{"id":1564,"date":"2025-05-01T08:39:32","date_gmt":"2025-05-01T06:39:32","guid":{"rendered":"https:\/\/thiim.com\/?page_id=1564"},"modified":"2026-01-29T13:13:59","modified_gmt":"2026-01-29T12:13:59","slug":"cybersicherheit-und-nis2","status":"publish","type":"page","link":"https:\/\/thiim.com\/de\/industriel-it-iiot\/cybersikkerhed-og-nis2\/","title":{"rendered":"Cybersicherheit und NIS2"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"1564\" class=\"elementor elementor-1564\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2caaffc e-flex e-con-boxed e-con e-parent\" data-id=\"2caaffc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd156f8 e-con-full e-flex e-con e-child\" data-id=\"cd156f8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3965d5b e-con-full e-flex e-con e-child\" data-id=\"3965d5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1c1880 elementor-widget elementor-widget-breadcrumbs\" data-id=\"a1c1880\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5337789 e-flex e-con-boxed e-con e-parent\" data-id=\"5337789\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c4f0b75 e-con-full e-flex e-con e-child\" data-id=\"c4f0b75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-eba936f e-con-full e-flex e-con e-child\" data-id=\"eba936f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c0a495d e-con-full e-flex e-con e-child\" data-id=\"c0a495d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8122f15 elementor-widget elementor-widget-text-editor\" data-id=\"8122f15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Das NIS2-Gesetz ist die d\u00e4nische Umsetzung der NIS2-Richtlinie der EU und zielt darauf ab <strong>St\u00e4rkung der Cybersicherheit<\/strong> in Unternehmen, die kritische oder wichtige Funktionen f\u00fcr die Gesellschaft erf\u00fcllen.<\/p><p>Das Gesetz stellt erh\u00f6hte Anforderungen an den Umgang der Unternehmen mit der IT-Sicherheit, einschlie\u00dflich des Risikomanagements, des St\u00f6rungsmanagements und der Umsetzung geeigneter technischer und organisatorischer Sicherheitsma\u00dfnahmen.<\/p><p>Das NIS2-Gesetz deckt Sektoren wie Energie, Verkehr, Gesundheitswesen, Wasserversorgung und digitale Infrastruktur ab, gilt aber auch f\u00fcr bestimmte IT- und Dienstleistungsanbieter. Die betroffenen Organisationen m\u00fcssen bereit sein, ihre Sicherheitsbem\u00fchungen zu dokumentieren, und k\u00f6nnen bei Nichteinhaltung mit Pr\u00fcfungen und Sanktionen, einschlie\u00dflich Geldstrafen, rechnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ac6c45 e-con-full e-flex e-con e-child\" data-id=\"6ac6c45\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f80650 elementor-widget elementor-widget-text-editor\" data-id=\"6f80650\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Die d\u00e4nische Handelskammer stellt fest, dass eine alarmierende <\/em><strong><em>60 % der kleinen und mittleren Unternehmen (KMU), die von einer Datenschutzverletzung oder einem Cyberangriff betroffen sind, gehen in Konkurs<\/em><\/strong><em>.<\/em><em> Die d\u00fcsteren Statistiken machen deutlich, wie fatal digitale Angriffe f\u00fcr KMU sein k\u00f6nnen - nicht nur technisch, sondern als reale Bedrohung f\u00fcr die Existenz des Unternehmens.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26878bb e-flex e-con-boxed e-con e-parent\" data-id=\"26878bb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8ea8ac7 e-con-full e-flex e-con e-child\" data-id=\"8ea8ac7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0e5363 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b0e5363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">F\u00fcr Ihr Unternehmen bedeutet dies, dass die Cybersicherheit nicht mehr nur eine technische Aufgabe ist, sondern eine Managementaufgabe und eine gesch\u00e4ftskritische Priorit\u00e4t.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac5e7b2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ac5e7b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>F\u00fcr die Organisation hat das NIS2-Gesetz mehrere konkrete Folgen:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac762f6 e-con-full e-grid e-con e-child\" data-id=\"ac762f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab24dd5 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"ab24dd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-layer-plus\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tErweiterter Anwendungsbereich\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tEs werden nun mehr Unternehmensarten und Beh\u00f6rden abgedeckt - insbesondere solche, die von entscheidender gesellschaftlicher Bedeutung sind oder eine gewisse Gr\u00f6\u00dfe aufweisen.