{"id":2668,"date":"2023-09-24T20:42:50","date_gmt":"2023-09-24T20:42:50","guid":{"rendered":"https:\/\/cyber-curriculum.com\/it-security-compliance\/"},"modified":"2024-11-16T02:55:18","modified_gmt":"2024-11-16T02:55:18","slug":"it-security-compliance","status":"publish","type":"page","link":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/","title":{"rendered":"IT Security &amp; Compliance"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:350px;--awb-padding-bottom:200px;--awb-padding-top-small:170px;--awb-padding-bottom-small:0px;--awb-background-color:var(--awb-color8);--awb-background-image:linear-gradient(180deg, rgba(0,0,0,0.1) 0%,#153731 100%),url(https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cc-it-security-compliance-header.jpg);;--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_4_5 4_5 fusion-flex-column\" style=\"--awb-padding-bottom-small:30px;--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-no-small-visibility fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:20px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:56px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:56;line-height:1.14;\">Customized IT security &amp; compliance solutions.<\/h1><\/div><div class=\"fusion-title title fusion-title-2 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:20px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:48;line-height:1.33;\">Customized IT security <br \/>&amp; compliance solutions.<\/h1><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:20px;width:100%;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-padding-bottom-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:0px;--awb-background-image:linear-gradient(180deg, #153731 0%,rgba(255,255,255,0) 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:30px;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInLeft\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">a question &#8230;<\/h3><\/div><div class=\"fusion-text fusion-text-1 sm-text-align-center\"><p style=\"color: var(--awb-color1);\">What is the value of a complex, automated network monitoring system if the door to your data center is not locked?<\/p>\n<p style=\"color: var(--awb-color1);\">IT security and compliance must always be viewed holistically and in a structured manner in order to achieve a positive effect: from organization to technical implementation. If even one aspect is neglected, this opens the door to attackers. And the legislator punishes this negligence with severe penalties, for example through the IT Security Act 2.0 (IT-SiG 2.0).<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(0,0,0,0);--awb-divider-hover-color:var(--awb-color8);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:#ffffff;--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2668-1\"><div class=\"fusion-panel panel-default panel-7dc52ed991039be0e fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_7dc52ed991039be0e\"><a aria-expanded=\"false\" aria-controls=\"7dc52ed991039be0e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2668-1\" data-target=\"#7dc52ed991039be0e\" href=\"#7dc52ed991039be0e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">learn more<\/span><\/a><\/h4><\/div><div id=\"7dc52ed991039be0e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_7dc52ed991039be0e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The days when manual hacker attacks were commonplace are long gone. Nowadays, automated tools with artificial intelligence are in use that constantly scan the entire Internet for vulnerabilities. This means that you no longer need to be targeted by global attackers or even insider threats to be at risk.<\/p>\n<p>IT security and compliance go hand in hand here and offer an efficient way to increase the security level of your organization and protect yourself from attacks and potential penalties.<\/p>\n<p>Compliance refers to the regulatory aspect and defines the minimum level of protection required by both legislators and business partners.<\/p>\n<p>IT security comprises all technical and organizational measures that contribute to ensuring this defined security in terms of confidentiality, integrity and availability of systems.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-padding-top-small:39px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-1\" data-id=\"1\" style=\"--awb-margin-top:-90px;--awb-margin-right:-30px;--awb-margin-left:-30px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/1-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:80px;--awb-padding-bottom-small:50px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-no-small-visibility fusion-no-medium-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:50px;width:100%;\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-small:35px;--awb-padding-right-small:35px;--awb-padding-bottom-small:35px;--awb-padding-left-small:35px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:95%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:95%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:30px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">How can we support you?<\/h4><\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Determination of a target image of the ISMS<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Handling IT security incidents <span style=\"color: var(--awb-textcolor); background-color: var(--awb-even-row-bgcolor); font-size: var(--awb-size); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">(incident management)<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Monitoring the implementation of the measures<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Conception and development of a central security operations center<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Compliance with laws and standards <span style=\"color: var(--awb-textcolor); background-color: var(--awb-odd-row-bgcolor); font-size: var(--awb-size); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">(BSI, ISO, GDPR&#8230;)<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Business continuity management, crisis and emergency management<\/p>\n<\/div><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-bottom-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2 awb-text-cols fusion-text-columns-2 fusion-no-small-visibility\" style=\"--awb-text-color:var(--awb-color1);--awb-columns:2;--awb-column-spacing:2em;--awb-column-min-width:100px;\"><p>Backing up your information systems usually involves several steps. First of all, it is important to develop an understanding of how the various components interact with each other, where they are located and when they are active. Next, a target is defined that is in line with the expected risk, the budget and the requirements of external partners such as suppliers or legislators. In the third step, measures are developed to achieve this goal, whereby priorities are set in such a way that implementation can take place as efficiently as possible. Finally, the technical and organizational measures are implemented throughout the entire organization.