{"id":909,"date":"2025-11-10T13:24:53","date_gmt":"2025-11-10T12:24:53","guid":{"rendered":"https:\/\/addyet.xyz\/data-protection-and-compliance\/isms"},"modified":"2025-12-24T09:09:54","modified_gmt":"2025-12-24T08:09:54","slug":"isms","status":"publish","type":"page","link":"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms","title":{"rendered":"ISMS"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; el_class=&#8221;subpage-header&#8221;][vc_column]<style>.vcex-heading.vcex_69dcfb48bac42{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:1.2em;}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h1 vcex_69dcfb48bac42\"><span class=\"vcex-heading-inner wpex-inline-block\">ISMS - Information security protects against threats<\/span><\/h1>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; el_class=&#8221;header-subtext&#8221;]An ISMS (Information Security Management System) is of crucial importance for the digital security of your company \u2013 and often mandatory. With the expertise of its experienced security experts, @-yet establishes an ISMS in your company, optimizes your information security and helps you to become resistant to digital threats with the experience gained from analyzing hundreds of attacks.[\/vc_column_text]<a href=\"#form\" class=\"vcex-button theme-button inline header-button\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\">Get free advice now<\/span><\/a> [\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1765794837625{background-color: #00056E !important;background-position: 0 0 !important;background-repeat: repeat-x !important;}&#8221; el_class=&#8221;info-text-section&#8221;][vc_column]<style>.vcex-heading.vcex_69dcfb48bcfa7{color:#fefefe;font-size:2.3rem;font-family:'Playfair Display', serif;font-weight:700;line-height:var(--wpex-leading-loose);}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69dcfb48bcfa7\"><span class=\"vcex-heading-inner wpex-inline-block\">ISMS by experienced incident security experts<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#ffffff&#8221; font_size=&#8221;1.2rem&#8221;]The security experts at @-yet GmbH have many years of experience in the field of information security. With their interdisciplinary expertise and years of practical experience, they can help you to set up your information security management system. @-yet&#8217;s expertise ranges from identifying and assessing security risks to implementing and monitoring effective protective measures.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765794899096{margin-top: 4rem !important;background-position: 0 0 !important;background-repeat: repeat-x !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_family=&#8221;Open Sans&#8221; text_align=&#8221;left&#8221;]\n<p style=\"text-align: left;\">Information security is more than just IT security<\/p>\n<p>&nbsp;[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb48bd991{color:#00056e;font-family:'Playfair Display', serif;font-weight:700;line-height:var(--wpex-leading-loose);margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69dcfb48bd991\"><span class=\"vcex-heading-inner wpex-inline-block\">Why an operational ISMS is important for you<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; text_align=&#8221;left&#8221;]Confidentiality, integrity, availability, authenticity \u2013 these are the cornerstones of information security. With an ISMS, you ensure that these cornerstones are firmly established.<\/p>\n<p>An information security management system (ISMS) comprises guidelines, procedures and controls to ensure and manage information security within your company. The aim of an ISMS of this kind from @-yet is to ensure the confidentiality, integrity, availability and authenticity of information without producing unnecessary documentation.<\/p>\n<p>In view of the increasing threats from cyber attacks, data leaks and other security incidents, this topic is becoming more and more important. Some legal requirements, such as the NIS2 Directive or DORA, explicitly prescribe an ISMS. And the General Data Protection Regulation (GDPR) can also be implemented more effectively with an ISMS. This is because it prescribes appropriate technical and organizational measures to protect personal data. This is a requirement that is easy to fulfill with an ISMS.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765794915249{margin-top: 4rem !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;24px&#8221; text_align=&#8221;left&#8221;]\n<p style=\"text-align: left;\">An ISMS is (more than) a complex project<\/p>\n<p>&nbsp;[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb48be2b2{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 wpex-text-left vcex_69dcfb48be2b2\"><span class=\"vcex-heading-inner wpex-inline-block\">With @-yet, you can master the challenges of an ISMS with the know-how from real threats.<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; text_align=&#8221;left&#8221;]Implementing an ISMS involves a number of challenges. One of the biggest hurdles is the complexity of the system. The ISMS must cover all aspects of information security. This is why introducing such a system can be a time-consuming and resource-intensive process. Companies should have the necessary capacities and expertise to successfully plan, implement and operate the ISMS. An ISMS is not a static system but requires continuous maintenance and should be regularly updated.