{"id":6267,"date":"2024-11-11T12:42:48","date_gmt":"2024-11-11T12:42:48","guid":{"rendered":"https:\/\/fuentis.com\/?p=6267"},"modified":"2025-04-15T21:18:00","modified_gmt":"2025-04-15T21:18:00","slug":"was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben","status":"publish","type":"post","link":"https:\/\/fuentis.com\/en\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/","title":{"rendered":"What is a virtual CISO (vCISO) and should your team have one?"},"content":{"rendered":"<h1>What is a virtual CISO (vCISO) and should your team have one?<\/h1>\n<p>Most people know what a Chief Information Security Officer (CISO) is and why they are critical to improving an organisation's security posture. The problem, however, is that many organisations have limited hiring options and it makes little sense to hire an in-house CISO with no tangible ROI.<\/p>\n<p>A virtual CISO or vCISO is an excellent solution for organisations that need to improve their security posture with limited resources. In this guide, you'll learn how vCISOs can help your organisation scale information security flexibly while supporting growth. We cover the following topics:<\/p>\n<ul>\n<li>The role and responsibilities of a vCISO.<\/li>\n<li>Differences between a CISO and a vCISO.<\/li>\n<li>Practical benefits of working with a vCISO.<\/li>\n<li>Signs that indicate you should hire a vCISO.<\/li>\n<li>Steps to find the right professional.<\/li>\n<\/ul>\n<h3>What is a vCISO?<\/h3>\n<p>A vCISO is an outstanding information security expert that you can hire remotely and on demand, offering you the expertise of a full-time CISO. The role of a vCISO doesn't have to be one person; it can also be a team or an agency. Compensation can be in a variety of formats, such as part-time, hourly, contract or as needed. This makes the vCISO a suitable option for small and medium-sized companies that need access to a security expert but need to keep an eye on their budget.<\/p>\n<p class=\"p1\">The primary responsibility of a vCISO is to provide your information security team with objective recommendations on best practices to improve information security and cybersecurity governance. They will provide independent advice on your current security strategies and work with your team to implement new technologies and processes according to industry standards. A vCISO would be helpful to support the development of an ISMS according to BSI <a href=\"https:\/\/fuentis.com\/en\/bsi-it-grundschutz\/\">IT Grundschutz protection<\/a> or <a href=\"https:\/\/fuentis.com\/en\/fuentis-iso-27001\/\">ISO 27001<\/a> to move forward.<\/p>\n<h3>What are the daily tasks of a vCISO?<\/h3>\n<p>By hiring a vCISO, you can outsource key information security functions and close internal skills gaps. Their day-to-day responsibilities will depend on the project they are hired for. Here are some typical responsibilities:<\/p>\n<ul>\n<li><strong>Implementation of security standards<\/strong>: If you want to introduce an established <a href=\"https:\/\/fuentis.com\/en\/fuentis-suite-4\/\">ISMS<\/a>framework such as <a href=\"https:\/\/www.bsi.bund.de\/DE\/Home\/home_node\">BSI<\/a> IT-Grundschutz or ISO 27001, a vCISO brings clarity to your processes.<\/li>\n<li><strong>Coordination of incident response measures<\/strong>: A vCISO not only helps to identify security risks and threats, but also develops and executes response plans to deal with sudden incidents. They can also help you to report security incidents in a NIS2-compliant manner.<\/li>\n<li><strong>Advising the GRC team<\/strong>: A vCISO provides insight and guidance to the GRC (Governance, Risk Management and Compliance) team on the implementation of security policies and procedures. In some cases, they will also train your internal teams.<\/li>\n<li><strong>Monitoring security audits<\/strong>: A significant part of a vCISO's day-to-day responsibilities is to conduct internal security reviews or assess the security posture of third-party vendors such as suppliers or partners. The vCISO can also recommend measures and checks to prepare for future audits.<\/li>\n<li><strong>Collaboration with other teams<\/strong>: A vCISO works with IT, legal, finance, procurement and other departments to address various aspects of risk management and mitigation.<\/li>\n<\/ul>\n<p>Although a full-time CISO can also fulfil these tasks, there are notable differences between the two roles.<\/p>\n<h3>CISO vs. vCISO: What's the difference?<\/h3>\n<p>The most obvious difference between a CISO and a vCISO is the employment status. The CISO is a permanent employee who works exclusively for your organisation (unless the employment contract states otherwise). A vCISO, on the other hand, is an independent service provider who often works with several organisations at the same time.