4781 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"9fd4781\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83b6a57 elementor-widget elementor-widget-heading\" data-id=\"83b6a57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NIS2 Infopaket des Bunds:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-234ab13 elementor-widget elementor-widget-button\" data-id=\"234ab13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.bsi.bund.de\/dok\/nis-2-infopakete\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Infopaket herunterladen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-936b4b9 e-flex e-con-boxed e-con e-parent\" data-id=\"936b4b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d3bc8a elementor-fixed elementor-widget elementor-widget-heading\" data-id=\"0d3bc8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Der Unterschied von Microsoft NAV zu Microsoft Dynamics 365 Business Central<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1178f321 e-flex e-con-boxed e-con e-parent\" data-id=\"1178f321\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fe349a elementor-widget elementor-widget-spacer\" data-id=\"2fe349a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11756f01 elementor-widget elementor-widget-heading\" data-id=\"11756f01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Die NIS2-Roadmap \u2013 strukturierte Umsetzung f\u00fcr Unternehmen\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f85141d elementor-widget elementor-widget-text-editor\" data-id=\"f85141d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Die Roadmap des BSI f\u00fchrt NIS2-betroffene Unternehmen in klaren Schritten von der ersten Einordnung bis zur dauerhaften Etablierung wirksamer Sicherheitsma\u00dfnahmen.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d5abeab elementor-widget elementor-widget-raven-advanced-accordion\" data-id=\"4d5abeab\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;collapsible&quot;:&quot;false&quot;,&quot;scroll_to_content&quot;:&quot;false&quot;}\" data-widget_type=\"raven-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div id=\"jupiterx-advanced-accordion-wrapper\" class=\"jupiterx-advanced-accordion-wrapper\">\n\t\t\t\t<div class=\"jupiterx-advanced-accordion-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-first  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Phase 1: Analyse &amp; Grundsatzkl\u00e4rung<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p><strong>Ziel:<\/strong>\u00a0Klarheit \u00fcber Betroffenheit, Pflichten und Verantwortung schaffen.<\/p><ul data-spread=\"true\"><li><p><strong>Betroffenheit pr\u00fcfen<\/strong><br \/>Einstufung als \u201ewichtige\u201c oder \u201ebesonders wichtige Einrichtung\u201c, Pr\u00fcfung der Schwellenwerte und Dokumentation der Ergebnisse.<\/p><\/li><li><p><strong>Registrierung vornehmen<\/strong><br \/>Unterst\u00fctzung bei der Registrierung im BSI-Portal, Festlegung von Zust\u00e4ndigkeiten und vollst\u00e4ndige Dokumentation.<\/p><\/li><li><p><strong>NIS2 verstehen<\/strong><br \/>Analyse der relevanten Anforderungen, branchenspezifischer Besonderheiten, \u00dcbergangsfristen, Sanktionen sowie nationaler Umsetzungsvorgaben.<\/p><\/li><li><p><strong>Rechts- und Haftungsfragen kl\u00e4ren<\/strong><br \/>Bewertung von Verantwortlichkeiten, Haftungsrisiken der Gesch\u00e4ftsleitung, Anpassung von Governance-Strukturen und internen Richtlinien.<\/p><\/li><li><p><strong>Gesch\u00e4ftsf\u00fchrung und Leitungsgremien einbinden<\/strong><br \/>Sensibilisierung der F\u00fchrungsebene, Etablierung von Berichtspflichten und Verankerung von Cybersicherheit als F\u00fchrungsaufgabe.<\/p><\/li><li><p><strong>NIS2-Programm aufsetzen<\/strong><br \/>Aufbau einer klaren Projekt- und Governance-Struktur mit Meilensteinen, Zust\u00e4ndigkeiten und Qualit\u00e4tskontrollen.<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Phase 2: Organisation &amp; Verantwortung<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p><strong>Ziel:<\/strong>\u00a0Klare Strukturen, Rollen und Nachweisf\u00e4higkeit etablieren.<\/p><ul data-spread=\"true\"><li><p><strong>Stakeholder und Verantwortlichkeiten festlegen<\/strong><br \/>Definition von Rollen f\u00fcr IT-Sicherheit, Recht, Datenschutz, Einkauf, BCM und Incident Response sowie Aufbau eines interdisziplin\u00e4ren Steuerungsteams.<\/p><\/li><li><p><strong>Dokumentation und Nachweisf\u00fchrung aufbauen<\/strong><br \/>Systematische Dokumentation aller Entscheidungen, Ma\u00dfnahmen und Prozesse zur Vorbereitung auf Pr\u00fcfungen durch Aufsichtsbeh\u00f6rden.<\/p><\/li><li><p><strong>Lieferketten- und Drittparteirisiken managen<\/strong><br \/>Einf\u00fchrung von Sicherheitsanforderungen f\u00fcr Dienstleister, Vertragspr\u00fcfungen und Third-Party-Risk-Management.