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4c039 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"1b4c039\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-user-tie\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tGr\u00f6\u00dfere Verantwortung f\u00fcr das Management\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDie oberste F\u00fchrungsebene wird eine klare rechtliche Verantwortung haben, um robuste Sicherheitsvorschriften und eine kontinuierliche \u00dcberwachung der Cybersicherheit zu gew\u00e4hrleisten - auch in OT-Umgebungen\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cff3df5 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"cff3df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-exclamation-triangle\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tStrengere Anforderungen an das Risikomanagement\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSystematische Risikobewertungen, Netzsegmentierung, St\u00f6rungsmanagement, Sicherheit der Lieferkette usw. m\u00fcssen auch in OT-Netzen umgesetzt werden.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b812bad elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"b812bad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-newspaper\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAnforderungen an die Berichterstattung \u00fcber Vorf\u00e4lle\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSicherheitsvorf\u00e4lle m\u00fcssen den zust\u00e4ndigen Beh\u00f6rden so schnell wie m\u00f6glich gemeldet werden - mit strengeren zeitlichen und inhaltlichen Anforderungen \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a10defa elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"a10defa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-search\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tSt\u00e4rkere \u00dcberwachung und Sanktionen\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDie Beh\u00f6rden erhalten mehr Befugnisse zur \u00dcberwachung, zur Erteilung von Anordnungen, zur Verh\u00e4ngung von Sanktionen oder sogar zur Suspendierung von F\u00fchrungskr\u00e4ften bei Nichteinhaltung der Vorschriften. \t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a3b86d7 e-con-full e-flex e-con e-child\" data-id=\"a3b86d7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9bbe1f elementor-widget elementor-widget-text-editor\" data-id=\"f9bbe1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kurz gesagt, NIS2 bedeutet, dass die Organisation nun strukturiert mit der Cybersicherheit arbeiten muss - sowohl <strong>strategisch, operativ und technisch<\/strong>. Dies gilt auch f\u00fcr industrielle OT-Netze, wo verz\u00f6gerte Aktualisierungen oder fehlende \u00dcberwachung ernsthafte Risiken f\u00fcr den Betrieb und die \u00f6ffentliche Sicherheit verursachen k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03c070f e-flex e-con-boxed e-con e-parent\" data-id=\"03c070f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3f338ca e-flex e-con-boxed e-con e-child\" data-id=\"3f338ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-708a729 elementor-widget elementor-widget-heading\" data-id=\"708a729\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Warum sind OT-Netze und NIS2 untrennbar miteinander verbunden?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bd2a08 elementor-widget elementor-widget-text-editor\" data-id=\"0bd2a08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Da industrielle Systeme und OT-Umgebungen zunehmend mit IT-Netzwerken integriert werden<\/strong>, sind sie zu einem attraktiven Ziel f\u00fcr Cyberangriffe geworden.<\/p><p>Das NIS2-Gesetz hat daher einen besonderen Fokus auf die OT-Sicherheit!<\/p><p>Die erh\u00f6hten Anforderungen sehen Sie auf der rechten Seite:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7e161bd e-con-full e-flex e-con e-child\" data-id=\"7e161bd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a0c5728 elementor-widget elementor-widget-heading\" data-id=\"a0c5728\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sind Sie von der NIS2 erfasst?\nMachen Sie den offiziellen Test<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60f0457 elementor-widget elementor-widget-text-editor\" data-id=\"60f0457\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Der erste Schritt zur Einhaltung der Richtlinie besteht darin festzustellen, ob Ihre Organisation unter die Richtlinie f\u00e4llt. Machen Sie den NIS2-Test und erhalten Sie die Antworten in weniger als zwei Minuten:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-775b876 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-left elementor-widget elementor-widget-button\" data-id=\"775b876\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/www.nis2tjek.sikkerdigital.dk\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Machen Sie hier den NIS2-Test<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-23d2dc6 e-grid e-con-boxed e-con e-child\" data-id=\"23d2dc6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ed61bd7 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"ed61bd7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df9af62 