{"id":4529,"date":"2024-10-04T13:19:57","date_gmt":"2024-10-04T13:19:57","guid":{"rendered":"https:\/\/www.forenova.com\/compliance\/"},"modified":"2025-03-13T10:19:15","modified_gmt":"2025-03-13T10:19:15","slug":"compliance","status":"publish","type":"page","link":"https:\/\/www.forenova.com\/de\/compliance\/","title":{"rendered":"Compliance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4529\" class=\"elementor elementor-4529 elementor-119\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c607041 main_banner e-flex e-con-boxed e-con e-parent\" data-id=\"c607041\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b7793e1 e-con-full e-flex e-con e-child\" data-id=\"b7793e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f2297d elementor-widget elementor-widget-heading\" data-id=\"9f2297d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">ForeNova-Leitfaden zur Cybersicherheits-Compliance<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6709909 elementor-widget elementor-widget-text-editor\" data-id=\"6709909\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova unterst\u00fctzt kleine und mittlere Unternehmen in der DACH-Region dabei, regulatorische Anforderungen zu erf\u00fcllen und deren Einhaltung nachzuweisen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71467eb elementor-widget elementor-widget-image\" data-id=\"71467eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.forenova.com\/de\/company-information\/#iso\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-7523\" alt=\"ISO27001\" srcset=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V-150x150.png 150w, https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/elementor\/thumbs\/RSMCERT.2024.32_ForeNova-Technologies-B.V-qymvphwjbx71thiw5wpt8bzo3ivry51f6lwglgrvvm.png 125w, https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V.png 283w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b10d15 e-con-full e-flex e-con e-child\" data-id=\"5b10d15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60b3a35 elementor-widget elementor-widget-video\" data-id=\"60b3a35\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/2ZPuNptrA4Q?si=lOGNHYbWs4rw7ZcN&quot;,&quot;show_image_overlay&quot;:&quot;yes&quot;,&quot;image_overlay&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/www.forenova.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/yt.webp&quot;,&quot;id&quot;:1653,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;&quot;,&quot;source&quot;:&quot;library&quot;},&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t\t\t<div class=\"elementor-custom-embed-image-overlay\" style=\"background-image: url(https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/yt.webp);\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-custom-embed-play\" role=\"button\" aria-label=\"Play Video\" tabindex=\"0\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"40\" height=\"40\" viewBox=\"0 0 40 40\" fill=\"none\"><rect width=\"40\" height=\"40\" rx=\"8\" fill=\"#F78D1B\"><\/rect><path d=\"M14.265 10.441C12.4618 9.40669 11 10.254 11 12.332V27.6665C11 29.7466 12.4618 30.5928 14.265 29.5595L27.6681 21.8728C29.4718 20.8382 29.4718 19.1619 27.6681 18.1275L14.265 10.441Z\" fill=\"white\"><\/path><\/svg>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ced187e elementor-widget__width-initial elementor-absolute bannershape bannershapeImg elementor-widget elementor-widget-image\" data-id=\"ced187e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1080\" height=\"162\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/banner-shape-v2.svg\" class=\"attachment-full size-full wp-image-3593\" alt=\"banner shape-v2\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ec4755 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"0ec4755\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66cf137 elementor-widget elementor-widget-heading\" data-id=\"66cf137\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">TISAX-Konformit\u00e4t\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5815b3 elementor-widget elementor-widget-n-accordion\" data-id=\"f5815b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2570\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2570\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. TISAX \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2570\" class=\"elementor-element elementor-element-deff269 e-con-full e-flex e-con e-child\" data-id=\"deff269\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2570\" class=\"elementor-element elementor-element-6ca1a88 e-flex e-con-boxed e-con e-child\" data-id=\"6ca1a88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48d20df accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"48d20df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"accordian-row active\"><div class=\"accordian-content\"><div class=\"inner-accordian-content\"><p>TISAX (Trusted Information Security Assessment Exchange) ist ein Zertifizierungsrahmen, der speziell f\u00fcr die Automobilindustrie entwickelt wurde. Er wurde vom Verband der Automobilindustrie (VDA) entwickelt, um sicherzustellen, dass Unternehmen in der Automobilzulieferkette hohe Standards der Informationssicherheit erf\u00fcllen.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2571\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2571\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. TISAX-Konformit\u00e4tsanforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2571\" class=\"elementor-element elementor-element-43c7b8c e-con-full e-flex e-con e-child\" data-id=\"43c7b8c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2571\" class=\"elementor-element elementor-element-791efae e-con-full e-flex e-con e-child\" data-id=\"791efae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7b793b accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"e7b793b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>TISAX verlangt von den Unternehmen, dass sie in jeder der sieben obligatorischen Kategorien mindestens den Reifegrad 3 erreichen.<\/p><p>Reifegrad 3 bedeutet, dass ein Standardprozess konsequent verfolgt und in das Gesamtsystem integriert wird. Die Beziehungen zu anderen Prozessen sind dokumentiert, und es wurden geeignete Schnittstellen geschaffen. Es gibt klare Belege daf\u00fcr, dass dieser Prozess \u00fcber einen langen Zeitraum hinweg zuverl\u00e4ssig und aktiv genutzt wurde.<\/p><p>Jede Kategorie hat ihre eigenen spezifischen Anforderungen, wobei Cybersecurity die Kontrollnummern von 5.1 bis 5.3.4 abdeckt.<\/p><p><a href=\"\/de\/tisax?hsLang=de\" rel=\"noopener\">Hier erfahren Sie mehr \u00fcber die Anforderungen der einzelnen TISAX-Konformit\u00e4tskategorien.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2572\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2572\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei der Einhaltung von TISAX helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2572\" class=\"elementor-element elementor-element-99e2de0 e-con-full e-flex e-con e-child\" data-id=\"99e2de0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2572\" class=\"elementor-element elementor-element-bcbd338 e-con-full e-flex e-con e-child\" data-id=\"bcbd338\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a02e29 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"6a02e29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mit NovaMDR erhalten Sie eine fortschrittliche Bedrohungserkennung, kontinuierliche \u00dcberwachung und Reaktion auf Vorf\u00e4lle, die einen robusten Sicherheitsrahmen bilden, der Ihre sensiblen Daten und Systeme vor sich entwickelnden Cyber-Bedrohungen sch\u00fctzt. \u00a0<\/p><p>NovaMDR hilft kleinen und mittleren Unternehmen der Automobilindustrie in Deutschland, den Prozess der TISAX-Konformit\u00e4t f\u00fcr Cybersicherheit effizient zu vereinfachen, ohne die Bank zu sprengen, indem es eine ma\u00dfgeschneiderte und verwaltete L\u00f6sung auf der Grundlage Ihrer individuellen Anforderungen bereitstellt.<\/p><p><a href=\"\/de\/tisax?hsLang=de\" rel=\"noopener\">Erfahren Sie mehr \u00fcber TISAX-Compliance.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a3b00d accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"2a3b00d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd4477d elementor-widget elementor-widget-heading\" data-id=\"fd4477d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">NIS2-Konformit\u00e4t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c84cd5 elementor-widget elementor-widget-n-accordion\" data-id=\"7c84cd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1300\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1300\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. NIS2 \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1300\" class=\"elementor-element elementor-element-9e69083 e-con-full e-flex e-con e-child\" data-id=\"9e69083\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1300\" class=\"elementor-element elementor-element-8bdc38d e-flex e-con-boxed e-con e-child\" data-id=\"8bdc38d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d5586f accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"6d5586f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"accordian-row active\"><div class=\"accordian-content\"><div class=\"inner-accordian-content\"><div class=\"accordian-row active\"><div class=\"accordian-content\"><div class=\"inner-accordian-content\"><p>Die Richtlinie zur Netz- und Informationssicherheit (NIS2) ist ein von der Europ\u00e4ischen Union geschaffener Rechtsrahmen zur Verbesserung der Cybersicherheit in den Mitgliedsstaaten. Sie zielt darauf ab, die Widerstandsf\u00e4higkeit und die Reaktionsf\u00e4higkeit von kritischen Infrastrukturen zu verbessern.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1301\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1301\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. NIS2-Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1301\" class=\"elementor-element elementor-element-b22492a e-con-full e-flex e-con e-child\" data-id=\"b22492a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1301\" class=\"elementor-element elementor-element-1ebbb98 e-con-full e-flex e-con e-child\" data-id=\"1ebbb98\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-131dcf7 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"131dcf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Berichterstattung \u00fcber Zwischenf\u00e4lle<\/strong>: Obligatorische Meldung bedeutender Vorf\u00e4lle an die zust\u00e4ndigen Beh\u00f6rden innerhalb bestimmter Fristen.