<\/p><\/li><li><p><strong>Internationale Abh\u00e4ngigkeiten ber\u00fccksichtigen<\/strong><br \/>Harmonisierung von Sicherheits- und Meldeprozessen bei internationaler oder konzernweiter T\u00e4tigkeit.<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Phase 3: Ist-Zustand &amp; Risikobewertung<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p><strong>Ziel:<\/strong>\u00a0Transparenz \u00fcber Sicherheitsniveau und Handlungsbedarf gewinnen.<\/p><ul data-spread=\"true\"><li><p><strong>Gap-Analyse durchf\u00fchren<\/strong><br \/>Bewertung des technischen, organisatorischen und prozessualen Reifegrads anhand anerkannter Standards (z. B. ISO 27001, NIST, BSI-Grundschutz).<\/p><\/li><li><p><strong>Risiken priorisieren<\/strong><br \/>Ableitung und Priorisierung von Ma\u00dfnahmen anhand von Kritikalit\u00e4t, Risiken und Umsetzbarkeit.<\/p><\/li><li><p><strong>IT- und Sicherheits-Roadmap anpassen<\/strong><br \/>Weiterentwicklung der Sicherheitsarchitektur (z. B. Zero Trust, MFA, IAM,\u00a0<span class=\"glossaryLink\" role=\"link\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemTitle&gt;Monitoring&lt;\/div&gt;&lt;div class=glossaryItemBody&gt;&amp;lt;!-- wp:paragraph --&amp;gt;Mit unserer 24\/7 Monitoring-L\u00f6sung\u00a0erkennen wir Fehler auf Ihren Systemen, bevor diese Auswirkungen haben. F\u00fcr jedes System \u00fcberwachen wir eine Vielzahl von Sensoren und Diensten. Wir werden bei \u00dcberschreitung von Warnschwellen benachrichtigt und beheben die Ursache, damit Sie durchgehend effektiv arbeiten k\u00f6nnen und Ausfallzeiten so gering wie m\u00f6glich bleiben.&amp;lt;br\/&amp;gt;&amp;lt;!-- \/wp:paragraph --&amp;gt;&lt;\/div&gt;\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\">Monitoring<\/span>, Cloud Security).<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Phase 4: Ressourcen sichern &amp; Umsetzung vorbereiten<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p><strong>Ziel:<\/strong>\u00a0Voraussetzungen f\u00fcr eine wirksame Umsetzung schaffen.<\/p><ul data-spread=\"true\"><li><p><strong>Ressourcen und Budget planen<\/strong><br \/>Planung von Personal, Technologien, externen Leistungen sowie Krisen- und Sonderbudgets.<\/p><\/li><li><p><strong>Schulungen und Awareness etablieren<\/strong><br \/>Einf\u00fchrung verpflichtender Schulungen, zielgruppenspezifischer Trainings und kontinuierlicher Sensibilisierungsma\u00dfnahmen.<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Phase 5: Umsetzung der Kernma\u00dfnahmen<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p><strong>Ziel:<\/strong>\u00a0NIS-2-Anforderungen wirksam in die Praxis umsetzen.<\/p><ul data-spread=\"true\"><li><p><strong>Risikomanagement implementieren<\/strong><br \/>Einf\u00fchrung eines formalen Informationssicherheits-Risikomanagements mit regelm\u00e4\u00dfigem Reporting an die Gesch\u00e4ftsleitung.<\/p><\/li><li><p><strong>Krisenmanagement und Incident Response aufbauen<\/strong><br \/>Entwicklung von Notfallpl\u00e4nen, Meldeketten, Eskalationsstufen sowie Durchf\u00fchrung von \u00dcbungen und Simulationen.<\/p><\/li><li><p><strong>Meldepflichten vorbereiten<\/strong><br \/>Aufbau interner Meldeprozesse, automatisierter \u00dcberwachung sowie Vorbereitung der Meldungen an Beh\u00f6rden.<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-last  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">Phase 6: Verstetigung &amp; kontinuierliche Verbesserung<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p><strong>Ziel:<\/strong>\u00a0Nachhaltige Cybersicherheit sicherstellen.<\/p><ul data-spread=\"true\"><li><p><strong>Wirksamkeit regelm\u00e4\u00dfig pr\u00fcfen<\/strong><br \/>Kontinuierliches\u00a0<span class=\"glossaryLink\" role=\"link\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemTitle&gt;Monitoring&lt;\/div&gt;&lt;div class=glossaryItemBody&gt;&amp;lt;!-- wp:paragraph --&amp;gt;Mit unserer 24\/7 Monitoring-L\u00f6sung\u00a0erkennen wir Fehler auf Ihren Systemen, bevor diese Auswirkungen haben. F\u00fcr jedes System \u00fcberwachen wir eine Vielzahl von Sensoren und Diensten. Wir werden bei \u00dcberschreitung von Warnschwellen benachrichtigt und beheben die Ursache, damit Sie durchgehend effektiv arbeiten k\u00f6nnen und Ausfallzeiten so gering wie m\u00f6glich bleiben.&amp;lt;br\/&amp;gt;&amp;lt;!-- \/wp:paragraph --&amp;gt;&lt;\/div&gt;\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\">Monitoring<\/span>, Audits, Schwachstellen- und Patchmanagement sowie KPI-gest\u00fctzte Steuerung.<\/p><\/li><li><p><strong>Cybersicherheit in der Unternehmenskultur verankern<\/strong><br \/>F\u00f6rderung einer gelebten Sicherheitskultur durch Kommunikation, F\u00fchrungsvorbilder und kontinuierliche Weiterentwicklung.