{"id":24697,"date":"2025-10-22T13:19:25","date_gmt":"2025-10-22T11:19:25","guid":{"rendered":"https:\/\/sits.friendventure.dev\/our-cyber-defense-approach\/"},"modified":"2025-11-04T11:30:11","modified_gmt":"2025-11-04T10:30:11","slug":"digital-challenges-our-cyber-defense-approach","status":"publish","type":"page","link":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/","title":{"rendered":"Our Cyber Defense Approach"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"800\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-Cyber-Devence-Center.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-Cyber-Devence-Center.jpg 1920w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-Cyber-Devence-Center-300x125.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-Cyber-Devence-Center-1024x427.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-Cyber-Devence-Center-768x320.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-Cyber-Devence-Center-1536x640.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Proactive, compliant and monitored 24\/7 \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    <b>Our Cyber Defense Approach<\/b> \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#contact\" class=\"btn-text\">Request Consultation<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h2 class=\"summary-headline headline h2\">Invisible threats, visibleconsequences<\/h2>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Organisations with critical processes \u2013 such as in energy supply, finance, industry, transport, healthcare or administration \u2013 are increasingly targeted by cyber attacks.<\/p>\n<p>New attack patterns driven by AI, fragmented security landscapes, a shortage of skilled professionals, and rising regulatory pressure from ISO 27001, BSI basic protection, and directives like NIS2 and DORA are creating complex challenges for corporate cyber security:<\/p>\n<div class=\"text\">\n<ul>\n<li><strong>Unclear security situation:<\/strong> Often, there is no overview of which areas are adequately protected and where action is needed.<\/li>\n<li><strong>Fragmented security landscapes:<\/strong> Numerous isolated tools create blind spots, increase complexity and lead to unnecessary false positives.<\/li>\n<li><strong>Long response times:<\/strong> Too much time often elapses between an attack and its detection \u2013 with consequences for business continuity and trust.<br \/>\nSkills shortage: Experienced cyber security specialists are in short supply, internal teams are overloaded and costs are rising.<\/li>\n<li><strong>Skills shortage:<\/strong> Experienced cyber security specialists are in short supply, internal teams are overloaded and costs are rising.<\/li>\n<li><strong>New attack patterns:<\/strong> AI-driven threats are developing rapidly \u2013 traditional defence strategies are no longer sufficient.<\/li>\n<li><strong>High investment:<\/strong> Developing in-house solutions requires considerable budgets for technology, resources and expertise.<\/li>\n<\/ul>\n<p>The complexity of challenges and risks highlights why a holistic approach to cyber defense is indispensable. We support you as a trusted partner: with over 700 experts, more than 20 years of experience, and over 2,000 protected organizations, we deliver tailored 360\u00b0 Security Services \u2013 EU-based, GDPR-compliant, and aligned with NIS2 and DORA.<\/p>\n<\/div>\n<p><\/p><\/div>\n\n                        \n\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-m\"><\/div>\n<h2  class=\"h1 smx-headline  center\">From protecting individual systems to achieving true resilience<\/h2>[vc_column_text]<\/p>\n<p style=\"text-align: center;\"><strong>The importance of a holistic cyber defence strategy and what it includes<\/strong><\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-6 iconboxes-cols-3 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Wenn-Sicherheitssysteme-zusammenarbeiten.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    When security systems collaborate                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Security solutions only deliver their full benefits when they work together. Individual tools provide data, but not a clear picture. The intelligent linking of technologies, processes and knowledge creates a strong security net that detects attacks faster and defends against them in a more targeted manner. You gain an overview, reduce effort and increase the actual value of your existing security investments.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Schnell-reagieren-in-komplexen-IT-Umgebungen.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Responding quickly in complex IT environments                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Modern infrastructures consist of a multitude of networked systems that are potentially vulnerable around the clock. A holistic detection and response approach ensures that threats are identified early and efficiently countered. Automated analyses, clear processes and experienced security teams enable incidents to be quickly assessed and damage minimised.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Vorausschauende-Sicherheit-durch-CTEM.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Proactive Security with CTEM                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Continuous Threat Exposure Management (CTEM) goes beyond traditional Vulnerability Management: attack paths are simulated to identify where threats can be most effectively interrupted. This provides clarity about your actual risk situation and enables the targeted prioritisation of protective measures. In addition, regular pentesting and intelligent supply chain analysis strengthen the overall view of potential attack surfaces \u2013 for proactive cyber defence.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Gemeinsam-staerker-durch-Cyber-Security-Intelligence.