[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb48beb5d{color:#00056e;font-size:1.2rem;line-height:var(--wpex-leading-relaxed);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon vcex_69dcfb48beb5d\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">During the implementation of an ISMS, many processes within the company are subject to intensive scrutiny. This can lead to more efficient and productive working methods. Standardising processes saves time and resources. In addition, optimised processes can improve cooperation between departments. Ultimately, an ISMS enables the creation of a security culture within the company. When all employees actively contribute to the protection of sensitive information, this is a significant benefit for everyone.<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">The ISMS must be integrated into the company&#8217;s business processes. In order to do this, existing processes and technologies are thoroughly analysed. This often reveals insights and solutions that not only contribute to security but also increase efficiency, for example by introducing single sign-on procedures to simplify authentication processes.<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">In order to manage security risks, security mechanisms must be transparent. In addition to manual documentation, the implementation of (partially) automated workflows for typical IT processes such as authorisation or change management efficiently creates transparency.<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">An ISMS is not a static system, but requires continuous maintenance and should be updated regularly. Compliance with various legal and regulatory requirements that can be covered by an ISMS fits well into the ongoing tasks of such a management system.<\/div><\/div><\/li>\n<\/ul>\n<p>&nbsp;<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221; text_align=&#8221;left&#8221;]The experienced security experts at @-yet are there to help you master these challenges. All members of the @-yet team have many years of interdisciplinary experience. With this expertise, we can provide you with the best possible support in setting up and maintaining your ISMS \u2013 whether you are a small or medium-sized company or an international corporation. In particular, our approach, which introduces the ISMS step by step, is the ideal solution for many small and medium-sized companies.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765795079389{margin-top: 4rem !important;background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]For a solid security strategy[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb48bf37e{color:#00056e;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb48bf37e\"><span class=\"vcex-heading-inner wpex-inline-block\">The benefits of an @-yet ISMS for your company<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]By proactively identifying and assessing risks, you reduce the likelihood of security incidents and their impact. This leads to significant cost savings by avoiding business interruptions. @-yet&#8217;s experience from numerous security incidents shows that an ISMS actively supports the handling of a cyber incident in all phases.[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb48bfa7d{color:#00056e;font-size:1.2rem;line-height:var(--wpex-leading-relaxed);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon vcex_69dcfb48bfa7d\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">As part of the implementation and continuous development of an ISMS, prioritisation decisions must be made on a regular basis in order to weigh up the capabilities of\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">preventing a security incident<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">detecting a security incident and<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">responding to a security incident<\/div><\/div><\/li>\n<\/ul>\n<p>Experience shows that prevention is often disproportionately emphasised over responsiveness.<\/div><\/div><\/li>\n<p><\/ul>\n<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb48bff66{color:#00056e;font-size:1.2rem;line-height:var(--wpex-leading-relaxed);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon vcex_69dcfb48bff66\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">@-yet has developed an implementation guide based on its experience with hundreds of security incidents. This guide aims to enable organisations to achieve incident readiness in the shortest possible time. This significantly increases digital resilience and sovereignty.<\/div><\/div><\/li>\n<\/ul>\n<p>&nbsp;<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]In addition, @-yet provides support throughout all phases of ISMS implementation \u2013 from planning and implementation to monitoring. Proven solutions, policy guidelines and templates ensure intuitive, step-by-step implementation. With experience in many common ISMS tools and a broad network of potential certification bodies, ISMS implementation with @-yet is guaranteed to be a successful project.