{"id":4558,"date":"2025-04-22T10:17:15","date_gmt":"2025-04-22T08:17:15","guid":{"rendered":"https:\/\/next.4conform.com\/branchenloesung\/public-administration\/"},"modified":"2025-05-28T13:37:31","modified_gmt":"2025-05-28T11:37:31","slug":"public-administration","status":"publish","type":"branchenloesung","link":"https:\/\/4conform.com\/en\/branchenloesung\/public-administration\/","title":{"rendered":"public administration"},"content":{"rendered":"<section class=\"l-section wpb_row height_auto color_primary with_img\"><div class=\"l-section-img\" role=\"img\" aria-label=\"Image\" data-img-width=\"2100\" data-img-height=\"1000\" style=\"background-image: url(https:\/\/4conform.com\/wp-content\/uploads\/2025\/04\/4conform_headerimage_daten_und_informationssicherheit_und_oeffentliche_verwatlung_image_by_sergii_ka_via_pexels.jpg);background-repeat: no-repeat;\"><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_bottom type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-separator size_large\"><\/div><div class=\"g-cols wpb_row via_grid cols_2 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-video us_custom_a137f1d8 us_animate_this align_none ratio_16x9 has_border_radius has_iframe\"><div class=\"w-video-h\"><iframe title=\"Vimeo video player\" src=\"https:\/\/player.vimeo.com\/video\/1078234804?autoplay=0&loop=0&autopause=0&color=00adef&portrait=0&byline=1&title=1&controls=1&muted=0\" frameborder=\"0\" allow=\"autoplay; fullscreen\" allowfullscreen loading=\"lazy\"><\/iframe><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_836f727b has_text_color\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_a518f36e styled_title_text white_text us_animate_this\"><div class=\"wpb_wrapper\"><h1 style=\"text-align: left;\">Use Case<\/h1>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_a518f36e us_animate_this\"><div class=\"wpb_wrapper\"><h2>Data and information security in public administration<\/h2>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_2fb981ac us_animate_this\"><div class=\"wpb_wrapper\"><p style=\"text-align: left;\"><span>How can the NIS2 directive be successfully implemented in public administration? This industry solution highlights the challenges and solutions and provides practical recommendations for your security. <\/span><\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto width_full\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-grid us_carousel type_carousel layout_333 preload_style_spinner items_6 ratio_16x9\" id=\"us_grid_1\" style=\"--items:6;--gap:1.5rem;--item-ratio:0.5625;\"><style>.layout_333 .w-grid-item-h{}<\/style><div class=\"w-grid-list owl-carousel valign_stretch dotstyle_circle navstyle_circle arrows-ver-pos_middle arrows-hor-pos_on_sides_outside arrows-disabled_hide owl-responsive-2000\" style=\"--transition-duration:1000ms;\">\t<article class=\"w-grid-item custom-link post-331 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"331\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.roteskreuz.at\/home\" aria-label=\"\u00d6sterreichisches Rotes Kreuz\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.roteskreuz.at\/home\" aria-label=\"\u00d6sterreichisches Rotes Kreuz\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_oesterreichisches_rotes_kreuz_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_oesterreichisches_rotes_kreuz_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_oesterreichisches_rotes_kreuz_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-330 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"330\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.ekey.net\/\" aria-label=\"eKey\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.ekey.net\/\" aria-label=\"eKey\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_ekey_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_ekey_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_ekey_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-329 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"329\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.eduscho.at\/\" aria-label=\"Tschibo | Eduscho\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.eduscho.at\/\" aria-label=\"Tschibo | Eduscho\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_eduscho_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_eduscho_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_eduscho_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-327 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"327\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.brz.gv.at\/\" aria-label=\"BRZ |\u00a0Bundesrechenzentrum\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.brz.gv.at\/\" aria-label=\"BRZ |\u00a0Bundesrechenzentrum\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_bundesrechenzentrum_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_bundesrechenzentrum_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_bundesrechenzentrum_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-326 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"326\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.volkshilfe-wien.at\/\" aria-label=\"Volkshilfe Wien\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.volkshilfe-wien.at\/\" aria-label=\"Volkshilfe Wien\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_volkshilfe_wien_logo.