{"id":24754,"date":"2025-10-02T15:02:25","date_gmt":"2025-10-02T13:02:25","guid":{"rendered":"https:\/\/sits.friendventure.dev\/ai-and-cyber-security\/"},"modified":"2025-11-04T09:57:32","modified_gmt":"2025-11-04T08:57:32","slug":"ai-and-cyber-security","status":"publish","type":"page","link":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/","title":{"rendered":"Introduce AI \u2013 safe and smart"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row full_width=\"stretch_row_content_no_spaces\" el_id=\"header\"][vc_column]<div class=\"header\">\n\n    \n            <div class=\"header_static\">\n            <div class=\"bg_wrapper\">\n                <div class=\"image\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"800\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-AI-Cyber.jpg\" class=\"bg\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-AI-Cyber.jpg 1920w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-AI-Cyber-300x125.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-AI-Cyber-1024x427.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-AI-Cyber-768x320.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Header-AI-Cyber-1536x640.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/>                <\/div>\n                <div class=\"bg_filter filter-_main\"><\/div>\n            <\/div>\n\n            <div class=\"header_content\">\n                <div class=\"header_icon\">\n                                    <\/div>\n                <div class=\"header_sub_headline subheadline\">\n                    Identify risks. Seize opportunities. Build trust. \n                <\/div>\n                <h1 class=\"header_headline headline h1\">\n                    <b>Introducing AI \u2013 safe and smart<\/b> \n                    <div class=\"slider_margin_left h1\">\n                         \n                    <\/div>\n                <\/h1>\n                \n                                <div class=\"header_button \">\n                     \n                        <div class=\"btn-wrapper\">\n                            <div class=\"btn\">\n                                <a href=\"#contact\" class=\"btn-text\">Request Consultation<\/a>\n                                <div><\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n\n        <\/div>\n                          \n            \n                \n    \n    \n\n<\/div>\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"summary-wrapper\">\n        <div class=\"summary-container clr-primary\">\n        <div class=\"summary-col_left\">\n                        <h2 class=\"summary-headline headline h2\">Safely navigating AI transformation<\/h2>\n                                <\/div>\n        <div class=\"summary-col_right\">\n            <div class=\"summary-content p3\"><p>Would you like to take advantage of the opportunities offered by artificial intelligence without having to accept security gaps, unclear data origins or regulatory risks? The SITS AI Portfolio offers services in the areas of security, data protection, technical solutions and awareness programmes that enable the efficient and ethically responsible use of AI \u2013 for the introduction of new systems as well as for securing existing AI environments.<\/p>\n<ul>\n<li><strong>Clear orientation:<\/strong> Benefit from a clear roadmap that drives your AI implementation forward in a structured, secure and efficient manner.<\/li>\n<li><strong>Reduce risks reliably:<\/strong> Identify and avoid security and compliance violations early on with SITS before they become a problem.<\/li>\n<li><strong>Sustainable success:<\/strong> Together, we create a stable foundation on which your projects can grow with the help of AI, enabling innovation and securing competitive advantages.<\/li>\n<\/ul>\n<p><\/p><\/div>\n\n                        \n\n            \n\n                    <\/div>\n    <\/div>\n<\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n<h2  class=\"h1 smx-headline \">The strategic use of AI: secure, scalable, responsible<\/h2>[vc_column_text]<strong>Are you sufficiently prepared?<\/strong>[\/vc_column_text][vc_column_text]AI can only be used safely when security &amp; compliance, productivity and data quality work together. With SITS, you can ensure that these building blocks mesh together and that risks do not arise in the first place.[\/vc_column_text]<div class=\"text_bild_element\">\n    <div class=\"text_bild_text spiegeln fade-in-bottom-top\">\n                <div class=\"headline\">\n            <h2 class=\"h4 smx-headline\">\n            Challenges for your Business        <\/h2>\n    <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n        <\/p>\n<ul>\n<li><strong>Secure, ethical and efficient introduction of AI:<\/strong> New solutions must comply with technical, ethical and security standards from the outset \u2013 a balancing act between innovation and regulation.<\/li>\n<li><strong>Evaluation of existing AI systems:<\/strong> Existing tools must be regularly checked to ensure that they continue to meet data protection, security and performance requirements \u2013 often there are no clear benchmarks for this.<\/li>\n<li><strong>Preventing uncontrolled use of AI:<\/strong> Employees are increasingly resorting to unauthorised AI tools. This makes transparency, governance and compliance more difficult.