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Stronger together through Cyber Security Intelligence                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Effective cyber defence starts with knowledge \u2013 about threats and about your own behaviour. Threat intelligence provides you with up-to-date insights into attackers, tactics and vulnerabilities so that you can identify risks early on and defend against them in a targeted manner. At the same time, targeted security awareness promotes an attentive and security-conscious workforce that recognises threats before they cause damage. This creates a learning security culture in which data, processes and people work together to build resilience.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-5  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            05\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Monitor-Detect-Respond.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Monitor, Detect & Respond                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    This approach stands for the continuous monitoring of IT systems, the rapid detection of security incidents and targeted responses to them. Modern technologies make it possible to identify suspicious activity in real time and initiate automated countermeasures. This stops attacks promptly and minimises damage. The close integration of analysis, automation, and human expertise creates an agile defence structure that not only detects threats but also proactively counters them.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-6  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            06\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Stabilitaet-durch-Compliance-Governance.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Stability through Compliance & Governance                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Effective cyber defence is the result of many forces working together. Compliance and governance provide the strategic framework in which exposure management, cyber security intelligence, and monitor, detect and respond interlock. Clear guidelines, transparent processes and regular audits ensure that security measures are not only effective but also compliant. This transforms individual protection mechanisms into a coordinated system \u2013 the backbone of a resilient Cyber Defence Center.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row headline_tag=\"h1\" headline_style=\"h1\" button_style=\"\" icon=\"\" img=\"20301\" spiegeln=\"spiegeln\" headline_content=\"Lernen &amp; Zertifizieren \u2013 alles aus einer Hand\" sub_headline_content=\"Erfolgreiche Weiterbildung und sichere Zertifikationen im eigenen Schulungszentrum.\" button_1=\"\" el_id=\"compliance-governance\"][vc_column]<h2  class=\"h1 smx-headline  center\">Your powerful Cyber Defence System<\/h2>[vc_column_text]<\/p>\n<p style=\"text-align: center;\"><strong>Greater resilience, clear compliance, comprehensive defence.<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">A reliable, holistic and compliant Cyber Defence System consists of four pillars. Together, they protect your critical processes, meet NIS2 and DORA requirements and help you remain operational at all times \u2013 thanks to an integrated security architecture consisting of proactive and reactive modules.<\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-m\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <h2 class=\"h2 smx-headline\">\n            Compliance &amp; Governance        <\/h2>\n    <\/div>\n    <div class=\"subheadline\">\n        Legally compliant and future-proof    <\/div>\n    <div class=\"text\">\n        <span style=\"font-weight: 400;\">Our consulting services provide companies with comprehensive and reliable support in meeting requirements such as ISO 27001, KRITIS, TISAX, NIS2 and DORA. At the same time, risks are controlled and contingency plans established to ensure that business processes remain stable even in an emergency.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our services include:<\/span><\/p>\n<ul>\n<li><strong>ISMS &amp; BCM implementation:<\/strong> From kick-off workshops to ongoing support \u2013 comprehensive implementation of information security and business continuity<\/li>\n<li><strong>Continuous compliance checks:<\/strong> Monthly reports, prioritised recommendations and certification preparation<\/li>\n<li><strong>Cyber Risk Management:<\/strong> Lean processes for emergency and crisis management ensure rapid response times<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"632\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Compliance.png\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Compliance.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Compliance-300x247.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row headline_tag=\"h1\" headline_style=\"h1\" button_style=\"\" icon=\"\" img=\"20301\" spiegeln=\"spiegeln\" headline_content=\"Lernen &amp; Zertifizieren \u2013 alles aus einer Hand\" sub_headline_content=\"Erfolgreiche Weiterbildung und sichere Zertifikationen im eigenen Schulungszentrum.\" button_1=\"\" el_id=\"ueberwachen-erkennen-reagieren\"][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <h2 class=\"h2 smx-headline\">\n            Monitor, Detect &amp; Respond        <\/h2>\n    <\/div>\n    <div class=\"subheadline\">\n        Neutralise threats in real time    <\/div>\n    <div class=\"text\">\n        Our Monitor, Detect &amp; Respond services secure your IT and OT environments around the clock. Our analysts continuously monitor systems, isolate threats at an early stage and respond immediately and reliably in the event of an emergency.<\/p>\n<p>Our services include:<\/p>\n<ul>\n<li><strong>Managed XDR &amp; SIEM: <\/strong>Holistic detection and isolation of attacks across endpoints, networks, cloud and IoT.<\/li>\n<li><strong>24\/7 SOC &amp; Incident Response: <\/strong>Continuous monitoring, analysis and rapid response \u2013 day and night.