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_volkshilfe_wien_logo.png 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_volkshilfe_wien_logo-300x233.png 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-325 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"325\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.svdgmbh.at\/\" aria-label=\"SVD B\u00fcromanagement GmbH\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.svdgmbh.at\/\" aria-label=\"SVD B\u00fcromanagement GmbH\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_svd_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_svd_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_svd_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-324 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"324\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.hausbetreuung-wien.at\/\" aria-label=\"Stadt Wien |\u00a0Wiener Wohnen Hausbetreuung\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.hausbetreuung-wien.at\/\" aria-label=\"Stadt Wien |\u00a0Wiener Wohnen Hausbetreuung\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_stadtwien_wienerwohnen_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_stadtwien_wienerwohnen_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_stadtwien_wienerwohnen_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-323 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"323\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.rse.at\/\" aria-label=\"RSE\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.rse.at\/\" aria-label=\"RSE\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_rse_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_rse_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_rse_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-322 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"322\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.eww.at\/\" aria-label=\"EWW Gruppe\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.eww.at\/\" aria-label=\"EWW Gruppe\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_eww_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_eww_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_eww_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-321 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"321\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/gataca.de\/\" aria-label=\"Gataca\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/gataca.de\/\" aria-label=\"Gataca\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_gataca_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_gataca_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_gataca_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-320 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"320\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.rekord-fenster.com\/\" aria-label=\"Rekord Fenster\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.rekord-fenster.com\/\" aria-label=\"Rekord Fenster\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_rekord_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_rekord_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_rekord_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n\t<article class=\"w-grid-item custom-link post-319 referenzen type-referenzen status-publish has-post-thumbnail hentry\" data-id=\"319\">\r\n\t\t<div class=\"w-grid-item-h\">\r\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.gw-world.com\/at\/\" aria-label=\"Gebr\u00fcder Weiss\" rel=\"nofollow noopener\" target=\"_blank\"><\/a>\r\n\t\t\t\t\t\t<div class=\"w-post-elm post_image usg_post_image_1 reference_hover stretched\"><a target=\"_blank\" href=\"https:\/\/www.gw-world.com\/at\/\" aria-label=\"Gebr\u00fcder Weiss\" rel=\"nofollow noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_gebrueder_weiss_logo.