<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e98ebe4 elementor-widget elementor-widget-spacer\" data-id=\"e98ebe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-523152b e-flex e-con-boxed e-con e-parent\" data-id=\"523152b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5378d8a elementor-widget elementor-widget-heading\" data-id=\"5378d8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Welche Ma\u00dfnahmen m\u00fcssen umgesetzt werden?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-787d3e3 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"787d3e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Konzepte f\u00fcr die Risikoanalyse und Sicherheit f\u00fcr Informationssysteme<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Aufrechterhaltung des Betriebs und Wiederherstellung nach einem Notfall<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Incident-Response-Plan zur schnellen Bew\u00e4ltigung von Sicherheitsvorf\u00e4llen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cyberhygiene und Schulungen zur Cybersicherheit<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Multi-Faktor-Authentifizierung oder kontinuierliche Authentifizierung<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sicherheit der Lieferkette<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sicherheitsma\u00dfnahmen bei Erwerb, Entwicklung und Wartung von Netz- und Informationssystemen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Konzepte und Verfahren f\u00fcr den Einsatz von Kryptografie und Verschl\u00fcsselung<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Layer_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 511.999 511.999\" style=\"enable-background:new 0 0 511.999 511.999;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M506.231,75.508c-7.689-7.69-20.158-7.69-27.849,0l-319.21,319.211L33.617,269.163c-7.689-7.691-20.158-7.691-27.849,0   c-7.69,7.69-7.69,20.158,0,27.849l139.481,139.481c7.687,7.687,20.16,7.689,27.849,0l333.133-333.136   C513.921,95.666,513.921,83.198,506.231,75.508z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Personalsicherheit, Zugriffskontrolle und Anlagenmanagement<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7998bd8 elementor-widget elementor-widget-spacer\" data-id=\"7998bd8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b973e15 e-flex e-con-boxed e-con e-parent\" data-id=\"5b973e15\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-680c827c e-con-full e-flex e-con e-child\" data-id=\"680c827c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-492a8e45 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"492a8e45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IHR ANSPRECHPARTNER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c41beaf elementor-widget elementor-widget-text-editor\" data-id=\"6c41beaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Vernetzen Sie sich mit unserem Experten.<br \/>Unverbindlich, unkompliziert, aber immer mit<br \/>Mehrwert f\u00fcr Sie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-482fa261 e-con-full e-flex e-con e-child\" data-id=\"482fa261\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6181ab elementor-widget elementor-widget-heading\" data-id=\"b6181ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MAX GIESSLER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a8eb5e1 elementor-widget elementor-widget-text-editor\" data-id=\"3a8eb5e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Gesch\u00e4ftsf\u00fchrer bitformer GmbH<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19611707 e-transform elementor-widget elementor-widget-image\" data-id=\"19611707\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.7,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"821\" height=\"1024\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-821x1024.png\" class=\"attachment-large size-large wp-image-7437\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-821x1024.png 821w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-241x300.png 241w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-768x958.png 768w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1-10x12.png 10w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/maxgiessler1.png 1080w\" sizes=\"(max-width: 821px) 100vw, 821px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a8d9425 e-con-full e-flex e-con e-child\" data-id=\"2a8d9425\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7fcfe8bd elementor-widget elementor-widget-shortcode\" data-id=\"7fcfe8bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-2470 forminator-design--material  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-2470\" data-uid=\"69fc4beab5a81\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-2470\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-2470 forminator-design--material  