<\/li>\n<li><strong>Effective incident handling:<\/strong> From phishing to ransomware \u2013 threats are analysed, contained and permanently eliminated.<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"632\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Ueberwachen.png\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Ueberwachen.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Ueberwachen-300x247.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row headline_tag=\"h1\" headline_style=\"h1\" button_style=\"\" icon=\"\" img=\"20301\" spiegeln=\"spiegeln\" headline_content=\"Lernen &amp; Zertifizieren \u2013 alles aus einer Hand\" sub_headline_content=\"Erfolgreiche Weiterbildung und sichere Zertifikationen im eigenen Schulungszentrum.\" button_1=\"\" el_id=\"exposure-management\"][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <h2 class=\"h2 smx-headline\">\n            Continuous Exposure Management        <\/h2>\n    <\/div>\n    <div class=\"subheadline\">\n        Identify security gaps, minimise risks    <\/div>\n    <div class=\"text\">\n        Our CTEM services give you full transparency over your attack surfaces and reliably secure critical systems. Risks are continuously identified, assessed and remedied.<\/p>\n<p>Our range of services includes:<\/p>\n<ul>\n<li><strong>Continuous Threat Exposure Management:<\/strong> Continuously monitor your IT environment, identify vulnerabilities and ward off threats in real time.<\/li>\n<li><strong>Professional penetration Testing: <\/strong>Simulate realistic attacks, uncover hidden weaknesses and harden systems in the long term.<\/li>\n<li><strong>Supply chain Intelligence: <\/strong>Monitor dependencies and third parties, reveal risks in the supply chain and ensure compliance.<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"632\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Kontinuierliches-Exposure.png\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Kontinuierliches-Exposure.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Kontinuierliches-Exposure-300x247.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row headline_tag=\"h1\" headline_style=\"h1\" button_style=\"\" icon=\"\" img=\"20301\" spiegeln=\"spiegeln\" headline_content=\"Lernen &amp; Zertifizieren \u2013 alles aus einer Hand\" sub_headline_content=\"Erfolgreiche Weiterbildung und sichere Zertifikationen im eigenen Schulungszentrum.\" button_1=\"\" el_id=\"cyber-security-intelligence\"][vc_column]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <h2 class=\"h2 smx-headline\">\n            Cyber Security Intelligence        <\/h2>\n    <\/div>\n    <div class=\"subheadline\">\n        Knowledge is the strongest weapon against cyber threats    <\/div>\n    <div class=\"text\">\n        Cyber Security Intelligence gives you insights into current and potential threats before they can cause damage. Continuous data collection, analysis and evaluation provide you with specific recommendations for action.<\/p>\n<p>Our services include:<\/p>\n<ul>\n<li><strong>CTI Reports &amp; IOC Feeds: <\/strong>Weekly updates on new attack patterns, malware and vulnerabilities.<\/li>\n<li><strong>Attack Surface Monitoring:<\/strong> Identify, monitor and secure digital attack surfaces \u2013 from the dark web to your internal network.<\/li>\n<li><strong>Phishing Defense &amp; Cyber Readiness:<\/strong> Empower employees to recognise, report and actively counter attacks.<\/li>\n<li><strong>Takedown Service:<\/strong> Support in removing phishing sites, fake social media accounts or other abusive content.<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"632\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Cyber-Security-Intelligence.png\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Cyber-Security-Intelligence.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Cyber-Security-Intelligence-300x247.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"block-cta_wrapper\">\n    <div class=\"block-cta_bg\">\n        <div class=\"block-cta_bg-overlay\"><\/div>\n        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Stoerer-Cyber-Devence-Center.jpg\" alt=\"\">\n    <\/div>\n    <div class=\"block-cta_container container\">\n        <div class=\"block-cta_headline headline center h1\">Stop waiting for the next attack.<\/div>\n        <div class=\"block-cta_content center\">Together, we will develop your Cyber Defence Strategy: tailor-made, scalable and legally compliant.<br \/>\nAct now.<\/div>\n        <div class=\"block-cta_bonus-content subheadline center\"><\/div>\n\n                    <div class=\"btn-wrapper btn-center\">\n                <div class=\"btn\">\n                    <a href=\"#contact\" class=\"btn-text\" title=\"\">\n                        Request consultation now                    <\/a>\n                    <div><\/div>\n                <\/div> \n            <\/div>\n            <\/div>\n<\/div><div class=\"smx_global_spacer size-s\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-s\"><\/div>\n\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n        Success that convinces.    <\/div>\n    <div class=\"subheadline\">\n        Our customers master complex security challenges with customised solutions \u2013 from strategy to implementation. Discover real-life examples of how we make digital security tangible and create sustainable added value.    <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/en\/customer-stories\/data-protection-management-at-finstreet\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1410\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1.jpg 2000w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1-300x212.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1-1024x722.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1-768x541.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1-1536x1083.