{"id":31940,"date":"2025-09-19T07:32:05","date_gmt":"2025-09-19T07:32:05","guid":{"rendered":"https:\/\/orise.com\/?page_id=31940"},"modified":"2026-03-18T08:34:04","modified_gmt":"2026-03-18T08:34:04","slug":"cybersecurity-heatmap","status":"publish","type":"page","link":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/","title":{"rendered":"Cybersecurity Heatmap"},"content":{"rendered":"<div id=\"pageheader-block_3defe2149ee6a1165de2acfec1940a83\" class=\"content-row content-row-pageheader bg-base\t\tcontent-row-pageheader-anchor   pageheader\">\n        <div class=\"contentPart-fixed\">\n        <div class=\"contentPart-inner\">\n            <div class=\"contentPart-text width-100\">\n                <h1>\n                                        Cybersecurity Heatmap \u2013 Ihre IT-Sicherheitslage auf einen Blick                                    <\/h1>\n                <h2 class=\"trans\">\n                                        Die Cybersecurity Heatmap liefert Ihnen innerhalb eines Tages eine fundierte, visuelle Einsch\u00e4tzung Ihrer IT- und OT-Sicherheitslage. Sie erkennen Schwachstellen, priorisieren Risiken und erhalten praxisnahe Handlungsempfehlungen \u2013 kompakt, verst\u00e4ndlich und direkt umsetzbar.                                    <\/h2>\n                                                <div class=\"anchor_links-wrapper trans\">\n                                        <div class=\"anchor_link-item trans\">\n                        <div class=\"anchor_link-item-inner\">\n                            <a class=\"anchorlink\" data-subtab=\"\"\n                                data-anchor=\"#wen\"\n                                href=\"#\">F\u00fcr wen ist die Cybersecurity Heatmap geeignet?<\/a>\n                        <\/div>\n                    <\/div>\n                                        <div class=\"anchor_link-item trans\">\n                        <div class=\"anchor_link-item-inner\">\n                            <a class=\"anchorlink\" data-subtab=\"\"\n                                data-anchor=\"#kunden\"\n                                href=\"#\">Kundenstimmen<\/a>\n                        <\/div>\n                    <\/div>\n                                        <div class=\"anchor_link-item trans\">\n                        <div class=\"anchor_link-item-inner\">\n                            <a class=\"anchorlink\" data-subtab=\"\"\n                                data-anchor=\"#beratung\"\n                                href=\"#\">Beratungsgespr\u00e4ch buchen<\/a>\n                        <\/div>\n                    <\/div>\n                                        <div class=\"anchor_link-item trans\">\n                        <div class=\"anchor_link-item-inner\">\n                            <a class=\"anchorlink\" data-subtab=\"\"\n                                data-anchor=\"#kontakt\"\n                                href=\"#\">Kontakt<\/a>\n                        <\/div>\n                    <\/div>\n                                    <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>\n    <div class=\"slidedown-button editor-hide\">\n        <span class=\"slidedown-label\">Mehr erfahren<\/span>\n        <img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/themes\/ats-orise\/img\/doubble-arrow-down.svg\" alt=\"\"\n            class=\"slidedown-icon\">\n    <\/div>\n<\/div>\n\n\n\n    <div id=\"image_banner-block_7e9352c5bdd84f6cc6aca8cfde233f38\" class=\"content-row content-row-imagebanner trans bg-base image_banner test\">\n                                                <img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png?w=1920&#038;h=0&#038;crop=1\" alt=\"\" class=\"fullscreen\">\n            <\/div>\n\n\n\n<div id=\"wen\" class=\"content-row anchortarget trans anchortarget\">\n    <h3 class=\"editorInfo\">#wen<\/h3>\n<\/div>\n\n    <div id=\"imagetext_textvariation-block_a2d7be033c033c8be0d667e4496ba81e\" class=\"content-row content-row-textvariation background_blue    textvariation\">\n        <div class=\"contentPart-inner\">\n            <div class=\"contentPart-text\">\n                                    <h2 class=\"text-blue content-row-headline trans\">\n                        F\u00fcr wen ist die Cybersecurity Heatmap geeignet?                    <\/h2>\n                                                    <div class=\"subline trans\">\n                        Cyberangriffe z\u00e4hlen heute zu den gr\u00f6\u00dften Gesch\u00e4ftsrisiken \u2013 auch f\u00fcr mittelst\u00e4ndische Unternehmen.                    <\/div>\n                            <\/div>\n                            <div class=\"contentPart-textbox width-50 textInput trans\">\n                    <p>Die Heatmap richtet sich an Unternehmen, die ihre IT-Sicherheit strukturiert verbessern m\u00f6chten \u2013 ohne Zertifizierungsdruck, aber mit klarem Fokus auf Wirksamkeit. Besonders geeignet ist sie f\u00fcr produzierende Unternehmen mit heterogenen IT-\/OT-Landschaften.<\/p>\n                <\/div>\n                                <\/div>\n                    <\/div>\n\n\n<div id=\"stepbox-block_d29c75f915e6d6b4454427da0ce8cb7c\" class=\"content-row content-row-stepbox bg-base stepbox\">\n    <div class=\"contentPart-inner\">\n        <div class=\"contentPart-text width-60\">\n                        <h2 class=\"content-row-headline trans\">\n                So funktioniert der Workshop            <\/h2>\n                                    <div class=\"subline trans\">\n                <h2>Im Cybersecurity Heatmap Workshop analysieren erfahrene Experten gemeinsam mit Ihrem Team die organisatorischen und technischen Aspekte Ihrer IT-Sicherheitslandschaft. <\/h2>\n            <\/div>\n                                    <div class=\"explanation\">\n                <p>Durch gezielte Fragen und bew\u00e4hrte Standards entsteht innerhalb weniger Stunden eine individuelle Heatmap, die Schwachstellen und St\u00e4rken klar visualisiert. Sie erhalten konkrete Empfehlungen, wie Sie Ihre IT-Sicherheit gezielt und effizient verbessern k\u00f6nnen \u2013 praxisnah, verst\u00e4ndlich und direkt umsetzbar.<\/p>\n            <\/div>\n                    <\/div>\n                <div class=\"steps-wrapper\">\n                                                <div class=\"step-item trans\">\n                                                <div class=\"index\">\n                    <p>1<\/p>\n                <\/div>\n                                <div class=\"step-item-inner\">\n                    <h3>\n                                                Ablauf &amp; Methodik                                            <\/h3>\n                    <div class=\"contentPart-textbox width-100 textInput\">\n                        <ul>\n<li>Orientierung an etablierten Standards: ISO\/IEC 27001, BSI IT-Grundschutz, EU-Richtlinie NIS2, optional VdS 10000.<\/li>\n<li>Fragenkatalog mit ca. 88 Fragen zu organisatorischen und technischen Themen.<\/li>\n<\/ul>\n                    <\/div>\n                                                        <\/div>\n            <\/div>\n                                                            <div class=\"step-item trans\">\n                                                <div class=\"index\">\n                    <p>2<\/p>\n                <\/div>\n                                <div class=\"step-item-inner\">\n                    <h3>\n                                                Dauer &amp; Ergebnis                                            <\/h3>\n                    <div class=\"contentPart-textbox width-100 textInput\">\n                        <ul>\n<li>Workshop-Dauer: ca. 4 Stunden (2h Organisation, 2h Technik)<\/li>\n<li>Individuelle Heatmap, klar priorisierte Ma\u00dfnahmen, Management-Report.<\/li>\n<\/ul>\n                    <\/div>\n                                                        <\/div>\n            <\/div>\n                                                            <div class=\"step-item trans\">\n                                                <div class=\"index\">\n                    <p>3<\/p>\n                <\/div>\n                                <div class=\"step-item-inner\">\n                    <h3>\n                                                Beispiel-Fragen &#8211; Organisatorisch                                            <\/h3>\n                    <div class=\"contentPart-textbox width-100 textInput\">\n                        <ul>\n<li>Wer ist f\u00fcr IT-Sicherheit verantwortlich und wie ist dies dokumentiert?<\/li>\n<li>Existiert eine Risikobewertung f\u00fcr kritische Gesch\u00e4ftsprozesse?<\/li>\n<li>Gibt es ein aktuelles Inventar aller IT-Assets?<\/li>\n<\/ul>\n                    <\/div>\n                                                        <\/div>\n            <\/div>\n                                                            <div class=\"step-item trans\">\n                                                <div class=\"index\">\n                    <p>4<\/p>\n                <\/div>\n                                <div class=\"step-item-inner\">\n                    <h3>\n                                                Beispiel-Fragen &#8211; Technisch                                            <\/h3>\n                    <div class=\"contentPart-textbox width-100 textInput\">\n                        <ul>\n<li>Wie werden Backups aufbewahrt und werden regelm\u00e4\u00dfige Restore-Tests durchgef\u00fchrt?