{"id":7902,"date":"2024-09-20T09:53:42","date_gmt":"2024-09-20T07:53:42","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-beratung\/cyber-resilience\/"},"modified":"2025-01-27T13:44:57","modified_gmt":"2025-01-27T12:44:57","slug":"cyber-resilience","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-beratung\/cyber-resilience\/","title":{"rendered":"Cyber Resilience"},"content":{"rendered":"<h1>Cyber Resilience<\/h1>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<hr>\n<h2><b>Successful crisis management: A well thought-out, synergetic cyber resilience and business continuity management strategy increases resilience and resilience in stormy seas.<\/b><\/h2>\n<div>Our IT security consulting for your business<\/div>\n<ul>\n<li>\n        <a href=\"\">Security Strategy<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/grc\/\">GRC<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/security-architektur\/\">Security Architecture<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/security-awareness\/\">Security Awareness<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/technologieberatung\/\">Technology Consulting<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/it-security-beratung\/cyber-resilience\/\">Cyber Resilience<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h2>Even with the most advanced technology, a ship is not considered unsinkable, so lifeboats and a proven evacuation plan are essential<\/h2>\n<div>\n<p>Smooth operational processes are the be-all and end-all for a company&#8217;s success. However, threats such as cyber attacks, system and network failures or natural disasters can severely disrupt your business activities at any time. Robust crisis management structures are required as part of a holistic business continuity management (BCM) system to ensure that your company can cope with such crises in the best possible way.<\/p>\n<\/div>\n<h3>Foundation for action competence<\/h3>\n<div>\n<p>Stable governance with clearly regulated roles, authorisations and escalation processes is central and unavoidable. Clear company guidelines such as policies, processes and security guidelines provide the framework for action. Regular training for your employees ensures risk awareness and crisis management knowledge at all levels.<\/p>\n<\/div>\n<h3>Risk management<\/h3>\n<div>\n<p>Unverzichtbar ist eine ganzheitliche Risikobehandlung und -\u00fcberwachung. Nebst IT-Sicherheitsrisiken m\u00fcssen auch Schwachstellen in Organisationsstrukturen, Prozessen und Personalsituation beleuchtet werden. So l\u00e4sst sich das gesamte Bedrohungspotenzial f\u00fcr Ihr Unternehmen erfassen und bewerten. Darauf aufbauend erfolgen Massnahmenableitung und Priorit\u00e4tensetzung.<\/p>\n<\/div>\n<h3>A reality check<\/h3>\n<div>\n<p>Crisis exercises are an indispensable part of a robust BCM to identify weak points and risks. Crisis teams, communication and response procedures are realistically simulated and put through their paces. Depending on the risk profile, a balanced mix of annual main exercises and more frequent, focussed special scenarios such as ransomware attacks is recommended.<\/p>\n<\/p>\n<p>Technical recovery tests are another critical component of the regular review and maintenance of corporate resilience.<\/p>\n<\/div>\n<h3>Continuous evolution<\/h3>\n<div>\n<p>Both corporate structures and the threat landscape are extremely dynamic. BCM for your company must therefore be constantly developed and adapted to current circumstances. Following significant changes or incidents that have occurred, you should promptly review your crisis preparedness.<\/p>\n<\/div>\n<h3>Sustainable protection of core processes<\/h3>\n<div>\n<p>Business continuity management is demanding and requires the ongoing commitment of all stakeholders in your organisation. But the effort is worth it: with robust BCM concepts, trained employees, resilient governance structures and continuous optimisation, business and mission-critical processes can be effectively protected, resilience increased and crisis situations managed in the best possible way at all times.<\/p>\n<\/div>\n<h2>The BCM services<\/h2>\n<ul>\n<li>\n<h3>Risk assessment &#038; prioritisation<\/h3>\n<div>\n<p>Using customised Business Impact Analyses (BIA), we identify and evaluate your critical business processes, systems and resources as a starting point.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Strategy development &#038; planning concept<\/h3>\n<div>\n<p>Based on the results of the analysis, we jointly develop a holistic business continuity strategy including roles and responsibilities as well as escalation mechanisms. We also draw up emergency and restart plans for you for relevant crisis scenarios.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>IT-Service Continuity Management<\/h3>\n<div>\n<p>We develop precise failure concepts for your IT infrastructure to ensure system availability. Solutions for failover, data recovery or emergency data centres are thus dovetailed with the overarching BCM processes. We also emphasise the importance of developing appropriate test concepts and support you in failure and recovery tests.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Awareness &#038; Simulations<\/h3>\n<div>\n<p>Regular training and realistic crisis exercises involving your emergency teams and crisis teams are the key to sensitising your employees to risks. We support you in successively optimising your processes through targeted exercises and simulations.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Governance Consulting<\/h3>\n<div>\n<p>Clear governance is the basis for effective emergency and crisis management. We support you in setting up suitable structures with policies, processes and defined escalation paths. You can find out more about our GRC services at <a href=\"https:\/\/www.ensec.ch\/en\/it-security-beratung\/grc\/\">GRC &#8211; ensec<\/a>.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/Aus-Sicht-des-Business_Cyber-Resilience_2.jpg\" alt=\"\"><\/p>\n<h2>Strengthening resilience<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p><strong>Sooner or later, every company will be affected by a cyber attack. However, those who have invested in their own resilience will be able to minimise damage to their image and financial losses with shorter start-up times and more robust processes.