{"id":13039,"date":"2022-04-12T18:14:15","date_gmt":"2022-04-12T16:14:15","guid":{"rendered":"https:\/\/www.advens.test\/expertise\/expertise-gestion-cyberattaque\/"},"modified":"2025-08-01T15:35:18","modified_gmt":"2025-08-01T13:35:18","slug":"incident-response","status":"publish","type":"expertise","link":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/solution\/incident-response\/","title":{"rendered":"Incident Response\u00a0"},"content":{"rendered":"\n\n<div id=\"block-logos-1671494249\" class=\"acf-block-logos grid -six mb-4 alignwide\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n              <\/div>\n    <\/div>\n  <\/div>\n  <div class=\"container bg-white py-3\">\n    <div class=\"row\">\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/agence-du-numerique-en-sante-260x52.png\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/vienne2-3-260x135.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/logo-hachette-livre-actuel-svg-gris-carbone-260x83.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/loccitane-logo-248x140.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n              <div class=\"col-4 col-md-2 mb-3 d-flex align-items-center justify-content-center\">\n          <div class=\"logo-container\" style=\"width: 120px; height: 80px; display: flex; align-items: center; justify-content: center;\">\n            <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/logo-de-mobivia-260x94.jpg\" alt=\"\" loading=\"lazy\" style=\"max-width: 100%; max-height: 100%; object-fit: contain;\"\/>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-image-texte-2082049590\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -gauche\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 \">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1211-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1211-1320x1278.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1211-1320x1278.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6 -right d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Die Cyber-Feuerwehr, die Ihnen hilft, zu reagieren \n        <\/h2>\n                    <div class=\"text-content\">\n          <p><span data-contrast=\"auto\">Um auf einen gr\u00f6\u00dferen Vorfall zu reagieren, m\u00fcssen Sie auf ein Team z\u00e4hlen k\u00f6nnen, das bereit ist, einzugreifen und Ma\u00dfnahmen zur Behebung des Problems zu ergreifen.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Mit der F\u00e4higkeit, sowohl technische als auch organisatorische Krisen zu steuern, steht Ihnen unser CSIRT-Team zur Seite, um das \u201eFeuer\u201c zu l\u00f6schen und das Risiko einer Wiederholung zu minimieren!<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-image-texte-1468954217\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -droite\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 -right\">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1217-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1217-1278x1320.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1217-1278x1320.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6  d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Viel mehr als ein Ansprechpartner \n        <\/h2>\n                    <div class=\"text-content\">\n          <p><span data-contrast=\"auto\">Je nach Ihren Bed\u00fcrfnissen und Anforderungen kann der Interventionsbereich angepasst werden.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p> <\/p>\n<p>Um umgehend reagieren zu k\u00f6nnen, ist ein fester Ansprechpartner in ihren t\u00e4glichen Gesch\u00e4ftsbetrieb eingebunden, direkt an der Seite Ihres Teams.<\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-image-texte-1458115069\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -gauche\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 \">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1867-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1867-1320x1278.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1867-1320x1278.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6 -right d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Eine enge Zusammenarbeit\n        <\/h2>\n                    <div class=\"text-content\">\n          <p><span class=\"TextRun SCXW162124888 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW162124888 BCX8\">Unsere CERT-Aktivit\u00e4ten beinhalten auch die Zusammenarbeit mit Ihren Teams f\u00fcr operative Sicherheit und unserem SOC.<\/span><\/span><\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n\n<div id=\"block-image-texte-1567157233\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -droite\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 -right\">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/pris-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/pris.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/pris.