{"id":49293,"date":"2025-08-26T10:19:46","date_gmt":"2025-08-26T10:19:46","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=49293"},"modified":"2025-10-01T10:18:05","modified_gmt":"2025-10-01T10:18:05","slug":"compliance-training","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/de\/compliance-training\/","title":{"rendered":"Compliance Training"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/03\/background-2-scaled-1.webp&#8220; custom_margin=&#8220;0px||0px||true|false&#8220; custom_padding=&#8220;0px||0px||true|false&#8220; bottom_divider_color=&#8220;#0C71C3&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;24vh||10vh|10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter|700|||||||&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_font_size=&#8220;60px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;0px||||false|false&#8220; header_font_size_tablet=&#8220;60px&#8220; header_font_size_phone=&#8220;42px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1>Compliance Training<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; global_colors_info=&#8220;{}&#8220;]Trainingsplattform \/ <span style=\"color: #f18a00;\">Compliance Training<\/span>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#f8f8f8&#8243; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8220; custom_padding=&#8220;||39px||false|false&#8220; custom_padding_tablet=&#8220;||||false|false&#8220; custom_padding_phone=&#8220;0px||0px||true|false&#8220; background_last_edited=&#8220;on|phone&#8220; background_position_tablet=&#8220;center_left&#8220; background_position_phone=&#8220;center_left&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; custom_padding=&#8220;|10%||10%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; custom_margin_tablet=&#8220;30px||||false|false&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2>Regularien Datenschutz und Sicherheit<\/h2>\n<p>Eine kulturelle Herausforderung<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_padding=&#8220;|94px||||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">In der heutigen, immer komplexer und sich schnell entwickelnden digitalen Landschaft stehen Organisationen unter st\u00e4ndigem Druck: Informationen zu sch\u00fctzen, Vertrauen zu bewahren und Vorschriften einzuhalten. Um heute konform zu sein, reicht es nicht aus, die richtigen Technologien einzusetzen oder formell Checklisten einzuhalten, sondern es muss eine Kultur der Sicherheit und geteilten Verantwortung auf allen Unternehmensebenen aufgebaut werden. <br \/><\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter||||||||&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">In diesem Szenario wird das <em>Awareness Training<\/em> zu einem wesentlichen Baustein, um die L\u00fccke zwischen Richtlinien und korrekter Praxis zu schlie\u00dfen, indem es die Mitarbeiter zu aktiven Akteuren der Verteidigungsstrategie der Organisation macht. <\/span><\/p>\n<p><span style=\"color: #000000;\">Vorschriften wie die <strong>DSGVO<\/strong>, der <strong>PCI DSS<\/strong> und andere Datenschutz- und Sicherheitsstandards erfordern viel mehr als nur robuste IT-Systeme. Sie verpflichten Organisationen sicherzustellen, dass alle Mitarbeiter verstehen, wie Daten verantwortungsvoll zu handhaben sind und sicherheitsbewusst handeln.  <\/span><\/p>\n<p><span style=\"color: #000000;\">Das bedeutet auch, diejenigen mit gr\u00f6\u00dferer Verantwortung zu schulen, um die Kultur des Datenschutzes zu verbreiten und die tats\u00e4chlichen Auswirkungen des t\u00e4glichen Verhaltens auf die Compliance zu vermitteln. <\/span><\/p>\n<p><span style=\"color: #000000;\">Aus diesem Grund spielt die Schulung zu Cyberrisiken eine grundlegende Rolle, <\/span><span style=\"color: #000000; font-size: 16px;\">indem sie die gesetzliche Verpflichtung in ein aktives und bewusstes Engagement verwandelt und sicheres und verantwortungsbewusstes Verhalten zu einem integralen Bestandteil der t\u00e4glichen Routine jedes Einzelnen macht. <\/span> <\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider show_divider=&#8220;off&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#f8f8f8&#8243; use_background_color_gradient=&#8220;on&#8220; background_color_gradient_direction=&#8220;360deg&#8220; background_color_gradient_stops=&#8220;#010512 0%|#071036 