<\/p>\n<p>Other key differences between a CISO and a vCISO include<\/p>\n<ul>\n<li><strong>Resource commitment<\/strong>: Hiring a vCISO can be more cost-effective than employing a full-time person, especially if you only need their services for one-off projects or specific requirements.<\/li>\n<li><strong>Availability<\/strong>: Unlike a CISO, a vCISO is not always just one person - it can also be an agency with an entire team of experts, ensuring greater availability of services for your team.<\/li>\n<li><strong>Onboarding complexity<\/strong>: Most vCISOs can be deployed immediately as they already have the necessary skills and know the ins and outs of the security situation of different organisations. A CISO, on the other hand, as a long-term position, often requires more extensive familiarisation.<\/li>\n<\/ul>\n<h3>Advantages of working with a vCISO<\/h3>\n<p>The nature of the work and engagement of a vCISO opens up various advantages for small and medium-sized enterprises, which are summarised in the table below:<\/p>\n<p><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" data-attachment-id=\"6279\" data-permalink=\"https:\/\/fuentis.com\/en\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/nis2-anforderungen-mit-bewa%cc%88hrten-managementsystemen-erfu%cc%88llen\/\" data-orig-file=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?fit=805%2C520&amp;ssl=1\" data-orig-size=\"805,520\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Vorteile der Zusammenarbeit mit einem vCISO\" data-image-description=\"&lt;p&gt;Vorteile der Zusammenarbeit mit einem vCISO&lt;\/p&gt;\" data-image-caption=\"&lt;p&gt;Vorteile der Zusammenarbeit mit einem vCISO&lt;\/p&gt;\" data-large-file=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?fit=805%2C520&amp;ssl=1\" class=\"wp-image-6279 aligncenter\" src=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen-300x194.png?resize=704%2C455&#038;ssl=1\" alt=\"Vorteile der Zusammenarbeit mit einem vCISO\" width=\"704\" height=\"455\" srcset=\"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?resize=300%2C194&amp;ssl=1 300w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?resize=768%2C496&amp;ssl=1 768w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?resize=18%2C12&amp;ssl=1 18w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?resize=24%2C16&amp;ssl=1 24w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?resize=36%2C23&amp;ssl=1 36w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?resize=48%2C31&amp;ssl=1 48w, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/NIS2-Anforderungen-mit-bewaehrten-Managementsystemen-erfuellen.webp?w=805&amp;ssl=1 805w\" sizes=\"(max-width: 704px) 100vw, 704px\" \/><\/p>\n<h3>5 signs that hiring a vCISO might be right for you<\/h3>\n<p>If you are unsure whether you need a vCISO, check whether the following scenarios apply to your organisation:<\/p>\n<ul>\n<li>Your internal security knowledge is limited.<\/li>\n<li>You want to further develop your security programme.<\/li>\n<li>You want to expand your IT security team with a limited budget.<\/li>\n<li>You need a more objective assessment of your security posture.<\/li>\n<li>You're struggling to navigate the compliance environment.<\/li>\n<\/ul>\n<p>Let's take a closer look at the details of each scenario:<\/p>\n<h4>1. your internal security skills are limited<\/h4>\n<p>Due to the complexity of cyber security, the demand for in-house CISOs is currently high, which can make it difficult to access suitable full-time staff. A vCISO can be an excellent alternative in this case as they are often more readily available.<\/p>\n<h4>2. you want to further develop your security programme<\/h4>\n<p>Evolving your security programme requires strategic work, time and resource investment to protect more devices, applications and data. It makes sense to hire someone with the necessary technical and leadership skills to close the gap between your current and target security levels without having to make a significant investment.<\/p>\n<h4>3. you want to expand your IT security team with a limited budget<\/h4>\n<p>Many organisations hire a vCISO because they want to give their growing security team the opportunity to evolve with new ideas from an industry expert. In this case, it might make sense to hire a vCISO on an ongoing basis. Your internal team can observe their approach to governance, risk management and business continuity to develop a proactive security culture internally.<\/p>\n<h4>4. you need a more objective assessment of your security posture<\/h4>\n<p>Internal teams are often deeply embedded in established policies and processes. This can lead to decision bias and resistance to new best practices in the industry. A vCISO can provide an objective outside perspective on your cybersecurity posture and help your team recognise the overarching goal behind relevant changes and trends.