{"id":322,"date":"2025-09-01T09:40:17","date_gmt":"2025-09-01T08:40:17","guid":{"rendered":"https:\/\/itcst.de\/?page_id=322"},"modified":"2025-09-01T09:43:59","modified_gmt":"2025-09-01T08:43:59","slug":"elementor-seite-322","status":"publish","type":"page","link":"https:\/\/itcst.de\/?page_id=322","title":{"rendered":"Elementor Seite #322"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"322\" class=\"elementor elementor-322\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1011a59 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1011a59\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2caff47\" data-id=\"2caff47\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1d98bf elementor-widget elementor-widget-heading\" data-id=\"d1d98bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\ud83d\ude80 Leistungen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-85af46a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"85af46a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b6d891c\" data-id=\"b6d891c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c26bc3 elementor-widget elementor-widget-text-editor\" data-id=\"3c26bc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"199\" data-end=\"215\">Einleitung<\/h3><p data-start=\"216\" data-end=\"555\">Als erfahrener CISO, Interim Manager und Projektleiter unterst\u00fctze ich Unternehmen dabei, Informationssicherheit, Compliance und digitale Transformation nachhaltig umzusetzen.<br data-start=\"391\" data-end=\"394\" \/>Meine Leistungen richten sich an Unternehmen, die schnell verf\u00fcgbare, internationale und praxiserprobte Expertise im Bereich IT- und OT-Security ben\u00f6tigen.<\/p><p data-start=\"216\" data-end=\"555\">\u00a0<\/p><h2 data-start=\"562\" data-end=\"591\">\ud83d\udd10 <strong data-start=\"568\" data-end=\"589\">CISO-as-a-Service<\/strong><\/h2><p data-start=\"592\" data-end=\"633\">Flexibel \u2013 Interim oder projektbasiert.<\/p><ul data-start=\"634\" data-end=\"867\"><li data-start=\"634\" data-end=\"703\"><p data-start=\"636\" data-end=\"703\">\u00dcbernahme der Rolle als Chief Information Security Officer (CISO)<\/p><\/li><li data-start=\"704\" data-end=\"764\"><p data-start=\"706\" data-end=\"764\">Aufbau &amp; Weiterentwicklung von Sicherheitsorganisationen<\/p><\/li><li data-start=\"765\" data-end=\"807\"><p data-start=\"767\" data-end=\"807\">Leitung internationaler Security-Teams<\/p><\/li><li data-start=\"808\" data-end=\"867\"><p data-start=\"810\" data-end=\"867\">KPI- &amp; Reporting-Strukturen f\u00fcr Management und Vorstand<\/p><\/li><\/ul><p data-start=\"869\" data-end=\"938\">\u27a1\ufe0f Ideal f\u00fcr Unternehmen ohne eigenen CISO oder in \u00dcbergangsphasen.<\/p><p data-start=\"869\" data-end=\"938\">\u00a0<\/p><h2 data-start=\"945\" data-end=\"974\">\ud83d\udcd1 <strong data-start=\"951\" data-end=\"972\">ISMS &amp; Compliance<\/strong><\/h2><p data-start=\"975\" data-end=\"1028\">Stark in Standards &amp; regulatorischen Anforderungen.<\/p><ul data-start=\"1029\" data-end=\"1241\"><li data-start=\"1029\" data-end=\"1094\"><p data-start=\"1031\" data-end=\"1094\">Einf\u00fchrung &amp; Auditvorbereitung nach <strong data-start=\"1067\" data-end=\"1092\">ISO\/IEC 27001 &amp; 27002<\/strong><\/p><\/li><li data-start=\"1095\" data-end=\"1135\"><p data-start=\"1097\" data-end=\"1135\">Umsetzung der <strong data-start=\"1111\" data-end=\"1133\">NIS2 EU-Richtlinie<\/strong><\/p><\/li><li data-start=\"1136\" data-end=\"1184\"><p data-start=\"1138\" data-end=\"1184\">Unterst\u00fctzung bei <strong data-start=\"1156\" data-end=\"1182\">TISAX-Zertifizierungen<\/strong><\/p><\/li><li data-start=\"1185\" data-end=\"1241\"><p data-start=\"1187\" data-end=\"1241\">Datenschutzkonzepte (DSGVO, kirchlicher Datenschutz)<\/p><\/li><\/ul><p data-start=\"1243\" data-end=\"1314\">\u27a1\ufe0f Compliance sicherstellen \u2013 von der Analyse bis zur Zertifizierung.