elementor-widget elementor-widget-icon-box\" data-id=\"df9af62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tNetzwerksegmentierung und Zugangskontrolle \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-158d364 e-con-full e-flex e-con e-child\" data-id=\"158d364\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59618f2 elementor-widget elementor-widget-text-editor\" data-id=\"59618f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zum Beispiel. Einsatz von Switches und Firewalls zur Isolierung von OT-Netzen<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-308762f e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"308762f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-221d2a9 elementor-widget elementor-widget-icon-box\" data-id=\"221d2a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tICS-spezifische Kontrollen und kontinuierliche \u00dcberwachung \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5d7e609 e-con-full e-flex e-con e-child\" data-id=\"5d7e609\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b48800 elementor-widget elementor-widget-text-editor\" data-id=\"7b48800\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wie Intrusion Detection, sichere Aktualisierung von IoT- und ICS-Kontrollsystemen<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a0c0d30 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"a0c0d30\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-31ab4bd elementor-widget elementor-widget-icon-box\" data-id=\"31ab4bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tZero-Trust-Prinzipien \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c837b4b e-con-full e-flex e-con e-child\" data-id=\"c837b4b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de0f024 elementor-widget elementor-widget-text-editor\" data-id=\"de0f024\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kontinuierliche \u00dcberpr\u00fcfung und segmentierter Zugriff von OT-Anbietern und Fernnutzern<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-92354d0 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"92354d0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-76beae7 elementor-widget elementor-widget-icon-box\" data-id=\"76beae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tLieferanten- und Lieferkettenmanagement \t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d521ba6 e-con-full e-flex e-con e-child\" data-id=\"d521ba6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43cf65c elementor-widget elementor-widget-text-editor\" data-id=\"43cf65c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dokumentation und Kontrolle, dass externe Anbieter gleichwertige Sicherheitsstandards einhalten<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b2c8eec e-flex e-con-boxed e-con e-parent\" data-id=\"b2c8eec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2034fa0 elementor-widget elementor-widget-text-editor\" data-id=\"2034fa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In der Praxis bedeutet dies, dass Sie Ihre OT-Einrichtung mit Ger\u00e4ten und Verfahren aufr\u00fcsten m\u00fcssen, die diese Anforderungen unterst\u00fctzen - und genau hier kommen unsere L\u00f6sungen ins Spiel.<\/p><p><strong>Wir bieten Switches, Firewalls und \u00dcberwachungsl\u00f6sungen, die sicherstellen, dass Ihr OT-Netzwerk die Anforderungen des NIS2-Gesetzes erf\u00fcllt - aber vielleicht noch wichtiger ist, dass Sie Ihr Unternehmen vor Cyberangriffen und den damit verbundenen Folgen sch\u00fctzen.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73a9c9c elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-center elementor-widget elementor-widget-button\" data-id=\"73a9c9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/thiim.com\/de\/kontakt\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kontaktieren Sie unsere Experten und erfahren Sie mehr \u00fcber Cybersicherheit<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb32b84 e-flex e-con-boxed e-con e-parent\" data-id=\"cb32b84\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c9fc1f3 e-con-full e-flex e-con e-child\" data-id=\"c9fc1f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-85e8e70 elementor-widget elementor-widget-image\" data-id=\"85e8e70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg\" class=\"attachment-large size-large wp-image-8282\" alt=\"\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg 1024w, https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-300x200.jpg 300w, https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-768x512.jpg 768w, https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1536x1024.jpg 1536w, https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-scaled.