{"id":10197,"date":"2023-01-22T08:52:00","date_gmt":"2023-01-22T07:52:00","guid":{"rendered":"https:\/\/a-volution.net\/?post_type=modul&amp;p=9988"},"modified":"2023-01-22T08:52:00","modified_gmt":"2023-01-22T07:52:00","slug":"modul-5-cyber-security","status":"publish","type":"modul","link":"https:\/\/wp.a-volution.net\/en\/modul\/modul-5-cyber-security\/","title":{"rendered":"<p>MODUL 5<\/p> CYBER SECURITY"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Ihre Herausforderung<\/h2>\n\n\n\n<p>Sie stehen vor der Aufgabe, eine neue Technologie in Ihrem Unternehmen zu erproben. Die technische Machbarkeit ist nur ein Aspekt, der beachtet werden will. Um eine neue Technologie dauerhaft in den Einsatz zu bringen oder gar neue Umsatzquellen zu erschlie\u00dfen, ist es n\u00f6tig das geplante Einsatzszenario mit den konkreten Anforderungen von Stakeholdern und Nutzern in Einklang zu bringen. Bei aller Technik m\u00fcssen im Kern immer erst die Menschen von der Wirksamkeit \u00fcberzeugt werden.<\/p>\n\n\n\n<div style=\"height:52px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Unsere L\u00f6sungen<\/h2>\n\n\n\n<p>Der Usecase ist konkret formuliert und das Feedback von Stakeholdern und Nutzern&nbsp;<strong>priorisiert<\/strong>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Unser Vorgehen<\/h2>\n\n\n\n<p>Das Feedback von potenziellen Nutzer:innen sowie allen wichtigen Business-Units wird eingeholt. Prozess-Analysen konkretisieren das Zielbild zus\u00e4tzlich.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kriminelle Gef\u00e4hrdungen in der digitalen Welt erkennen<\/p>\n","protected":false},"author":6,"featured_media":0,"template":"","meta":{"inline_featured_image":false},"tags":[],"modul_categories":[98,99],"class_list":["post-10197","modul","type-modul","status-publish","hentry","modul_categories-loesungsbaustein-1","modul_categories-x-volution"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MODUL 5 CYBER SECURITY &#8211; A-VOLUTION<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wp.a-volution.net\/en\/modul\/modul-5-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MODUL 5 CYBER SECURITY &#8211; A-VOLUTION\" \/>\n<meta property=\"og:description\" content=\"Kriminelle Gef\u00e4hrdungen in der digitalen Welt erkennen\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.a-volution.net\/en\/modul\/modul-5-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"A-VOLUTION\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/modul\\\/modul-5-cyber-security\\\/\",\"url\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/modul\\\/modul-5-cyber-security\\\/\",\"name\":\"MODUL 5 CYBER SECURITY &#8211; A-VOLUTION\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/#website\"},\"datePublished\":\"2023-01-22T07:52:00+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/modul\\\/modul-5-cyber-security\\\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/\",\"name\":\"A-VOLUTION\",\"description\":\"Wandel gemeinsam gestalten\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/#organization\",\"name\":\"A-VOLUTION GmbH & Co. KG\",\"url\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/a-volution.net\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/a-volution-logo-1605-01-sw-f-01.svg\",\"contentUrl\":\"https:\\\/\\\/a-volution.net\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/a-volution-logo-1605-01-sw-f-01.svg\",\"width\":359,\"height\":110,\"caption\":\"A-VOLUTION GmbH & Co. KG\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.a-volution.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MODUL 5 CYBER SECURITY &#8211; A-VOLUTION","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wp.a-volution.net\/en\/modul\/modul-5-cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"MODUL 5 CYBER SECURITY &#8211; A-VOLUTION","og_description":"Kriminelle Gef\u00e4hrdungen in der digitalen Welt erkennen","og_url":"https:\/\/wp.a-volution.net\/en\/modul\/modul-5-cyber-security\/","og_site_name":"A-VOLUTION","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wp.a-volution.net\/en\/modul\/modul-5-cyber-security\/","url":"https:\/\/wp.a-volution.net\/en\/modul\/modul-5-cyber-security\/","name":"MODUL 5 CYBER SECURITY &#8211; A-VOLUTION","isPartOf":{"@id":"https:\/\/wp.a-volution.net\/en\/#website"},"datePublished":"2023-01-22T07:52:00+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.a-volution.net\/en\/modul\/modul-5-cyber-security\/"]}]},{"@type":"WebSite","@id":"https:\/\/wp.a-volution.net\/en\/#website","url":"https:\/\/wp.a-volution.net\/en\/","name":"A-VOLUTION","description":"Wandel gemeinsam gestalten","publisher":{"@id":"https:\/\/wp.a-volution.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.a-volution.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wp.a-volution.net\/en\/#organization","name":"A-VOLUTION GmbH & Co. KG","url":"https:\/\/wp.a-volution.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wp.a-volution.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/a-volution.net\/wp-content\/uploads\/2022\/05\/a-volution-logo-1605-01-sw-f-01.svg","contentUrl":"https:\/\/a-volution.net\/wp-content\/uploads\/2022\/05\/a-volution-logo-1605-01-sw-f-01.svg","width":359,"height":110,"caption":"A-VOLUTION GmbH & Co. KG"},"image":{"@id":"https:\/\/wp.a-volution.net\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/wp.a-volution.net\/en\/wp-json\/wp\/v2\/modul\/10197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.a-volution.net\/en\/wp-json\/wp\/v2\/modul"}],"about":[{"href":"https:\/\/wp.a-volution.net\/en\/wp-json\/wp\/v2\/types\/modul"}],"author":[{"embeddable":true,"href":"https:\/\/wp.a-volution.net\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":0,"href":"https:\/\/wp.a-volution.net\/en\/wp-json\/wp\/v2\/modul\/10197\/revisions"}],"wp:attachment":[{"href":"https:\/\/wp.a-volution.net\/en\/wp-json\/wp\/v2\/media?parent=10197"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.a-volution.net\/en\/wp-json\/wp\/v2\/tags?post=10197"},{"taxonomy":"modul_categories","embeddable":true,"href":"https:\/\/wp.a-volution.net\/en\/wp-json\/wp\/v2\/modul_categories?post=10197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}