<\/li>\n<li><strong>Protecting sensitive data:<\/strong> Company data must not be used for training public AI models under any circumstances. A lack of guidelines and control mechanisms increases the risk of unintentional data transfer.<\/li>\n<li><strong>Insufficient structure in projects:<\/strong> Without defined processes, clear responsibilities and documented procedures, AI projects often fail to deliver sustainable added value.<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild spiegeln\">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"632\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-2.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-2.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-2-300x247.jpg 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<h2  class=\"h1 smx-headline  center\">Your benefits with the SITS Secure AI Portfolio<\/h2>[vc_column_text]<\/p>\n<p style=\"text-align: center;\"><strong>The path to responsible AI usage<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: center;\">The SITS Secure AI Portfolio combines security, data protection, data quality, governance and change management. Together, we lay the foundations for a controlled, efficient and compliant use of artificial intelligence.<\/p>\n<p>[\/vc_column_text]<div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"iconbox-grid\">\n    <div class=\"iconboxes--wrapper\">\n                                <div class=\"iconboxes--container iconboxes-6 iconboxes-cols-4 animate_kachel_wrapper\">\n                                    <div class=\"iconbox--single iconbox--nr-1  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            01\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Zielgerichtete-KI-Strategie-entwickeln.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                     Develop a targeted AI strategy                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Get a transparent strategy that minimises uncertainty and makes the use of AI predictable and business-oriented.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-2  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            02\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Zuverlaessige-Datenbasis-schaffen.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Create a reliable database                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    With improved data structures and quality standards, you can build a foundation that enables secure, transparent and resilient AI applications.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-3  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            03\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/KI-Tools-nachhaltig-einfuehren.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Sustainable implementation of AI tools                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Avoid typical pitfalls in AI projects. Our methodical approach helps you to implement AI solutions in a predictable and effective manner.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-4  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            04\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Effizient-zu-greifbarem-Mehrwert.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Efficiently achieving real added value                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Accelerate your AI implementation by streamlining processes, addressing risks early on and clearly defining pilot projects.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-5  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            05\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Kontrollierte-und-sichere-KI-Nutzung.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Controlled and safe use of AI                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    Clear guidelines and governance prevent unauthorised AI tools from being used in everyday work. This protects sensitive data, maintains control and ensures compliance requirements are met at all times.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                                    <div class=\"iconbox--single iconbox--nr-6  animate_kachel\">\n                        <div class=\"iconbox--single__counter\">\n                            06\n                        <\/div>\n                        <div class=\"iconbox--single__inner\">\n                                                            <div class=\"iconbox--image\">\n                                      <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Change-Management-fuer-sichere-KI.png\" alt=\"\">                                <\/div>\n                                <div class=\"iconbox--headline headline-boxed\">\n                                    Change management for secure AI                                <\/div>\n                                <div class=\"iconbox--content\">\n                                    We strengthen your teams through targeted training, awareness measures and change management. This promotes acceptance, knowledge transfer and responsible use of AI throughout your organisation.                                <\/div>\n                                                                                        <\/div>\n                    <\/div>\n                            <\/div>\n            <\/div>\n<\/div><div class=\"smx_global_spacer size-s\"><\/div>\n<div class=\"btn-wrapper btn-center\">\n    <div class=\"btn btn btn--green\">\n        <a href=\"#contact\" class=\"btn-text\" title=\"Beratung anfragen\">\n            Contact us now        <\/a>\n        <div><\/div>\n    <\/div> \n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n<div class=\"text_bild_element\">\n    <div class=\"text_bild_text  fade-in-bottom-top\">\n                <div class=\"headline\">\n            <h2 class=\"h4 smx-headline\">\n            Risk Reduction and Compliance        <\/h2>\n    <\/div>\n    <div class=\"subheadline\">\n            <\/div>\n    <div class=\"text\">\n        With SITS, you can minimise risks in the areas of data protection, security and regulation, and lay the foundation for trustworthy AI use.<br \/>\nIn doing so, we take established international standards and frameworks into account:<\/p>\n<ul>\n<li><strong>AI-specific:<\/strong> ISO\/IEC 42001, ISO\/IEC 23894, NIST AI RMF, EU AI Act<\/li>\n<li><strong>Data protection:<\/strong> GDPR, ISO\/IEC 27701, ISO\/IEC 27555<\/li>\n<li><strong>Security:<\/strong> ISO\/IEC 27001, ISO\/IEC 27018, ENISA AI Threat Landscape, OWASP AI Security<\/li>\n<li><strong>Data quality:<\/strong> ISO\/IEC 5259, ISO\/IEC 8000<\/li>\n<li><strong>Bias &amp; Ethics:<\/strong> ISO\/IEC 24027, ISO\/IEC TR 24028, OECD\/UNESCO principles<\/li>\n<\/ul>\n<p>    <\/div>\n    <\/div>\n<div class=\"text_bild_bild \">\n    <div class=\"img\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"632\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-3.jpg\" class=\"img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-3.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-3-300x247.jpg 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>    <\/div>\n<\/div>\n<\/div><div class=\"smx_global_spacer size-m\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"block-cta_wrapper\">\n    <div class=\"block-cta_bg\">\n        <div class=\"block-cta_bg-overlay\"><\/div>\n        <img decoding=\"async\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/Stoerer-AI-Cyber.png\" alt=\"\">\n    <\/div>\n    <div class=\"block-cta_container container\">\n        <div class=\"block-cta_headline headline center h1\">Your guide for a safe use of AI<\/div>\n        <div class=\"block-cta_content center\">Let us work together to examine how you can use AI responsibly, compliantly and efficiently. Our experts will work with you to develop the right roadmap.<\/div>\n        <div class=\"block-cta_bonus-content subheadline center\"><\/div>\n\n                    <div class=\"btn-wrapper btn-center\">\n                <div class=\"btn\">\n                    <a href=\"#contact\" class=\"btn-text\" title=\"\">\n                        Request consultation now                    <\/a>\n                    <div><\/div>\n                <\/div> \n            <\/div>\n            <\/div>\n<\/div><div class=\"smx_global_spacer size-s\"><\/div>\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-s\"><\/div>\n\n<div class=\"media_center_slider_wrapper\">\n    <div class=\"media_center_slider_heading\">\n        <div class=\"headline h2\">\n        Success that convinces.    <\/div>\n    <div class=\"subheadline\">\n        Our customers master complex security challenges with customised solutions \u2013 from strategy to implementation. Discover real-life examples of how we make digital security tangible and create sustainable added value.    <\/div>\n    <div class=\"text\">\n            <\/div>\n<\/div>\n\n<div class=\"media-center-slider-controlls\">\n    <div class=\"se_slider_buttons\">\n        <div class=\"se_slider_prev \" style=\"\">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n        <div class=\"se_slider_next \">\n            <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/02\/arrow-black.svg\">\n        <\/div>\n    <\/div>\n<\/div>\n\n<div class=\"media-center-slider\">\n\n            <a href=\"https:\/\/sits.friendventure.dev\/en\/customer-stories\/data-protection-management-at-finstreet\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1410\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1.jpg 2000w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1-300x212.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1-1024x722.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1-768x541.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Finstreet-1-1536x1083.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Data protection management rebuilt at finstreet                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/customer-stories\/iam-modernization-at-the-municipality-of-utrecht\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1410\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1.jpg 2000w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1-300x212.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1-1024x722.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1-768x541.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Utrecht-1-1536x1083.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Efficient access control: Utrecht relies on Omada and SITS|Traxion                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/customer-stories\/tisax-recertification-in-record-time-efficient-secure-future-oriented\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1410\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle.jpg 2000w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle-300x212.