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_gebrueder_weiss_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_gebrueder_weiss_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/a><\/div>\t\t<\/div>\r\n\t\t\t<\/article>\r\n<\/div><div class=\"w-grid-carousel-json hidden\" onclick='return {&quot;carousel_settings&quot;:{&quot;aria_labels&quot;:{&quot;prev&quot;:&quot;Previous&quot;,&quot;next&quot;:&quot;Next&quot;},&quot;autoplayContinual&quot;:true,&quot;autoplayHoverPause&quot;:false,&quot;autoplayTimeout&quot;:7000,&quot;autoWidth&quot;:false,&quot;smartSpeed&quot;:1000,&quot;margin&quot;:0,&quot;mouseDrag&quot;:true,&quot;rtl&quot;:false,&quot;slideBy&quot;:&quot;1&quot;,&quot;touchDrag&quot;:true,&quot;slideTransition&quot;:&quot;&quot;,&quot;responsive&quot;:{&quot;0&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:true,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:false,&quot;items&quot;:2,&quot;loop&quot;:true,&quot;nav&quot;:false,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;601&quot;:{&quot;items&quot;:6,&quot;autoplay&quot;:true,&quot;center&quot;:false,&quot;dots&quot;:false,&quot;nav&quot;:false,&quot;autoHeight&quot;:false,&quot;autoWidth&quot;:false,&quot;loop&quot;:true,&quot;stagePadding&quot;:0}}}}'><\/div><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-separator size_large\"><\/div><div class=\"wpb_text_column us_custom_a518f36e styled_title_text us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: left;\">NIS2<\/h2>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">Security and resilience for the future<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_grid cols_1-3 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_88683148 us_animate_this\"><div class=\"wpb_wrapper\"><p>Secure administration and strong data protection are compatible. With 4conform, public authorities reliably meet all IT and data protection requirements and effectively protect citizen data.<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_7e35600f us_animate_this\"><div class=\"wpb_wrapper\"><p>Public administration faces the challenge of reliably protecting sensitive citizen data and critical infrastructures. At the same time, requirements are constantly increasing due to laws such as NIS2, the IT Security Act and the GDPR.<\/p>\n<p>With the 4conform ENTERPRISE solution for ISMS and DSMS, we support authorities in detecting cyberattacks at an early stage, implementing data protection seamlessly and managing processes efficiently. This not only ensures compliance, but also strengthens citizens&#8217; trust in your administration.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-separator size_large\"><\/div><div class=\"wpb_text_column us_custom_e33a8179 styled_title_text us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">Data protection &amp; information security<\/h2>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_7e35600f us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: center;\">The 9 most important challenges for public administration<\/h2>\n<\/div><\/div><div class=\"w-separator size_huge\"><\/div><div class=\"g-cols wpb_row via_grid cols_3 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:30px;--laptops-columns-gap:30px;--tablets-columns-gap:20px;--mobiles-columns-gap:15px;\"><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-user-lock\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Ransomware attacks<\/h5>\n<p>Cybercriminals encrypt your data and demand a ransom. Such an attack can lead to business interruptions, financial losses and reputational damage. SMEs are often seen as easy targets, which increases the danger.<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_3 icon_atright\" href=\"https:\/\/4conform.com\/?post_type=wictionary&amp;p=4308\"><span class=\"w-btn-label\">to the Wiktionary<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-fish-cooked\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Phishing attacks<\/h5>\n<p>Employees are tricked into disclosing sensitive data by fake emails or messages. These attacks are often difficult to detect and can lead to data loss and financial damage.<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_3 icon_atright\" href=\"https:\/\/4conform.com\/en\/wiki\/phishing-attacks\/\"><span class=\"w-btn-label\">to the Wiktionary<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-server\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Denial of service attacks (DoS)<\/h5>\n<p>The accessibility of your online services is blocked by targeted attacks. This can lead to lost sales and a loss of customer confidence.<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_3 icon_atright\" href=\"https:\/\/4conform.com\/?post_type=wictionary&amp;p=4310\"><span class=\"w-btn-label\">to the Wiktionary<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_grid cols_3 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:30px;--laptops-columns-gap:30px;--tablets-columns-gap:20px;--mobiles-columns-gap:15px;\"><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-computer-classic\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Outdated IT infrastructures<\/h5>\n<p>Old systems and software with unpatched security vulnerabilities offer attack surfaces, which is particularly critical for networked management systems. Modern security standards often cannot be implemented.