<br \/><br \/><strong>Risikomanagement<\/strong>: Umsetzung von Ma\u00dfnahmen zum Risikomanagement, einschlie\u00dflich Sicherheitsrichtlinien und -verfahren.<br \/><br \/><strong>Sicherheit der Lieferkette<\/strong>: Gew\u00e4hrleistung der Cybersicherheit in der gesamten Lieferkette.<br \/><br \/><strong>Zusammenarbeit und Informationsaustausch<\/strong>: Zusammenarbeit und Informationsaustausch zwischen den Mitgliedsstaaten und relevanten Einrichtungen.<br \/><strong><br \/>Kontinuierliche \u00dcberwachung<\/strong>: Laufende \u00dcberwachung von Netzwerken und Informationssystemen, um Bedrohungen zu erkennen und zu entsch\u00e4rfen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1302\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1302\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei NIS2 helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1302\" class=\"elementor-element elementor-element-ab61734 e-con-full e-flex e-con e-child\" data-id=\"ab61734\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1302\" class=\"elementor-element elementor-element-e64df6b e-con-full e-flex e-con e-child\" data-id=\"e64df6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2729ff accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"b2729ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova bietet umfassende Unterst\u00fctzung, um Unternehmen bei der Einhaltung von NIS2 zu helfen:<\/p><p><strong>Vorfallberichterstattung<\/strong>: Benachrichtigung innerhalb von 30 Minuten \u00fcber bedeutende Vorf\u00e4lle mit regelm\u00e4\u00dfigen Aktualisierungen und Abschlussberichten, wie von den Beh\u00f6rden gefordert.<\/p><p><strong>Risikomanagement<\/strong>: Unterst\u00fctzung bei der Umsetzung robuster Risikomanagementma\u00dfnahmen, einschlie\u00dflich Sicherheitsrichtlinien und -verfahren.<\/p><p><strong>Sicherheit in der Lieferkette<\/strong>: Sicherstellung von Cybersicherheitsma\u00dfnahmen in der gesamten Lieferkette.<\/p><p><strong>Zusammenarbeit und Informationsaustausch<\/strong>: Erleichterung der Zusammenarbeit und des Informationsaustauschs mit relevanten Stellen.<\/p><p><strong>Kontinuierliche \u00dcberwachung<\/strong>: Rund-um-die-Uhr-\u00dcberwachung von Netzwerken und Informationssystemen, um Bedrohungen zu erkennen und darauf zu reagieren.<\/p><p>Erfahren Sie mehr in unserem\u00a0<a href=\"\/de\/nis2-directive-compliance?hsLang=de\" rel=\"noopener\">Leitfaden zur NIS2-Konformit\u00e4t<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef8f962 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"ef8f962\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63ac803 elementor-widget elementor-widget-heading\" data-id=\"63ac803\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Einhaltung von Basel III<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-517931b elementor-widget elementor-widget-n-accordion\" data-id=\"517931b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8540\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-8540\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. Basel III im \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8540\" class=\"elementor-element elementor-element-5daa34d e-con-full e-flex e-con e-child\" data-id=\"5daa34d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8540\" class=\"elementor-element elementor-element-5d913ea e-flex e-con-boxed e-con e-child\" data-id=\"5d913ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c928519 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"c928519\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"accordian-row active\"><div class=\"accordian-content\"><div class=\"inner-accordian-content\"><div class=\"accordian-row active\"><div class=\"accordian-content\"><div class=\"inner-accordian-content\"><p>Der Basler Ausschuss f\u00fcr Bankenaufsicht (BCBS) legt internationale Standards f\u00fcr die Bankenregulierung fest und konzentriert sich dabei auf Risikomanagement und Transparenz. Basel III zielt darauf ab, die F\u00e4higkeit des Bankensektors zur Bew\u00e4ltigung finanzieller Belastungen durch verbesserte Regulierung, Aufsicht und Risikomanagement zu st\u00e4rken.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8541\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8541\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. Basel III Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8541\" class=\"elementor-element elementor-element-c3a49ea e-con-full e-flex e-con e-child\" data-id=\"c3a49ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8541\" class=\"elementor-element elementor-element-9d612b2 e-con-full e-flex e-con e-child\" data-id=\"9d612b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a34d42 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"4a34d42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Risikodatenaggregation<\/strong>: Sammeln und Verarbeiten von Daten aus verschiedenen Quellen, um einen umfassenden \u00dcberblick \u00fcber die Risikoexposition zu erhalten.<br \/><br \/><strong>Risikoberichterstattung<\/strong>: Erstellung zeitnaher und pr\u00e4ziser Risikoberichte f\u00fcr die Beteiligten.<br \/><br \/><strong>Datengenauigkeit und -integrit\u00e4t<\/strong>: Gew\u00e4hrleistung, dass die f\u00fcr das Risikomanagement verwendeten Daten genau und zuverl\u00e4ssig sind.<br \/><br \/><strong>IT-Infrastruktur<\/strong>: Aufrechterhaltung einer belastbaren und skalierbaren IT-Infrastruktur.<br \/><br \/><strong>Stresstests<\/strong>: F\u00fchren Sie regelm\u00e4\u00dfig Stresstests durch, um die Widerstandsf\u00e4higkeit gegen\u00fcber widrigen Umst\u00e4nden zu bewerten.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-8542\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-8542\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei Basel III helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8542\" class=\"elementor-element elementor-element-c15c8e2 e-con-full e-flex e-con e-child\" data-id=\"c15c8e2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-8542\" class=\"elementor-element elementor-element-a389fa5 e-con-full e-flex e-con e-child\" data-id=\"a389fa5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0b21cad accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"0b21cad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova bietet ma\u00dfgeschneiderte L\u00f6sungen, um Finanzinstitute bei der Einhaltung von Basel III zu unterst\u00fctzen:<br \/><br \/><strong>24\/7 Monitoring<\/strong>: Kontinuierliche \u00dcberwachung zur Erkennung von und Reaktion auf Sicherheitsvorf\u00e4lle in Echtzeit.<br \/><br \/><strong>Aggregation von Risikodaten<\/strong>: Unterst\u00fctzung f\u00fcr genaue und zuverl\u00e4ssige Datenaggregations- und Validierungsprozesse.<br \/><strong><br \/>Risikoberichterstattung<\/strong>: Unterst\u00fctzung bei der Erstellung umfassender und zeitnaher Risikoberichte.<br \/><br \/><strong>Resiliente IT-Infrastruktur<\/strong>: Aufbau und Pflege einer skalierbaren IT-Infrastruktur zur Unterst\u00fctzung des Risikomanagements.<br \/><br \/><strong>Stresstests<\/strong>: Tools und Fachwissen f\u00fcr die Durchf\u00fchrung von Stresstests.<br \/><br \/>Mit dem NovaMDR-Service von ForeNova k\u00f6nnen Finanzinstitute durch ein robustes Risikomanagement, eine kontinuierliche \u00dcberwachung und eine effektive Reaktion auf Vorf\u00e4lle auf die Einhaltung von Basel III hinarbeiten.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db33c73 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"db33c73\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11d75e7 elementor-widget elementor-widget-heading\" data-id=\"11d75e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">CERT-RMM-Konformit\u00e4t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9962b2a elementor-widget elementor-widget-n-accordion\" data-id=\"9962b2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1600\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1600\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. CERT-RMM \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1600\" class=\"elementor-element elementor-element-112f973 e-con-full e-flex e-con e-child\" data-id=\"112f973\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1600\" class=\"elementor-element elementor-element-7a3d4fe e-flex e-con-boxed e-con e-child\" data-id=\"7a3d4fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d02e057 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"d02e057\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"accordian-row active\"><div class=\"accordian-content\"><div class=\"inner-accordian-content\"><p>Das CERT Resilience Management Model (CERT-RMM) ist ein Rahmenwerk, das Sicherheit, Gesch\u00e4ftskontinuit\u00e4t und IT-Operationen integriert, um die Widerstandsf\u00e4higkeit und das Risikomanagement von Organisationen zu verbessern.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1601\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1601\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. CERT-RMM-Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1601\" class=\"elementor-element elementor-element-fb7af2a e-con-full e-flex e-con e-child\" data-id=\"fb7af2a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1601\" class=\"elementor-element elementor-element-bc04e92 e-con-full e-flex e-con e-child\" data-id=\"bc04e92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67c9844 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"67c9844\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Verm\u00f6gensinventarisierung<\/strong>: Identifizieren und Dokumentieren von Verm\u00f6genswerten.<br \/><br \/><strong>Eigentumszuweisung<\/strong>: Festlegen der Eigentumsverh\u00e4ltnisse und der Verwahrung von Verm\u00f6genswerten.