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fe8bca e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"1fe8bca\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInRight&quot;,&quot;animation_tablet&quot;:&quot;slideInUp&quot;,&quot;animation_mobile&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00eb493 elementor-widget elementor-widget-heading\" data-id=\"00eb493\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Verschaffen Sie sich einen \u00dcberblick mit unserer NIS2-Checkliste<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6da3eae elementor-widget elementor-widget-text-editor\" data-id=\"6da3eae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nutzen Sie unsere detaillierte Checkliste, um festzustellen, ob Ihr OT-Netz NIS2-konform ist. Sie f\u00fchrt Sie durch alle wichtigen Punkte:<\/p><ul><li>Zust\u00e4ndigkeiten f\u00fcr Governance und Management<\/li><li>Netzwerksegmentierung und Zugangskontrolle<\/li><li>\u00dcberwachung, Protokollierung und Reaktion auf Vorf\u00e4lle<\/li><li>Laufende Risikobewertung und Dokumentation<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34c1bcb elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-left elementor-widget elementor-widget-button\" data-id=\"34c1bcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/indd.adobe.com\/view\/389b26db-0871-4ddf-8cde-0e61fbead982\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Laden Sie die NIS2-Checkliste hier herunter<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9dcb152 e-flex e-con-boxed e-con e-parent\" data-id=\"9dcb152\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c8db84d elementor-widget elementor-widget-heading\" data-id=\"c8db84d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wie man mit der Cybersicherheit in der Produktionsumgebung beginnt<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9167f78 e-con-full e-flex e-con e-child\" data-id=\"9167f78\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7b00ca4 e-con-full e-grid elementor-invisible e-con e-child\" data-id=\"7b00ca4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInLeft&quot;,&quot;animation_tablet&quot;:&quot;slideInUp&quot;,&quot;animation_mobile&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b219f0b elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"b219f0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-laptop-house\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAbbildung Ihrer Systeme\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tIdentifizierung aller OT-Ger\u00e4te und Netzwerke, die Produktions- und Betriebsumgebungen steuern\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8210989 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"8210989\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-file-exclamation\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPriorisierung von Schwachstellen\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tKonzentration auf die Komponenten mit dem h\u00f6chsten Risiko von Cyberangriffen\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab825d3 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"ab825d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-shield-check\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDurchf\u00fchrung von Sicherheitsma\u00dfnahmen\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tVerwendung von Segmentierung, sicheren Passw\u00f6rtern und Netzwerk\u00fcberwachung\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f12461b elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"f12461b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-clock\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tReaktion auf Vorf\u00e4lle \u00fcben\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tSchulen Sie Ihr Team darin, Angriffe zu erkennen, zu melden und darauf zu reagieren.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71657a5 elementor-position-inline-start elementor-mobile-position-inline-start elementor-view-default elementor-widget elementor-widget-icon-box\" data-id=\"71657a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fal fa-file-alt\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h4 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tDokumentation aufrechterhalten\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h4>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tDokumentieren Sie Ihre Arbeit und aktualisieren Sie die Checkliste regelm\u00e4\u00dfig\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d78595 e-con-full e-flex e-con e-child\" data-id=\"2d78595\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d74cad1 elementor-widget elementor-widget-heading\" data-id=\"d74cad1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Warum sollten Sie sich f\u00fcr unsere L\u00f6sung entscheiden?