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle-1024x722.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle-768x541.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/EuroStyle-1536x1083.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            TISAX recertification in record time \u2013 efficient, secure, future-oriented                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n                <a href=\"https:\/\/sits.friendventure.dev\/en\/customer-stories\/global-identity-governance-at-randstad\/\" class=\"slider_element\">\n            <div class=\"se_background\">\n                <img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1410\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1.jpg 2000w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1-300x212.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1-1024x722.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1-768x541.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/07\/Randstad-1-1536x1083.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/>            <\/div>\n                        <div class=\"se_cat\">\n                            <\/div>\n            \n            <div class=\"se_content\">\n                <div class=\"se_content_inner\">\n                    <div class=\"se_content_inner_text\">\n                        <div class=\"se_content_meta\">\n                            <div class=\"se_date\">\n                                                            <\/div>\n                        <\/div>\n                        <div class=\"se_content_headline\">\n                            Global Identity Governance at Randstad                        <\/div>\n                        <div class=\"se_readmore\">\n                            Learn more                        <\/div>\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/a>\n        <\/div>\n<div class=\"media-center-slider-progress\">\n    <div class=\"progress\" role=\"progressbar\" aria-valuemin=\"0\" aria-valuemax=\"100\">\n        <span class=\"slider__label sr-only\"><\/span>\n    <\/div>\n<\/div>\n<\/div>[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row full_width=\"stretch_row_content_no_spaces\" note=\"\" seo_tag=\"h1\" headline_class=\"h2\" icon=\"\" bg_img=\"4733\" image_faqs=\"%5B%7B%22headline%22%3A%22What%20is%20an%20ISMS%20and%20why%20is%20it%20important%3F%22%2C%22text%22%3A%22An%20information%20security%20management%20system%20(ISMS)%20is%20a%20structured%20approach%20to%20managing%20and%20protecting%20a%20company's%20IT%20security.%20It%20combines%20policies%2C%20processes%20and%20control%20mechanisms%20to%20protect%20sensitive%20data%20from%20threats.%20An%20ISMS%20systematically%20minimizes%20risks%2C%20ensures%20compliance%20with%20data%20protection%20standards%20and%20serves%20to%20build%20trust%20with%20customers%20and%20business%20partners.%22%7D%2C%7B%22headline%22%3A%22What%20are%20the%20main%20advantages%20of%20implementing%20an%20ISMS%3F%22%2C%22text%22%3A%22The%20advantages%20are%20in%20particular%3Cul%3E%20%3Cli%3EStrengthening%20the%20security%20of%20sensitive%20information%3C%2Fli%3E%20%3Cli%3ECompliance%20with%20legal%20and%20contractual%20obligations%3C%2Fli%3E%20%3Cli%3EImproving%20risk%20management%20and%20the%20security%20culture%20within%20the%20company%3C%2Fli%3E%20%3Cli%3EIncreasing%20resilience%20to%20cyber%20attacks%3C%2Fli%3E%20%3Cli%3EIncreasing%20customer%20confidence%20through%20transparent%20security%20standards%3C%2Fli%3E%20%3C%2Ful%3E%22%7D%2C%7B%22headline%22%3A%22What%20challenges%20you%20may%20face%20when%20introducing%20an%20ISMS%3F%22%2C%22text%22%3A%22A%20great%20deal%20of%20expertise%20is%20required%20to%20introduce%20an%20ISMS.%20The%20biggest%20challenges%20are%3A%3Cul%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3EResource%20intensity%3A%3C%2Fstrong%3E%20Implementing%20and%20maintaining%20the%20ISMS%20requires%20investment%20in%20time%20and%20manpower.%26nbsp%3B%3C%2Fli%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3EDocumentation%20requirements%3A%3C%2Fstrong%3E%20The%20detailed%20documentation%20of%20all%20ISMS%20processes%20can%20be%20extensive.%3C%2Fli%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3ECompliance%20requirements%3A%3C%2Fstrong%3E%20Compliance%20with%20all%20relevant%20laws%20and%20regulations%20is%20complex.%3C%2Fli%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3EDynamic%20risk%20management%3A%3C%2Fstrong%3E%20Adapting%20to%20constantly%20changing%20threats%20is%20essential.%3C%2Fli%3E%20%20%20%20%20%3Cli%3E%3Cstrong%3EProcess%20integration%3A%3C%2Fstrong%3E%20Integrating%20the%20ISMS%20into%20existing%20company%20processes%20can%20be%20complicated.%3C%2Fli%3E%20%3C%2Ful%3E%22%7D%5D\" headline_content=\"Frequently asked questions\" sub_headline_content=\"The key answers on ISMS\" headline_element_1=\"Element 1\" text_element_1=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.\" headline_element_2=\"Element 2\" text_element_2=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. 2\" headline_element_3=\"Element 3\" text_element_3=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. 3\" headline_element_4=\"Element 4\" text_element_4=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.