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6  d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Zertifizierungen als Qualit\u00e4tsgarantie \n        <\/h2>\n                    <div class=\"text-content\">\n          <p>Die Professionalit\u00e4t unserer Methoden und unsere F\u00e4higkeit, in hochsicheren Umfeldern zu agieren, belegen wir mit einem Zertifikat von der ANSSI nach dem PRIS-Standard.<\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n  \n<div id=\"block-chiffres-1885840154\" class=\"acf-block-chiffres alignwide\">\n  <div class=\"container\">\n    <div class=\"row\">\n      <div class=\"col-12\">\n        <h3>In Zahlen<\/h3>\n      <\/div>\n    <\/div>\n  <\/div>\n  <div class=\"container\">\n    <div class=\"row row-cols-2 row-cols-xl-4 g-3 g-xl-5\">\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">+30 <\/strong>\n              <p class=\"text\">CSIRT Abonnements<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">+10<\/strong>\n              <p class=\"text\">Mitarbeiter:innen<\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">+30<\/strong>\n              <p class=\"text\">Eingriffe in 2021 <\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col\">\n          <div class=\"card bg-grey-white border-0 h-100\">\n            <div class=\"card-body\">\n              <strong class=\"value\">+10<\/strong>\n              <p class=\"text\">Wichtige Krisenmanagement-F\u00e4lle im Jahr 2021 <\/p>\n            <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-cas-clients-782018185\" class=\"acf-block-cas-clients cas-clients alignwide\">\n  <div class=\"container container-header\">\n    <div class=\"row mb-4\">\n      <div class=\"col-12 d-flex justify-content-between align-items-center\">\n        <h2>Case Study<\/h2>\n                <a class=\"ico-btn btn-see-all\" title=\"Alle anzeigen\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/business-case\/\">\n          Alle anzeigen\n        <\/a>\n      <\/div>\n    <\/div>\n  <\/div>\n                          <div class=\"simple-item bg-grey-white p-4 p-xl-5 rounded-2\">\n          <div class=\"container\">\n            <div class=\"row\">\n              <div class=\"col-12\">\n                <h3 class=\"mb-4\">CERT-Einsatz zur Bew\u00e4ltigung eines Ransomware-Angriffs<\/h3>\n              <\/div>\n            <\/div>\n            <div class=\"row\">\n              <div class=\"col-12 col-xl-6\">\n                <div class=\"cas-client-activite-defis text texte-moyen\">\n                  <div class=\"cas-client-inner\">\n                                          <p>\n                        <strong>Kunde<\/strong>\n                      <\/p>\n                      <div class=\"cas-client-logo mb-3\">\n                                                <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/logovienne-140x140.png\" alt=\"Logo \" loading=\"lazy\" class=\"img-fluid\"\/>\n                      <\/div>\n                                        <strong>Voraussetzungen<\/strong>\r\n<ul>\r\n \t<li>438\u00a0435 Einwohner<\/li>\r\n \t<li>6\u00a0990\u00a0km\u00b2<\/li>\r\n \t<li>1\u00a0600 Mitarbeiter<\/li>\r\n \t<li>514 Millionen Euro Budget im Jahr\u00a02022<\/li>\r\n<\/ul>\r\n<strong>Herausforderungen<\/strong>\r\n<ul>\r\n \t<li>Umgang mit einem Ransomware-Angriff<\/li>\r\n \t<li>Verstehen des Ursprungs und des Ausma\u00dfes des Angriffs<\/li>\r\n \t<li>Bew\u00e4ltigung der Cyberkrise auf technischer und organisatorischer Ebene<\/li>\r\n \t<li>Verringerung der Auswirkungen und der Ausfallzeiten<\/li>\r\n \t<li>Wiederaufbau eines sicheren Systems<\/li>\r\n<\/ul>\n                  <\/div>\n                <\/div>\n                <a class=\"link -blue -arrow-right texte-moyen-bold\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/business-case\/intervention-du-cert-pour-gerer-une-attaque-par-ransomware\/\">Erfolgsgeschichte lesen<\/a>\n              <\/div>\n              <div class=\"col-12 col-xl-6\">\n                <blockquote>\n                  <p class=\"body-bold\">\n                    \u201cIch m\u00f6chte die Reaktionsf\u00e4higkeit der Advens-Teams hervorheben. Ich konnte die Teams innerhalb weniger Stunden kontaktieren. Nach einem ersten Einsatz per Videotelefonie am Wochenende trafen die Advens-CERT-Teams am Montag vor Ort ein. Alles lief sehr schnell und reibungslos.