<\/p>\n<h4>5. you are struggling to navigate the compliance environment<\/h4>\n<p>Security compliance is no easy task, especially for growing organisations that constantly need to hit new revenue targets. With numerous measures, policies and processes, it can quickly become overwhelming for smaller teams. Experienced vCISOs are usually experts who have helped various organisations ensure full compliance. They can significantly reduce your team's workload by organising compliance workflows and recommending software solutions such as <a href=\"https:\/\/fuentis.com\/en\/fuentis-suite-4\/\">fuentis Suite 4<\/a> , which automates recurring tasks.<\/p>\n<h3>How to find the right vCISO for your needs<\/h3>\n<p>vCISOs can have different specialisations, and not everyone will be a good fit for your business. To find the most suitable expert, follow these steps:<\/p>\n<ul>\n<li><strong>Define the scope<\/strong>: Decide whether you need a vCISO for specific projects\/tasks or general security work. Determine the services required to find the right skills.<\/li>\n<li><strong>Determine the technical or industry expertise required<\/strong>: A vCISO may specialise in certain industries. When selecting, you could look for someone with extensive experience in your desired field.<\/li>\n<li><strong>Use appropriate sources for recruitment<\/strong>: You can find a vCISO through professional networks, consultancies, job portals and other channels. Don't hesitate to ask industry peers how they found their top-performing professionals.<\/li>\n<li><strong>Conduct interviews with scenario-based assessments<\/strong>: Simulating scenarios where a vCISO should be helpful is an excellent way to understand their approach to security and test their suitability for your team.<\/li>\n<li><strong>Finalise contract terms and onboarding<\/strong>: Once you've found your vCISO, finalise the terms of engagement in a written contract that sets out key areas such as performance expectations and compensation.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Was ist ein virtueller CISO (vCISO) und sollte Ihr Team einen haben? Die meisten Menschen wissen, was ein Chief Information Security Officer (CISO) ist und warum er entscheidend f\u00fcr die Verbesserung der Sicherheitslage eines Unternehmens ist. Das Problem ist jedoch, dass viele Organisationen nur begrenzte Einstellungsm\u00f6glichkeiten haben und es wenig Sinn macht, einen internen CISO [&hellip;]<\/p>\n","protected":false},"author":249796503,"featured_media":6282,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[1],"tags":[],"class_list":["post-6267","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Was ist ein virtueller CISO (vCISO)?<\/title>\n<meta name=\"description\" content=\"Was ist ein virtueller CISO (vCISO)? | Ein vollst\u00e4ndiger Leitfaden | Vorteile und Nachteile vom vCISO | fuentis\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fuentis.com\/en\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Was ist ein virtueller CISO (vCISO) und sollte Ihr Team einen haben?\" \/>\n<meta property=\"og:description\" content=\"Was ist ein virtueller CISO (vCISO)? | Ein vollst\u00e4ndiger Leitfaden | fuentis\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fuentis.com\/en\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/\" \/>\n<meta property=\"og:site_name\" content=\"fuentis\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/fuentisAG\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-11T12:42:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-15T21:18:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Srdan Manasijevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Was ist ein virtueller CISO (vCISO)? | Ein vollst\u00e4ndiger Leitfaden | fuentis\" \/>\n<meta name=\"twitter:creator\" content=\"@fuentisAG\" \/>\n<meta name=\"twitter:site\" content=\"@fuentisAG\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Srdan Manasijevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/\"},\"author\":{\"name\":\"Srdan Manasijevic\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/person\\\/b8e4b7a7ae41aff4c7a9849c181a65b8\"},\"headline\":\"Was ist ein virtueller CISO (vCISO) und sollte Ihr Team einen haben?\",\"datePublished\":\"2024-11-11T12:42:48+00:00\",\"dateModified\":\"2025-04-15T21:18:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/\"},\"wordCount\":1387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/\",\"url\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/\",\"name\":\"Was ist ein virtueller CISO (vCISO)?