\" headline_element_5=\"Element 5\" text_element_5=\"Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. At vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet. 5\"][vc_column]<div class=\"accordion_bild_section\">\n    <div class=\"accordion_section accordionbild_section\">\n        <div class=\"accordion_section_inner\">\n            <div class=\"accordion_head\">\n                <div class=\"accordion_icon\">\n                                    <\/div>\n                <h2 class=\"h2 smx-headline\">\n                    Frequently Asked Questions                <\/h2>\n                <div class=\"subheadline\">\n                    The most important answers about AI in Cyber Security                <\/div>\n            <\/div>\n            <div class=\"accordion_wrapper\">\n                                                <button class=\"accordion\">How can we ensure a safe path to AI adoption?<\/button>\n                                    <div class=\"panel\">\n                                        <p>A safe path to AI adoption begins with clear governance structures, risk analysis and technical safeguards. It is crucial that security, data protection and ethics are integrated into every AI project from the outset. This creates trust and compliance \u2013 rather than a patchwork solution added as an afterthought.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">Who requires secure AI services?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Secure AI services are relevant for all organisations that use AI in a business-critical manner \u2013 from public authorities to medium-sized companies to large corporations. Highly regulated industries such as finance, healthcare and public administration benefit in particular from a structured approach that guarantees security and compliance.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What is the difference between GDPR compliance and AI Act compliance?<\/button>\n                                    <div class=\"panel\">\n                                        <p>The GDPR protects personal data and regulates how data may be processed. The AI Act goes further and specifies how AI systems must be developed, operated and monitored \u2013 including risk management, transparency and accountability requirements. The two complement each other and are essential for trustworthy AI.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What poses the greatest threat to the security of AI solutions?<\/button>\n                                    <div class=\"panel\">\n                                        <p>The greatest risks arise from insecure training data, unprotected models and uncontrolled interfaces. Attacks such as prompt injection, data poisoning or model theft can manipulate AI systems. Therefore, preventive security architecture, monitoring and regular testing are crucial.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What sets SITS apart from other providers?<\/button>\n                                    <div class=\"panel\">\n                                        <p>We combine security, compliance, data protection and ethics in one holistic approach. Our portfolio is based on international standards such as ISO\/IEC 42001, 27001 and the EU AI Act and offers strategic consulting as well as technical implementation and managed services.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How do we ensure the compliance of our existing AI systems today and tomorrow?<\/button>\n                                    <div class=\"panel\">\n                                        <p>With a continuous compliance approach: regular audits, performance and risk assessments, and post-market monitoring in accordance with the EU AI Act. This ensures that AI systems remain secure and compliant even as legal requirements change.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How do we make sure that AI doesn't compromise the security of our most sensitive internal data?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Through clear access controls, data classification and privacy-by-design principles. In addition, we secure models and data pipelines in accordance with ISO\/IEC 27001 and 27701 to prevent unauthorised access or data leaks..<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">How can we prevent employees from using unauthorised AI tools?<\/button>\n                                    <div class=\"panel\">\n                                        <p>With clear company guidelines, education and technical access restrictions. Our awareness programmes and governance frameworks help to ensure that AI tools are used in a controlled and secure manner, in line with data protection and compliance requirements.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What opportunities do small and medium-sized enterprises have to safely introduce AI?<\/button>\n                                    <div class=\"panel\">\n                                        <p>SMEs in particular benefit from modular, scalable Secure AI solutions. With clear standards and targeted support, risks can be minimised and AI can be used specifically where it creates real added value \u2013 in a secure, efficient and compliant manner.<\/p>\n                                    <\/div>\n                                                                <button class=\"accordion\">What role does Identity and Access Management play regarding AI security?