<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>@-yet</provider_name><provider_url>https://www.at-yet.de/en</provider_url><title>Security Maturity Assessment</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="py3NLAby3o"&gt;&lt;a href="https://www.at-yet.de/en/it-security/security-maturity-assessment"&gt;Security Maturity Assessment&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.at-yet.de/en/it-security/security-maturity-assessment/embed#?secret=py3NLAby3o" width="600" height="338" title="&#x201C;Security Maturity Assessment&#x201D; &#x2014; @-yet" data-secret="py3NLAby3o" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.at-yet.de/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>[vc_row full_width=&#x201D;stretch_row&#x201D; content_placement=&#x201D;middle&#x201D; el_class=&#x201D;subpage-header&#x201D;][vc_column][vc_column_text css=&#x201D;&#x201D; color=&#x201D;#00056e&#x201D; font_size=&#x201D;1.2rem&#x201D; el_class=&#x201D;header-subtext&#x201D;]Secure IT is of central importance for every company. Hardly any core process can do without the support of IT systems and services. This dependence on information systems requires robust security strategies that must be developed and implemented. An effective means of evaluating and improving these protection concepts&hellip;</description></oembed>