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1\",\"datePublished\":\"2024-11-11T12:42:48+00:00\",\"dateModified\":\"2025-04-15T21:18:00+00:00\",\"description\":\"Was ist ein virtueller CISO (vCISO)? | Ein vollst\u00e4ndiger Leitfaden | Vorteile und Nachteile vom vCISO | fuentis\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1\",\"width\":1200,\"height\":630,\"caption\":\"Was ist ein vCISO?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fuentis.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Was ist ein virtueller CISO (vCISO) und sollte Ihr Team einen haben?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#website\",\"url\":\"https:\\\/\\\/fuentis.com\\\/\",\"name\":\"fuentis AG | fuentis Suite\",\"description\":\"Die IT-Compliance Plattform f\u00fcr ISO 27001, BSI IT-Grundschutz und Risikomanagement.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\"},\"alternateName\":\"fuentis AG | Homepage\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fuentis.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#organization\",\"name\":\"fuentis AG\",\"alternateName\":\"fuentis\",\"url\":\"https:\\\/\\\/fuentis.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fuentis.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"fuentis AG\"},\"image\":{\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/fuentisAG\\\/\",\"https:\\\/\\\/x.com\\\/fuentisAG\",\"https:\\\/\\\/mastodon.social\\\/@fuentisag\",\"https:\\\/\\\/de.linkedin.com\\\/company\\\/fuentis\",\"https:\\\/\\\/www.youtube.com\\\/@fuentisAG\",\"https:\\\/\\\/www.instagram.com\\\/fuentisag\\\/\"],\"description\":\"Fuentis vereint Cybersicherheit, Informationssicherheit und Datenschutz in einem Tool. Jetzt pers\u00f6nliches Angebot anfordern!\",\"email\":\"info@fuentis.com\",\"telephone\":\"+ 49 (331) 885 9211 -0\",\"legalName\":\"fuentis AG\",\"foundingDate\":\"2016-01-01\",\"vatID\":\"DE313123288\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fuentis.com\\\/#\\\/schema\\\/person\\\/b8e4b7a7ae41aff4c7a9849c181a65b8\",\"name\":\"Srdan Manasijevic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g\",\"caption\":\"Srdan Manasijevic\"},\"url\":\"https:\\\/\\\/fuentis.com\\\/en\\\/author\\\/srdan-manasijevic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Was ist ein virtueller CISO (vCISO)?","description":"Was ist ein virtueller CISO (vCISO)? | Ein vollst\u00e4ndiger Leitfaden | Vorteile und Nachteile vom vCISO | fuentis","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fuentis.com\/en\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/","og_locale":"en_GB","og_type":"article","og_title":"Was ist ein virtueller CISO (vCISO) und sollte Ihr Team einen haben?","og_description":"Was ist ein virtueller CISO (vCISO)? | Ein vollst\u00e4ndiger Leitfaden | fuentis","og_url":"https:\/\/fuentis.com\/en\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/","og_site_name":"fuentis","article_publisher":"https:\/\/www.facebook.com\/fuentisAG\/","article_published_time":"2024-11-11T12:42:48+00:00","article_modified_time":"2025-04-15T21:18:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp","type":"image\/webp"}],"author":"Srdan Manasijevic","twitter_card":"summary_large_image","twitter_description":"Was ist ein virtueller CISO (vCISO)? | Ein vollst\u00e4ndiger Leitfaden | fuentis","twitter_creator":"@fuentisAG","twitter_site":"@fuentisAG","twitter_misc":{"Written by":"Srdan Manasijevic","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/#article","isPartOf":{"@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/"},"author":{"name":"Srdan Manasijevic","@id":"https:\/\/fuentis.com\/#\/schema\/person\/b8e4b7a7ae41aff4c7a9849c181a65b8"},"headline":"Was ist ein virtueller CISO (vCISO) und sollte Ihr Team einen haben?","datePublished":"2024-11-11T12:42:48+00:00","dateModified":"2025-04-15T21:18:00+00:00","mainEntityOfPage":{"@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/"},"wordCount":1387,"commentCount":0,"publisher":{"@id":"https:\/\/fuentis.com\/#organization"},"image":{"@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1","articleSection":["Uncategorized"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/","url":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/","name":"Was ist ein virtueller CISO (vCISO)?","isPartOf":{"@id":"https:\/\/fuentis.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/#primaryimage"},"image":{"@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1","datePublished":"2024-11-11T12:42:48+00:00","dateModified":"2025-04-15T21:18:00+00:00","description":"Was ist ein virtueller CISO (vCISO)? | Ein vollst\u00e4ndiger Leitfaden | Vorteile und Nachteile vom vCISO | fuentis","breadcrumb":{"@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/#primaryimage","url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1","width":1200,"height":630,"caption":"Was ist ein vCISO?"