\u201d\n                  <\/p>\n                  <cite>\n                    <span class=\"texte-moyen-bold\">Luis Manuel Da Silva<\/span>\n                    <span class=\"texte-moyen\">Directeur de la Transition Num\u00e9rique du d\u00e9partement de la Vienne<\/span>\n                  <\/cite>\n                <\/blockquote>\n              <\/div>\n            <\/div>\n          <\/div>\n        <\/div>\n            <\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n\n<div id=\"block-interviews-1305667029\" class=\"acf-block-interviews interviews alignwide\">\n      <div class=\"default-block-header header\">\n      <h2 class=\"title-6 title\">Ihr Kontakt <\/h2>\n    <\/div>\n  \n                    <div class=\"container\">\n          <div class=\"row\">\n            <div class=\"col-12 col-xl-6 d-flex flex-column justify-content-center\">\n              <blockquote>\n                <p class=\"introduction introduction text-primary fs-3\">\n                  \u201cDas CERT Advens besteht aus zwei Teams: einem Team von Cyber-Feuerwehrleuten, Spezialisten f\u00fcr die Reaktion auf Vorf\u00e4lle, und einem Team von W\u00e4chtern, die sich auf Cyber-Threat-Intelligence konzentrieren.\u201c \n                <\/p>\n                <cite>\n                  <strong class=\"texte-moyen-bold d-flex\">Julien Reisdorffer<\/strong>\n                  <span class=\"texte-moyen\">VP Managed Detection &#038; Response <\/span>\n                <\/cite>\n              <\/blockquote>\n              <div class=\"btns\">\n                                              <\/div>\n            <\/div>\n            <div class=\"col-12 col-xl-6\">\n                              <div class=\"wrapper-img\">\n                  <img decoding=\"async\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/website-profilbilder-2-855x570.png\" alt=\"Julien Reisdorffer\" loading=\"lazy\" class=\"img-fluid\"\/>\n                <\/div>\n                          <\/div>\n          <\/div>\n        <\/div>\n            <\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n  \n  \n  \n\n  \n  <div id=\"block-push-3-colonnes-1657327949\" class=\"acf-block-push-contenus-3colonnes \">\n                                                \n      <div class=\"post-item card card-push card__push3 card-push-all card-push__post h-100\">\n        <a class=\"card-link card-push__link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/media\/cyber-news-de\/cyber-horizons-edr-alles-was-sie-ueber-endpoint-detection-and-response-loesungen-wissen-muessen\/\" target=\"\" title=\"Cyber Horizons EDR: Alles, was Sie \u00fcber Endpoint Detection and Response-L\u00f6sungen wissen m\u00fcssen\u00a0\"><\/a>\n        <div class=\"card-push__img\">\n          <img decoding=\"async\" class=\"card-img-top img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2023\/05\/soc-definition-1024x683-1-700x480.jpg\" alt=\"\">\n        <\/div>\n                  <div class=\"card-body d-flex flex-column align-items-start\">\n                          <span class=\"card-push__badge badge rounded-pill text-bg-primary text-white fw-400 mt-2 mb-3\">\n                Cyber News, Security Operations\n              <\/span>\n                                    <h3 class=\"card-h card-push__h3 text-grey-carbon my-auto\">Cyber Horizons EDR: Alles, was Sie \u00fcber Endpoint Detection and Response-L\u00f6sungen wissen m\u00fcssen\u00a0<\/h3>\n                        <span class=\"card-text small text-grey-light mt-auto py-2\">28 Juli 2025<\/span>\n          <\/div>\n              <\/div>\n                                                \n      <div class=\"post-item card card-push card__push3 card-push-all card-push__post h-100\">\n        <a class=\"card-link card-push__link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/media\/security-operations-de\/cyberangriffe-2024-2025-das-wichtigste-im-ueberblick\/\" target=\"\" title=\"Panorama der Cyberangriffe 2024-2025: Das Wichtigste im \u00dcberblick\"><\/a>\n        <div class=\"card-push__img\">\n          <img decoding=\"async\" class=\"card-img-top img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/06\/Rapport-sur-letat-de-la-menace-2025-Cyberattaques-2024-1-1-700x480.jpg\" alt=\"Rapport sur l'\u00e9tat de la menace 2025 - Cyberattaques 2024\">\n        <\/div>\n                  <div class=\"card-body d-flex flex-column align-items-start\">\n                          <span class=\"card-push__badge badge rounded-pill text-bg-primary text-white fw-400 mt-2 mb-3\">\n                Security Operations\n              <\/span>\n                                    <h3 class=\"card-h card-push__h3 text-grey-carbon my-auto\">Panorama der Cyberangriffe 2024-2025: Das Wichtigste im \u00dcberblick<\/h3>\n                        <span class=\"card-text small text-grey-light mt-auto py-2\">12 Juni 2025<\/span>\n          <\/div>\n              <\/div>\n                                                \n      <div class=\"post-item card card-push card__push3 card-push-all card-push__post h-100\">\n        <a class=\"card-link card-push__link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/media\/security-operations-de\/sicherung-des-active-directory-herausforderungen-und-loesungen\/\" target=\"\" title=\"Sicherung des Active Directory: Herausforderungen und L\u00f6sungen\"><\/a>\n        <div class=\"card-push__img\">\n          <img decoding=\"async\" class=\"card-img-top