<\/button>\n                                    <div class=\"panel\">\n                                        <p>Identity and Access Management is the first line of defence against data and model misuse. It ensures that only authorised individuals and systems can access training data, models, and results \u2013 a core principle of any secure AI infrastructure.<\/p>\n                                    <\/div>\n                                        <\/div>\n                    <\/div>\n    <\/div>\n    <div class=\"accordion_bild\">\n        <img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"632\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg\" class=\"bg_img\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1.jpg 768w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2025\/10\/AI-Cyber-Security-1-300x247.jpg 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>    <\/div>\n\n<\/div>\n\n\n\n\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row][vc_row disable_element=\"yes\" title_1=\"Wo steht Ihr Unternehmen in Sachen Cybersecurity?\" highlight_title_1=\"Security Check\" row_1=\"%5B%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%2C%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%2C%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%5D\" title_2=\"Einfache Kontrolle \u00fcber Shadow IT und Datenabfluss mit SASE\" highlight_title_2=\"Webinar\" row_2=\"%5B%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%2C%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%2C%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%5D\" title_3=\"Der Weg zur stabilenIT\" highlight_title_3=\"E-Book\" row_3=\"%5B%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%2C%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%2C%7B%22bp%22%3A%22Lorem%20ipsum%20dolor%22%7D%5D\" button_content_1=\"Jetzt Security Check starten\" button_link_1=\"#\" button_content_2=\"Jetzt anmelden\" button_link_2=\"#\" button_content_3=\"Jetzt herunterladen\" button_link_3=\"#\" button_title_1=\"\" button_title_2=\"\" button_title_3=\"\"][vc_column]<div class=\"smx_global_spacer size-xs\"><\/div>\n<div class=\"service-levels_wrapper\">\n    <div class=\"service-levels_container\">\n\n                <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Wo steht Ihr Unternehmen in Sachen Cybersecurity?                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Security Check                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                                <div class=\"service-level_row\">\n                        <div class=\"btn-wrapper btn-center\">\n                            <div class=\"btn\">\n                                <a href=\"#\" class=\"btn-text\" title=\"\">\n                                Jetzt Security Check starten                                <\/a>\n                                <div><\/div>\n                            <\/div> \n                        <\/div>\n                    <\/div>\n                            <\/div>\n \n            \n            \n            \n                        <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Einfache Kontrolle \u00fcber Shadow IT und Datenabfluss mit SASE                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        Webinar                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                                <div class=\"service-level_row\">\n                        <div class=\"btn-wrapper btn-center\">\n                            <div class=\"btn\">\n                                <a href=\"#\" class=\"btn-text\" title=\"\">\n                                Jetzt anmelden                                <\/a>\n                                <div><\/div>\n                            <\/div> \n                        <\/div>\n                    <\/div>\n                            <\/div>\n \n            \n            \n            \n                        <div class=\"service-levels_single active\">\n                <div class=\"service-level_row\">\n                    <div class=\"service-level_title h5\">\n                        Der Weg zur stabilen IT                    <\/div>\n                <\/div>\n                <div class=\"service-level_row highlight\">\n                    <div class=\"service-level_highlight\">\n                        E-Book                    <\/div>\n                <\/div>\n\n\n                                            <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp light\">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                        <div class=\"service-level_row service-level_bp \">\n                                <div class=\"service-level_bp-inner\">Lorem ipsum dolor<\/div>\n                            <\/div>\n                                                                <div class=\"service-level_row\">\n                        <div class=\"btn-wrapper btn-center\">\n                            <div class=\"btn\">\n                                <a href=\"#\" class=\"btn-text\" title=\"\">\n                                Jetzt herunterladen                                <\/a>\n                                <div><\/div>\n                            <\/div> \n                        <\/div>\n                    <\/div>\n                            <\/div>\n \n            \n            \n            \n            \n\n    <\/div>\n<\/div>\n\n\n\n[\/vc_column][\/vc_row][vc_row el_id=\"contact\"][vc_column]\n    <div class=\"contact_section full_contact\">\n        <div class=\"contact_form_wrapper\">\n            <div class=\"h3 smx-headline\">\n            Contact us now        <\/div>\n        <div class=\"subheadline\">\n            We are happy to advise you!        <\/div>\n        <div class=\"form\">\n            <script charset='utf-8' type='text\/javascript' src='\/\/js-eu1.hsforms.net\/forms\/embed\/v2.js'><\/script><br \/>\n<script>\n  hbspt.forms.create({\n    portalId: '26142091',\n    formId: 'e4e9df1b-3cdf-4107-8098-329dd7e5ca8c',\n    region: 'eu1'\n  });\n<\/script>\n        <\/div>\n    <\/div>\n    <!--\n    <div class=\"contact_person_wraper\">\n                    <div class=\"person_box\">\n                <div class=\"person_pic\">\n                    <img loading=\"lazy\" decoding=\"async\" width=\"1440\" height=\"1440\" src=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1.jpg\" class=\"contact_profile_pic\" alt=\"\" srcset=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1.jpg 1440w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-300x300.jpg 300w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-1024x1024.jpg 1024w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-150x150.jpg 150w, https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/Ansprechpartner_SMW-1-768x768.jpg 768w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/>                <\/div>\n                <div class=\"person_info\">\n                    <div class=\"person_name\">\n                        Angelo Schneider                    <\/div>\n                                                        <\/div>\n            <\/div>\n        \n    <\/div>\n    -->\n    <\/div>\n\n[\/vc_column][\/vc_row][vc_row][vc_column]<div class=\"smx_global_spacer size-l\"><\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content_no_spaces&#8221; el_id=&#8221;header&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Are you sufficiently prepared?[\/vc_column_text][vc_column_text]AI can only be used safely when security &amp; compliance, productivity and data quality work together. With SITS, you can ensure that these building blocks mesh together and that risks do not arise in the first place.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] The path to responsible AI usage [\/vc_column_text][vc_column_text] The SITS Secure AI Portfolio combines [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-24754","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing AI \u2013 safe and smart | SITS<\/title>\n<meta name=\"description\" content=\"Introducing AI with SITS: From strategy to implementation, including data protection, security, and governance for your company.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing AI \u2013 safe and smart | SITS\" \/>\n<meta property=\"og:description\" content=\"Introducing AI with SITS: From strategy to implementation, including data protection, security, and governance for your company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-04T08:57:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/\",\"name\":\"Introducing AI \u2013 safe and smart | SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\"},\"datePublished\":\"2025-10-02T13:02:25+00:00\",\"dateModified\":\"2025-11-04T08:57:32+00:00\",\"description\":\"Introducing AI with SITS: From strategy to implementation, including data protection, security, and governance for your company.\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introduce AI \u2013 safe and smart\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing AI \u2013 safe and smart | SITS","description":"Introducing AI with SITS: From strategy to implementation, including data protection, security, and governance for your company.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Introducing AI \u2013 safe and smart | SITS","og_description":"Introducing AI with SITS: From strategy to implementation, including data protection, security, and governance for your company.","og_url":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/","og_site_name":"SITS","article_modified_time":"2025-11-04T08:57:32+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/","url":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/","name":"Introducing AI \u2013 safe and smart | SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/en\/#website"},"datePublished":"2025-10-02T13:02:25+00:00","dateModified":"2025-11-04T08:57:32+00:00","description":"Introducing AI with SITS: From strategy to implementation, including data protection, security, and governance for your company.","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/en\/digital-challenges\/ai-and-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/en\/"},{"@type":"ListItem","position":2,"name":"Introduce AI \u2013 safe and smart"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/en\/#website","url":"https:\/\/sits.friendventure.dev\/en\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/en\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/24754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/comments?post=24754"}],"version-history":[{"count":12,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/24754\/revisions"}],"predecessor-version":[{"id":25236,"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/pages\/24754\/revisions\/25236"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/en\/wp-json\/wp\/v2\/media?parent=24754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}