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-user-secret\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>GDPR compliance<\/h5>\n<p>High documentation requirements, reporting obligations within 24 hours and transparency requirements overburden many authorities organizationally. Legal uncertainties regarding data pools increase the risk.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-people-arrows\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Scarcity of resources<\/h5>\n<p>A lack of IT security experts and insufficient budgets are hampering investment in modern protection measures. Uncompetitive salaries exacerbate the problem.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_grid cols_3 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:30px;--laptops-columns-gap:30px;--tablets-columns-gap:20px;--mobiles-columns-gap:15px;\"><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-external-link\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>External service provider risks<\/h5>\n<p>Cloud services and outsourcing partners without sufficient security certifications jeopardize compliance. Contract design with external providers is often inadequate.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-chalkboard-teacher\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Employee sensitization<\/h5>\n<p>Ignorance of phishing methods and insecure handling of data lead to avoidable security incidents. Regular training is often lacking.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_2aba0e4e us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper align_none valign_top\"><div class=\"w-iconbox iconpos_top style_default color_primary align_left no_text no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:3rem;\"><i class=\"fal fa-file-signature\"><\/i><\/div><div class=\"w-iconbox-meta\"><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Emergency planning<\/h5>\n<p>Unclear escalation paths in the event of data breaches and inexperienced communication with those affected exacerbate the consequences of security incidents.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><div class=\"g-cols wpb_row via_grid cols_1-2-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_5374f916 us_animate_this\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">If you would like more detailed information on the NIS2 law, we recommend our<strong> NIS2 AI Co-Advisor <\/strong>or refer to the current <strong>NIS2 EU Regulation<\/strong> or the <strong>draft law of the Austrian Federal Government<\/strong>.<\/p>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><\/div><\/div><\/div><div class=\"w-hwrapper valign_middle align_center\"><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_1 us_custom_9f5ba4a2 us_animate_this icon_atright\" href=\"https:\/\/4conform.com\/en\/nis2-ki-co-consultant\/\"><span class=\"w-btn-label\">AI Co-Consultant<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_4 us_custom_e33a8179 us_animate_this icon_atright\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.ris.bka.gv.at\/Dokumente\/Begut\/BEGUT_42FD65C8_76B7_40F0_97E3_BB29BDFC0CE9\/BEGUT_42FD65C8_76B7_40F0_97E3_BB29BDFC0CE9.html\"><span class=\"w-btn-label\">NIS2 Draft law (AT)<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_4 us_custom_7e35600f us_animate_this icon_atright\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/eur-lex.europa.eu\/legal-content\/DE\/TXT\/HTML\/?uri=CELEX:32022L2555#anx_I\"><span class=\"w-btn-label\">NIS2 Directive (EU)<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><\/div><div class=\"w-separator size_large\"><\/div><section class=\"l-section wpb_row height_auto width_full\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_1 mobiles-cols_1 valign_middle type_default\"><div class=\"wpb_column vc_column_container us_custom_177df999 us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-separator size_small\"><\/div><div class=\"g-cols wpb_row via_grid cols_2 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_middle type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_a518f36e styled_title_text us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: left;\">ISMS Live<\/h2>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">Take a look at our ISMS in action<\/h3>\n<\/div><\/div><div class=\"w-separator hide_on_default hide_on_laptops size_small\"><\/div><div class=\"w-video us_custom_e3fab4e9 us_animate_this hide_on_default hide_on_laptops hide_on_tablets align_none ratio_16x9 has_border_radius with_overlay