[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:4rem;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1765795160738{background-color: #00056E !important;background-position: 0 0 !important;background-repeat: repeat-x !important;}&#8221; el_class=&#8221;info-text-section&#8221;][vc_column]<style>.vcex-heading.vcex_69dcfb48c07a1{color:#ffffff;font-size:2.3rem;font-family:'Playfair Display', serif;font-weight:700;line-height:var(--wpex-leading-loose);}<\/style><h1 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-text-left vcex_69dcfb48c07a1\"><span class=\"vcex-heading-inner wpex-inline-block\">Information: The essence of a company<\/span><\/h1><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#ffffff&#8221; font_size=&#8221;1.2rem&#8221;]That is why an effectively implemented information security management system (ISMS) is essential for almost every company. It involves much more than just a collection of technical measures. An ISMS is a comprehensive strategy, a framework that takes into account all aspects of information security in your company. It helps to identify risks, eliminate vulnerabilities, and proactively protect data. @-yet supports you in successfully and sustainably implementing information security in your company.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221; css=&#8221;.vc_custom_1759848861664{margin-bottom: 4rem !important;}&#8221;][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-bottom-width:1px;border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765795586366{background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Systematic information security[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb48c17a9{color:#00056e;font-size:2.3rem;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb48c17a9\"><span class=\"vcex-heading-inner wpex-inline-block\">ISMS with @-yet<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]An ISMS comprises guidelines, procedures and controls to ensure and manage information security in your company. The @-yet accompanies you step by step. The ISMS experts support you with documentation templates and tools for efficient design and implementation, among other things. You will be assigned a dedicated contact person for the entire duration of the project. They will guide you to your goal with supporting measures: an operational ISMS and sustainable security management.[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Methodology: How @-yet works[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb48c1eca{color:#00056e;font-size:1.2rem;line-height:var(--wpex-leading-relaxed);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon bullet-liste vcex_69dcfb48c1eca\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Scoping workshop to define the scope of application and certification<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Gap analysis or internal audit according to recognized standards<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Development of risk management based on business processes and IT (BIA)<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Support in the implementation of technical and organizational requirements<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Audit preparation and support for internal and external audits<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Support in setting up and implementing an effective training and awareness programme<\/div><\/div><\/li>\n<\/ul>\n<p>&nbsp;<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221; font_size=&#8221;1.2rem&#8221;]Your advantages[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb48c24fe{color:#00056e;font-size:1.2rem;line-height:var(--wpex-leading-relaxed);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon bullet-liste vcex_69dcfb48c24fe\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Stronger anchoring of information security in the organization<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Better understanding of information security in the departments<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Faster and more targeted reporting of security incidents<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Greater awareness of the acute risks to the organization<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Compliance with requirements from ISO, NIS2 or industry or data protection regulations<\/div><\/div><\/li>\n<\/ul>\n<p>&nbsp;<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:4rem;\"><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1765795670254{background-color: #FFFFFF !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Safety starts with the employees[\/vc_column_text]<style>.vcex-heading.vcex_69dcfb48c2c4a{color:#00056e;font-size:2.3rem;margin-block-start:0px;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-h2 vcex_69dcfb48c2c4a\"><span class=\"vcex-heading-inner wpex-inline-block\">Awareness training from @-yet<\/span><\/h2>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]The @-yet awareness training is more than just a training session. Awareness arouses emotions and sensitizes to current cyber threats. Live hacking, real-life examples of attacks, and numerous practical cases are used to vividly convey the principles of secure behavior. The interactive approach simplifies understanding. Participants recognize potential methods of attack and learn how to protect themselves effectively. The many years of experience of @-yet and the structured training concept strengthen your &#8220;human firewall&#8221;.