<br \/><br \/><strong>Serviceverkn\u00fcpfung<\/strong>: Verkn\u00fcpfen Sie Verm\u00f6genswerte mit den Dienstleistungen, die sie unterst\u00fctzen.<br \/><br \/><strong>Resilienzanforderungen<\/strong>: Definieren Sie Anforderungen f\u00fcr den Schutz und die Aufrechterhaltung von Anlagen und Dienstleistungen.<br \/><br \/><strong>\u00c4nderungsmanagement<\/strong>: Implementieren Sie Prozesse f\u00fcr die Verwaltung von Anlagen\u00e4nderungen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1602\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1602\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova mit CERT-RMM helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1602\" class=\"elementor-element elementor-element-59ffa30 e-con-full e-flex e-con e-child\" data-id=\"59ffa30\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1602\" class=\"elementor-element elementor-element-c39601f e-con-full e-flex e-con e-child\" data-id=\"c39601f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d578b2 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"0d578b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova unterst\u00fctzt Organisationen bei der Erf\u00fcllung der CERT-RMM-Anforderungen durch:<br \/><br \/><strong>Asset Identification<\/strong>: Hilfe bei der Inventarisierung und Dokumentation von Assets.<br \/><br \/><strong>Ownership Assignment<\/strong>: Unterst\u00fctzung bei der Festlegung der Eigentumsverh\u00e4ltnisse und der Verwahrung von Assets.<br \/><br \/><strong>Service Linkage<\/strong>: Verkn\u00fcpfung von Verm\u00f6genswerten mit ihren jeweiligen Dienstleistungen.<br \/><br \/><strong>Resilienzplanung<\/strong>: Definition und Implementierung von Ausfallsicherheitsanforderungen.<br \/><br \/><strong>Change Management<\/strong>: Unterst\u00fctzung von Change Management Prozessen f\u00fcr Assets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20e2acc accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"20e2acc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-317e3b0 elementor-widget elementor-widget-heading\" data-id=\"317e3b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">CIS Critical Security Controls Compliance\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37820e4 elementor-widget elementor-widget-n-accordion\" data-id=\"37820e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5820\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-5820\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. \u00dcberblick \u00fcber die kritischen Sicherheitskontrollen des CIS <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5820\" class=\"elementor-element elementor-element-4904789 e-con-full e-flex e-con e-child\" data-id=\"4904789\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5820\" class=\"elementor-element elementor-element-967c79d e-flex e-con-boxed e-con e-child\" data-id=\"967c79d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5936af accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"a5936af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Center for Internet Security (CIS) Critical Security Controls bietet eine Reihe von Best Practices zur Verbesserung der Cybersicherheit. Diese Kontrollen sind weit verbreitet und erg\u00e4nzen andere Sicherheitsrahmenwerke.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5821\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5821\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. CIS-Anforderungen f\u00fcr kritische Sicherheitskontrollen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5821\" class=\"elementor-element elementor-element-81392d6 e-con-full e-flex e-con e-child\" data-id=\"81392d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5821\" class=\"elementor-element elementor-element-7d2aaab e-con-full e-flex e-con e-child\" data-id=\"7d2aaab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0e9045 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"d0e9045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Inventarisierung und Kontrolle von Unternehmensressourcen<\/strong><br \/><br \/>Aktive Verwaltung (Inventarisierung, Nachverfolgung und Korrektur) aller Hardware-Ger\u00e4te im Netzwerk, so dass nur autorisierte Ger\u00e4te Zugang erhalten.<br \/><br \/><strong>Inventarisierung und Kontrolle von Software-Ressourcen<\/strong><br \/><br \/>Aktive Verwaltung (Inventarisierung, Nachverfolgung und Korrektur) aller Software im Netzwerk, so dass nur autorisierte Software installiert ist und ausgef\u00fchrt werden kann.<br \/><br \/><strong>Datenschutz<\/strong><br \/><br \/>Sch\u00fctzen Sie Unternehmensdaten durch Ma\u00dfnahmen wie Verschl\u00fcsselung, Schutz vor Datenverlust und Zugriffskontrolle.<br \/><br \/><strong>Sichere Konfiguration von Unternehmensressourcen und Software<\/strong><br \/><br \/>Erstellen und pflegen Sie sichere Konfigurationen f\u00fcr Hardware und Software auf mobilen Ger\u00e4ten, Laptops, Workstations und Servern.<br \/>Kontoverwaltung<br \/><br \/>Verwendung von Prozessen und Tools zur Zuweisung und Verwaltung von Berechtigungsnachweisen f\u00fcr Benutzerkonten und Ger\u00e4te.<br \/><br \/><strong>Zugangskontrollmanagement<\/strong><br \/><br \/>Verwaltung des Lebenszyklus von Zugangsberechtigungen und Umsetzung des Prinzips der geringsten Privilegien.<br \/><br \/><strong>Kontinuierliches Schwachstellenmanagement<\/strong><br \/><br \/>Kontinuierliche Beschaffung und Bewertung von Informationen \u00fcber neue Softwareschwachstellen und Ergreifen von entsprechenden Ma\u00dfnahmen.<br \/><br \/><strong>Audit-Log-Management<\/strong><br \/><br \/>Sammeln, Verwalten und Analysieren von Audit-Protokollen, um Sicherheitsvorf\u00e4lle zu erkennen und zu verstehen.<br \/><br \/><strong>E-Mail- und Webbrowser-Schutz<\/strong><br \/><br \/>Verbesserung des E-Mail- und Webbrowser-Schutzes durch Ma\u00dfnahmen wie Filterung und Isolierung.<br \/><br \/><strong>Malware-Abwehr<\/strong><br \/><br \/>Kontrolle der Installation, Verbreitung und Ausf\u00fchrung von b\u00f6sartigem Code durch Anti-Malware-Tools und andere Techniken.<br \/><br \/><strong>Datenwiederherstellung<\/strong><br \/><br \/>Einf\u00fchrung von Ma\u00dfnahmen zur Gew\u00e4hrleistung der Integrit\u00e4t und Verf\u00fcgbarkeit von Daten, einschlie\u00dflich regelm\u00e4\u00dfiger Backups und Wiederherstellungsverfahren.<br \/>Verwaltung der Netzwerkinfrastruktur<br \/><br \/>Sicherung von Netzwerkinfrastrukturger\u00e4ten wie Routern, Switches und Firewalls durch sichere Konfigurationen und Verwaltungspraktiken.<br \/><br \/><strong>\u00dcberwachung und Abwehr von Netzwerken<\/strong><br \/><br \/>Betrieb und Verwaltung eines umfassenden \u00dcberwachungs- und Abwehrsystems zur Erkennung von und Reaktion auf netzwerkbasierte Bedrohungen.<br \/><br \/><strong>Schulung des Sicherheitsbewusstseins und der F\u00e4higkeiten<\/strong><br \/><br \/>Entwicklung und Umsetzung eines Programms zur Sensibilisierung und Schulung aller Mitarbeiter in Sachen Sicherheit.<br \/><br \/><strong>Verwaltung von Dienstanbietern<\/strong><br \/><br \/>Implementierung von Sicherheitsma\u00dfnahmen zur Verwaltung des mit Dienstanbietern verbundenen Risikos.<br \/><br \/><strong>Sicherheit von Anwendungssoftware<\/strong><br \/><br \/>Verwaltung des Sicherheitslebenszyklus aller intern entwickelten und erworbenen Software zur Verhinderung, Erkennung und Behebung von Sicherheitsl\u00fccken.<br \/><br \/><strong>Incident Response Management<\/strong><br \/><br \/>Entwicklung und Umsetzung eines Incident Response Plans, um Sicherheitsvorf\u00e4lle zu erkennen, einzud\u00e4mmen und zu beheben.<br \/><br \/><strong>Penetration Testing<\/strong><br \/><br \/>Regelm\u00e4\u00dfige \u00dcberpr\u00fcfung der Wirksamkeit von Sicherheitskontrollen durch Penetrationstests und Red Team \u00dcbungen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5822\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5822\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei kritischen CIS-Sicherheitskontrollen helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5822\" class=\"elementor-element elementor-element-767655b e-con-full e-flex e-con e-child\" data-id=\"767655b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6c51b7 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"f6c51b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova hilft Unternehmen bei der Implementierung von CIS-Kontrollen durch:<br \/><br \/><strong>Kontinuierliche \u00dcberwachung<\/strong>: Rund um die Uhr Scannen nach Bedrohungen und Schwachstellen.<br \/><br \/><strong>Schwachstellenmanagement<\/strong>: Priorisierung und Behebung kritischer Schwachstellen.<br \/><br \/><strong>Zugangskontrolle<\/strong>: Verhinderung von unn\u00f6tigem Zugriff auf kritische Systeme.<br \/><br \/><strong>Konfigurationsmanagement<\/strong>: Gew\u00e4hrleistung sicherer Konfigurationseinstellungen.<br \/><br \/>ForeNova&#8217;s NovaMDR Service unterst\u00fctzt Unternehmen dabei, robuste Cybersicherheitspraktiken zu erreichen, die mit den CIS-Kontrollen \u00fcbereinstimmen, und so ihre allgemeine Sicherheitslage zu verbessern.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d08b0b0 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"d08b0b0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f181a90 elementor-widget elementor-widget-heading\" data-id=\"f181a90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">DSGVO-Einhaltung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-92651b6 elementor-widget elementor-widget-n-accordion\" data-id=\"92651b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1530\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1530\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. DSGVO-\u00dcbersicht <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1530\" class=\"elementor-element elementor-element-9ed7e5f e-con-full e-flex e-con e-child\" data-id=\"9ed7e5f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1530\" class=\"elementor-element elementor-element-a565335 e-flex e-con-boxed e-con e-child\" data-id=\"a565335\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-622ad6b accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"622ad6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die Datenschutz-Grundverordnung (DSGVO) regelt den Schutz personenbezogener Daten und die Privatsph\u00e4re von EU-B\u00fcrgern. Sie stellt hohe Anforderungen an Unternehmen, die solche Daten verarbeiten, und sieht strenge Strafen bei Nichteinhaltung vor.