<\/li>\n<li>Wie viele Domain-Admin-Accounts existieren und wird ein Tiered-Admin-Konzept genutzt?<\/li>\n<li>Sind alle am Netz befindlichen Ger\u00e4te (z. B. Maschinen) bekannt und \u00fcberwacht?<\/li>\n<\/ul>\n                    <\/div>\n                                                        <\/div>\n            <\/div>\n                                <\/div>\n        <div class=\"steps-buttons\">\n                                                                                                                                                                    <\/div>\n            <\/div>\n<\/div>\n\n\n    <div id=\"imagetext_textvariation-block_d504383b804d491d99bf43c985e88827\" class=\"content-row content-row-textvariation background_blue    textvariation\">\n        <div class=\"contentPart-inner\">\n            <div class=\"contentPart-text\">\n                                    <h2 class=\"text-blue content-row-headline trans\">\n                        NIS2 Compliance Check &amp; Fertigungs-IT-Scan                    <\/h2>\n                                                    <div class=\"subline trans\">\n                        Sicherheit beginnt mit Transparenz.                    <\/div>\n                            <\/div>\n                            <div class=\"contentPart-textbox width-50 textInput trans\">\n                    <p>Gemeinsam mit unserem Partner <a href=\"https:\/\/www.4iot.de\/pages\/discoveryscan\/\"><b>4IoT<\/b><\/a> bieten wir Ihnen einen kompakten Einstieg in die Sicherheitsbewertung Ihrer IT- und OT-Infrastruktur. Der von 4IoT entwickelte Scan liefert in k\u00fcrzester Zeit einen fundierten \u00dcberblick \u00fcber Ihre aktuelle Sicherheitslage \u2013 speziell in der Fertigung.<\/p>\n<p>Ob veraltete Betriebssysteme, unklare Verantwortlichkeiten oder fehlende Netzsegmentierung: Der automatisierte Discovery-Scan deckt Schwachstellen auf, bevor es Angreifer tun. Die Ergebnisse werden anhand aktueller Standards wie\u00a0<strong>NIS2<\/strong>,\u00a0<strong>ISO 27001<\/strong>,\u00a0<strong>BSI Grundschutz<\/strong>\u00a0und\u00a0<strong>CIS Controls<\/strong>\u00a0bewertet und priorisiert.<\/p>\n                <\/div>\n                                        <div class=\"contentPart-textbox contentPart-textbox_2 textInput width-50 trans\">\n                    <p><strong>Ihr Mehrwert:<\/strong><\/p>\n<ul>\n<li><strong>Transparenz<\/strong>\u00a0\u00fcber alle Systeme und Netzwerke \u2013 auch in der Fertigung<\/li>\n<li><strong>Priorisierte Handlungsempfehlungen<\/strong>\u00a0f\u00fcr organisatorische und technische Ma\u00dfnahmen<\/li>\n<li><strong>Compliance-Check<\/strong>\u00a0mit Blick auf gesetzliche Anforderungen (z.\u202fB. NIS2)<\/li>\n<li><strong>Effizienz<\/strong>: Analyse, Auswertung und Ergebnispr\u00e4sentation \u2013 alles an einem Tag<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>F\u00fcr wen ist das relevant?<\/strong><\/h3>\n<p>Gerade mittelst\u00e4ndische Unternehmen profitieren von diesem pragmatischen Ansatz: ohne Zertifizierungsdruck, aber mit klarem Fokus auf Umsetzbarkeit und Wirkung.<\/p>\n                <\/div>\n                    <\/div>\n                    <\/div>\n\n\n<div id=\"stepbox-block_e9daec6cf4fdb3bc6ab12ff0ae0a0852\" class=\"content-row content-row-stepbox bg-base stepbox\">\n    <div class=\"contentPart-inner\">\n        <div class=\"contentPart-text width-60\">\n                        <h2 class=\"content-row-headline trans\">\n                Ihre Vorteile            <\/h2>\n                                    <div class=\"subline trans\">\n                <h2>Mit der Cybersecurity Heatmap erhalten Sie nicht nur einen schnellen \u00dcberblick \u00fcber Ihre IT-Sicherheitslage, sondern auch konkrete, priorisierte Handlungsempfehlungen. <\/h2>\n            <\/div>\n                                    <div class=\"explanation\">\n                <p>Die Ergebnisse unterst\u00fctzen Sie dabei, Schwachstellen gezielt zu beheben, Investitionen sinnvoll zu planen und Verantwortlichkeiten klar zu definieren. So schaffen Sie eine solide Basis f\u00fcr nachhaltige IT-Sicherheit und st\u00e4rken das Vertrauen von Management und Mitarbeitenden<\/p>\n            <\/div>\n                    <\/div>\n                <div class=\"steps-wrapper\">\n                                                <div class=\"step-item trans\">\n                                                <div class=\"index\">\n                    <p>1<\/p>\n                <\/div>\n                                <div class=\"step-item-inner\">\n                    <h3>\n                                                Individuelle Heatmap mit klaren Handlungsempfehlungen                                            <\/h3>\n                    <div class=\"contentPart-textbox width-100 textInput\">\n                                            <\/div>\n                                                        <\/div>\n            <\/div>\n                                                            <div class=\"step-item trans\">\n                                                <div class=\"index\">\n                    <p>2<\/p>\n                <\/div>\n                                <div class=\"step-item-inner\">\n                    <h3>\n                                                Fundierter \u00dcberblick \u00fcber Schwachstellen und St\u00e4rken                                            <\/h3>\n                    <div class=\"contentPart-textbox width-100 textInput\">\n                                            <\/div>\n                                                        <\/div>\n            <\/div>\n                                                            <div class=\"step-item trans\">\n                                                <div class=\"index\">\n                    <p>3<\/p>\n                <\/div>\n                                <div class=\"step-item-inner\">\n                    <h3>\n                                                Solide Grundlage f\u00fcr Management-Entscheidungen und Investitionen                                            <\/h3>\n                    <div class=\"contentPart-textbox width-100 textInput\">\n                                            <\/div>\n                                                        <\/div>\n            <\/div>\n                                                            <div class=\"step-item trans\">\n                                                <div class=\"index\">\n                    <p>4<\/p>\n                <\/div>\n                                <div class=\"step-item-inner\">\n                    <h3>\n                                                Gemeinsames Verst\u00e4ndnis von Verantwortlichkeiten und Priorit\u00e4ten                                            <\/h3>\n                    <div class=\"contentPart-textbox width-100 textInput\">\n                                            <\/div>\n                                                        <\/div>\n            <\/div>\n                                <\/div>\n        <div class=\"steps-buttons\">\n                                                                                                                                                                    <\/div>\n            <\/div>\n<\/div>\n\n\n<div id=\"kunden\" class=\"content-row anchortarget trans anchortarget\">\n    <h3 class=\"editorInfo\">#kunden<\/h3>\n<\/div>\n\n    <div id=\"singletext-block_e6bb05b968ba6f293d7beade41188ce5\" class=\"content-row content-row-singletext bg-base   singletext\">\n        <div class=\"contentPart-inner\">\n            <div class=\"contentPart-text width-100\">\n                <h2 class=\" content-row-headline trans\">\n                                    <\/h2>\n                <div class=\"contentPart-textbox textInput trans\">\n                    <h2>Was unsere Kunden sagen<\/h2>\n                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n\n\n    <div id=\"clientquotes-block_455b4f278cfd2a60d804e42a546c5aa3\" class=\"content-row content-row-clientquotes trans clientquotes \">\n                    <div class=\"contentPart-inner\">\n                <div class=\"clientquotes_carousel-slider\">\n                                            <div class=\"clientquotes_carousel-item\">\n                            <div class=\"slider-wrapper\">\n                                <div class=\"clientquotes_carousel-item-imagebox\">\n                                    <div class=\"logobox\">\n                                                                                                                    <\/div>\n                                    <div class=\"personbox\">\n                                                                                                                            <img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/07\/Firefly_Experten-Menschen-sitzen-zusammen-an-einem-Tisch-und-im-Hintergrund-sind-auf-einem-957936.jpg?w=1000&#038;h=563&#038;crop=1\" alt=\"\" class=\"clientquotes_logo\">\n                                                                            <\/div>\n                                <\/div>\n\n                                <div class=\"clientquotes_carousel-item-text\">\n                                    <div class=\"clientquotes-metaline\">\n                                        Max E. \/ Mitglied der Gesch\u00e4ftsleitung                                    <\/div>\n                                    <div class=\"clientquotes-text\">\n                                        <h2>\n                                            Sycotec GmbH                                        <\/h2>\n                                        <div class=\"text\">\n                                            &quot;Ein rundum gelungener Workshop \u2013 effizient, praxisnah und mit echtem Mehrwert. Der Workshop hat mir als Verantwortlichem den Impuls gegeben, IT-Sicherheit besser im Unternehmen zu kommunizieren.&quot;                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"clientquotes_carousel-item\">\n                            <div class=\"slider-wrapper\">\n                                <div class=\"clientquotes_carousel-item-imagebox\">\n                                    <div class=\"logobox\">\n                                                                                                                    <\/div>\n                                    <div class=\"personbox\">\n                                                                                                                            <img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2022\/10\/shutterstock_1394035037-2.jpg?w=1000&#038;h=563&#038;crop=1\" alt=\"\" class=\"clientquotes_logo\">\n                                                                            <\/div>\n                                <\/div>\n\n                                <div class=\"clientquotes_carousel-item-text\">\n                                    <div class=\"clientquotes-metaline\">\n                                        Tobias G. \/ Leiter IT &amp; Digitalisierung                                    <\/div>\n                                    <div class=\"clientquotes-text\">\n                                        <h2>\n                                            Paul Leibinger GmbH &amp; Co. KG                                        <\/h2>\n                                        <div class=\"text\">\n                                            &quot;Endlich ein \u00dcberblick, der nicht nur technisch, sondern auch organisatorisch greift. Der Workshop hat uns ein klares Rahmenwerk gegeben, um unsere IT-Security gezielt weiterzuentwickeln.&quot;                                        <\/div>\n                                    <\/div>\n                                <\/div>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n            <\/div>\n\n\n<div id=\"highlight-box-block_6e0c27488250b0c37aff20a4e6e43bdd\"\n    class=\"content-row content-row-highlightbox trans highlightbox background_blue\">\n    <div class=\"contentPart-inner\">\n        <div class=\"contentPart-text\">\n            <div class=\"contentPart-text-inner\">\n                                <h2>Denkansto\u00df ben\u00f6tigt?<\/h2>\n                                                <div class=\"text\">\n                    In unserem Webinar stellen wir Ihnen unseren <b>Security-Heatmap-Workshop<\/b> vor \u2013 ein kompaktes Format, mit dem Sie in nur einem Tag eine fundierte Einsch\u00e4tzung Ihrer IT-Sicherheitslage erhalten. Gemeinsam visualisieren wir organisatorische und technische Schwachstellen, bewerten Ihre Resilienz und leiten konkrete Handlungsempfehlungen ab.\r\n\r\nErleben Sie das Thema im Dialogformat: Zwei Experten \u2013 ein Ziel. Freuen Sie sich auf eine gef\u00fchrte Diskussion im Podcast-Stil mit Praxisbeispielen, Kundenfeedback und spannenden Einblicken in die Methodik.\r\n                <\/div>\n                <div class=\"links\">\n                                                                                                    <a href=\"https:\/\/youtu.be\/JSxLRQcgqf0?si=NtrMhBJYX0YIlnmC\">\n                                                <div class=\"icon_wrap\"><img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Website-Icons-10.png?w=1000&#038;h=1&#038;crop=1\"\n                                alt=\"\" class=\"icon\"><\/div>\n                        <p>Jetzt Webinar-Aufzeichnung ansehen<\/p>\n                                            <\/a>\n                                                        <\/div>\n            <\/div>\n        <\/div>\n        <div class=\"contentPart-image\">\n                                    <img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/07\/Firefly_Experten-Menschen-sitzen-zusammen-an-einem-Tisch-und-im-Hintergrund-sind-auf-einem-957936.jpg?w=1920&#038;h=0&#038;crop=1\" alt=\"\"\n                class=\"textbildimg\">\n                    <\/div>\n    <\/div>\n<\/div>\n\n\n    <div id=\"accordion-block_fb621681428cdaa40228ad6e4ad545cc\" class=\"content-row content-row-accordion bg-base accordion\">\n                    <div class=\"contentPart-inner\">\n                <div class=\"accordion-wrapper\">\n                                            <div class=\"accordion-item accordion-item-off trans\">\n                            <div class=\"accordion-titel\">\n                                <h2>\n                                                                            Downloads                                                                    <\/h2>\n                                <img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/themes\/ats-orise\/img\/icon-plus.svg\" alt=\"\" class=\"accordion-plus\">\n\n                            <\/div>\n                            <div class=\"accordion-content\">\n                                                                <div class=\"contentPart-textbox width-50 textInput full-width\">\n                                    <p>Der Cybersecurity Heatmap Workshop kompakt auf einen Blick &#8211; Hier k\u00f6nnen Sie das FactSheet herunterladen.<\/p>\n\n                                                                                                                <div class=\"btnrow btnrow-light bold trans\"><a href=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/09\/Orise_Cybersecurity-Heatmap_FactSheet_DE.pdf\" target=\"_blank\" class=\"animateAll\">FactSheet herunterladen<\/a><\/div>\n                                                                    <\/div>\n                                                            <\/div>\n                        <\/div>\n\n                                    <\/div>\n                        <\/div>\n    <\/div>\n\n\n<div id=\"beratung\" class=\"content-row anchortarget trans anchortarget\">\n    <h3 class=\"editorInfo\">#beratung<\/h3>\n<\/div>\n\n<div id=\"highlight-box-block_25430b48b978b4d862c54cf59dd51381\"\n    class=\"content-row content-row-highlightbox trans highlightbox bg-base\">\n    <div class=\"contentPart-inner\">\n        <div class=\"contentPart-text\">\n            <div class=\"contentPart-text-inner\">\n                                <h2>Machen Sie den n\u00e4chsten Schritt zu einer sicheren und compliance\u2011konformen IT.<\/h2>\n                                                <div class=\"text\">\n                    In einem pers\u00f6nlichen Beratungsgespr\u00e4ch zeigen wir Ihnen, wie das Orise Trust Center Sie bei NIS\u20112, strukturiertem Vulnerability Management und der Absicherung Ihrer SAP\u2011 und IT\u2011Landschaften unterst\u00fctzt.\r\nErleben Sie, wie klare Security\u2011Prozesse, kontinuierliche \u00dcberwachung und erfahrene Expert:innen Risiken reduzieren und Ihre IT langfristig widerstandsf\u00e4hig machen.                <\/div>\n                <div class=\"links\">\n                                                                                                    <a href=\"https:\/\/outlook.office.com\/bookwithme\/user\/864ef346e197404482f60025d08fcfd8@a2pp.com\/meetingtype\/OxSMcGejFESYGI-fUg0JGQ2?anonymous&#038;ismsaljsauthenabled&#038;ep=mcard\">\n                                                <div class=\"icon_wrap\"><img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/alternate_email.svg?w=14&#038;h=1&#038;crop=1\"\n                                alt=\"\" class=\"icon\"><\/div>\n                        <p>Jetzt unverbindliche Beratung buchen!<\/p>\n                                            <\/a>\n                                                        <\/div>\n            <\/div>\n        <\/div>\n        <div class=\"contentPart-image\">\n                                    <img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2023\/11\/shutterstock_719542471-1.jpg?w=1000&#038;h=1&#038;crop=1\" alt=\"\"\n                class=\"textbildimg\">\n                    <\/div>\n    <\/div>\n<\/div>\n\n\n<div id=\"kontakt\" class=\"content-row anchortarget trans anchortarget\">\n    <h3 class=\"editorInfo\">#kontakt<\/h3>\n<\/div>\n\n    <div id=\"imagetext_textvariation-block_3957a37f590218b28e3d00f754863d65\" class=\"content-row content-row-textvariation background_blue    textvariation\">\n        <div class=\"contentPart-inner\">\n            <div class=\"contentPart-text\">\n                                    <h2 class=\"text-blue content-row-headline trans\">\n                        Jetzt IT-Sicherheitslage visualisieren lassen!                    <\/h2>\n                                            <\/div>\n                            <div class=\"contentPart-textbox width-50 textInput trans\">\n                    <p>Nutzen Sie die Chance und erhalten Sie in nur einem Tag einen klaren \u00dcberblick \u00fcber Ihre IT-Sicherheit. Fordern Sie jetzt Ihren individuellen Cybersecurity Heatmap Workshop an und starten Sie gezielt mit den wichtigsten Ma\u00dfnahmen f\u00fcr Ihr Unternehmen.<\/p>\n                <\/div>\n                                        <div class=\"contentPart-textbox contentPart-textbox_2 textInput width-50 trans\">\n                    <p><strong data-renderer-mark=\"true\">Jetzt Kontakt aufnehmen und Workshop anfordern.<\/strong><\/p>\n                <\/div>\n                    <\/div>\n                    <\/div>\n\n\n    <div id=\"textimage-block_22a0b84d977a177a71aff6f495dcfa92\" class=\"content-row content-row-textimage background_blue  textimage\">\n        <div class=\"contentPart-inner\">\n            <div class=\"contentPart-text width-50\">\n                <h2 class=\"trans text-blue \">\n                                            Ihr Ansprechpartner                                                                <span class=\"headline_white\">Guido Berndt \u00b7 Vice President Operations<\/span>\n                                    <\/h2>\n                <div class=\"textInput trans\">\n                                            <p>Rheinwaldstra\u00dfe 38<br \/>\n78628 Rottweil<\/p>\n<p>Tel.: 0741 17 44 16 600<br \/>\nE-Mail: service.DE-ROT@orise.com<\/p>\n                                    <\/div>\n                                    <div class=\"btnrow btnrow-light bold trans\"><a href=\"https:\/\/orise.com\/de\/sap\/\" class=\"animateAll\">Zur\u00fcck zum SAP Solutions Hub<\/a><\/div>\n                                            <\/div>\n            <div class=\"contentPart-image width-50 trans \">\n                                                    <img decoding=\"async\" src=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/advanced-application-20200127-0051.jpg?w=1024\" alt=\"\" class=\"textbildimg\">\n                            <\/div>\n        <\/div>\n    <\/div>\n\n\n    <div id=\"contactform-block_e2e64542e3fd1b62a00b8cb11a62cb7f\" class=\"content-row content-row-contactform  background_darken contactform\">\n        <div class=\"contentPart-inner\">\n\n            <div class=\"contentPart-text width-100\">\n                                    <h2 class=\"text-blue content-row-headline trans\">\n                        Jetzt Kontakt aufnehmen                    <\/h2>\n                            <\/div>\n\n            <div class=\"contactform-wrapper trans\">\n                                    <iframe src=\"https:\/\/go.atsautomation.com\/l\/651873\/2025-06-04\/h7yqym\" class=\"form-iframe form-iframe-contactform\" data-cookieconsent=\"marketing\"><\/iframe>\n                            <\/div>\n\n        <\/div>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":595,"featured_media":22317,"parent":22132,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cr_original_post":"31937","_cr_replace_post_id":"","_cr_replacing_post_id":"","footnotes":""},"class_list":["post-31940","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Heatmap | Orise<\/title>\n<meta name=\"description\" content=\"Sichere IT mit exklusiven Cybersecurity Services vom zertifizierten SAP Gold Partner. Jetzt Beratung sichern!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Heatmap\" \/>\n<meta property=\"og:description\" content=\"Sichere IT mit exklusiven Cybersecurity Services vom zertifizierten SAP Gold Partner. Jetzt Beratung sichern!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/\" \/>\n<meta property=\"og:site_name\" content=\"Orise\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T08:34:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png?w=768\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/\",\"url\":\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/\",\"name\":\"Cybersecurity Heatmap | Orise\",\"isPartOf\":{\"@id\":\"https:\/\/orise.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png\",\"datePublished\":\"2025-09-19T07:32:05+00:00\",\"dateModified\":\"2026-03-18T08:34:04+00:00\",\"description\":\"Sichere IT mit exklusiven Cybersecurity Services vom zertifizierten SAP Gold Partner. Jetzt Beratung sichern!