},{"@type":"BreadcrumbList","@id":"https:\/\/fuentis.com\/was-ist-ein-virtueller-ciso-vciso-und-sollte-ihr-team-einen-haben\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fuentis.com\/"},{"@type":"ListItem","position":2,"name":"Was ist ein virtueller CISO (vCISO) und sollte Ihr Team einen haben?"}]},{"@type":"WebSite","@id":"https:\/\/fuentis.com\/#website","url":"https:\/\/fuentis.com\/","name":"fuentis AG | fuentis Suite","description":"Die IT-Compliance Plattform f\u00fcr ISO 27001, BSI IT-Grundschutz und Risikomanagement.","publisher":{"@id":"https:\/\/fuentis.com\/#organization"},"alternateName":"fuentis AG | Homepage","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fuentis.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fuentis.com\/#organization","name":"fuentis AG","alternateName":"fuentis","url":"https:\/\/fuentis.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fuentis.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/cropped-Fuentis-Logo-Icon-1.00.jpeg?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"fuentis AG"},"image":{"@id":"https:\/\/fuentis.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/fuentisAG\/","https:\/\/x.com\/fuentisAG","https:\/\/mastodon.social\/@fuentisag","https:\/\/de.linkedin.com\/company\/fuentis","https:\/\/www.youtube.com\/@fuentisAG","https:\/\/www.instagram.com\/fuentisag\/"],"description":"Fuentis vereint Cybersicherheit, Informationssicherheit und Datenschutz in einem Tool. Jetzt pers\u00f6nliches Angebot anfordern!","email":"info@fuentis.com","telephone":"+ 49 (331) 885 9211 -0","legalName":"fuentis AG","foundingDate":"2016-01-01","vatID":"DE313123288","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/fuentis.com\/#\/schema\/person\/b8e4b7a7ae41aff4c7a9849c181a65b8","name":"Srdan Manasijevic","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5bbbd470c77d8d79f4e89926e610bd8a29b351634d47e1575c09bace50d83f71?s=96&d=mm&r=g","caption":"Srdan Manasijevic"},"url":"https:\/\/fuentis.com\/en\/author\/srdan-manasijevic\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1",1200,630,false],"thumbnail":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=300%2C158&ssl=1",300,158,true],"medium_large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=768%2C403&ssl=1",768,403,true],"large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1024%2C538&ssl=1",1024,538,true],"1536x1536":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1",1200,630,true],"2048x2048":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1",1200,630,true],"trp-custom-language-flag":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=18%2C9&ssl=1",18,9,true],"newspack-article-block-landscape-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=1200%2C630&ssl=1",1200,630,true],"newspack-article-block-portrait-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=900%2C630&ssl=1",900,630,true],"newspack-article-block-square-large":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=1200%2C630&ssl=1",1200,630,true],"newspack-article-block-landscape-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=800%2C600&ssl=1",800,600,true],"newspack-article-block-portrait-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=600%2C630&ssl=1",600,630,true],"newspack-article-block-square-medium":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=800%2C630&ssl=1",800,630,true],"newspack-article-block-landscape-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=600%2C450&ssl=1",600,450,true],"newspack-article-block-portrait-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=450%2C600&ssl=1",450,600,true],"newspack-article-block-square-intermediate":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=600%2C600&ssl=1",600,600,true],"newspack-article-block-landscape-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=400%2C300&ssl=1",400,300,true],"newspack-article-block-portrait-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=300%2C400&ssl=1",300,400,true],"newspack-article-block-square-small":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=400%2C400&ssl=1",400,400,true],"newspack-article-block-landscape-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=200%2C150&ssl=1",200,150,true],"newspack-article-block-portrait-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=150%2C200&ssl=1",150,200,true],"newspack-article-block-square-tiny":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?resize=200%2C200&ssl=1",200,200,true],"newspack-article-block-uncropped":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=1200%2C630&ssl=1",1200,630,true],"menu-24x24":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=24%2C13&ssl=1",24,13,true],"menu-36x36":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=36%2C19&ssl=1",36,19,true],"menu-48x48":["https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/11\/Kopie-von-OG-Images.webp?fit=48%2C25&ssl=1",48,25,true]},"uagb_author_info":{"display_name":"Srdan