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd57268 elementor-widget elementor-widget-text-editor\" data-id=\"bd57268\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Schneller \u00dcberblick:<\/strong> Testen Sie, ob Ihr Unternehmen versichert ist<\/li><li><strong>Praktische Anleitung:<\/strong> Nutzen Sie unsere NIS2-Checkliste, um sich einen \u00dcberblick zu verschaffen und Sicherheitsl\u00fccken zu schlie\u00dfen<\/li><li><strong>St\u00e4ndig aktualisiert<\/strong>Wir befolgen die NIS2-Gesetzgebung und pr\u00fcfen die L\u00f6sungen<\/li><\/ul><p><strong><br \/>Fangen Sie noch heute damit an - sch\u00fctzen Sie Ihren Betrieb, vermeiden Sie Geldstrafen und halten Sie den Cyberangriffen stand!<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbd6bb2 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-center elementor-widget elementor-widget-button\" data-id=\"fbd6bb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"mailto:%20thiim@thiim.com\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kontaktieren Sie uns<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb26a06 e-flex e-con-boxed e-con e-parent\" data-id=\"cb26a06\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-4049da31 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4049da31\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;slideInLeft&quot;,&quot;animation_tablet&quot;:&quot;slideInUp&quot;,&quot;animation_mobile&quot;:&quot;slideInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1965e071 elementor-widget elementor-widget-heading\" data-id=\"1965e071\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hier finden Sie eine Auswahl unserer IEC 62443-zertifizierten Schalter<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6896f850 elementor-widget elementor-widget-text-editor\" data-id=\"6896f850\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Switches, die die Cybersicherheit st\u00e4rken!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25405c84 elementor-mobile-align-justify elementor-widget-mobile__width-inherit elementor-align-left elementor-widget elementor-widget-button\" data-id=\"25405c84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-float\" href=\"https:\/\/thiim.com\/de\/industriel-it-iiot\/industriel-netvaerksinfrastruktur\/ethernet-switche\/iec62443-certificerede-switche\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Sehen Sie hier eine Auswahl<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-594e7101 e-con-full e-flex e-con e-child\" data-id=\"594e7101\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e8a084 elementor-widget elementor-widget-image\" data-id=\"e8a084\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"197\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-1024x252.jpg\" class=\"attachment-large size-large wp-image-9183\" alt=\"\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-1024x252.jpg 1024w, https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-300x74.jpg 300w, https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-768x189.jpg 768w, https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low-18x4.jpg 18w, https:\/\/thiim.com\/wp-content\/uploads\/EDS-4000-G4000-Family-Photo-2_low.jpg 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>NIS2-loven er den danske implementering af EU\u2019s NIS2-direktiv og har til form\u00e5l at styrke cybersikkerheden i virksomheder, der varetager samfundskritiske eller vigtige funktioner. Loven stiller \u00f8gede krav til, hvordan virksomheder h\u00e5ndterer IT-sikkerhed, herunder risikostyring, h\u00e6ndelsesh\u00e5ndtering og implementering af passende tekniske og organisatoriske sikkerhedsforanstaltninger. NIS2-loven omfatter blandt andet sektorer som energi, transport, sundhed, vandforsyning og digital [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1563,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1564","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersikkerhed og NIS2\u200b | Industriel IT | Thiim A\/S<\/title>\n<meta name=\"description\" content=\"L\u00e6r om cybersikkerhed og NIS2\u2011direktivets krav for industriel IT &amp; OT \u2013 styrk netv\u00e6rkssikkerhed, risikostyring og compliance i dine digitale industrielle systemer\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thiim.com\/de\/industrielle-it-iiot\/cybersicherheit-und-nis2\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersikkerhed og NIS2\u200b | Industriel IT | Thiim A\/S\" \/>\n<meta property=\"og:description\" content=\"L\u00e6r om cybersikkerhed og NIS2\u2011direktivets krav for industriel IT &amp; OT \u2013 styrk netv\u00e6rkssikkerhed, risikostyring og compliance i dine digitale industrielle systemer\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thiim.com\/de\/industrielle-it-iiot\/cybersicherheit-und-nis2\/\" \/>\n<meta property=\"og:site_name\" content=\"Thiim\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T12:13:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/\",\"url\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/\",\"name\":\"Cybersikkerhed og NIS2\u200b | Industriel IT | Thiim A\/S\",\"isPartOf\":{\"@id\":\"https:\/\/thiim.