100%&#8220; background_enable_image=&#8220;off&#8220; custom_padding=&#8220;||39px||false|false&#8220; custom_padding_tablet=&#8220;||||false|false&#8220; custom_padding_phone=&#8220;0px||0px||true|false&#8220; background_last_edited=&#8220;on|phone&#8220; background_position_tablet=&#8220;center_left&#8220; background_position_phone=&#8220;center_left&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; custom_padding=&#8220;|10%||10%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; custom_margin_tablet=&#8220;30px||||false|false&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #ffffff;\">NIS2 und DORA: Von der Compliance zur F\u00fchrung in der Cybersicherheit<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px|-44px|20px||false|false&#8220; custom_padding=&#8220;|94px||||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">In einem immer strengeren und st\u00e4rker vernetzten regulatorischen Umfeld ist Cybersicherheit zu einer direkten Verantwortung f\u00fcr das Top-Management geworden. Europ\u00e4ische Vorschriften wie <strong>NIS2<\/strong> und <strong>DORA<\/strong> weisen den F\u00fchrungsebenen von Organisationen pr\u00e4zise Pflichten in Bezug auf Cybersicherheit, ICT-Risikomanagement und operative Resilienz zu. Um wirklich effektiv und konform zu sein, reicht es nicht mehr aus, zu delegieren: Es bedarf eines Bewusstseins an der Spitze und verbreiteter Kompetenzen. Die Schulungsprogramme von <em>Compliance Training<\/em> sind darauf ausgelegt, die \u201ekulturelle Entwicklung von Organisationen zu leiten und die\u201c regulatorische Verpflichtung in einen strategischen Hebel f\u00fcr die digitale Governance zu verwandeln. Die Schulungen richten sich an:    <\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][et_pb_blurb alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #ffffff;\">Vorst\u00e4nde, F\u00fchrungskr\u00e4fte und Top-Manager \u00f6ffentlicher und privater Organisationen<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #ffffff;\">Einrichtungen, die in den regulatorischen Geltungsbereich von NIS2 und DORA fallen<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #ffffff;\">Verantwortliche f\u00fcr Governance, Cyber-Resilienz und regulatorische Compliance<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/07\/yes.png&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #ffffff;\">Lieferanten und Partner, die in die Lieferketten involviert sind<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;RGBA(255,255,255,0)&#8220; min_height=&#8220;1350px&#8220; custom_margin=&#8220;|||0px|false|false&#8220; custom_padding=&#8220;0px||53px|0px|false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; min_height=&#8220;715px&#8220; custom_margin=&#8220;21px|auto||auto||&#8220; custom_padding=&#8220;0px|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|8%|||false|false&#8220; custom_padding_tablet=&#8220;|8%|||false|false&#8220; custom_padding_phone=&#8220;|2%||2%|false|true&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;87.6%&#8220; width_tablet=&#8220;80%&#8220; width_phone=&#8220;&#8220; width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_margin_tablet=&#8220;||25px||false|false&#8220; custom_margin_phone=&#8220;||25px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; text_orientation_tablet=&#8220;&#8220; text_orientation_phone=&#8220;center&#8220; text_orientation_last_edited=&#8220;on|phone&#8220; module_alignment_tablet=&#8220;left&#8220; module_alignment_phone=&#8220;center&#8220; module_alignment_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2>Board Training NIS2<\/h2>\n<h3>Digitale Sicherheit als Governance-Verantwortung<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Das E-Learning-Schulungsprogramm zur <em>NIS2-Richtlinie<\/em> erf\u00fcllt die f\u00fcr die Leitungsorgane wesentlicher und wichtiger Organisationen, sowohl \u00f6ffentlicher als auch privater, vorgesehenen Pflichten, mit einem Fokus auf:<\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"color: #000000;\">Rolle des Vorstands im Cyber-Risikomanagement<\/span><\/li>\n<li><span style=\"color: #000000;\">Schulungspflichten und rechtliche Verantwortlichkeiten<\/span><\/li>\n<li><span style=\"color: #000000;\">Strategien zur Pr\u00e4vention, Reaktion und Resilienz<\/span><\/li>\n<li><span style=\"color: #000000;\">Szenarien, Angriffstechniken und Gegenma\u00dfnahmen<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">Dieses Schulungsprogramm stattet die Vorstandsmitglieder mit den Werkzeugen aus, um bewusste und informierte Entscheidungen im Einklang mit den Pflichten der NIS2-Richtlinie zu treffen.