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1531\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1531\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. DSGVO-Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1531\" class=\"elementor-element elementor-element-54dc5d2 e-con-full e-flex e-con e-child\" data-id=\"54dc5d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1531\" class=\"elementor-element elementor-element-9db6635 e-con-full e-flex e-con e-child\" data-id=\"9db6635\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b2a46a accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"9b2a46a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Datenschutzbeauftragter<\/strong>r: Ernennen Sie einen Datenschutzbeauftragten.<\/p><p><strong>Privacy by Design<\/strong>: Setzen Sie einen datenschutzfreundlichen Ansatz um.<\/p><p><strong>Datensicherheit<\/strong>: Stellen Sie sicher, dass Datensicherheitsma\u00dfnahmen vorhanden sind.<\/p><p><strong>Benachrichtigung bei Datenschutzverletzungen<\/strong>: Informieren Sie die Aufsichtsbeh\u00f6rden innerhalb von 72 Stunden \u00fcber Datenschutzverletzungen.<\/p><p><strong>Verbraucherrechte<\/strong>: Gew\u00e4hren Sie den Verbrauchern das Recht, auf ihre Daten zuzugreifen, sie einzuschr\u00e4nken und zu kontrollieren.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1532\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1532\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei der DSGVO helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1532\" class=\"elementor-element elementor-element-8f7fa71 e-con-full e-flex e-con e-child\" data-id=\"8f7fa71\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a750377 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"a750377\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova hilft bei der Einhaltung der DSGVO durch:<\/p><p><strong>Datensicherheit<\/strong>: Bereitstellung von Sicherheit durch Schwachstellenmanagement und Reaktion.<\/p><p><strong>Beratung und Schulung<\/strong>: Beratung zu Datensicherheitsma\u00dfnahmen und Nutzerschulungen.<\/p><p><strong>Benachrichtigung bei Sicherheitsverletzungen<\/strong>: Erleichterung der schnellen Erkennung und Benachrichtigung bei Datenschutzverletzungen.<\/p><p>Die Dienstleistungen von ForeNova helfen Unternehmen, personenbezogene Daten zu sch\u00fctzen und die DSGVO-Anforderungen zu erf\u00fcllen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05ed62c accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"05ed62c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae148f5 elementor-widget elementor-widget-heading\" data-id=\"ae148f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">ISO 27002 Konformit\u00e4t<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64f3ff9 elementor-widget elementor-widget-n-accordion\" data-id=\"64f3ff9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1050\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1050\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. ISO 27002 \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1050\" class=\"elementor-element elementor-element-5f93c32 e-con-full e-flex e-con e-child\" data-id=\"5f93c32\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1050\" class=\"elementor-element elementor-element-4a698ce e-flex e-con-boxed e-con e-child\" data-id=\"4a698ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b81861 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"1b81861\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ISO 27002 ist eine internationale Norm, die Richtlinien f\u00fcr das Informationssicherheitsmanagement enth\u00e4lt. Sie unterst\u00fctzt die Implementierung von Informationssicherheitskontrollen innerhalb eines ISMS auf der Grundlage von ISO\/IEC 27001.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1051\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1051\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. ISO 27002 Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1051\" class=\"elementor-element elementor-element-d1cd3f0 e-con-full e-flex e-con e-child\" data-id=\"d1cd3f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1051\" class=\"elementor-element elementor-element-1b420fd e-con-full e-flex e-con e-child\" data-id=\"1b420fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb22dd6 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"bb22dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Sicherheitsrichtlinien<\/strong>: Legen Sie Richtlinien f\u00fcr die Informationssicherheit fest.<\/li><li><strong>Organisation der Sicherheit<\/strong>: Definieren Sie die Organisation der Informationssicherheit.<\/li><li><strong>Sicherheit der Humanressourcen<\/strong>: Implementierung von Sicherheitsma\u00dfnahmen f\u00fcr die Personalabteilung.<\/li><li><strong>Verm\u00f6gensverwaltung<\/strong>: Verwalten und kontrollieren Sie Verm\u00f6genswerte.<\/li><li><strong>Zugangskontrolle<\/strong>: Einrichtung von Zugangskontrollmechanismen.<\/li><li><strong>Kryptographie<\/strong>: Verwenden Sie kryptografische Kontrollen.<\/li><li><strong>Physikalische Sicherheit<\/strong>: Gew\u00e4hrleistung der physischen und \u00f6kologischen Sicherheit.<\/li><li><strong>Betriebliche Sicherheit<\/strong>: Implementierung betrieblicher Sicherheitsma\u00dfnahmen.<\/li><li><strong>Kommunikationssicherheit<\/strong>: Sichere Kommunikation.<\/li><li><strong>Systementwicklung<\/strong>: Sichere Systembeschaffung und -entwicklung.<\/li><li><strong>Lieferantenbeziehungen<\/strong>: Verwalten Sie die Sicherheit der Lieferanten.<\/li><li><strong>Vorfallmanagement<\/strong>: Umgang mit Vorf\u00e4llen im Bereich der Informationssicherheit.<\/li><li><strong>Gesch\u00e4ftskontinuit\u00e4t<\/strong>: Behandlung der Informationssicherheitsaspekte der Gesch\u00e4ftskontinuit\u00e4t.<\/li><li><strong>Compliance<\/strong>: Gew\u00e4hrleistung der Einhaltung von Sicherheitsanforderungen.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1052\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1052\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei ISO 27002 helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1052\" class=\"elementor-element elementor-element-3e03eb3 e-con-full e-flex e-con e-child\" data-id=\"3e03eb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1052\" class=\"elementor-element elementor-element-8afb5a1 e-con-full e-flex e-con e-child\" data-id=\"8afb5a1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb25981 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"bb25981\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova unterst\u00fctzt die Einhaltung von ISO 27002 durch:<br \/><br \/><strong>Beweise und Artefakte<\/strong>: Bereitstellung von Nachweisen f\u00fcr Asset Management, Zugriffskontrolle und Systemwartung.<br \/><br \/><strong>Unterst\u00fctzung bei Vorf\u00e4llen<\/strong>: Unterst\u00fctzung bei Informationssicherheitsvorf\u00e4llen.<br \/><br \/>ForeNova&#8217;s NovaMDR Service hilft Unternehmen bei der Implementierung und Aufrechterhaltung effektiver Sicherheitskontrollen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ba90223 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"ba90223\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f873c9c elementor-widget elementor-widget-heading\" data-id=\"f873c9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KRITIS-Einhaltung<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1ac53c elementor-widget elementor-widget-n-accordion\" data-id=\"a1ac53c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1690\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1690\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. KRITIS \u00dcbersicht <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1690\" class=\"elementor-element elementor-element-f7a8bd5 e-con-full e-flex e-con e-child\" data-id=\"f7a8bd5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1690\" class=\"elementor-element elementor-element-9998699 e-flex e-con-boxed e-con e-child\" data-id=\"9998699\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-62ad761 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"62ad761\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Die KRITIS-Vorschriften in Deutschland gelten f\u00fcr Betreiber kritischer Infrastrukturen, die f\u00fcr gesellschaftliche Funktionen unverzichtbar sind. Das BSI-Gesetz und das IT-Sicherheitsgesetz 2.0 definieren diese Anforderungen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1691\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1691\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. KRITIS-Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1691\" class=\"elementor-element elementor-element-f4b2f41 e-con-full e-flex e-con e-child\" data-id=\"f4b2f41\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1691\" class=\"elementor-element elementor-element-2de3597 e-con-full e-flex e-con e-child\" data-id=\"2de3597\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea579e6 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"ea579e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Registrierung<\/strong>: Registrieren Sie sich beim BSI als Betreiber kritischer Infrastrukturen.<\/li><li><strong>Kontaktstelle<\/strong>: Legen Sie eine Kontaktstelle f\u00fcr das BSI fest.<\/li><li><strong>Erkennung und Meldung von Zwischenf\u00e4llen<\/strong>: Erkennen und melden Sie kritische Sicherheitsvorf\u00e4lle sofort.<\/li><li><strong>IT-Sicherheitsma\u00dfnahmen<\/strong>: Implementierung von IT-Sicherheitsma\u00dfnahmen nach dem neuesten Stand der Technik.<\/li><li><strong>Sicherheitspr\u00fcfungen<\/strong>: F\u00fchren Sie alle zwei Jahre IT-Sicherheitspr\u00fcfungen durch.