<\/strong><\/p>\n<p>Building this resilience requires proven concepts, an understanding of individual operational processes and the respective sales market, as well as technical expertise. To strengthen resilience as efficiently and effectively as possible, it is also essential to focus on the most critical processes and their most important aspects.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Schreiben Sie uns<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"css\":\".uk-container {\\n\\tmargin-top:0px;\\n}\\n\\n@media only screen and (min-width: 960px) {\\n    .uk-container {\\n\\tmargin-top:-80px;\\n}\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"3-5,2-5\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"3-5\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align\":\"center\",\"content\":\"Cyber Resilience\",\"css\":\".el-element {\\n\\tpadding-top:30px;\\n}\",\"margin\":\"small\",\"margin_remove_top\":true,\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-5\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 60px;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"lightbox_bg_close\":true,\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\",\"modified\":\"2021-07-13T19:31:48.139Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"breadcrumbs\",\"props\":{\"show_current\":true,\"show_home\":true}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_bottom\":true,\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"<b>Successful crisis management: A well thought-out, synergetic cyber resilience and business continuity management strategy increases resilience and resilience in stormy seas.<\\\/b>\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"large\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our IT security consulting for your business\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"div\",\"title_style\":\"h5\"}},{\"type\":\"subnav\",\"props\":{\"css\":\"@media only screen and (max-width: 600px) {\\n  a.el-content, a.el-link {\\n  padding:10px 20px;\\n  }\\n}\\n\\n.el-link {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #fff;\\n  color: #007ea7;\\n}\\n\\n.el-link:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\\n\\n.el-content {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #007ea7;\\n  color: #fff;\\n}\",\"subnav_style\":\"pill\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Strategy\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"GRC\",\"link\":\"it-security-beratung\\\/grc\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Architecture\",\"link\":\"it-security-beratung\\\/security-architektur\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Awareness\",\"link\":\"it-security-beratung\\\/security-awareness\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Technology Consulting\",\"link\":\"it-security-beratung\\\/technologieberatung\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Cyber Resilience\",\"link\":\"it-security-beratung\\\/cyber-resilience\\\/\"}}],\"modified\":\"2021-05-11T13:39:40.496Z\",\"name\":\"Subnav \\u2013 IT Security\"},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"remove-vertical\",\"margin_remove_top\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Even with the most advanced technology, a ship is not considered unsinkable, so lifeboats and a proven evacuation plan are essential\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Smooth operational processes are the be-all and end-all for a company's success. However, threats such as cyber attacks, system and network failures or natural disasters can severely disrupt your business activities at any time. Robust crisis management structures are required as part of a holistic business continuity management (BCM) system to ensure that your company can cope with such crises in the best possible way.<\\\/p>\",\"margin\":\"default\",\"text_color\":\"primary\",\"text_style\":\"large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Foundation for action competence\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Stable governance with clearly regulated roles, authorisations and escalation processes is central and unavoidable. Clear company guidelines such as policies, processes and security guidelines provide the framework for action. Regular training for your employees ensures risk awareness and crisis management knowledge at all levels.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Risk management\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Unverzichtbar ist eine ganzheitliche Risikobehandlung und -\\u00fcberwachung. Nebst IT-Sicherheitsrisiken m\\u00fcssen auch Schwachstellen in Organisationsstrukturen, Prozessen und Personalsituation beleuchtet werden. So l\\u00e4sst sich das gesamte Bedrohungspotenzial f\\u00fcr Ihr Unternehmen erfassen und bewerten. Darauf aufbauend erfolgen Massnahmenableitung und Priorit\\u00e4tensetzung.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"A reality check\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Crisis exercises are an indispensable part of a robust BCM to identify weak points and risks. Crisis teams, communication and response procedures are realistically simulated and put through their paces. Depending on the risk profile, a balanced mix of annual main exercises and more frequent, focussed special scenarios such as ransomware attacks is recommended.<\\\/p>\\n\n\n<p><\\\/p>\\n\n\n<p>Technical recovery tests are another critical component of the regular review and maintenance of corporate resilience.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Continuous evolution\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Both corporate structures and the threat landscape are extremely dynamic. BCM for your company must therefore be constantly developed and adapted to current circumstances. Following significant changes or incidents that have occurred, you should promptly review your crisis preparedness.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Sustainable protection of core processes\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Business continuity management is demanding and requires the ongoing commitment of all stakeholders in your organisation. But the effort is worth it: with robust BCM concepts, trained employees, resilient governance structures and continuous optimisation, business and mission-critical processes can be effectively protected, resilience increased and crisis situations managed in the best possible way at all times.