<\/p>\n<p>Our certified experts will be happy to assist you in each of these steps! If you are interested, contact us and we will prepare a customized offer that meets your specific operational requirements.<\/p>\n<\/div><div class=\"fusion-text fusion-text-3 sm-text-align-center fusion-no-medium-visibility fusion-no-large-visibility\" style=\"--awb-text-color:var(--awb-color1);\"><p>Backing up your information systems usually involves several steps. First of all, it is important to develop an understanding of how the various components interact with each other, where they are located and when they are active. Next, a target is defined that is in line with the expected risk, the budget and the requirements of external partners such as suppliers or legislators. In the third step, measures are developed to achieve this goal, whereby priorities are set in such a way that implementation can take place as efficiently as possible. Finally, the technical and organizational measures are implemented throughout the entire organization.<\/p>\n<p>Our certified experts will be happy to assist you in each of these steps! If you are interested, contact us and we will prepare a customized offer that meets your specific operational requirements.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:20px;--awb-padding-right:19px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:22%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"138\" height=\"138\" title=\"Group 281\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-281.png\" alt class=\"img-responsive wp-image-2561\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-281-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-281.png 138w\" sizes=\"(max-width: 138px) 100vw, 138px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">1. Structured &amp; Detailed Analysis<\/h5><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">In close collaboration with you, we conduct a thorough inventory to identify all relevant processes and data within your company.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:20px;--awb-padding-right:19px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:22%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"139\" height=\"138\" title=\"Group 282\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-282.png\" alt class=\"img-responsive wp-image-2563\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-282-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-282.png 139w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">2. Personalized Risk Assessment<\/h5><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">Using our expertise, we identify and evaluate potential data protection risks and vulnerabilities.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:20px;--awb-padding-right:19px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:22%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"139\" height=\"138\" title=\"Group 284\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-284.png\" alt class=\"img-responsive wp-image-2562\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-284-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-284.png 139w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">3. Compliance &#8211;<br \/>Audit<\/h5><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">It is our responsibility to ensure that your company fully complies with relevant data protection regulations, such as GDPR.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:20px;--awb-padding-right:19px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:22%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"227\" height=\"227\" title=\"Group 275\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-275.png\" alt class=\"img-responsive wp-image-2556\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-275-200x200.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-275.png 227w\" sizes=\"(max-width: 640px) 100vw, 227px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">4. Tailored Solutions<\/h5><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">Based on our findings, we develop a customized action plan to address identified vulnerabilities and ensure compliance with data protection laws.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion-flex-column fusion-animated borderhover2\" style=\"--awb-padding-top:100px;--awb-padding-right:80px;--awb-padding-bottom:100px;--awb-padding-left:80px;--awb-padding-right-medium:40px;--awb-padding-bottom-medium:80px;--awb-padding-left-medium:40px;--awb-padding-top-small:40px;--awb-padding-right-small:30px;--awb-padding-bottom-small:40px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-top:0px;--awb-border-right:0px;--awb-border-bottom:0px;--awb-border-left:0px;--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:100%;--awb-margin-top-large:40px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8 md-text-align-center sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p style=\"color: var(--awb-color1); font-size: 18px;\" data-fusion-font=\"true\">Have we caught your Attention?<\/p>\n<\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">ARE YOU READY TO<br \/>\nSECURE YOUR ORGANIZATION?<\/h2><\/div><div class=\"fusion-text fusion-text-9 md-text-align-center sm-text-align-center\"><p style=\"color: var(--awb-color1);\">Do you need a non-binding quote or further information?<br \/>\nThen feel free to reach out to us or book a non-binding consultation appointment.