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1692\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1692\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei KRITIS helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1692\" class=\"elementor-element elementor-element-883ea49 e-con-full e-flex e-con e-child\" data-id=\"883ea49\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1692\" class=\"elementor-element elementor-element-cfaf7b5 e-con-full e-flex e-con e-child\" data-id=\"cfaf7b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7157ac6 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"7157ac6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova unterst\u00fctzt KRITIS-Betreiber durch:<br \/><br \/><strong>Vorfallerkennung und -reaktion<\/strong>: Rund-um-die-Uhr-\u00dcberwachung und Reaktion auf Vorf\u00e4lle.<br \/><strong>Anleitung<\/strong>: Fachkundige Anleitung zur Verbesserung der Sicherheitsma\u00dfnahmen.<br \/><strong>Audit-Support<\/strong>: Bereitstellung von Nachweisen und Berichten f\u00fcr Audits.<br \/><br \/>Die Dienstleistungen von ForeNova helfen Betreibern kritischer Infrastrukturen, die KRITIS-Anforderungen zu erf\u00fcllen und ihre Sicherheitslage zu verbessern.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca2bbc6 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"ca2bbc6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d1efde elementor-widget elementor-widget-heading\" data-id=\"6d1efde\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">PCI-DSS-Einhaltung\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-370f672 elementor-widget elementor-widget-n-accordion\" data-id=\"370f672\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5770\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-5770\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. PCI-DSS \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5770\" class=\"elementor-element elementor-element-64460c7 e-con-full e-flex e-con e-child\" data-id=\"64460c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5770\" class=\"elementor-element elementor-element-8178f5a e-flex e-con-boxed e-con e-child\" data-id=\"8178f5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d7840d accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"8d7840d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Der Payment Card Industry Data Security Standard (PCI-DSS) ist eine Reihe von Sicherheitsstandards, die dem Schutz von Karteninhaberdaten dienen. Er wird vom PCI Security Standards Council festgelegt.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5771\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5771\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. PCI-DSS-Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5771\" class=\"elementor-element elementor-element-2efd924 e-con-full e-flex e-con e-child\" data-id=\"2efd924\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5771\" class=\"elementor-element elementor-element-fa59ccb e-con-full e-flex e-con e-child\" data-id=\"fa59ccb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75f5c54 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"75f5c54\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Firewall-Konfigurationen<\/strong>: Installation und Wartung von Firewalls.<\/li><li><strong>Sichere Standardwerte<\/strong>: Vermeiden Sie die Verwendung von Standardwerten f\u00fcr Kennw\u00f6rter, die vom Hersteller vorgegeben werden.<\/li><li><strong>Datenschutz<\/strong>: Sch\u00fctzen Sie gespeicherte Karteninhaberdaten.<\/li><li><strong>Datenverschl\u00fcsselung<\/strong>: Verschl\u00fcsselung der Karteninhaberdaten w\u00e4hrend der \u00dcbertragung.<\/li><li><strong>Schutz vor Malware<\/strong>: Sch\u00fctzen Sie Ihre Systeme vor Malware.<\/li><li><strong>Sichere Systeme<\/strong>: Entwicklung und Pflege sicherer Systeme und Anwendungen.<\/li><li><strong>Zugangskontrolle<\/strong>: Schr\u00e4nken Sie den Zugriff auf Karteninhaberdaten ein.<\/li><li><strong>Authentifizierung<\/strong>: Identifizierung und Authentifizierung des Zugangs zu Systemkomponenten.<\/li><li><strong>Physikalische Sicherheit<\/strong>: Schr\u00e4nken Sie den physischen Zugang zu Karteninhaberdaten ein.<\/li><li><strong>\u00dcberwachung<\/strong>: Verfolgen und \u00fcberwachen Sie den Zugriff auf Netzwerkressourcen.<\/li><li><strong>Pr\u00fcfung<\/strong>: Regelm\u00e4\u00dfiges Testen der Sicherheitssysteme und -prozesse.<\/li><li><strong>Sicherheit<\/strong>\u00a0<strong>Politik<\/strong>: F\u00fchren Sie eine Informationssicherheitspolitik.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-5772\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-5772\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei PCI-DSS helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5772\" class=\"elementor-element elementor-element-956a863 e-con-full e-flex e-con e-child\" data-id=\"956a863\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-5772\" class=\"elementor-element elementor-element-5b4a1d7 e-con-full e-flex e-con e-child\" data-id=\"5b4a1d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-98b708a accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"98b708a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova hilft bei der Einhaltung des PCI-DSS durch:<br \/><br \/><strong>Angepasste Berichte<\/strong>: Vereinfachung der Einhaltung mit ma\u00dfgeschneiderten Berichten.<br \/><br \/><strong>Zugangs\u00fcberwachung<\/strong>: \u00dcberwachung des Zugriffs auf Karteninhaberdaten.<br \/><br \/><strong>Echtzeit-Warnungen<\/strong>: Bereitstellung von Echtzeit-Warnungen auf der Grundlage von Gesch\u00e4ftsrisiken.<br \/><br \/><strong>Schwachstellenbewertungen<\/strong>: Umfasst die Suche nach Bedrohungen und Penetrationstests zur Identifizierung von Schwachstellen und Schwachstellen.<br \/><br \/><strong>Sichere Konfiguration<\/strong>: Implementierung sicherer Konfigurationsrichtlinien.<br \/><br \/><strong>Einhaltungsnachweis<\/strong>: Nachweis der Konformit\u00e4t durch Berichte und Dashboards.<br \/><br \/>ForeNova&#8217;s Dienstleistungen gew\u00e4hrleisten den Schutz von Karteninhaberdaten und helfen bei der Einhaltung von PCI-DSS-Standards.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02cc572 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"02cc572\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8870208 elementor-widget elementor-widget-heading\" data-id=\"8870208\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">SCF Secure Controls Framework Compliance\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-182c892 elementor-widget elementor-widget-n-accordion\" data-id=\"182c892\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2530\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2530\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. SCF \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2530\" class=\"elementor-element elementor-element-5e5ec19 e-con-full e-flex e-con e-child\" data-id=\"5e5ec19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2530\" class=\"elementor-element elementor-element-93fa8da e-flex e-con-boxed e-con e-child\" data-id=\"93fa8da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d4a4d2 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"5d4a4d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Secure Controls Framework (SCF) ist ein umfassender Katalog von Kontrollmechanismen, der Unternehmen dabei helfen soll, sichere Prozesse, Systeme und Anwendungen zu entwerfen, aufzubauen und zu pflegen, die sowohl die Cybersicherheit als auch den Datenschutz ber\u00fccksichtigen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2531\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2531\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. SCF-Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2531\" class=\"elementor-element elementor-element-a99f1ec e-con-full e-flex e-con e-child\" data-id=\"a99f1ec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2531\" class=\"elementor-element elementor-element-5445ff4 e-con-full e-flex e-con e-child\" data-id=\"5445ff4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4bad2b accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"a4bad2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Vertraulichkeit<\/strong>: Sicherstellen, dass der Zugriff auf Informationen auf autorisierte Benutzer beschr\u00e4nkt ist.<\/li><li><strong>Integrit\u00e4t<\/strong>: Sch\u00fctzen Sie Daten vor unbefugten \u00c4nderungen.<\/li><li><strong>Verf\u00fcgbarkeit<\/strong>: Sicherstellung des rechtzeitigen und zuverl\u00e4ssigen Zugangs zu Informationen.<\/li><li><strong>Sicherheit<\/strong>: Reduzieren Sie die mit eingebetteten Technologien verbundenen Risiken.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2532\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2532\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei SCF helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2532\" class=\"elementor-element elementor-element-30133d8 e-con-full e-flex e-con e-child\" data-id=\"30133d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2532\" class=\"elementor-element elementor-element-845a93d e-con-full e-flex e-con e-child\" data-id=\"845a93d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0172cc3 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"0172cc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova unterst\u00fctzt die SCF-Implementierung durch:<br \/><br \/><strong>Beweise und Artefakte<\/strong>: Bereitstellung von Beweisen f\u00fcr alle SCF-Bereiche.<br \/><strong>\u00dcberwachung<\/strong>: Bietet kontinuierliche \u00dcberwachungsdienste.<br \/><strong>Schwachstellenmanagement<\/strong>: Wirksames Management von Schwachstellen.<br \/><strong>Sicherheitsschulung<\/strong>: Bereitstellung von Schulungen zum Sicherheitsbewusstsein.<br \/><br \/>Die Dienstleistungen von ForeNova helfen Unternehmen, die SCF-Anforderungen zu erf\u00fcllen und sichere Abl\u00e4ufe zu gew\u00e4hrleisten.