has_iframe\" style=\"background-image:url(https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_headerimage_cybersecurity_technology_privacy_shield_header_image_by_freepik.jpg);\" onclick=\"return {&quot;player_id&quot;:&quot;vimeo-idda&quot;,&quot;player_api&quot;:&quot;&quot;,&quot;player_html&quot;:&quot;&lt;iframe title=\\&quot;Vimeo video player\\&quot; src=\\&quot;https:\\\/\\\/player.vimeo.com\\\/video\\\/1062330235?autoplay=1&amp;loop=0&amp;autopause=0&amp;color=00adef&amp;portrait=0&amp;byline=0&amp;title=0&amp;controls=1&amp;muted=0\\&quot; frameborder=\\&quot;0\\&quot; allow=\\&quot;autoplay; fullscreen\\&quot; allowfullscreen loading=\\&quot;lazy\\&quot;&gt;&lt;\\\/iframe&gt;&quot;}\"><button class=\"w-video-play\" type=\"button\" aria-label=\"Play\"><span class=\"w-video-play-icon\" style=\"font-size:1.2rem;background:var(--color-content-primary);color:#ffffff\"><\/span><\/button><div class=\"w-video-h\"><\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_aa2c80e6 us_animate_this\"><div class=\"wpb_wrapper\"><p>As the person responsible for information security, you face the challenge of managing risks quickly and efficiently without losing track of the bigger picture.<br data-start=\"208\" data-end=\"211\" \/>This is exactly where we come in \u2013 not at some point, but right now. See for yourself in our short video or the guided tour on <a href=\"https:\/\/4conform-gmbh.webinargeek.com\/risikomanagement-so-einfach-wie-noch-nie\" target=\"_blank\" rel=\"noopener nofollow\">WebinarGeek<\/a>.<\/p>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_1 us_custom_1040e5a8 us_animate_this\" id=\"click_book_demo\" target=\"_blank\" href=\"\/en\/book-a-demo\/\"><span class=\"w-btn-label\">Book a demo<\/span><\/a><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_5 us_custom_f12e2105 us_animate_this icon_atright\" target=\"_blank\" href=\"https:\/\/4conform-gmbh.webinargeek.com\/risikomanagement-so-einfach-wie-noch-nie\" rel=\"nofollow noopener\"><span class=\"w-btn-label\">Guided Tour<\/span><i class=\"far fa-chalkboard-teacher\"><\/i><\/a><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-video us_custom_e3fab4e9 us_animate_this hide_on_mobiles align_none ratio_16x9 has_border_radius with_overlay has_iframe\" style=\"background-image:url(https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_isms_guided_tour_informationssicherheit_wichtiger_denn_je_titelbild.jpg);\" onclick=\"return {&quot;player_id&quot;:&quot;vimeo-m8ec&quot;,&quot;player_api&quot;:&quot;&quot;,&quot;player_html&quot;:&quot;&lt;iframe title=\\&quot;Vimeo video player\\&quot; src=\\&quot;https:\\\/\\\/player.vimeo.com\\\/video\\\/1062330235?autoplay=1&amp;loop=0&amp;autopause=0&amp;color=00adef&amp;portrait=0&amp;byline=0&amp;title=0&amp;controls=1&amp;muted=0\\&quot; frameborder=\\&quot;0\\&quot; allow=\\&quot;autoplay; fullscreen\\&quot; allowfullscreen loading=\\&quot;lazy\\&quot;&gt;&lt;\\\/iframe&gt;&quot;}\"><button class=\"w-video-play\" type=\"button\" aria-label=\"Play\"><span class=\"w-video-play-icon\" style=\"font-size:1.2rem;background:var(--color-content-primary);color:#ffffff\"><\/span><\/button><div class=\"w-video-h\"><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_small\"><\/div><\/div><\/div><\/div><\/div><\/section>\n<\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto with_shape\" id=\"Informationssicherheit\"><div class=\"l-section-shape type_custom pos_bottom\" style=\"height:33%;color:var(--color-content-bg-alt)\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 8\" preserveAspectRatio=\"none\" width=\"100%\" height=\"100%\">\r\n\t<path fill=\"currentColor\" d=\"M64 8 L0 8 L0 0 L64 0 Z\"\/>\r\n<\/svg><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-separator size_huge\"><\/div><div class=\"wpb_text_column us_custom_a518f36e styled_title_text us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: left;\">An example<\/h2>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">Dangers in public administration<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_grid cols_1-3 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_88683148 us_animate_this\"><div class=\"wpb_wrapper\"><p>Public institutions are disproportionately often the target of cyberattacks, particularly ransomware. On average, two municipalities were affected per month in 2023, with consequential costs of up to \u20ac2.6 million per incident.<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_7e35600f us_animate_this\"><div class=\"wpb_wrapper\"><p><strong>Example 1: Carinthian state administration (May 2022)<\/strong><\/p>\n<p>A <strong>ransomware attack<\/strong> paralyzed the IT infrastructure of the state of Carinthia. Attackers broke in <strong>via a workstation<\/strong>, encrypted servers and published <strong>5.6 GB of sensitive data<\/strong> (including passports) on the darknet. The ransom demand amounted to 5 million euros. The Court of Audit criticized the incomplete IT security management. However, 5.75 million euros were invested in recovery measures.