\",\"breadcrumb\":{\"@id\":\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#primaryimage\",\"url\":\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png\",\"contentUrl\":\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png\",\"width\":1920,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/orise.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP\",\"item\":\"https:\/\/orise.com\/de\/sap\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Heatmap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/orise.com\/de\/#website\",\"url\":\"https:\/\/orise.com\/de\/\",\"name\":\"Orise\",\"description\":\"Unlock your full potential.\",\"publisher\":{\"@id\":\"https:\/\/orise.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/orise.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/orise.com\/de\/#organization\",\"name\":\"Orise\",\"url\":\"https:\/\/orise.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/orise.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/cropped-Orise-Circle-Icon-Website-V1-1.png\",\"contentUrl\":\"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/cropped-Orise-Circle-Icon-Website-V1-1.png\",\"width\":512,\"height\":512,\"caption\":\"Orise\"},\"image\":{\"@id\":\"https:\/\/orise.com\/de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Heatmap | Orise","description":"Sichere IT mit exklusiven Cybersecurity Services vom zertifizierten SAP Gold Partner. Jetzt Beratung sichern!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/","og_locale":"de_DE","og_type":"article","og_title":"Cybersecurity Heatmap","og_description":"Sichere IT mit exklusiven Cybersecurity Services vom zertifizierten SAP Gold Partner. Jetzt Beratung sichern!","og_url":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/","og_site_name":"Orise","article_modified_time":"2026-03-18T08:34:04+00:00","og_image":[{"url":"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png?w=768","width":768,"height":288,"type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1 Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/","url":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/","name":"Cybersecurity Heatmap | Orise","isPartOf":{"@id":"https:\/\/orise.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#primaryimage"},"image":{"@id":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#primaryimage"},"thumbnailUrl":"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png","datePublished":"2025-09-19T07:32:05+00:00","dateModified":"2026-03-18T08:34:04+00:00","description":"Sichere IT mit exklusiven Cybersecurity Services vom zertifizierten SAP Gold Partner. Jetzt Beratung sichern!","breadcrumb":{"@id":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#primaryimage","url":"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png","contentUrl":"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/Image-Banner-WordPress-3.png","width":1920,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/orise.com\/de\/sap\/cybersecurity-heatmap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/orise.com\/de\/"},{"@type":"ListItem","position":2,"name":"SAP","item":"https:\/\/orise.com\/de\/sap\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Heatmap"}]},{"@type":"WebSite","@id":"https:\/\/orise.com\/de\/#website","url":"https:\/\/orise.com\/de\/","name":"Orise","description":"Unlock your full potential.","publisher":{"@id":"https:\/\/orise.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/orise.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/orise.com\/de\/#organization","name":"Orise","url":"https:\/\/orise.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/orise.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/cropped-Orise-Circle-Icon-Website-V1-1.png","contentUrl":"https:\/\/orise.com\/wp-content\/uploads\/sites\/71\/2025\/04\/cropped-Orise-Circle-Icon-Website-V1-1.png","width":512,"height":512,"caption":"Orise"},"image":{"@id":"https:\/\/orise.com\/de\/#\/schema\/logo\/image\/"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/pages\/31940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/users\/595"}],"replies":[{"embeddable":true,"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/comments?post=31940"}],"version-history":[{"count":7,"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/pages\/31940\/revisions"}],"predecessor-version":[{"id":35248,"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/pages\/31940\/revisions\/35248"}],"up":[{"embeddable":true,"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/pages\/22132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/media\/22317"}],"wp:attachment":[{"href":"https:\/\/orise.com\/de\/wp-json\/wp\/v2\/media?parent=31940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}