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"2470\"\n\t\t\t\t data-color-option=\"theme\" data-design=\"material\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69fc4beab5a81\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-3\" class=\"forminator-field-name forminator-col forminator-col-6 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-3_69fc4beab5a81\" id=\"forminator-field-name-3_69fc4beab5a81-label\" class=\"forminator-label\">Unternehmen <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-3\" value=\"\" placeholder=\"\" id=\"forminator-field-name-3_69fc4beab5a81\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-6 \"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69fc4beab5a81\" id=\"forminator-field-name-1_69fc4beab5a81-label\" class=\"forminator-label\">Ihr Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"\" id=\"forminator-field-name-1_69fc4beab5a81\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6 \"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69fc4beab5a81\" id=\"forminator-field-email-1_69fc4beab5a81-label\" class=\"forminator-label\">E-Mail-Adresse <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"\" id=\"forminator-field-email-1_69fc4beab5a81\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6 \"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69fc4beab5a81\" id=\"forminator-field-phone-1_69fc4beab5a81-label\" class=\"forminator-label\">Telefon<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"\" id=\"forminator-field-phone-1_69fc4beab5a81\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"text-1\" class=\"forminator-field-text forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-text-1_69fc4beab5a81\" id=\"forminator-field-text-1_69fc4beab5a81-label\" class=\"forminator-label\">Betreff<\/label><input type=\"text\" name=\"text-1\" value=\"\" placeholder=\"\" id=\"forminator-field-text-1_69fc4beab5a81\" class=\"forminator-input forminator-name--field\" data-required=\"\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69fc4beab5a81\" id=\"forminator-field-textarea-1_69fc4beab5a81-label\" class=\"forminator-label\">Nachricht<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69fc4beab5a81\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12 \"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69fc4beab5a81\" id=\"forminator-field-consent-1_69fc4beab5a81-label\" class=\"forminator-label\">Einwilligung <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69fc4beab5a81__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69fc4beab5a81\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69fc4beab5a81-label\" aria-describedby=\"forminator-field-consent-1_69fc4beab5a81__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69fc4beab5a81__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Ich habe die Information zum <a href=\"\/datenschutz\">Datenschutz<\/a> gelesen und stimme der Verarbeitung und Speicherung meiner Daten im Rahmen der Vorgangsbearbeitung zu.<\/p><\/div><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\"><span>Absenden<\/span><span aria-hidden=\"true\"><\/span><\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"9c75c93b76\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/6013\" \/><input type=\"hidden\" name=\"form_id\" value=\"2470\"><input type=\"hidden\" name=\"page_id\" value=\"6013\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/www.bitformer.net\/en\/it-security\/nis2\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_8\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_8\" type=\"text\" name=\"input_8\" value=\"\" autocomplete=\"off\"><\/label><\/form><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Home NIS2 Mehr Cybersicherheit in Europa \u2013 und neue Pflichten f\u00fcr Unternehmen Externer ISB ISMS Cybersicherheit Quick Audit IT ISO 27001 NIS2 &#8211; Was nun? Mit der\u00a0NIS2-Richtlinie (Network and Information Security Directive 2)\u00a0hebt die Europ\u00e4ische Union die Anforderungen an die Cyber- und Informationssicherheit deutlich an. Die Richtlinie erweitert den Anwendungsbereich der bisherigen NIS-Regelung erheblich und [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":2320,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-6013","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/6013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/comments?post=6013"}],"version-history":[{"count":10,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/6013\/revisions"}],"predecessor-version":[{"id":9342,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/6013\/revisions\/9342"}],"up":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2320"}],"wp:attachment":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/media?parent=6013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}