img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/securiser-active-directory-1024x683-1-700x480.webp\" alt=\"\">\n        <\/div>\n                  <div class=\"card-body d-flex flex-column align-items-start\">\n                          <span class=\"card-push__badge badge rounded-pill text-bg-primary text-white fw-400 mt-2 mb-3\">\n                Security Operations\n              <\/span>\n                                    <h3 class=\"card-h card-push__h3 text-grey-carbon my-auto\">Sicherung des Active Directory: Herausforderungen und L\u00f6sungen<\/h3>\n                        <span class=\"card-text small text-grey-light mt-auto py-2\">19 Mai 2025<\/span>\n          <\/div>\n              <\/div>\n                                                \n      <div class=\"post-item card card-push card__push3 card-push-all card-push__post h-100\">\n        <a class=\"card-link card-push__link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/media\/cyber-strategy-de\/umgang-mit-cyberangriffen-im-industriellen-umfeld\/\" target=\"\" title=\"Umgang mit Cyberangriffen im industriellen Umfeld\"><\/a>\n        <div class=\"card-push__img\">\n          <img decoding=\"async\" class=\"card-img-top img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/cyberattaques-en-environnement-industriel-1024x683-1-700x480.webp\" alt=\"\">\n        <\/div>\n                  <div class=\"card-body d-flex flex-column align-items-start\">\n                          <span class=\"card-push__badge badge rounded-pill text-bg-primary text-white fw-400 mt-2 mb-3\">\n                Cyber Strategy\n              <\/span>\n                                    <h3 class=\"card-h card-push__h3 text-grey-carbon my-auto\">Umgang mit Cyberangriffen im industriellen Umfeld<\/h3>\n                        <span class=\"card-text small text-grey-light mt-auto py-2\">19 Mai 2025<\/span>\n          <\/div>\n              <\/div>\n      <\/div>\n\n\n\n\n  \n  \n  \n\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-colonnes-200186186\" class=\"acf-block-colonnes colonnes alignwide\">\n  <div class=\"container\">\n    <div class=\"row mb-4\">\n      <div class=\"col-12\">\n        <h3>Warum Advens w\u00e4hlen? <\/h3>\n                  <p><span class=\"TextRun SCXW91074167 BCX8\" lang=\"DE\" xml:lang=\"DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW91074167 BCX8\">Wir begleiten Sie langfristig bei all Ihren Cyberprojekten, damit keine Bedrohung Ihre Gesch\u00e4ftst\u00e4tigkeit beeintr\u00e4chtigen kann.<\/span><\/span><span class=\"EOP SCXW91074167 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <a class=\"link\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/uber-advens\/\" target=\"\" title=\"\u00dcber Advens \">\n            \u00dcber Advens \n          <\/a>\n              <\/div>\n    <\/div>\n\n                  \n    <div class=\"row row-colonnes row-cols-1 row-cols-md-2 row-cols-xl-4 gy-4 mb-4 mb-xl-5\">\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Ein umfassendes Angebot <\/h4>\n              <p><span class=\"TextRun SCXW8348743 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW8348743 BCX8\">Die Kombination aus erstklassiger Expertise und einem \u201e<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW8348743 BCX8\">as<\/span><span class=\"NormalTextRun SCXW8348743 BCX8\">-a-service\u201c-Ansatz.<\/span><\/span><span class=\"EOP SCXW8348743 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Ausgezeichnete Expertise <\/h4>\n              <p><span class=\"TextRun SCXW223019280 BCX8\" lang=\"DE\" xml:lang=\"DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW223019280 BCX8\">Services, die durch die Sicherheitszertifikate der ANSSI anerkannt sind, und zertifizierte Experten.<\/span><\/span><span class=\"EOP SCXW223019280 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Security-as-a-Service <\/h4>\n              <p><span class=\"TextRun SCXW61026866 BCX8\" lang=\"DE\" xml:lang=\"DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW61026866 BCX8\">Ein einzigartiger Service, der erweiterten Schutz, Flexibilit\u00e4t und Kostenoptimierung vereint.<\/span><\/span><span class=\"EOP SCXW61026866 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                          <h4>Pragmatismus und Verst\u00e4ndlichkeit <\/h4>\n              <p><span class=\"TextRun SCXW35536024 BCX8\" lang=\"DE\" xml:lang=\"DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW35536024 BCX8\">Ans\u00e4tze, die zug\u00e4nglich, bedarfsorientiert und ergebnisorientiert sind.