[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Methodology: How @-yet works[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb48c3360{color:#00056e;font-size:1.2rem;line-height:var(--wpex-leading-relaxed);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon bullet-liste vcex_69dcfb48c3360\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Practical approach<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Live hacking demonstrations<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Participatory learning methods through interactive exercises<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Low-threshold presentation, not just of the current cyber threat situation<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Integration of private security aspects to sensitize people to their own concerns<\/div><\/div><\/li>\n<\/ul>\n<p>&nbsp;<\/div><div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div>[vc_column_text css=&#8221;&#8221; color=&#8221;#00056e&#8221;]Your advantages[\/vc_column_text]<div class=\"vcex-spacing wpex-w-100 wpex-clear\" style=\"height:20px;\"><\/div><style>.vcex-bullets.vcex_69dcfb48c3916{color:#00056e;font-size:1.2rem;line-height:var(--wpex-leading-relaxed);}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--vertical custom-icon bullet-liste vcex_69dcfb48c3916\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Stronger anchoring of information security in the organization<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Better understanding of information security in the departments<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Faster and more targeted reporting of security incidents<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Greater awareness of the acute risks to the organization<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon fa fa-solid fa-arrow-right-long\" aria-hidden=\"true\"><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Compliance with requirements from ISO, NIS2 or industry or data protection regulations<\/div><\/div><\/li>\n<\/ul>\n<p>&nbsp;<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row_content&#8221;][vc_column]<div class=\"vcex-module vcex-divider vcex-divider-solid vcex-divider-center wpex-mx-auto wpex-block wpex-h-0 wpex-border-b wpex-border-solid wpex-border-main\" style=\"border-color:#00056e;\"><\/div>[\/vc_column][\/vc_row][vc_row local_scroll_id=&#8221;form&#8221;][vc_column]<div class=\"templatera_shortcode\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<header class=\"ce_contact__header\">\n<p class=\"overline\">With @-yet, you can protect what is most valuable.<\/p>\n<\/header>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><style>.vcex-heading.vcex_69dcfb48c71a5{color:#00056e;}<\/style><h2 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl vcex_69dcfb48c71a5\"><span class=\"vcex-heading-inner wpex-inline-block\">Arrange your free, no-obligation consultation now.<\/span><\/h2><div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Arrange your personal appointment now for a non-binding and free consultation. Our security and data protection experts will be happy to answer your questions.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div>\n\t<div style=\"color:#00056e;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Direct contact:<\/strong><\/p>\n<p>Phone: +49 2175 16 55 0<br \/>\nEmail: info@at-yet.de<\/p>\n<p>Or via this form.<\/p>\n<p>We look forward to hearing from you!<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><script>\nvar gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),document.addEventListener(\"gform\/theme\/scripts_loaded\",function(){gform.themeScriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>\"function\"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn(\"The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1.\"),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener(\"gform_main_scripts_loaded\",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener(\"gform\/theme\/scripts_loaded\",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener(\"DOMContentLoaded\",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook(\"action\",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook(\"filter\",o,r,e,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,r){gform.removeHook(\"action\",o,r)},removeFilter:function(o,r,e){gform.removeHook(\"filter\",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+\"_\"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==r?t.apply(null,e):e[0]=t.apply(null,e)})),\"filter\"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});\n<\/script>\n\n                <div class='gf_browser_gecko gform_wrapper gravity-theme gform-theme--no-framework' data-form-theme='gravity-theme' data-form-index='0' id='gform_wrapper_2' ><form method='post' enctype='multipart\/form-data'  id='gform_2'  action='\/en\/wp-json\/wp\/v2\/pages\/909' data-formid='2' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_2' class='gform_fields top_label form_sublabel_below description_below validation_below'><div id=\"field_2_5\" class=\"gfield gfield--type-select gfield--input-type-select gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_5'>Salutation<\/label><div class='ginput_container ginput_container_select'><select name='input_5' id='input_2_5' class='large gfield_select'     aria-invalid=\"false\" ><option value='' >Please select<\/option><option value='Herr' >Mr.<\/option><option value='Frau' >Mrs.