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"The BCM services\",\"title_element\":\"h2\",\"title_style\":\"h1\"},\"name\":\"Headline\"}]}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-05.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"css\":\".el-item:hover {\\n\\tbox-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item {\\n\\tcolor:#151515;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"3\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Using customised Business Impact Analyses (BIA), we identify and evaluate your critical business processes, systems and resources as a starting point.<\\\/p>\",\"image\":\"\",\"title\":\"Risk assessment & prioritisation\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Based on the results of the analysis, we jointly develop a holistic business continuity strategy including roles and responsibilities as well as escalation mechanisms. We also draw up emergency and restart plans for you for relevant crisis scenarios.<\\\/p>\",\"image\":\"\",\"title\":\"Strategy development & planning concept\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>We develop precise failure concepts for your IT infrastructure to ensure system availability. Solutions for failover, data recovery or emergency data centres are thus dovetailed with the overarching BCM processes. We also emphasise the importance of developing appropriate test concepts and support you in failure and recovery tests.<\\\/p>\",\"image\":\"\",\"title\":\"IT-Service Continuity Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Regular training and realistic crisis exercises involving your emergency teams and crisis teams are the key to sensitising your employees to risks. We support you in successively optimising your processes through targeted exercises and simulations.<\\\/p>\",\"image\":\"\",\"title\":\"Awareness & Simulations\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Clear governance is the basis for effective emergency and crisis management. We support you in setting up suitable structures with policies, processes and defined escalation paths. You can find out more about our GRC services at <a href=\\\"https:\\\/\\\/www.ensec.ch\\\/en\\\/it-security-beratung\\\/grc\\\/\\\">GRC - ensec<\\\/a>.<\\\/p>\",\"image\":\"\",\"title\":\"Governance Consulting\"}}],\"name\":\"Grid Services\"}]}]}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p><strong>Sooner or later, every company will be affected by a cyber attack. However, those who have invested in their own resilience will be able to minimise damage to their image and financial losses with shorter start-up times and more robust processes.<\\\/strong><\\\/p>\\n\n\n<p>Building this resilience requires proven concepts, an understanding of individual operational processes and the respective sales market, as well as technical expertise. To strengthen resilience as efficiently and effectively as possible, it is also essential to focus on the most critical processes and their most important aspects.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Aus-Sicht-des-Business_Cyber-Resilience_2.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"Strengthening resilience\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"status\":\"disabled\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"GRC Services im Detail\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]}],\"props\":{\"width\":\"expand\"}}]},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-05.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_top\":false,\"status\":\"disabled\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"css\":\".el-item > *:hover {\\n\\tbox-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"4\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die Security Governance schafft die Voraussetzungen und einen Ordnungsrahmen f\\u00fcr eine optimale Unterst\\u00fctzung der Unternehmensziele. Was es zu beachten gilt.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/support-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Security Governance\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die Informationssicherheit f\\u00fcr Unternehmen wird immer wichtiger. Ein Information Security Management System bietet Schutz. So sollte es ausgestaltet sein.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/mss-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Information Security Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Business Continuity Management stellt sicher, dass kritische Gesch\\u00e4ftsprozesse und -Daten auch in Notsituationen verf\\u00fcgbar bleiben. Was das f\\u00fcr die IT heisst.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/security-analytics-1.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"Business Continuity Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die rechtlichen und regulatorischen Pflichten stellen im IT-Umfeld eine wesentliche Teilmenge aller Compliance-Anforderungen dar. Das m\\u00fcssen CIOs und CCOs wissen.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/experts.svg\",\"link\":\"it-security-services\\\/ciso-as-a-service\\\/level-3\\\/\",\"title\":\"IT Compliance & Datenschutz\"}}]}]}],\"props\":{\"width\":\"expand\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Schreiben Sie uns\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"Call to Action\",\"modified\":\"2021-02-09T15:59:25.850Z\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Resilience Our IT security experts will be happy to advise you. Call now Successful crisis management: A well thought-out, synergetic cyber resilience and business continuity management strategy increases resilience and resilience in stormy seas. Our IT security consulting for your business Security Strategy GRC Security Architecture Security Awareness Technology Consulting Cyber Resilience Even with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7868,"menu_order":5,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7902","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7902"}],"version-history":[{"count":9,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7902\/revisions"}],"predecessor-version":[{"id":8242,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7902\/revisions\/8242"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7868"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}