<\/span><\/span><span class=\"EOP SCXW35536024 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Incident Response (CSIRT) und Cyber Threat Intelligence (CTI)  <\/p>\n<p>sollten nicht vernachl\u00e4ssigt werden. Direkt aus Ihrem Krisenstab unterst\u00fctzen wir Sie dabei, dem Schlimmsten zu begegnen und sich selbst von der kleinsten Cyberattacke zu erholen. <\/p>\n","protected":false},"featured_media":11181,"template":"","taxo_expertise":[],"class_list":["post-13039","expertise","type-expertise","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Krisenmanagement bei Cyberangriffen: Reagieren Sie schnell und effektiv<\/title>\n<meta name=\"description\" content=\"Dank relevanter Cyber-Bedrohungsinformationen und eines einsatzbereiten Teams k\u00f6nnen Sie schnell reagieren und das Wiederauftreten von Risiken begrenzen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Krisenmanagement bei Cyberangriffen: Reagieren Sie schnell und effektiv\" \/>\n<meta property=\"og:description\" content=\"Dank relevanter Cyber-Bedrohungsinformationen und eines einsatzbereiten Teams k\u00f6nnen Sie schnell reagieren und das Wiederauftreten von Risiken begrenzen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-01T13:35:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.test\/app\/uploads\/2022\/05\/advens-video-capture-ftm-16.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/\",\"url\":\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/\",\"name\":\"Krisenmanagement bei Cyberangriffen: Reagieren Sie schnell und effektiv\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-16.jpg\",\"datePublished\":\"2022-04-12T16:14:15+00:00\",\"dateModified\":\"2025-08-01T13:35:18+00:00\",\"description\":\"Dank relevanter Cyber-Bedrohungsinformationen und eines einsatzbereiten Teams k\u00f6nnen Sie schnell reagieren und das Wiederauftreten von Risiken begrenzen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#primaryimage\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-16.jpg\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-16.jpg\",\"width\":1920,\"height\":801},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.test\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Incident Response\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.test\/#website\",\"url\":\"https:\/\/www.advens.test\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.test\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.test\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.test\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Krisenmanagement bei Cyberangriffen: Reagieren Sie schnell und effektiv","description":"Dank relevanter Cyber-Bedrohungsinformationen und eines einsatzbereiten Teams k\u00f6nnen Sie schnell reagieren und das Wiederauftreten von Risiken begrenzen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/","og_locale":"de_DE","og_type":"article","og_title":"Krisenmanagement bei Cyberangriffen: Reagieren Sie schnell und effektiv","og_description":"Dank relevanter Cyber-Bedrohungsinformationen und eines einsatzbereiten Teams k\u00f6nnen Sie schnell reagieren und das Wiederauftreten von Risiken begrenzen.","og_url":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/","og_site_name":"Advens","article_modified_time":"2025-08-01T13:35:18+00:00","og_image":[{"width":1920,"height":801,"url":"https:\/\/www.advens.test\/app\/uploads\/2022\/05\/advens-video-capture-ftm-16.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/","url":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/","name":"Krisenmanagement bei Cyberangriffen: Reagieren Sie schnell und effektiv","isPartOf":{"@id":"https:\/\/www.advens.test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-16.jpg","datePublished":"2022-04-12T16:14:15+00:00","dateModified":"2025-08-01T13:35:18+00:00","description":"Dank relevanter Cyber-Bedrohungsinformationen und eines einsatzbereiten Teams k\u00f6nnen Sie schnell reagieren und das Wiederauftreten von Risiken begrenzen.","breadcrumb":{"@id":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#primaryimage","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-16.jpg","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-16.jpg","width":1920,"height":801},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.test\/solution\/expertise-gestion-cyberattaque\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.test\/de\/"},{"@type":"ListItem","position":2,"name":"Incident Response\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.test\/#website","url":"https:\/\/www.advens.test\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.advens.test\/#organization","name":"Advens","url":"https:\/\/www.advens.test\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/expertise\/13039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/expertise"}],"about":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/types\/expertise"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/media\/11181"}],"wp:attachment":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/media?parent=13039"}],"wp:term":[{"taxonomy":"taxo_expertise","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/de\/wp-json\/wp\/v2\/taxo_expertise?post=13039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}