<\/span><\/p>\n<p>[\/et_pb_text][dipl_button _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/dipl_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/Dashboard_NIS2_DE.webp&#8220; alt=&#8220;Dashboard_NIS2_DE&#8220; title_text=&#8220;Dashboard_NIS2_DE&#8220; align=&#8220;center&#8220; force_fullwidth=&#8220;on&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|tablet&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_padding=&#8220;32px||||false|true&#8220; custom_padding_tablet=&#8220;|5%||5%|false|true&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2025\/08\/Lesson_DORA_DE_2x-scaled.webp&#8220; alt=&#8220;Lesson_DORA_DE&#8220; title_text=&#8220;Lesson_DORA_DE&#8220; force_fullwidth=&#8220;on&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|8%|||false|false&#8220; custom_css_main_element=&#8220;margin:auto;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;87.6%&#8220; width_tablet=&#8220;80%&#8220; width_phone=&#8220;&#8220; width_last_edited=&#8220;on|phone&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_margin_tablet=&#8220;||25px||false|false&#8220; custom_margin_phone=&#8220;||25px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; text_orientation_tablet=&#8220;&#8220; text_orientation_phone=&#8220;center&#8220; text_orientation_last_edited=&#8220;on|phone&#8220; module_alignment_tablet=&#8220;left&#8220; module_alignment_phone=&#8220;center&#8220; module_alignment_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22,%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Board Training DORA<\/h2>\n<h3 style=\"text-align: left;\">Governance der digitalen operativen Resilienz<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\">Die <em>DORA-Verordnung<\/em> (Digital Operational Resilience Act) stellt strenge Anforderungen an den Finanzsektor, um ICT-Risiken zu managen und die operative Kontinuit\u00e4t im Falle systemischer Bedrohungen zu gew\u00e4hrleisten.<\/span><\/p>\n<p><span style=\"color: #000000;\">Das Programm zur DORA-Verordnung hilft den Leitungsorganen, ICT-Risiken zu verstehen und zu managen, und f\u00f6rdert eine Kultur der digitalen Resilienz. Das Programm konzentriert sich auf: <\/span><\/p>\n<p><span style=\"color: #000000;\"><\/span><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><span style=\"color: #000000;\">ICT-Risikomanagement und Verantwortung des Vorstands<\/span><\/li>\n<li><span style=\"color: #000000;\">Cyber-Bedrohungen und systemische Auswirkungen<\/span><\/li>\n<li><span style=\"color: #000000;\">Operative Resilienz im Finanzsektor<\/span><\/li>\n<li><span style=\"color: #000000;\">Dritte Parteien und Anbieter kritischer Dienste<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#f8f8f8&#8243; background_enable_image=&#8220;off&#8220; custom_padding=&#8220;||39px||false|false&#8220; custom_padding_tablet=&#8220;||||false|false&#8220; custom_padding_phone=&#8220;0px||0px||true|false&#8220; background_last_edited=&#8220;on|phone&#8220; background_position_tablet=&#8220;center_left&#8220; background_position_phone=&#8220;center_left&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; module_alignment=&#8220;center&#8220; custom_padding=&#8220;|10%||10%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; custom_margin_tablet=&#8220;30px||||false|false&#8220; custom_margin_phone=&#8220;20px||||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2>Ein Schulungsmodell<\/h2>\n<h2>angepasst an die Bed\u00fcrfnisse<\/h2>\n<h2>der Vorschriften<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Inter||||||||&#8220; text_font_size=&#8220;16px&#8220; custom_margin=&#8220;10px||20px||false|false&#8220; custom_padding=&#8220;|94px||||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #000000;\">Im heutigen digitalen Kontext kann sich die regulatorische Compliance nicht auf die Einf\u00fchrung von Technologien oder die formale Einhaltung von Anforderungen beschr\u00e4nken: Sie erfordert eine gemeinsame Kultur der Sicherheit und Verantwortung. <\/span><\/p>\n<ul><\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;98.5%&#8220; module_alignment=&#8220;left&#8220; min_height=&#8220;34.2px&#8220; custom_margin=&#8220;|||154px||&#8220; custom_padding=&#8220;||0px|||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>Progressives Lernen<\/strong><\/span><br \/><span style=\"color: #000000;\">Kurze und fokussierte Mikro-Lektionen zur Optimierung der kognitiven Belastung und zur F\u00f6rderung des Verst\u00e4ndnisses<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>Modulare Erfahrung<\/strong><\/span><br \/><span style=\"color: #000000;\">Pfade, die darauf ausgelegt sind, sich an verschiedene Rollen und Verantwortungsstufen anzupassen<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>Stets aktuelle und normkonforme Inhalte<\/strong><\/span><br \/><span style=\"color: #000000;\">St\u00e4ndige Ausrichtung an den Vorschriften und Entwicklungen der Cyber-Landschaft<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Cyberguru-favicon.webp&#8220; alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;]<\/p>\n<p><span style=\"color: #000000;\"><strong>Berichterstattung und Nachverfolgung<\/strong><\/span><br \/><span style=\"color: #000000;\">Monitoring-Dashboards zur \u00dcberpr\u00fcfung von Abschluss, Fortschritt und Ergebnissen<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb alt=&#8220;Cyberguru Favicon&#8220; icon_placement=&#8220;left&#8220; content_max_width=&#8220;1100px&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;Inter||||||||&#8220; body_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; body_font_size=&#8220;16px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;|-34px||||&#8220; custom_padding=&#8220;|||0px||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22body_text_color%22,%22body_text_color%22%93}&#8220;][\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8220; background_position=&#8220;bottom_center&#8220; custom_padding=&#8220;50px||50px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8220; alt=&#8220;Mehr&#8220; title_text=&#8220;Mehr&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-200px&#8220; horizontal_offset=&#8220;85px&#8220; vertical_offset_tablet=&#8220;-55px&#8220; vertical_offset_phone=&#8220;-90px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-55px&#8220; horizontal_offset_phone=&#8220;-50px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; position_origin_a_tablet=&#8220;top_left&#8220; position_origin_a_phone=&#8220;top_left&#8220; position_origin_a_last_edited=&#8220;on|phone&#8220; position_origin_f_tablet=&#8220;&#8220; position_origin_f_phone=&#8220;&#8220; position_origin_f_last_edited=&#8220;on|phone&#8220; position_origin_r_tablet=&#8220;&#8220; position_origin_r_phone=&#8220;&#8220; position_origin_r_last_edited=&#8220;on|phone&#8220; width=&#8220;100%&#8220; custom_margin=&#8220;||||false|false&#8220; positioning_tablet=&#8220;absolute&#8220; positioning_phone=&#8220;absolute&#8220; positioning_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; admin_label=&#8220;Zeile&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;70px|170px|0px|170px|false|true&#8220; custom_padding_tablet=&#8220;|100px||100px|false|true&#8220; custom_padding_phone=&#8220;70px|20px|0px|20px|false|true&#8220; border_radii=&#8220;off|10px|10px||&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">M\u00f6chtest du mehr erfahren?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_tablet=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_phone=&#8220;0px|0px|70px|0px|false|true&#8220; border_radii=&#8220;off|||15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;1px&#8220; box_shadow_vertical=&#8220;20px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;https:\/\/www.cyberguru.it\/de\/kontakt\/&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;KONTAKTIEREN SIE UNS&#8220; button_alignment=&#8220;center&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;https:\/\/www.cyberguru.it\/?sdm_process_download=1&#038;download_id=51680&#8243; url_new_window=&#8220;on&#8220; button_text=&#8220;UNTERNEHMENSPROFIL&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;on|phone&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; hover_enabled=&#8220;0&#8243; custom_css_main_element=&#8220;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220; sticky_enabled=&#8220;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DEMO ANFORDERN&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;off|desktop&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8220; alt=&#8220;M\u00f6chten Sie mehr erfahren&#8220; title_text=&#8220;M\u00f6chten Sie mehr erfahren&#8220; align=&#8220;right&#8220; disabled_on=&#8220;on|off|off&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-20px&#8220; horizontal_offset=&#8220;-100px&#8220; vertical_offset_tablet=&#8220;-20px&#8220; vertical_offset_phone=&#8220;-80px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-100px&#8220; horizontal_offset_phone=&#8220;-130px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; width=&#8220;25%&#8220; width_tablet=&#8220;25%&#8220; width_phone=&#8220;25%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_margin=&#8220;||||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compliance