<\/p><p data-start=\"1243\" data-end=\"1314\">\u00a0<\/p><h2 data-start=\"1321\" data-end=\"1344\">\ud83c\udfed <strong data-start=\"1327\" data-end=\"1342\">OT-Security<\/strong><\/h2><p data-start=\"1345\" data-end=\"1398\">Sicherheit f\u00fcr Produktions- und Betriebsumgebungen.<\/p><ul data-start=\"1399\" data-end=\"1589\"><li data-start=\"1399\" data-end=\"1440\"><p data-start=\"1401\" data-end=\"1440\">Umsetzung von <strong data-start=\"1415\" data-end=\"1428\">IEC 62443<\/strong>-Standards<\/p><\/li><li data-start=\"1441\" data-end=\"1488\"><p data-start=\"1443\" data-end=\"1488\">Netzwerksegmentierung &amp; Zero Trust Konzepte<\/p><\/li><li data-start=\"1489\" data-end=\"1527\"><p data-start=\"1491\" data-end=\"1527\">Privileged Access Management (PAM)<\/p><\/li><li data-start=\"1528\" data-end=\"1589\"><p data-start=\"1530\" data-end=\"1589\">Entwicklung &amp; Test von Notfall- und Ransomware-Strategien<\/p><\/li><\/ul><p data-start=\"1591\" data-end=\"1653\">\u27a1\ufe0f Sch\u00fctzt kritische Infrastrukturen und Produktionsanlagen.<\/p><p data-start=\"1591\" data-end=\"1653\">\u00a0<\/p><h2 data-start=\"1660\" data-end=\"1699\">\ud83d\udd04 <strong data-start=\"1666\" data-end=\"1697\">ERP &amp; Supply Chain Security<\/strong><\/h2><p data-start=\"1700\" data-end=\"1753\">Sicherer Betrieb von ERP-Systemen und Lieferketten.<\/p><ul data-start=\"1754\" data-end=\"1988\"><li data-start=\"1754\" data-end=\"1801\"><p data-start=\"1756\" data-end=\"1801\">SAP S\/4HANA, Dynamics 365, NAV-Umstellungen<\/p><\/li><li data-start=\"1802\" data-end=\"1866\"><p data-start=\"1804\" data-end=\"1866\">Integration sicherer Schnittstellen in Produktion &amp; Logistik<\/p><\/li><li data-start=\"1867\" data-end=\"1923\"><p data-start=\"1869\" data-end=\"1923\">End-to-End Absicherung von E-Commerce &amp; SCM-Systemen<\/p><\/li><li data-start=\"1924\" data-end=\"1988\"><p data-start=\"1926\" data-end=\"1988\">Umsetzung von Business Continuity &amp; Disaster Recovery Pl\u00e4nen<\/p><\/li><\/ul><p data-start=\"1990\" data-end=\"2038\">\u27a1\ufe0f IT-Security f\u00fcr reibungslose Supply Chains.<\/p><p data-start=\"1990\" data-end=\"2038\">\u00a0<\/p><h2 data-start=\"2045\" data-end=\"2078\">\ud83d\udc68\u200d\ud83d\udcbc <strong data-start=\"2054\" data-end=\"2076\">Interim Management<\/strong><\/h2><p data-start=\"2079\" data-end=\"2110\">Managementkompetenz auf Zeit.<\/p><ul data-start=\"2111\" data-end=\"2315\"><li data-start=\"2111\" data-end=\"2154\"><p data-start=\"2113\" data-end=\"2154\">CIO \/ CISO \/ Head of Security (Interim)<\/p><\/li><li data-start=\"2155\" data-end=\"2197\"><p data-start=\"2157\" data-end=\"2197\">F\u00fchrung von IT- &amp; Security-Abteilungen<\/p><\/li><li data-start=\"2198\" data-end=\"2267\"><p data-start=\"2200\" data-end=\"2267\">Projektleitung komplexer IT-Programme (ERP, Cloud, Infrastruktur)<\/p><\/li><li data-start=\"2268\" data-end=\"2315\"><p data-start=\"2270\" data-end=\"2315\">Budgetverantwortung bis in den Mio.-Bereich<\/p><\/li><\/ul><p data-start=\"2317\" data-end=\"2367\">\u27a1\ufe0f Sofortige Entlastung und schnelle Ergebnisse.