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5578275 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"5578275\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a68c18e elementor-widget elementor-widget-heading\" data-id=\"a68c18e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sarbanes-Oxley Act (SOX) Compliance\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-270f4da elementor-widget elementor-widget-n-accordion\" data-id=\"270f4da\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-4090\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-4090\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. Sarbanes-Oxley Act (SOX) \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-4090\" class=\"elementor-element elementor-element-3ea6e77 e-con-full e-flex e-con e-child\" data-id=\"3ea6e77\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-4090\" class=\"elementor-element elementor-element-692a40e e-flex e-con-boxed e-con e-child\" data-id=\"692a40e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-199b009 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"199b009\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das Sarbanes-Oxley-Gesetz (SOX) soll Anleger vor betr\u00fcgerischen Finanzberichten von Unternehmen sch\u00fctzen. Es gilt f\u00fcr alle b\u00f6rsennotierten Unternehmen in den USA, f\u00fcr ausl\u00e4ndische Unternehmen mit bei der SEC registrierten Wertpapieren und f\u00fcr Wirtschaftspr\u00fcfungsgesellschaften.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-4091\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-4091\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. Anforderungen des Sarbanes-Oxley Act (SOX) <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-4091\" class=\"elementor-element elementor-element-0f9dbaf e-con-full e-flex e-con e-child\" data-id=\"0f9dbaf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-4091\" class=\"elementor-element elementor-element-50cdd08 e-con-full e-flex e-con e-child\" data-id=\"50cdd08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2c6ef1 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"d2c6ef1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Section 302<\/strong>: Leitende Angestellte m\u00fcssen die Richtigkeit der Jahresabschl\u00fcsse bescheinigen.<\/li><li><strong>Sektion 404<\/strong>: Management und Pr\u00fcfer m\u00fcssen interne Kontrollen einrichten und aufrechterhalten.<\/li><li><strong>Abschnitt 802<\/strong>: Festlegung von Regeln f\u00fcr die Aufbewahrung von Unterlagen, einschlie\u00dflich Vernichtung und Aufbewahrungsfristen.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-4092\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-4092\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova beim Sarbanes-Oxley Act (SOX) helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-4092\" class=\"elementor-element elementor-element-4b1ac19 e-con-full e-flex e-con e-child\" data-id=\"4b1ac19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-4092\" class=\"elementor-element elementor-element-f58472d e-con-full e-flex e-con e-child\" data-id=\"f58472d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-53b3c3d accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"53b3c3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova unterst\u00fctzt die SOX-Konformit\u00e4t durch:<br \/><br \/><strong>Schwachstellenmanagement:<\/strong>\u00a0Analysieren und Verwalten von Schwachstellen.<br \/><strong>\u00dcberwachung von Audit-Protokollen<\/strong>: \u00dcberwachung und Verwaltung von Audit-Protokollen.<br \/><strong>Risikobewertungen<\/strong>: Durchf\u00fchrung regelm\u00e4\u00dfiger Risikobewertungen, um sicherzustellen, dass die internen Kontrollen wirksam sind.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b94ab62 accrodion_section e-flex e-con-boxed e-con e-parent\" data-id=\"b94ab62\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9fc8440 elementor-widget elementor-widget-heading\" data-id=\"9fc8440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">SOC II Typ 2 Einhaltung\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11dac66 elementor-widget elementor-widget-n-accordion\" data-id=\"11dac66\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:350,&quot;sizes&quot;:[]},&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1870\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1870\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 1. SOC II Typ 2 \u00dcberblick <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1870\" class=\"elementor-element elementor-element-32fd957 e-con-full e-flex e-con e-child\" data-id=\"32fd957\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1870\" class=\"elementor-element elementor-element-a13e650 e-flex e-con-boxed e-con e-child\" data-id=\"a13e650\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d8bef9 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"5d8bef9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"accordian-row active\"><div class=\"accordian-content\"><div class=\"inner-accordian-content\"><p>Ein SOC-2-Bericht vom Typ 2 bewertet, wie Cloud-basierte Dienstanbieter mit sensiblen Daten umgehen, und konzentriert sich dabei auf die Eignung und Wirksamkeit ihrer Kontrollen \u00fcber einen bestimmten Zeitraum. Er basiert auf f\u00fcnf Kriterien f\u00fcr vertrauensw\u00fcrdige Dienste: Sicherheit, Verf\u00fcgbarkeit, Integrit\u00e4t der Verarbeitung, Vertraulichkeit und Datenschutz.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1871\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1871\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 2. SOC II Typ 2 Anforderungen <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1871\" class=\"elementor-element elementor-element-1af94dc e-con-full e-flex e-con e-child\" data-id=\"1af94dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1871\" class=\"elementor-element elementor-element-0a09fc9 e-con-full e-flex e-con e-child\" data-id=\"0a09fc9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ef7a09f accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"ef7a09f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Sicherheit<\/strong>: Schutz der Systeme vor unberechtigtem Zugriff.<\/li><li><strong>Verf\u00fcgbarkeit<\/strong>: Sicherstellen, dass die Systeme f\u00fcr den Betrieb und die Nutzung wie zugesagt verf\u00fcgbar sind.<\/li><li><strong>Integrit\u00e4t der Verarbeitung<\/strong>: Sicherstellen, dass die Systemverarbeitung vollst\u00e4ndig, g\u00fcltig, genau, zeitgerecht und autorisiert ist.<\/li><li><strong>Vertraulichkeit<\/strong>: Sch\u00fctzen Sie die als vertraulich eingestuften Informationen.<\/li><li><strong>Datenschutz<\/strong>: Schutz personenbezogener Daten, die gesammelt, verwendet, gespeichert, weitergegeben und entsorgt werden.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1872\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1872\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> 3. Wie ForeNova bei SOC II Typ 2 helfen kann <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1872\" class=\"elementor-element elementor-element-a5f2328 e-con-full e-flex e-con e-child\" data-id=\"a5f2328\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1872\" class=\"elementor-element elementor-element-dd37d92 e-con-full e-flex e-con e-child\" data-id=\"dd37d92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41f1607 accordion_content elementor-widget elementor-widget-text-editor\" data-id=\"41f1607\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>ForeNova unterst\u00fctzt Unternehmen bei der Einhaltung von SOC 2 Typ 2 durch:<br \/><br \/><strong>Zugangskontrollen<\/strong>: \u00dcberwachung und Nachweis von Zugriffskontrollen.<br \/><strong>Systembetrieb<\/strong>: Gew\u00e4hrleistung eines sicheren und zuverl\u00e4ssigen Systembetriebs.<br \/><strong>Risikomanagement<\/strong>: Unterst\u00fctzung des Risikomanagements durch kontinuierliche \u00dcberwachung und Verfolgung von Schwachstellen.<br \/><strong>Reaktion auf Vorf\u00e4lle<\/strong>: Bietet robuste Funktionen zur Erkennung von und Reaktion auf Vorf\u00e4lle.<br \/><br \/>ForeNova&#8217;s NovaMDR Service stellt sicher, dass Unternehmen die SOC 2 Typ 2 Anforderungen durch effektive Sicherheitskontrollen und kontinuierliche \u00dcberwachung erf\u00fcllen k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a0ad0b e-flex e-con-boxed e-con e-parent\" data-id=\"0a0ad0b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f77f53 elementor-widget elementor-widget-heading\" data-id=\"8f77f53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vorfallsprozess<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ea3931 elementor-widget elementor-widget-heading\" data-id=\"0ea3931\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Risk reduction by Forenova<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e65a78c elementor-widget elementor-widget-image\" data-id=\"e65a78c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1134\" height=\"514\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/Group-427324674.svg\" class=\"attachment-full size-full wp-image-3582\" alt=\"Group Image Demo\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c644720 e-flex e-con-boxed e-con e-parent\" data-id=\"c644720\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-57dfdd7 e-con-full e-flex e-con e-child\" data-id=\"57dfdd7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-03b4ff2 e-con-full e-flex e-con e-child\" data-id=\"03b4ff2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3a9190 elementor-widget elementor-widget-image\" data-id=\"d3a9190\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"455\" height=\"220\" src=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/983Converted-01.png\" class=\"attachment-full size-full wp-image-3580\" alt=\"demo shield\" srcset=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/983Converted-01.png 455w, https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/983Converted-01-300x145.png 300w\" sizes=\"(max-width: 455px) 100vw, 455px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-81c060a e-con-full e-flex e-con e-child\" data-id=\"81c060a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f3134d4 elementor-widget elementor-widget-heading\" data-id=\"f3134d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">24\/7 \u00dcberwachung &amp; Expertise im Risikomanagement<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8fea35 elementor-widget elementor-widget-text-editor\" data-id=\"d8fea35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"BoxContent font16 w60 pl30\"><div class=\"BoxContent font16 w60 pl30\"><div class=\"BoxContent font16 w60  pl30\"><p>ForeNova hat es sich zur Aufgabe gemacht, seine Kunden auf ihrem Weg zur Einhaltung gesetzlicher Vorschriften zu unterst\u00fctzen.