<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-hwrapper valign_middle wrap align_left\" style=\"--hwrapper-gap:1rem\"><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_3 us_custom_d77bca1a us_animate_this icon_atright\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.ktn.gv.at\/Service\/informationen-cyberangriff\/bekanntmachung\"><span class=\"w-btn-label\">Announcement of the Carinthian government<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_3 us_custom_4a742b6c us_animate_this icon_atright\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.rechnungshof.gv.at\/rh\/home\/news\/Meldungen_2024\/IT-Sicherheit_des_Landes_Kaernten.html#\"><span class=\"w-btn-label\">Criticism from the Court of Auditors<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_7e35600f us_animate_this\"><div class=\"wpb_wrapper\"><p><strong>Example 2: Municipality of Tulln (February 2025)<\/strong><\/p>\n<p>A cyberattack <strong>encrypted the server infrastructure<\/strong>, which meant that citizen services such as notarizations were only possible to a limited extent for weeks. External IT companies and the security authorities analyzed the damage. Data misuse could not be ruled out. The reason was a<strong> security gap <\/strong>in the firewall, which the hacker group was able to use to gain access.<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-hwrapper valign_middle wrap align_left\" style=\"--hwrapper-gap:1rem\"><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_3 us_custom_d77bca1a us_animate_this icon_atright\" target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/kommunal.at\/hackerangriff-auf-tulln\"><span class=\"w-btn-label\">Hacker attack in Tulln (Kommunal.at)<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><div class=\"g-cols wpb_row via_grid cols_3 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:2rem;\"><div class=\"wpb_column vc_column_container us_custom_6073c147 us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Proactive risk analyses<\/h5>\n<p>Regular vulnerability analyses and threat modelling identify critical IT risks (e.g. outdated systems, unsecured interfaces) in order to prioritize targeted protective measures against attacks.<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_fd7c2031 us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Incident response plans<\/h5>\n<p>Clear escalation processes, reporting chains and communication routines enable rapid action in the event of security incidents in order to minimize downtime and consequential damage.<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container us_custom_98b18af1 us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h5>Robust backup strategies<\/h5>\n<p>Backups, immutable storage and regular recovery tests protect against data loss &#8211; even in the event of ransomware attacks, backed-up data remains intact and can be restored quickly.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><div class=\"g-cols wpb_row via_grid cols_1-4-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_5374f916 us_animate_this\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Take back <strong>control<\/strong> of your cybersecurity with <strong>4conform ENTERPRISE ISMS<\/strong>. Our comprehensive solution helps you build a <strong>robust<\/strong> and <strong>customized<\/strong> information security management system that detects threats early, protects your critical infrastructure and helps you meet complex regulatory requirements &#8211; to keep the lights on safely.<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row us_custom_a9be633b height_auto with_shape\"><div class=\"l-section-shape type_custom pos_bottom\" style=\"height:15vmin;\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 64 8\" preserveAspectRatio=\"none\" width=\"100%\" height=\"100%\">\r\n\t<path fill=\"currentColor\" d=\"M64 8 L0 8 L0 0 L64 0 Z\"\/>\r\n<\/svg><\/div><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-separator size_huge\"><\/div><div class=\"g-cols wpb_row via_grid cols_2 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default reversed stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-content-carousel items_1\"><div class=\"owl-carousel valign_stretch dotstyle_dash navstyle_circle arrows-ver-pos_middle arrows-hor-pos_on_sides_inside arrows-disabled_hide owl-responsive-2000 with_dots with_arrows\" style=\"--items-gap:30px;--transition-duration:350ms;--arrows-size:1.5rem;--arrows-gap:10px;\" onclick=\"return {&quot;aria_labels&quot;:{&quot;prev&quot;:&quot;Previous&quot;,&quot;next&quot;:&quot;Next&quot;},&quot;autoplayContinual&quot;:false,&quot;autoplayHoverPause&quot;:false,&quot;autoplayTimeout&quot;:3000,&quot;autoWidth&quot;:false,&quot;smartSpeed&quot;:350,&quot;margin&quot;:30,&quot;mouseDrag&quot;:true,&quot;rtl&quot;:false,&quot;slideBy&quot;:&quot;1&quot;,&quot;touchDrag&quot;:true,&quot;slideTransition&quot;:&quot;&quot;,&quot;responsive&quot;:{&quot;0&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:false,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:false,&quot;items&quot;:1,&quot;loop&quot;:false,&quot;nav&quot;:false,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;601&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:false,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:true,&quot;items&quot;:1,&quot;loop&quot;:false,&quot;nav&quot;:true,&quot;stagePadding&quot;:0}}}\"><div class=\"w-vwrapper align_center valign_top\"><div class=\"w-image us_custom_e33a8179 us_animate_this style_shadow-1 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1600\" height=\"915\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_abteilungen_und_bausteine.png\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_abteilungen_und_bausteine.png 1600w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_abteilungen_und_bausteine-300x172.png 300w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_abteilungen_und_bausteine-1024x586.png 1024w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/div><\/div><div class=\"wpb_text_column us_custom_567d60fe has_text_color\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Keep an eye on all departments and their risks.<\/p>\n<\/div><\/div><\/div><div class=\"w-vwrapper align_center valign_top\"><div class=\"w-image us_custom_e33a8179 us_animate_this style_shadow-1 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1600\" height=\"915\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_risikobehandlung.png\" class=\"attachment-full size-full\" alt=\"Risikobehandlung aller Gef\u00e4hrdungen f\u00fcr Ihr Unternehmen\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_risikobehandlung.png 1600w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_risikobehandlung-300x172.png 300w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_risikobehandlung-1024x586.png 1024w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/div><\/div><div class=\"wpb_text_column us_custom_567d60fe has_text_color\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Risk treatment of all hazards for your company.<\/p>\n<\/div><\/div><\/div><div class=\"w-vwrapper align_center valign_top\"><div class=\"w-image us_custom_e33a8179 us_animate_this style_shadow-1 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1600\" height=\"915\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_statement_of_applicability.png\" class=\"attachment-full size-full\" alt=\"Statement of Applicability in 4conform ENTERPRISE ISMS als Checkliste\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_statement_of_applicability.png 1600w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_statement_of_applicability-300x172.png 300w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_statement_of_applicability-1024x586.png 1024w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/div><\/div><div class=\"wpb_text_column us_custom_567d60fe has_text_color\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Statement of applicability in 4conform ENTERPRISE ISMS als Checkliste.<\/p>\n<\/div><\/div><\/div><div class=\"w-vwrapper align_center valign_top\"><div class=\"w-image us_custom_e33a8179 us_animate_this style_shadow-1 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"630\" height=\"434\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_risikomatrix_des_BSI.png\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_risikomatrix_des_BSI.png 630w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_risikomatrix_des_BSI-300x207.png 300w\" sizes=\"auto, (max-width: 630px) 100vw, 630px\" \/><\/div><\/div><div class=\"wpb_text_column us_custom_567d60fe has_text_color\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Classify your risks with the help of the BSI risk matrix.<\/p>\n<\/div><\/div><\/div><div class=\"w-vwrapper align_center valign_top\"><div class=\"w-image us_custom_e33a8179 us_animate_this style_shadow-1 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1600\" height=\"915\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_dashboard.png\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_dashboard.png 1600w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_dashboard-300x172.png 300w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_isms_informationssicherheit_risikomanagement_screenshot_dashboard-1024x586.png 1024w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/div><\/div><div class=\"wpb_text_column us_custom_567d60fe has_text_color\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">The risk matrix in the 4conform ENTERPRISE ISMS dashboard<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_a518f36e styled_title_text white_text us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: left;\">Information security<\/h2>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">How can our ISMS help?