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Data protection management rebuilt at finstreet                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/customer-stories\/iam-modernization-at-the-municipality-of-utrecht\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1410\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1.jpg 2000w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1-300x212.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1-1024x722.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1-768x541.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1-1536x1083.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Efficient access control: Utrecht relies on Omada and SITS|Traxion                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/customer-stories\/tisax-recertification-in-record-time-efficient-secure-future-oriented\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1410\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle.jpg 2000w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle-300x212.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle-1024x722.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle-768x541.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle-1536x1083.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            TISAX recertification in record time \u2013 efficient, secure, future-oriented                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/customer-stories\/global-identity-governance-at-randstad\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1410\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1.jpg 2000w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1-300x212.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1-1024x722.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1-768x541.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1-1536x1083.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Global Identity Governance at Randstad                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\" note=\"\" seo_tag=\"h1\" headline_class=\"h2\" icon=\"\" bg_img=\"4733\" image_faqs=\"%5B%7B%22headline%22%3A%22What%20is%20an%20ISMS%20and%20why%20is%20it%20important%3F%22%2C%22text%22%3A%22An%20information%20security%20management%20system%20(ISMS)%20is%20a%20structured%20approach%20to%20managing%20and%20protecting%20a%20company's%20IT%20security.%20It%20combines%20policies%2C%20processes%20and%20control%20mechanisms%20to%20protect%20sensitive%20data%20from%20threats.%20An%20ISMS%20systematically%20minimizes%20risks%2C%20ensures%20compliance%20with%20data%20protection%20standards%20and%20serves%20to%20build%20trust%20with%20customers%20and%20business%20partners.%22%7D%2C%7B%22headline%22%3A%22What%20are%20the%20main%20advantages%20of%20implementing%20an%20ISMS%3F%22%2C%22text%22%3A%22The%20advantages%20are%20in%20particular%3Cul%3E%20%3Cli%3EStrengthening%20the%20security%20of%20sensitive%20information%3C%2Fli%3E%20%3Cli%3ECompliance%20with%20legal%20and%20contractual%20obligations%3C%2Fli%3E%20%3Cli%3EImproving%20risk%20management%20and%20the%20security%20culture%20within%20the%20company%3C%2Fli%3E%20%3Cli%3EIncreasing%20resilience%20to%20cyber%20attacks%3C%2Fli%3E%20%3Cli%3EIncreasing%20customer%20confidence%20through%20transparent%20security%20standards%3C%2Fli%3E%20%3C%2Ful%3E%22%7D%2C%7B%22headline%22%3A%22What%20challenges%20you%20may%20face%20when%20introducing%20an%20ISMS%3F%22%2C%22text%22%3A%22A%20great%20deal%20of%20expertise%20is%20required%20to%20introduce%20an%20ISMS.%20The%20biggest%20challenges%20are%3A%3Cul%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3EResource%20intensity%3A%3C%2Fstrong%3E%20Implementing%20and%20maintaining%20the%20ISMS%20requires%20investment%20in%20time%20and%20manpower.%26nbsp%3B%3C%2Fli%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3EDocumentation%20requirements%3A%3C%2Fstrong%3E%20The%20detailed%20documentation%20of%20all%20ISMS%20processes%20can%20be%20extensive.%3C%2Fli%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3ECompliance%20requirements%3A%3C%2Fstrong%3E%20Compliance%20with%20all%20relevant%20laws%20and%20regulations%20is%20complex.%3C%2Fli%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3EDynamic%20risk%20management%3A%3C%2Fstrong%3E%20Adapting%20to%20constantly%20changing%20threats%20is%20essential.%3C%2Fli%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3EProcess%20integration%3A%3C%2Fstrong%3E%20Integrating%20the%20ISMS%20into%20existing%20company%20processes%20can%20be%20complicated.%3C%2Fli%3E%20%3C%2Ful%3E%22%7D%5D\" headline_content=\"Frequently asked questions\" sub_headline_content=\"The key answers on ISMS\" headline_element_1=\"Element 1\" text_element_1=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.\" headline_element_2=\"Element 2\" text_element_2=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. 2\" headline_element_3=\"Element 3\" text_element_3=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. 3\" headline_element_4=\"Element 4\" text_element_4=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.\" headline_element_5=\"Element 5\" text_element_5=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. 5\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <h2 class=\"h2 smx-headline\">\n                    Frequently Asked Questions                <\/h2>\n                <div class=\"subheadline\">\n                    The most important answers about AI in Cyber Defense                <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">What does SITS define as comprehensive Cyber Defence?<\/button>\n                                    <div class=\"panel\">\n                                        <p>SITS combines technical, organisational, and strategic measures to provide companies with lasting protection against digital threats.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">For whom is SITS' Cyber Defence Strategy suitable?