<\/option><\/select><\/div><\/div><fieldset id=\"field_2_1\" class=\"gfield gfield--type-name gfield--input-type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_2_1'>\n                            \n                            <span id='input_2_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.3' id='input_2_1_3' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_3' class='gform-field-label gform-field-label--type-sub '>First name<\/label>\n                                                <\/span>\n                            \n                            <span id='input_2_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >\n                                                    <input type='text' name='input_1.6' id='input_2_1_6' value=''   aria-required='true'     \/>\n                                                    <label for='input_2_1_6' class='gform-field-label gform-field-label--type-sub '>Last name<\/label>\n                                                <\/span>\n                            \n                        <\/div><\/fieldset><div id=\"field_2_6\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_6'>Company<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_2_6' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_7\" class=\"gfield gfield--type-text gfield--input-type-text gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_7'>Position<\/label><div class='ginput_container ginput_container_text'><input name='input_7' id='input_2_7' type='text' value='' class='large'      aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_3\" class=\"gfield gfield--type-email gfield--input-type-email gfield--width-half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_3'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_3' id='input_2_3' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_2_4\" class=\"gfield gfield--type-phone gfield--input-type-phone gfield--width-half field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_4'>Phone<\/label><div class='ginput_container ginput_container_phone'><input name='input_4' id='input_2_4' type='tel' value='' class='large'    aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_2_8\" class=\"gfield gfield--type-textarea gfield--input-type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_8'>Your message<\/label><div class='ginput_container ginput_container_textarea'><textarea name='input_8' id='input_2_8' class='textarea medium'      aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><fieldset id=\"field_2_10\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Further information<\/legend><div class='ginput_container ginput_container_consent'><input name='input_10.1' id='input_2_10_1' type='checkbox' value='1'    aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_10_1' >Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.<\/label><input type='hidden' name='input_10.2' value='Yes, I would like to receive news about IT security and data protection as well as information about @-yet events in future.' class='gform_hidden' \/><input type='hidden' name='input_10.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><fieldset id=\"field_2_9\" class=\"gfield gfield--type-consent gfield--type-choice gfield--input-type-consent gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><legend class='gfield_label gform-field-label gfield_label_before_complex' >Privacy protection<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/legend><div class='ginput_container ginput_container_consent'><input name='input_9.1' id='input_2_9_1' type='checkbox' value='1'   aria-required=\"true\" aria-invalid=\"false\"   \/> <label class=\"gform-field-label gform-field-label--type-inline gfield_consent_label\" for='input_2_9_1' >Yes, I have read and understood the contents of the <a href=\"\/en\/privacy-policy\">privacy policy<\/a>.<\/label><input type='hidden' name='input_9.2' value='Yes, I have read and understood the contents of the &lt;a href=&quot;\/en\/privacy-policy&quot;&gt;privacy policy&lt;\/a&gt;.' class='gform_hidden' \/><input type='hidden' name='input_9.3' value='2' class='gform_hidden' \/><\/div><\/fieldset><div id=\"field_2_11\" class=\"gfield gfield--type-frcaptcha gfield--input-type-frcaptcha gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible\"  ><label class='gfield_label gform-field-label' for='input_2_11'>Ohne Titel<\/label><div class='ginput_container ginput_container_frcaptcha'><div class=\"frc-captcha \" data-sitekey=\"FCMKBD0ANB8C39IQ\" data-lang=\"en\" ><\/div>\n\t\t<noscript>You need to enable Javascript for the anti-spam check.<\/noscript><\/div><\/div><\/div><\/div>\n        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_2' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit now'  \/> \n            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_2' value='postback' \/>\n            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_2' id='gform_theme_2' value='gravity-theme' \/>\n            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_2' id='gform_style_settings_2' value='[]' \/>\n            <input type='hidden' class='gform_hidden' name='is_submit_2' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='2' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='EUR' value='GW8HMuQm0HE12KmM+r4MFImH7F9QGOeVhfzAOxRpzJncLwUAS\/tkW1ljuuNFeTAN8Jr6V7ijTjSObVZtWPjsWWOyFCZBKadlPbOCSRvMaiSrSt0=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_2' value='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' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_2' id='gform_target_page_number_2' value='0' \/>\n            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_2' id='gform_source_page_number_2' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery('#gform_ajax_frame_2').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_2');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_2').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_2').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_2').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_2').