<br \/><br \/>Unser Expertenteam kennt die komplexe und sich st\u00e4ndig weiterentwickelnde Natur der Compliance-Anforderungen und wir haben umfassende L\u00f6sungen entwickelt, um den spezifischen Anforderungen von Unternehmen in verschiedenen Branchen gerecht zu werden.\u00a0<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-131bd55 right-half-star e-flex e-con-boxed e-con e-parent\" data-id=\"131bd55\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d412e14 e-con-full e-flex e-con e-child\" data-id=\"d412e14\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-94d6e4a e-con-full e-flex e-con e-child\" data-id=\"94d6e4a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-390526f e-con-full e-flex e-con e-child\" data-id=\"390526f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c1a42cd elementor-widget elementor-widget-heading\" data-id=\"c1a42cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Bereiten Sie sich auf die Einhaltung der Vorschriften vor<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fffada0 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"fffada0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Warten Sie nicht auf eine Sicherheitsverletzung, um den Wert einer robusten Cybersicherheit zu erkennen \u00a0<\/p><p><br \/>Fordern Sie noch heute eine Demo an und erfahren Sie aus erster Hand, wie NovaMDR Ihr Unternehmen bei der Einhaltung gesetzlicher Vorschriften unterst\u00fctzen kann.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b0bb971 e-con-full e-flex e-con e-child\" data-id=\"b0bb971\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c2a76d1 e-con-full e-flex e-con e-child\" data-id=\"c2a76d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-898899f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"898899f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" aria-hidden=\"true\"><g id=\"Alternate Phone1_layer\"><path d=\"M497.39 361.8l-112-48a24 24 0 0 0-28 6.9l-49.6 60.6A370.66 370.66 0 0 1 130.6 204.11l60.6-49.6a23.94 23.94 0 0 0 6.9-28l-48-112A24.16 24.16 0 0 0 122.6.61l-104 24A24 24 0 0 0 0 48c0 256.5 207.9 464 464 464a24 24 0 0 0 23.4-18.6l24-104a24.29 24.29 0 0 0-14.01-27.6z\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0ca497 e-con-full e-flex e-con e-child\" data-id=\"f0ca497\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24af60b elementor-widget elementor-widget-heading\" data-id=\"24af60b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Kontakt f\u00fcr Unterst\u00fctzung:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9338068 editor-link elementor-widget elementor-widget-text-editor\" data-id=\"9338068\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Festnetz: <a href=\"tel:+498926200920\">+49 8926 200 920<\/a><\/p><p>Montag-Freitag: 09:00-17:00<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9be5825 e-con-full e-flex e-con e-child\" data-id=\"9be5825\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d341adb elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"d341adb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" aria-hidden=\"true\"><g id=\"Envelope2_layer\"><path d=\"M502.3 190.8c3.9-3.1 9.7-.2 9.7 4.7V400c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V195.6c0-5 5.7-7.8 9.7-4.7 22.4 17.4 52.1 39.5 154.1 113.6 21.1 15.4 56.7 47.8 92.2 47.6 35.7.3 72-32.8 92.3-47.6 102-74.1 131.6-96.3 154-113.7zM256 320c23.2.4 56.6-29.2 73.4-41.4 132.7-96.3 142.8-104.7 173.4-128.7 5.8-4.5 9.2-11.5 9.2-18.9v-19c0-26.5-21.5-48-48-48H48C21.5 64 0 85.5 0 112v19c0 7.4 3.4 14.3 9.2 18.9 30.6 23.9 40.7 32.4 173.4 128.7 16.8 12.2 50.2 41.8 73.4 41.4z\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2387ced e-con-full e-flex e-con e-child\" data-id=\"2387ced\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f197880 elementor-widget elementor-widget-heading\" data-id=\"f197880\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">E-Mail f\u00fcr Informationen:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b19709 editor-link elementor-widget elementor-widget-text-editor\" data-id=\"9b19709\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"mailto:marketing@forenova.com\">marketing@forenova.com<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-98229d5 e-con-full e-flex e-con e-child\" data-id=\"98229d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44beb0f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"44beb0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 384 512\" aria-hidden=\"true\"><g id=\"Alternate Map Marker3_layer\"><path d=\"M172.268 501.67C26.97 291.031 0 269.413 0 192 0 85.961 85.961 0 192 0s192 85.961 192 192c0 77.413-26.97 99.031-172.268 309.67-9.535 13.774-29.93 13.773-39.464 0zM192 272c44.183 0 80-35.817 80-80s-35.817-80-80-80-80 35.817-80 80 35.817 80 80 80z\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d10d8c1 e-con-full e-flex e-con e-child\" data-id=\"d10d8c1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a3c259 elementor-widget elementor-widget-heading\" data-id=\"5a3c259\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Adresse des Hauptsitzes:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a79f765 elementor-widget elementor-widget-text-editor\" data-id=\"a79f765\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"container\"><div class=\"baseModuleParent\"><div class=\"content-wrapper\"><div class=\"customWidthOption\"><div class=\"ac-naxWidth-form\"><div class=\"ac-InnedDiv-form d-flex swap \"><div class=\"site-detailsAndContent w40\"><div class=\"site-imageAddressContent d-flex\"><div class=\"site-Contentaddres \"><p>ForeNova Technologies GmbH, Sulzbacher Str. 48, 90489 N\u00fcrnberg<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-278805b e-con-full e-flex e-con e-child\" data-id=\"278805b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ffa273 elementor-widget elementor-widget-heading\" data-id=\"7ffa273\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Demo anfordern<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa6dfe1 brevo_form elementor-widget elementor-widget-shortcode\" data-id=\"fa6dfe1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t\t\t\t<script type=\"text\/javascript\">\n\t\t\t\t\t\tvar gCaptchaSibWidget;\n                        var onloadSibCallbackInvisible = function () {\n\n                            var element = document.getElementsByClassName('sib-default-btn');\n                            var countInvisible = 0;\n                            var indexArray = [];\n                            jQuery('.sib-default-btn').each(function (index, el) {\n                                if ((jQuery(el).attr('id') == \"invisible\")) {\n                                    indexArray[countInvisible] = index;\n                                    countInvisible++\n                                }\n                            });\n\n                            jQuery('.invi-recaptcha').each(function (index, el) {\n                                grecaptcha.render(element[indexArray[index]], {\n                                    'sitekey': jQuery(el).attr('data-sitekey'),\n                                    'callback': sibVerifyCallback,\n                                });\n                            });\n                        };\n\t\t\t\t\t<\/script>\n\t\t\t\t\t                <script src=\"https:\/\/www.google.com\/recaptcha\/api.js?onload=onloadSibCallbackInvisible&render=explicit\" async defer><\/script>\n\t\t\t\t\n\t\t\t<form id=\"sib_signup_form_4\" method=\"post\" class=\"sib_signup_form\">\n\t\t\t\t<div class=\"sib_loader\" style=\"display:none;\"><img\n\t\t\t\t\t\t\tsrc=\"https:\/\/www.forenova.com\/wp-includes\/images\/spinner.gif\" alt=\"loader\"><\/div>\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_action\" value=\"subscribe_form_submit\">\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_id\" value=\"4\">\n                <input type=\"hidden\" name=\"sib_form_alert_notice\" value=\"Bitte f\u00fcllen Sie dieses Feld aus\">\n                <input type=\"hidden\" name=\"sib_form_invalid_email_notice\" value=\"Ihre E-Mail-Adresse ist ung\u00fcltig\">\n                <input type=\"hidden\" name=\"sib_security\" value=\"da8aa3a81e\">\n\t\t\t\t<div class=\"sib_signup_box_inside_4\">\n\t\t\t\t\t<div style=\"\/*display:none*\/\" class=\"sib_msg_disp\">\n\t\t\t\t\t<\/div>\n                                            <div id=\"sib_captcha_invisible\" class=\"invi-recaptcha\" data-sitekey=\"6LelL5IqAAAAACkl6mPfPq69G67Cs71WyITCIgDd\"><\/div>\n                    \t\t\t\t\t<input type=\"text\" name=\"bname\" id=\"bname\">\r\n<p class=\"sib-ORIGINAL_TRAFFIC_SOURCE-area \" id=\"custom-hidden-source\"> \r\n    <label class=\"sib-ORIGINAL_TRAFFIC_SOURCE-area\">UTM Source<\/label> \r\n    <input type=\"hidden\" class=\"sib-ORIGINAL_TRAFFIC_SOURCE-area\" name=\"ORIGINAL_TRAFFIC_SOURCE\" placeholder=\"UTM SOURCE\"> \r\n<\/p>\r\n\r\n<p class=\"sib-ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN1-area\" id=\"custom-hidden-campaign\"> \r\n    <label class=\"sib-ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN1-area\">ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN1<\/label> \r\n    <input type=\"hidden\" class=\"custom-hidden-field sib-ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN1-area\" name=\"ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN1\"> \r\n<\/p>\r\n\r\n<p class=\"sib-ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN2-area hidden\" id=\"custom-hidden-medium\"> \r\n    <label class=\"sib-ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN2-area\">UTM Medium<\/label> \r\n    <input type=\"hidden\" class=\"sib-ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN2-area\" name=\"ORIGINAL_TRAFFIC_SOURCE_DRILL_DOWN2\" placeholder=\"UTM CAMPAIGN\"> \r\n<\/p>\r\n\r\n\r\n<p class=\"sib-LATEST_TRAFFIC_SOURCE_DRILL_DOWN1-area\" id=\"url-field-hidden\"> \r\n    <label class=\"sib-LATEST_TRAFFIC_SOURCE_DRILL_DOWN1-area\">URL<\/label> \r\n    <input type=\"hidden\" class=\"sib-LATEST_TRAFFIC_SOURCE_DRILL_DOWN1-area\" name=\"LATEST_TRAFFIC_SOURCE_DRILL_DOWN1\"> \r\n<\/p>\r\n<p class=\"sib-FIRSTNAME-area\"> \r\n    <label class=\"sib-FIRSTNAME-area\">Vorname<span class=\"atrisk\">*<\/span><\/label> \r\n    <input type=\"text\" class=\"sib-FIRSTNAME-area\" name=\"FIRSTNAME\" required=\"required\"> \r\n<\/p>\r\n<p class=\"sib-LASTNAME-area\"> \r\n    <label class=\"sib-LASTNAME-area\">Nachname<span class=\"atrisk\">*<\/span><\/label> \r\n    <input type=\"text\" class=\"sib-LASTNAME-area\" name=\"LASTNAME\" required=\"required\"> \r\n<\/p><p class=\"sib-email-area\"> \r\n    <label class=\"sib-email-area\">Gesch\u00e4ftliche E-Mail<span class=\"atrisk\">*<\/span><\/label> \r\n    <input type=\"email\" class=\"sib-email-area\" name=\"email\" placeholder=\"\" value=\"\" required=\"required\"> \r\n<\/p>\r\n\r\n<p class=\"sib-COMPANY-area\"> \r\n    <label class=\"sib-COMPANY-area\">Unternehmen<span class=\"atrisk\">*<\/span><\/label> \r\n    <input type=\"text\" class=\"sib-COMPANY-area\" name=\"COMPANY\" required=\"required\"> \r\n<\/p>\r\n<p class=\"sib-TELEPHONENUMBER-area\"> \r\n    <label class=\"sib-TELEPHONENUMBER-area\">Telefonnummer<span class=\"atrisk\">*<\/span><\/label> \r\n    <input type=\"text\" class=\"sib-TELEPHONENUMBER-area\" name=\"TELEPHONENUMBER\" required=\"required\" pattern=\"[0-9]+([.