<\/p><p data-start=\"2317\" data-end=\"2367\">\u00a0<\/p><h3 data-start=\"2374\" data-end=\"2407\">\u2705 <strong data-start=\"2380\" data-end=\"2407\">Warum mit mir arbeiten?<\/strong><\/h3><ul data-start=\"2408\" data-end=\"2867\"><li data-start=\"2408\" data-end=\"2471\"><p data-start=\"2410\" data-end=\"2471\">15+ Jahre Erfahrung in Industrie, Healthcare &amp; Supply Chain<\/p><\/li><li data-start=\"2472\" data-end=\"2635\"><p data-start=\"2474\" data-end=\"2635\"><strong data-start=\"2474\" data-end=\"2495\">CISM-zertifiziert<\/strong>, <strong data-start=\"2497\" data-end=\"2520\">CISA-Exam bestanden<\/strong>, Scrum Master, Datenschutzbeauftragter<\/p><\/li><li data-start=\"2636\" data-end=\"2701\"><p data-start=\"2638\" data-end=\"2701\">Internationale F\u00fchrungserfahrung (Europa, Nordamerika, Asien)<\/p><\/li><li data-start=\"2702\" data-end=\"2786\"><p data-start=\"2704\" data-end=\"2786\">Erfolgreiche Projekte bis 4,2 Mio. \u20ac Budget<\/p><\/li><li data-start=\"2787\" data-end=\"2867\"><p data-start=\"2789\" data-end=\"2867\">Sehr gute Referenzen &amp; Arbeitszeugnisse<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-34acd73 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34acd73\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-92db653\" data-id=\"92db653\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b99627 elementor-widget elementor-widget-text-editor\" data-id=\"9b99627\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"2874\" data-end=\"2894\">Call-to-Action<\/h3><p data-start=\"2895\" data-end=\"3042\"><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/27a1.svg\" alt=\"\u27a1\ufe0f\" \/> <strong data-start=\"2898\" data-end=\"2975\">Sichern Sie sich jetzt Unterst\u00fctzung f\u00fcr Ihr Projekt oder Interim-Mandat.<\/strong><br data-start=\"2975\" data-end=\"2978\" \/><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e7.svg\" alt=\"\ud83d\udce7\" \/> info@itcst.de | <img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4de.svg\" alt=\"\ud83d\udcde\" \/> +491625922574 | <img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f517.svg\" alt=\"\ud83d\udd17\" \/> <a href=\"https:\/\/www.linkedin.com\/in\/matthias-t-342627137\/\">LinkedIn<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>&#x1f680; Leistungen Einleitung Als erfahrener CISO, Interim Manager und Projektleiter unterst\u00fctze ich Unternehmen dabei, Informationssicherheit, Compliance und digitale Transformation nachhaltig umzusetzen.Meine Leistungen richten sich an Unternehmen, die schnell verf\u00fcgbare, internationale und praxiserprobte Expertise im Bereich IT- und OT-Security ben\u00f6tigen. \u00a0 &#x1f510; CISO-as-a-Service Flexibel \u2013 Interim oder projektbasiert. \u00dcbernahme der Rolle als Chief Information Security Officer &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/itcst.de\/?page_id=322\" class=\"more-link\"><span class=\"screen-reader-text\">\u201eElementor Seite #322\u201c<\/span> weiterlesen<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-322","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/pages\/322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itcst.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=322"}],"version-history":[{"count":4,"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/pages\/322\/revisions"}],"predecessor-version":[{"id":326,"href":"https:\/\/itcst.de\/index.php?rest_route=\/wp\/v2\/pages\/322\/revisions\/326"}],"wp:attachment":[{"href":"https:\/\/itcst.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}