<\/button>\n                                    <div class=\"panel\">\n                                        <p>For organisations of all sizes that want to strengthen their IT security and\/or meet regulatory requirements such as DORA or NIS2.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">Can the strategy also be implemented by companies without an in-house IT department?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Yes, we support you in all phases of the strategy, from conception to implementation and operation, and, if desired, we can also take on complete responsibility, so that implementation is possible even without an internal IT security team.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What distinguishes SITS from traditional IT security providers?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Our focus lies on integrating Cyber Defence into daily operations \u2013 not just on isolated measures.<\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"632\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Haeufige-Fragen.png\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Haeufige-Fragen.png 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Cyber-Devence-Center-Haeufige-Fragen-300x247.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row el_id=\"contact\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Contact us now        <\/div>\n        <div class=\"subheadline\">\n            We are happy to advise you!        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    portalId: '26142091',\n    formId: 'e4e9df1b-3cdf-4107-8098-329dd7e5ca8c',\n    region: 'eu1'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Angelo Schneider                    <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; el_id=&#8221;header&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] The importance of a holistic cyber defence strategy and what it includes [\/vc_column_text][\/vc_column][\/vc_row][vc_row headline_tag=&#8221;h1&#8243; headline_style=&#8221;h1&#8243; button_style=&#8221;&#8221; icon=&#8221;&#8221; img=&#8221;20301&#8243; spiegeln=&#8221;spiegeln&#8221; headline_content=&#8221;Lernen &amp; Zertifizieren \u2013 alles aus einer Hand&#8221; sub_headline_content=&#8221;Erfolgreiche Weiterbildung und sichere Zertifikationen im eigenen Schulungszentrum.&#8221; button_1=&#8221;&#8221; el_id=&#8221;compliance-governance&#8221;][vc_column][vc_column_text] Greater resilience, clear compliance, comprehensive defence. [\/vc_column_text][vc_column_text] A reliable, holistic and compliant Cyber Defence System [&hellip;]<\/p>\n","protected":false},"author":23,"featured_media":24420,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-24697","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Defense Approach | SITS<\/title>\n<meta name=\"description\" content=\"SITS&#039; Cyber Defense Approach: Proactive defense, security information, and compliance for a resilient and compliant IT landscape.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Defense Approach | SITS\" \/>\n<meta property=\"og:description\" content=\"SITS&#039; Cyber Defense Approach: Proactive defense, security information, and compliance for a resilient and compliant IT landscape.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-04T10:30:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"632\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/\",\"name\":\"Cyber Defense Approach | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg\",\"datePublished\":\"2025-10-22T11:19:25+00:00\",\"dateModified\":\"2025-11-04T10:30:11+00:00\",\"description\":\"SITS' Cyber Defense Approach: Proactive defense, security information, and compliance for a resilient and compliant IT landscape.\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg\",\"width\":768,\"height\":632},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Cyber Defense Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Defense Approach | SITS","description":"SITS' Cyber Defense Approach: Proactive defense, security information, and compliance for a resilient and compliant IT landscape.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Cyber Defense Approach | SITS","og_description":"SITS' Cyber Defense Approach: Proactive defense, security information, and compliance for a resilient and compliant IT landscape.","og_url":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/","og_site_name":"SITS","article_modified_time":"2025-11-04T10:30:11+00:00","og_image":[{"width":768,"height":632,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/","url":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/","name":"Cyber Defense Approach | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg","datePublished":"2025-10-22T11:19:25+00:00","dateModified":"2025-11-04T10:30:11+00:00","description":"SITS' Cyber Defense Approach: Proactive defense, security information, and compliance for a resilient and compliant IT landscape.","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg","width":768,"height":632},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/our-cyber-defense-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/en\/"},{"@type":"ListItem","position":2,"name":"Our Cyber Defense Approach"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/en\/#website","url":"https:\/\/sits.friendventure.dev\/en\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/en\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/24697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/comments?post=24697"}],"version-history":[{"count":13,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/24697\/revisions"}],"predecessor-version":[{"id":25239,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/24697\/revisions\/25239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media\/24420"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media?parent=24697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}