TrainingTrainingsplattform \/ Compliance TrainingRegularien Datenschutz und Sicherheit Eine kulturelle HerausforderungIn der heutigen, immer komplexer und sich schnell entwickelnden digitalen Landschaft stehen Organisationen unter st\u00e4ndigem Druck: Informationen zu sch\u00fctzen, Vertrauen zu bewahren und Vorschriften einzuhalten. Um heute konform zu sein, reicht es nicht aus, die richtigen Technologien einzusetzen oder formell Checklisten einzuhalten, sondern es muss [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-49293","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Compliance Training - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Erfahren Sie mehr \u00fcber die Bedeutung von Compliance Training, um eine Kultur der Sicherheit und Verantwortung im Unternehmen zu gew\u00e4hrleisten.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/de\/compliance-training\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance Training\" \/>\n<meta property=\"og:description\" content=\"Erfahren Sie mehr \u00fcber die Bedeutung von Compliance Training, um eine Kultur der Sicherheit und Verantwortung im Unternehmen zu gew\u00e4hrleisten.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/de\/compliance-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T10:18:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"24\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/compliance-training\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/compliance-training\\\/\",\"name\":\"Compliance Training - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\"},\"datePublished\":\"2025-08-26T10:19:46+00:00\",\"dateModified\":\"2025-10-01T10:18:05+00:00\",\"description\":\"Erfahren Sie mehr \u00fcber die Bedeutung von Compliance Training, um eine Kultur der Sicherheit und Verantwortung im Unternehmen zu gew\u00e4hrleisten.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/compliance-training\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/compliance-training\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/compliance-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/homepage-v2-entwurf\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Compliance Training - Cyber Guru","description":"Erfahren Sie mehr \u00fcber die Bedeutung von Compliance Training, um eine Kultur der Sicherheit und Verantwortung im Unternehmen zu gew\u00e4hrleisten.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/de\/compliance-training\/","og_locale":"de_DE","og_type":"article","og_title":"Compliance Training","og_description":"Erfahren Sie mehr \u00fcber die Bedeutung von Compliance Training, um eine Kultur der Sicherheit und Verantwortung im Unternehmen zu gew\u00e4hrleisten.","og_url":"https:\/\/www.cyberguru.it\/de\/compliance-training\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-10-01T10:18:05+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"24\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/de\/compliance-training\/","url":"https:\/\/www.cyberguru.it\/de\/compliance-training\/","name":"Compliance Training - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/de\/#website"},"datePublished":"2025-08-26T10:19:46+00:00","dateModified":"2025-10-01T10:18:05+00:00","description":"Erfahren Sie mehr \u00fcber die Bedeutung von Compliance Training, um eine Kultur der Sicherheit und Verantwortung im Unternehmen zu gew\u00e4hrleisten.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/de\/compliance-training\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/de\/compliance-training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/de\/compliance-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/de\/homepage-v2-entwurf\/"},{"@type":"ListItem","position":2,"name":"Compliance Training"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/de\/#website","url":"https:\/\/www.cyberguru.it\/de\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/49293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/comments?post=49293"}],"version-history":[{"count":14,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/49293\/revisions"}],"predecessor-version":[{"id":51708,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/49293\/revisions\/51708"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/media?parent=49293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}