Manasijevic","author_link":"https:\/\/fuentis.com\/en\/author\/srdan-manasijevic\/"},"uagb_comment_info":0,"uagb_excerpt":"Was ist ein virtueller CISO (vCISO) und sollte Ihr Team einen haben? Die meisten Menschen wissen, was ein Chief Information Security Officer (CISO) ist und warum er entscheidend f\u00fcr die Verbesserung der Sicherheitslage eines Unternehmens ist. Das Problem ist jedoch, dass viele Organisationen nur begrenzte Einstellungsm\u00f6glichkeiten haben und es wenig Sinn macht, einen internen CISO&hellip;","jetpack_likes_enabled":false,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pfIFB2-1D5","jetpack-related-posts":[{"id":6828,"url":"https:\/\/fuentis.com\/en\/isms-software\/","url_meta":{"origin":6267,"position":0},"title":"ISMS Software","author":"Srdan Manasijevic","date":"February 24, 2025","format":false,"excerpt":"ISMS Software Weshalb braucht man eine ISMS Software? Bevor man die Frage kl\u00e4rt, was eine ISMS Software ist und weshalb Sie eine brauchen, sollte man erstmal kl\u00e4ren, was ein ISMS ist. Was hei\u00dft ISMS? ISMS steht f\u00fcr Informationssicherheitsmanagementsystem. Das klingt zun\u00e4chst lang und kompliziert, in einigen Teilen ist es das\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"SMS Software \u2013 Die zentrale L\u00f6sung f\u00fcr Informationssicherheitsmanagement","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/02\/fuentis-AG-OG-Image-Warum-eine-ISMS-Software-1.00.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/02\/fuentis-AG-OG-Image-Warum-eine-ISMS-Software-1.00.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/02\/fuentis-AG-OG-Image-Warum-eine-ISMS-Software-1.00.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/02\/fuentis-AG-OG-Image-Warum-eine-ISMS-Software-1.00.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/02\/fuentis-AG-OG-Image-Warum-eine-ISMS-Software-1.00.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":6533,"url":"https:\/\/fuentis.com\/en\/die-6-besten-iso-27001-softwareloesungen-in-2025\/","url_meta":{"origin":6267,"position":1},"title":"The 6 best ISO 27001 software solutions in 2025","author":"Srdan Manasijevic","date":"January 13, 2025","format":false,"excerpt":"Die 6 besten ISO 27001 Softwarel\u00f6sungen in 2025 \u00a0 \u00a0 Was ist ISO 27001? Die ISO\/IEC 27001 ist ein international anerkannter Standard f\u00fcr Informationssicherheitsmanagementsysteme (ISMS). Er bietet einen strukturierten Rahmen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit von Informationen in Unternehmen sicherzustellen. Der Standard definiert Anforderungen, die Organisationen umsetzen m\u00fcssen, um\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"OG Image - Besten ISO 27001 Softwarelo\u0308sungen - 10.01.2025","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Besten-ISO-27001-Softwareloesungen-10.01.2025.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Besten-ISO-27001-Softwareloesungen-10.01.2025.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Besten-ISO-27001-Softwareloesungen-10.01.2025.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Besten-ISO-27001-Softwareloesungen-10.01.2025.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/01\/OG-Image-Besten-ISO-27001-Softwareloesungen-10.01.2025.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7192,"url":"https:\/\/fuentis.com\/en\/wiba-der-weg-zur-basis-absicherung-mit-it-grundschutz-und-isms\/","url_meta":{"origin":6267,"position":2},"title":"WiBA: The way in the Basis-Absicherung with IT-Grundschutz und ISMS","author":"Srdan Manasijevic","date":"March 19, 2025","format":false,"excerpt":"WiBA: Der Weg zur Basis-Absicherung mit IT-Grundschutz und ISMS \u00a0 \u00a0 Was ist WiBA? WiBA steht f\u00fcr \u201cWeg in die Basis-Absicherung\u201d und bietet einen niedrigschwelligen Einstieg in die Informationssicherheit. Es wurde entwickelt, um Organisationen \u2013 insbesondere kleinere und mittlere Unternehmen sowie Beh\u00f6rden \u2013 dabei zu unterst\u00fctzen, anerkannte Sicherheitsstandards wie den\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"WiBA bietet eine niedrigschwellige, praxisnahe L\u00f6sung, um Organisationen einen strukturierten Einstieg in die Informationssicherheit zu erm\u00f6glichen. Durch den fokussierten Ansatz, die klar definierten Checklisten und die geringe Einstiegsh\u00fcrde k\u00f6nnen auch kleinere Kommunen, KMUs und Organisationen ohne umfassende IT-Sicherheitskenntnisse schnell ein h\u00f6heres Sicherheitsniveau erreichen.","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/03\/fuentis-AG-OG-Image-Weg-in-die-Basis-Absicherung-1.00.