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_2').val();gformInitSpinner( 2, 'https:\/\/www.at-yet.de\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [2, current_page]);window['gf_submitting_2'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_2').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [2]);window['gf_submitting_2'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_2').text());}else{jQuery('#gform_2').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger(\"gform_pre_post_render\", [{ formId: \"2\", currentPage: \"current_page\", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( \"gform_wrapper_2\" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( \"span\" );            visibilitySpan.id = \"gform_visibility_test_2\";            gformWrapperDiv.insertAdjacentElement( \"afterend\", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( \"gform_visibility_test_2\" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 2, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} );\n<\/script>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>[\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"ISMS - Information security protects against threats An ISMS (Information Security Management System) is of crucial importance for the digital security of your company \u2013 and often mandatory. With the expertise of its experienced security experts, @-yet establishes an ISMS in your company, optimizes your information security and helps you to become resistant to digital&hellip;","protected":false},"author":2,"featured_media":0,"parent":746,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-909","page","type-page","status-publish","hentry","entry","no-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ISMS - @-yet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISMS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms\" \/>\n<meta property=\"og:site_name\" content=\"@-yet\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T08:09:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/data-protection-and-compliance\\\/isms\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/data-protection-and-compliance\\\/isms\",\"name\":\"ISMS - @-yet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\"},\"datePublished\":\"2025-11-10T12:24:53+00:00\",\"dateModified\":\"2025-12-24T08:09:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/data-protection-and-compliance\\\/isms#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.at-yet.de\\\/en\\\/data-protection-and-compliance\\\/isms\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/data-protection-and-compliance\\\/isms#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection and compliance\",\"item\":\"https:\\\/\\\/www.at-yet.de\\\/en\\\/data-protection-and-compliance\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ISMS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#website\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"name\":\"@-yet\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.at-yet.de\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#organization\",\"name\":\"@-yet\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.at-yet.de\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/add_yet_Logo.svg\",\"caption\":\"@-yet\"},\"image\":{\"@id\":\"https:\\\/\\\/www.at-yet.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/at-yet\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ISMS - @-yet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms","og_locale":"en_US","og_type":"article","og_title":"ISMS","og_url":"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms","og_site_name":"@-yet","article_modified_time":"2025-12-24T08:09:54+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms","url":"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms","name":"ISMS - @-yet","isPartOf":{"@id":"https:\/\/www.at-yet.de\/en#website"},"datePublished":"2025-11-10T12:24:53+00:00","dateModified":"2025-12-24T08:09:54+00:00","breadcrumb":{"@id":"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance\/isms#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.at-yet.de\/en"},{"@type":"ListItem","position":2,"name":"Data protection and compliance","item":"https:\/\/www.at-yet.de\/en\/data-protection-and-compliance"},{"@type":"ListItem","position":3,"name":"ISMS"}]},{"@type":"WebSite","@id":"https:\/\/www.at-yet.de\/en#website","url":"https:\/\/www.at-yet.de\/en","name":"@-yet","description":"","publisher":{"@id":"https:\/\/www.at-yet.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.at-yet.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.at-yet.de\/en#organization","name":"@-yet","url":"https:\/\/www.at-yet.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/","url":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","contentUrl":"https:\/\/www.at-yet.de\/wp-content\/uploads\/2025\/07\/add_yet_Logo.svg","caption":"@-yet"},"image":{"@id":"https:\/\/www.at-yet.de\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/at-yet\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/comments?post=909"}],"version-history":[{"count":6,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/909\/revisions"}],"predecessor-version":[{"id":1933,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/909\/revisions\/1933"}],"up":[{"embeddable":true,"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/pages\/746"}],"wp:attachment":[{"href":"https:\/\/www.at-yet.de\/en\/wp-json\/wp\/v2\/media?parent=909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}