|,][0-9]+)?\"> \r\n<\/p>\r\n<p class=\"sib-TITLE-area\"> \r\n    <label class=\"sib-TITLE-area\">Titel (Berufsbezeichnung)<\/label> \r\n    <input type=\"text\" class=\"sib-TITLE-area\" name=\"TITLE\"> \r\n<\/p>\r\n<p class=\"sib-COUNTRY-area full\"> \r\n    <label class=\"sib-COUNTRY-area\">Land<span class=\"atrisk\">*<\/span><\/label> \r\n    <input type=\"text\" class=\"sib-COUNTRY-area\" name=\"COUNTRY\" required=\"required\"> \r\n<\/p>\r\n<p class=\"full toc_row\"> <input type=\"checkbox\" name=\"terms\" required=\"required\"> <span>Ich bin damit einverstanden, dass ForeNova meine personenbezogenen Daten speichert und verarbeitet. Sie k\u00f6nnen diese Mitteilungen jederzeit abbestellen. Weitere Informationen zum Abbestellen, zu unseren Datenschutzpraktiken und zu unserer Verpflichtung, Ihre Privatsph\u00e4re zu sch\u00fctzen und zu respektieren, finden Sie in unseren Nutzungsbedingungen.<span>  <\/p>\r\n<p> \r\n    <input type=\"submit\" id=\"invisible\" class=\"sib-default-btn\" name=\"submit\" value=\"NACHRICHT SENDEN\"> \r\n<\/p>\r\n\t\t\t\t<\/div>\n\t\t\t<\/form>\n\t\t\t<style>\n\t\t\t\tform#sib_signup_form_4 p.sib-alert-message {\n    padding: 6px 12px;\n    margin-bottom: 20px;\n    border: 1px solid transparent;\n    border-radius: 4px;\n    -webkit-box-sizing: border-box;\n    -moz-box-sizing: border-box;\n    box-sizing: border-box;\n}\nform#sib_signup_form_4 p.sib-alert-message-error {\n    background-color: #f2dede;\n    border-color: #ebccd1;\n    color: #a94442;\n}\nform#sib_signup_form_4 p.sib-alert-message-success {\n    background-color: #dff0d8;\n    border-color: #d6e9c6;\n    color: #3c763d;\n}\nform#sib_signup_form_4 p.sib-alert-message-warning {\n    background-color: #fcf8e3;\n    border-color: #faebcc;\n    color: #8a6d3b;\n}\n\t\t\t<\/style>\n\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ForeNova-Leitfaden zur Cybersicherheits-Compliance ForeNova unterst\u00fctzt kleine und mittlere Unternehmen in der DACH-Region dabei, regulatorische Anforderungen zu erf\u00fcllen und deren Einhaltung nachzuweisen. TISAX-Konformit\u00e4t 1. TISAX \u00dcberblick TISAX (Trusted Information Security Assessment Exchange) ist ein Zertifizierungsrahmen, der speziell f\u00fcr die Automobilindustrie entwickelt wurde. Er wurde vom Verband der Automobilindustrie (VDA) entwickelt, um sicherzustellen, dass Unternehmen in der [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":true,"inline_featured_image":false,"footnotes":""},"class_list":["post-4529","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compliance-L\u00f6sungen f\u00fcr KRITIS, NIS2, ISO27002 und andere<\/title>\n<meta name=\"description\" content=\"Stellen Sie sicher, dass Ihr Unternehmen die f\u00fchrenden Vorschriften wie Basel III, NIS2, SOC II und andere einh\u00e4lt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forenova.com\/de\/compliance\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance-L\u00f6sungen f\u00fcr KRITIS, NIS2, ISO27002 und andere\" \/>\n<meta property=\"og:description\" content=\"Stellen Sie sicher, dass Ihr Unternehmen die f\u00fchrenden Vorschriften wie Basel III, NIS2, SOC II und andere einh\u00e4lt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forenova.com\/de\/compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Forenova\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T10:19:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V.png\" \/>\n\t<meta property=\"og:image:width\" content=\"283\" \/>\n\t<meta property=\"og:image:height\" content=\"283\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"27 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forenova.com\/de\/compliance\/\",\"url\":\"https:\/\/www.forenova.com\/de\/compliance\/\",\"name\":\"Compliance-L\u00f6sungen f\u00fcr KRITIS, NIS2, ISO27002 und andere\",\"isPartOf\":{\"@id\":\"https:\/\/www.forenova.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forenova.com\/de\/compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forenova.com\/de\/compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V-150x150.png\",\"datePublished\":\"2024-10-04T13:19:57+00:00\",\"dateModified\":\"2025-03-13T10:19:15+00:00\",\"description\":\"Stellen Sie sicher, dass Ihr Unternehmen die f\u00fchrenden Vorschriften wie Basel III, NIS2, SOC II und andere einh\u00e4lt.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forenova.com\/de\/compliance\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forenova.com\/de\/compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.forenova.com\/de\/compliance\/#primaryimage\",\"url\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V-150x150.png\",\"contentUrl\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V-150x150.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forenova.com\/de\/compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forenova.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forenova.com\/de\/#website\",\"url\":\"https:\/\/www.forenova.com\/de\/\",\"name\":\"Forenova\",\"description\":\"Forenova\",\"publisher\":{\"@id\":\"https:\/\/www.forenova.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forenova.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forenova.com\/de\/#organization\",\"name\":\"Forenova\",\"url\":\"https:\/\/www.forenova.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.forenova.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova_logo.webp\",\"contentUrl\":\"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova_logo.webp\",\"width\":230,\"height\":41,\"caption\":\"Forenova\"},\"image\":{\"@id\":\"https:\/\/www.forenova.com\/de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compliance-L\u00f6sungen f\u00fcr KRITIS, NIS2, ISO27002 und andere","description":"Stellen Sie sicher, dass Ihr Unternehmen die f\u00fchrenden Vorschriften wie Basel III, NIS2, SOC II und andere einh\u00e4lt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forenova.com\/de\/compliance\/","og_locale":"de_DE","og_type":"article","og_title":"Compliance-L\u00f6sungen f\u00fcr KRITIS, NIS2, ISO27002 und andere","og_description":"Stellen Sie sicher, dass Ihr Unternehmen die f\u00fchrenden Vorschriften wie Basel III, NIS2, SOC II und andere einh\u00e4lt.","og_url":"https:\/\/www.forenova.com\/de\/compliance\/","og_site_name":"Forenova","article_modified_time":"2025-03-13T10:19:15+00:00","og_image":[{"width":283,"height":283,"url":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"27 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forenova.com\/de\/compliance\/","url":"https:\/\/www.forenova.com\/de\/compliance\/","name":"Compliance-L\u00f6sungen f\u00fcr KRITIS, NIS2, ISO27002 und andere","isPartOf":{"@id":"https:\/\/www.forenova.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forenova.com\/de\/compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.forenova.com\/de\/compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V-150x150.png","datePublished":"2024-10-04T13:19:57+00:00","dateModified":"2025-03-13T10:19:15+00:00","description":"Stellen Sie sicher, dass Ihr Unternehmen die f\u00fchrenden Vorschriften wie Basel III, NIS2, SOC II und andere einh\u00e4lt.","breadcrumb":{"@id":"https:\/\/www.forenova.com\/de\/compliance\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forenova.com\/de\/compliance\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.forenova.com\/de\/compliance\/#primaryimage","url":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V-150x150.png","contentUrl":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/RSMCERT.2024.32_ForeNova-Technologies-B.V-150x150.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forenova.com\/de\/compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forenova.com\/de\/"},{"@type":"ListItem","position":2,"name":"Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.forenova.com\/de\/#website","url":"https:\/\/www.forenova.com\/de\/","name":"Forenova","description":"Forenova","publisher":{"@id":"https:\/\/www.forenova.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forenova.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.forenova.com\/de\/#organization","name":"Forenova","url":"https:\/\/www.forenova.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.forenova.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova_logo.webp","contentUrl":"https:\/\/www.forenova.com\/wp-content\/uploads\/2024\/10\/ForeNova_logo.webp","width":230,"height":41,"caption":"Forenova"},"image":{"@id":"https:\/\/www.forenova.com\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/pages\/4529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/comments?post=4529"}],"version-history":[{"count":0,"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/pages\/4529\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forenova.com\/de\/wp-json\/wp\/v2\/media?parent=4529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}