<\/p>\n<\/div><div class=\"md-text-align-center sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Book your call<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-padding-right-medium:100px;--awb-padding-left-medium:100px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:50px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-2 fusion-no-small-visibility\" data-id=\"2\" style=\"--awb-margin-top:-90px;--awb-margin-right:-70px;--awb-margin-bottom:-150px;--awb-margin-left:-70px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"viewport\" data-start_point=\"0\" data-end_point=\"100\" data-animationoffset=\"top-into-view\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-lottie fusion-lottie-3 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"3\" style=\"--awb-margin-top:-70px;--awb-margin-right:-100px;--awb-margin-bottom:-50px;--awb-margin-left:-100px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><style>.element {\n  opacity: 1;\n  transition: opacity 0.5s ease-in-out;\n}\n\n.element.fade-out {\n  opacity: 0;\n}\n\n\t\t.sticky-button {\n\t\t\tposition: fixed;\n\t\t\tbottom: 40px;\nright: 40px;\nwidth: 3rem;\nheight: 3rem;\n\t\t\tbackground-color: #23c7ac;\n\t\t\tborder: none;\n\t\t\tcolor: white;\n\t\t\tpadding: 8px 8px 8px 8px;\n\t\t\ttext-align: center;\n\t\t\ttext-decoration: none;\n\t\t\tdisplay: inline-block;\n\t\t\tfont-size: 13px;\n\t\t\tcursor: pointer;\n\t\t\tz-index: 9999 !important;\n\t\t\tborder-radius: 100rem;\n\t\t}\n\n@media only screen and (max-width: 600px) {\n    .sticky-button {\n        bottom: 30px; \n        right: 20px;\n    }\n}\n\n\t\t.sticky-button .fade-out {\nopacity: 0;\n}\n\n\t\t.sticky-button img {\n\t\t\tdisplay: block;\n\t\t\tmargin: 0 auto 5px;\n\t\t\theight: 20px;\n\t\t\twidth: auto;\n\t\t}\n\n\t\t.popup {\n\t\t\tposition: fixed;\n\t\t\ttop: 0;\n\t\t\tleft: 0;\n\t\t\twidth: 100%;\n\t\t\theight: 100%;\n\t\t\tbackground-color: rgba(0, 0, 0, 0.8);\n\t\t\tdisplay: flex;\n\t\t\tjustify-content: center;\n\t\t\talign-items: center;\n\t\t\tz-index: 9999;\n\t\t\topacity: 0;\n\t\t\tpointer-events: none;\n\t\t\ttransition: opacity 0.3s ease-in-out;\n\t\t}\n\n\t\t.popup.show {\n\t\t\topacity: 1;\n\t\t\tpointer-events: auto;\n\t\t}\n\n\t\t.popup-content {\n\t\t\tbox-shadow: 0px 0px 10px rgba(0, 0, 0, 0.5);\n\t\t}\n\t\t.close-button {\n\t\t\tposition: absolute;\n\t\t\ttop: 10px;\n\t\t\tright: 10px;\n\t\t\tfont-size: 24px;\n\t\t\tcolor: #999;\n\t\t\tcursor: pointer;\n\t\t}\n\t<\/style><div class=\"element fade-out\"><button id=\"sticky-button\" class=\"sticky-button\"><img decoding=\"async\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/icon_ansprechpartner.svg\" alt=\"Button Image\" loading=\"lazy\"><\/button><\/div><div id=\"popup\" class=\"popup\"><div class=\"popup-content\"><span id=\"close-button\" class=\"close-button\">\u00d7\n    <\/span><div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-z-index:9999999999999999999999;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:#454545;--awb-border-top:2px;--awb-border-right:2px;--awb-border-bottom:2px;--awb-border-left:2px;--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:100%;--awb-flex-grow:0;--awb-flex-shrink:0;--awb-margin-top-large:;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-flex-grow-medium:0;--awb-flex-shrink-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-flex-grow-small:0;--awb-flex-shrink-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:35px;--awb-padding-bottom:35px;--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Niclas Matz<\/h4><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;width:100%;\"><div class=\"fusion-separator-border sep-single sep-solid\" style=\"--awb-height:20px;--awb-amount:20px;border-color:var(--awb-color3);border-top-width:1px;\"><\/div><\/div><div class=\"fusion-text fusion-text-10 fusion-text-no-margin\" style=\"--awb-margin-top:10px;--awb-margin-bottom:0px;\"><p style=\"color: var(--awb-color1);\">Ihr IT-Security &amp; Compliance Experte<\/p>\n<\/div><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-3 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-phone fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>+49 (0) 30 577 006 830<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon fa-envelope fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>info@cyber-curriculum.de<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_3 1_3 fusion-flex-column fusion-flex-align-self-flex-end\" style=\"--awb-padding-top:15px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:33.333333333333%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-end fusion-content-layout-column\"><div class=\"fusion-image-element sm-text-align-right\" style=\"--awb-margin-top:10px;--awb-max-width:150px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"473\" height=\"649\" title=\"Design-ohne-Titel-3-1\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Design-ohne-Titel-3-1-1.png\" alt class=\"img-responsive wp-image-2612\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Design-ohne-Titel-3-1-1-200x274.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Design-ohne-Titel-3-1-1-400x549.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Design-ohne-Titel-3-1-1.png 473w\" sizes=\"(max-width: 640px) 100vw, 473px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n\n\n    <\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2668","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Security &amp; Compliance - CyberCurriculum<\/title>\n<meta name=\"description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security &amp; Compliance - CyberCurriculum\" \/>\n<meta property=\"og:description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberCurriculum\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-16T02:55:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/\",\"url\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/\",\"name\":\"IT Security &amp; Compliance - CyberCurriculum\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"datePublished\":\"2023-09-24T20:42:50+00:00\",\"dateModified\":\"2024-11-16T02:55:18+00:00\",\"description\":\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security &amp; Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"CyberCurriculum\",\"description\":\"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security &amp; Compliance - CyberCurriculum","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/","og_locale":"en_US","og_type":"article","og_title":"IT Security &amp; Compliance - CyberCurriculum","og_description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","og_url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/","og_site_name":"CyberCurriculum","article_modified_time":"2024-11-16T02:55:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/","url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/","name":"IT Security &amp; Compliance - CyberCurriculum","isPartOf":{"@id":"\/#website"},"datePublished":"2023-09-24T20:42:50+00:00","dateModified":"2024-11-16T02:55:18+00:00","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","breadcrumb":{"@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cyber-curriculum.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"IT Security &amp; Compliance"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"CyberCurriculum","description":"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/comments?post=2668"}],"version-history":[{"count":7,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2668\/revisions"}],"predecessor-version":[{"id":4180,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2668\/revisions\/4180"}],"wp:attachment":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/media?parent=2668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}