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7502,"url":"https:\/\/fuentis.com\/en\/nis2-richtlinie-einfach-erklaert-was-unternehmen-jetzt-wissen-muessen\/","url_meta":{"origin":6267,"position":3},"title":"NIS2-Richtlinie einfach erkl\u00e4rt \u2013 Was Unternehmen jetzt wissen m\u00fcssen","author":"adminfuentis","date":"April 28, 2025","format":false,"excerpt":"NIS2-Richtlinie einfach erkl\u00e4rt \u2013 Was Unternehmen jetzt wissen m\u00fcssenDie NIS2-Richtlinie der Europ\u00e4ischen Union ist ein entscheidender Schritt, um die Cybersicherheit und Widerstandsf\u00e4higkeit kritischer Infrastrukturen nachhaltig zu verbessern. Mit dem zunehmenden digitalen Wandel und den damit verbundenen Cyberrisiken steigen auch die Anforderungen an Unternehmen, ihre Sicherheitsstrategien zu st\u00e4rken. Die NIS2-Richtlinie definiert\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"fuentis_handshake_rechenzentrum_fortschritt","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/fuentis_handshake_rechenzentrum_fortschritt-1024x683.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/fuentis_handshake_rechenzentrum_fortschritt-1024x683.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/fuentis_handshake_rechenzentrum_fortschritt-1024x683.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2025\/04\/fuentis_handshake_rechenzentrum_fortschritt-1024x683.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":4314,"url":"https:\/\/fuentis.com\/en\/ihr-leitfaden-zur-iso-27001-zertifizierung\/","url_meta":{"origin":6267,"position":4},"title":"Your guide to ISO 27001 certification","author":"Srdan Manasijevic","date":"October 26, 2024","format":false,"excerpt":"Alles, was Sie \u00fcber den ISMS-Standard wissen m\u00fcssen Informationssicherheit ist heute f\u00fcr jedes Unternehmen von zentraler Bedeutung, insbesondere wenn es um den Umgang mit sensiblen Daten geht. Hier kommt die ISO 27001-Norm ins Spiel, die als internationaler Standard f\u00fcr Informationssicherheitsmanagementsysteme (ISMS) gilt. Durch die Umsetzung dieser Norm k\u00f6nnen Unternehmen Risiken\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/QAssurance-logos.webp?fit=900%2C506&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/QAssurance-logos.webp?fit=900%2C506&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/QAssurance-logos.webp?fit=900%2C506&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/10\/QAssurance-logos.webp?fit=900%2C506&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6496,"url":"https:\/\/fuentis.com\/en\/kommt-der-grundschutz-2025\/","url_meta":{"origin":6267,"position":5},"title":"Is Grundschutz++ coming in 2025?","author":"Srdan Manasijevic","date":"January 6, 2025","format":false,"excerpt":"Kommt der Grundschutz++ 2025? \u00a0 Was ist der Grundschutz++ und warum ist er wichtig? Die IT-Sicherheitslandschaft entwickelt sich in rasantem Tempo weiter. Cyberangriffe werden immer raffinierter, Unternehmen treiben ihre Digitalisierung voran, und die regulatorischen Anforderungen wie die NIS2-Richtlinie und der geplante Grundschutz++ nehmen kontinuierlich zu. Genau in diesem dynamischen Umfeld\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"Wann kommt der Grundschutz++? Die langerhoffte Verbesserung des IT-Grundschutzes soll zum Jahr 2026 kommen.","src":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Kommt-der-Grundschutz-2025-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Kommt-der-Grundschutz-2025-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Kommt-der-Grundschutz-2025-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Kommt-der-Grundschutz-2025-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/fuentis.com\/wp-content\/uploads\/2024\/12\/OG-Image-Kommt-der-Grundschutz-2025-20.11.2024.webp?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/6267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/users\/249796503"}],"replies":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/comments?post=6267"}],"version-history":[{"count":16,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/6267\/revisions"}],"predecessor-version":[{"id":6285,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/posts\/6267\/revisions\/6285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/media\/6282"}],"wp:attachment":[{"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/media?parent=6267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/categories?post=6267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fuentis.com\/en\/wp-json\/wp\/v2\/tags?post=6267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}