{"id":306,"date":"2025-09-01T09:15:12","date_gmt":"2025-09-01T08:15:12","guid":{"rendered":"https:\/\/itcst.de\/?page_id=306"},"modified":"2025-09-01T09:20:11","modified_gmt":"2025-09-01T08:20:11","slug":"elementor-seite-306","status":"publish","type":"page","link":"https:\/\/itcst.de\/","title":{"rendered":"Start Page"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"306\" class=\"elementor elementor-306\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c7ee5b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c7ee5b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9fab1f\" data-id=\"f9fab1f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29ac273 elementor-widget elementor-widget-heading\" data-id=\"29ac273\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CISO &amp; IT-Security Leader \u2013 international, erfahren, zertifiziert<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-137c3ee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"137c3ee\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-23134a3\" data-id=\"23134a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cbfd372 elementor-widget elementor-widget-text-editor\" data-id=\"cbfd372\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Ich unterst\u00fctze Unternehmen als CISO, Interim Manager oder Projektleiter dabei, Informationssicherheit, Compliance und digitale Transformation erfolgreich umzusetzen.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ecb1248 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ecb1248\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-102a4f4\" data-id=\"102a4f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0006427 elementor-widget elementor-widget-text-editor\" data-id=\"0006427\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"582\" data-end=\"612\"><strong>Kurzprofil<\/strong><\/h3>\n<p data-start=\"613\" data-end=\"1010\">Mit \u00fcber 15 Jahren Erfahrung in der Leitung internationaler IT- und OT-Security-Programme helfe ich Unternehmen, ihre Sicherheitsarchitektur nachhaltig zu st\u00e4rken und regulatorische Anforderungen wie ISO 27001, NIS2 und BSI-Grundschutz zu erf\u00fcllen.<br data-start=\"861\" data-end=\"864\" \/>Ob als Interim CISO, Projektleiter oder Berater \u2013 ich liefere praxisnahe L\u00f6sungen, die Sicherheit, Effizienz und Gesch\u00e4ftskontinuit\u00e4t verbinden.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2b55140 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2b55140\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-984fc76\" data-id=\"984fc76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3714498 elementor-widget elementor-widget-text-editor\" data-id=\"3714498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"1017\" data-end=\"1069\">Leistungs\u00fcbersicht\u00a0<\/h3>\n<ul data-start=\"1070\" data-end=\"1377\">\n<li data-start=\"1070\" data-end=\"1127\">\n<p data-start=\"1072\" data-end=\"1127\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/2705.svg\" alt=\"\u2705\" \/> <strong data-start=\"1074\" data-end=\"1095\">CISO-as-a-Service<\/strong> \u2013 Interim oder projektbasiert<\/p>\n<\/li>\n<li data-start=\"1128\" data-end=\"1185\">\n<p data-start=\"1130\" data-end=\"1185\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/2705.svg\" alt=\"\u2705\" \/> <strong data-start=\"1132\" data-end=\"1153\">ISMS &amp; Compliance<\/strong> \u2013 ISO 27001, NIS2, BSI, TISAX<\/p>\n<\/li>\n<li data-start=\"1186\" data-end=\"1247\">\n<p data-start=\"1188\" data-end=\"1247\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/2705.svg\" alt=\"\u2705\" \/> <strong data-start=\"1190\" data-end=\"1205\">OT-Security<\/strong> \u2013 IEC 62443, PAM, Netzwerksegmentierung<\/p>\n<\/li>\n<li data-start=\"1248\" data-end=\"1306\">\n<p data-start=\"1250\" data-end=\"1306\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/2705.svg\" alt=\"\u2705\" \/> <strong data-start=\"1252\" data-end=\"1283\">ERP &amp; Supply Chain Security<\/strong> \u2013 SAP, Dynamics, NAV<\/p>\n<\/li>\n<li data-start=\"1307\" data-end=\"1377\">\n<p data-start=\"1309\" data-end=\"1377\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/2705.svg\" alt=\"\u2705\" \/> <strong data-start=\"1311\" data-end=\"1333\">Interim Management<\/strong> \u2013 CIO \/ Head of Security \/ Projektleitung<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1379\" data-end=\"1438\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/27a1.svg\" alt=\"\u27a1\ufe0f\" \/><b><a href=\"https:\/\/itcst.de\/?page_id=71\">Kontakt<\/a><\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CISO &amp; IT-Security Leader \u2013 international, erfahren, zertifiziert Ich unterst\u00fctze Unternehmen als CISO, Interim Manager oder Projektleiter dabei, Informationssicherheit, Compliance und digitale Transformation erfolgreich umzusetzen. Kurzprofil Mit \u00fcber 15 Jahren Erfahrung in der Leitung internationaler IT- und OT-Security-Programme helfe ich Unternehmen, ihre Sicherheitsarchitektur nachhaltig zu st\u00e4rken und regulatorische Anforderungen wie ISO 27001, NIS2 und BSI-Grundschutz &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/itcst.de\/\" class=\"more-link\"><span class=\"screen-reader-text\">\u201eStart Page\u201c<\/span> weiterlesen<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-306","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/pages\/306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itcst.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=306"}],"version-history":[{"count":8,"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/pages\/306\/revisions"}],"predecessor-version":[{"id":314,"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/pages\/306\/revisions\/314"}],"wp:attachment":[{"href":"https:\/\/itcst.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}