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg\",\"datePublished\":\"2025-05-01T06:39:32+00:00\",\"dateModified\":\"2026-01-29T12:13:59+00:00\",\"description\":\"L\u00e6r om cybersikkerhed og NIS2\u2011direktivets krav for industriel IT & OT \u2013 styrk netv\u00e6rkssikkerhed, risikostyring og compliance i dine digitale industrielle systemer\",\"breadcrumb\":{\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage\",\"url\":\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg\",\"contentUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Industriel IT &#038; IIoT\u200b\",\"item\":\"https:\/\/thiim.com\/industriel-it-iiot\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersikkerhed og NIS2\u200b\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thiim.com\/#website\",\"url\":\"https:\/\/thiim.com\/\",\"name\":\"Thiim\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/thiim.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thiim.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thiim.com\/#organization\",\"name\":\"Thiim\",\"url\":\"https:\/\/thiim.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/thiim.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg\",\"contentUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg\",\"width\":653.94,\"height\":121.95,\"caption\":\"Thiim\"},\"image\":{\"@id\":\"https:\/\/thiim.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersicherheit und NIS2 | Industrial IT | Thiim A\/S","description":"Erfahren Sie mehr \u00fcber Cybersicherheit und die Anforderungen der NIS2-Richtlinie f\u00fcr industrielle IT und OT - st\u00e4rken Sie die Netzwerksicherheit, das Risikomanagement und die Compliance in Ihren digitalen Industriesystemen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thiim.com\/de\/industrielle-it-iiot\/cybersicherheit-und-nis2\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersikkerhed og NIS2\u200b | Industriel IT | Thiim A\/S","og_description":"L\u00e6r om cybersikkerhed og NIS2\u2011direktivets krav for industriel IT & OT \u2013 styrk netv\u00e6rkssikkerhed, risikostyring og compliance i dine digitale industrielle systemer","og_url":"https:\/\/thiim.com\/de\/industrielle-it-iiot\/cybersicherheit-und-nis2\/","og_site_name":"Thiim","article_modified_time":"2026-01-29T12:13:59+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/","url":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/","name":"Cybersicherheit und NIS2 | Industrial IT | Thiim A\/S","isPartOf":{"@id":"https:\/\/thiim.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage"},"image":{"@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage"},"thumbnailUrl":"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg","datePublished":"2025-05-01T06:39:32+00:00","dateModified":"2026-01-29T12:13:59+00:00","description":"Erfahren Sie mehr \u00fcber Cybersicherheit und die Anforderungen der NIS2-Richtlinie f\u00fcr industrielle IT und OT - st\u00e4rken Sie die Netzwerksicherheit, das Risikomanagement und die Compliance in Ihren digitalen Industriesystemen","breadcrumb":{"@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#primaryimage","url":"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg","contentUrl":"https:\/\/thiim.com\/wp-content\/uploads\/making-political-choice-background-2025-03-07-14-41-13-utc-1024x683.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/thiim.com\/industriel-it-iiot\/cybersikkerhed-og-nis2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Industriel IT &#038; IIoT\u200b","item":"https:\/\/thiim.com\/industriel-it-iiot\/"},{"@type":"ListItem","position":2,"name":"Cybersikkerhed og NIS2\u200b"}]},{"@type":"WebSite","@id":"https:\/\/thiim.com\/#website","url":"https:\/\/thiim.com\/","name":"Thiim","description":"","publisher":{"@id":"https:\/\/thiim.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thiim.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/thiim.com\/#organization","name":"Thiim","url":"https:\/\/thiim.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/thiim.com\/#\/schema\/logo\/image\/","url":"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg","contentUrl":"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg","width":653.94,"height":121.95,"caption":"Thiim"},"image":{"@id":"https:\/\/thiim.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/pages\/1564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/comments?post=1564"}],"version-history":[{"count":21,"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/pages\/1564\/revisions"}],"predecessor-version":[{"id":9939,"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/pages\/1564\/revisions\/9939"}],"up":[{"embeddable":true,"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/pages\/1563"}],"wp:attachment":[{"href":"https:\/\/thiim.com\/de\/wp-json\/wp\/v2\/media?parent=1564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}