<\/h3>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_7e35600f us_animate_this\"><div class=\"wpb_wrapper\"><p>A structured <strong>information security management system (ISMS)<\/strong> is essential for public institutions. It enables those responsible to effectively protect critical infrastructures such as government IT, digital citizen services and sensitive data from <strong>cyber threats<\/strong>.<\/p>\n<p>For example, an ISMS supports the <strong>security of administrative systems<\/strong>, compliance with <strong>authority-specific requirements<\/strong> (e.g. BSI IT baseline protection), precise <strong>risk management<\/strong> in the event of targeted attacks and a <strong>rapid response<\/strong> to security incidents. With an ISMS, public institutions improve their organizational security, ensure the integrity and availability of citizen data and increase their <strong>resilience<\/strong> to cyberattacks.<\/p>\n<p>This strengthens the administration&#8217;s ability to act and citizens&#8217; trust in digital services. Investments in an ISMS make public infrastructures future-proof and NIS2-compliant.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_huge\"><\/div><section class=\"l-section wpb_row us_custom_a9be633b height_auto width_full\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"g-cols wpb_row us_custom_7a53793d has_text_color us_animate_this via_grid cols_2 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_middle type_default reversed stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">BSI basic protection included<\/h3>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_aa2c80e6 us_animate_this\"><div class=\"wpb_wrapper\"><p>Start your ISMS without detours! Our 4conform ENTERPRISE ISMS software contains all relevant BSI basic protection modules with the corresponding measures. <\/p>\n<p><strong>This means <\/strong>you can get started right away. Rely on a proven solution that saves you time, resources and headaches. Secure your company with an ISMS that has been developed by experts and meets the highest standards.<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-iconbox us_custom_9a6f83a3 has_text_color us_animate_this iconpos_left style_default color_custom align_left no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:1.2rem;--icon-color:#fff;\"><i class=\"fal fa-play-circle\"><\/i><\/div><div class=\"w-iconbox-meta\"><div class=\"w-iconbox-text\"><p><strong>Ready for immediate use:<\/strong> Start your ISMS straight away, without having to make any customizations.<\/p>\n<\/div><\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-iconbox us_custom_076062d5 has_text_color us_animate_this iconpos_left style_default color_custom align_left no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:1.2rem;--icon-color:#fff;\"><i class=\"fal fa-hourglass-start\"><\/i><\/div><div class=\"w-iconbox-meta\"><div class=\"w-iconbox-text\"><p><strong>Time saving:<\/strong> Save time with integrated BSI basic protection modules.<\/p>\n<\/div><\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-iconbox us_custom_62adc815 has_text_color us_animate_this iconpos_left style_default color_custom align_left no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:1.2rem;--icon-color:#fff;\"><i class=\"fal fa-head-side-brain\"><\/i><\/div><div class=\"w-iconbox-meta\"><div class=\"w-iconbox-text\"><p><strong>Expertise:<\/strong> Benefit from the specialist knowledge of the developers.<\/p>\n<\/div><\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-iconbox us_custom_ffa22963 has_text_color us_animate_this iconpos_left style_default color_custom align_left no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:1.2rem;--icon-color:#fff;\"><i class=\"fal fa-shield-cross\"><\/i><\/div><div class=\"w-iconbox-meta\"><div class=\"w-iconbox-text\"><p><strong>Proven solution:<\/strong> Use a recognized standard for information security.<\/p>\n<\/div><\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-iconbox us_custom_83c30cb8 has_text_color us_animate_this iconpos_left style_default color_custom align_left no_title\"><div class=\"w-iconbox-icon\" style=\"font-size:1.2rem;--icon-color:#fff;\"><i class=\"fal fa-puzzle-piece\"><\/i><\/div><div class=\"w-iconbox-meta\"><div class=\"w-iconbox-text\"><p><strong>No headaches: <\/strong>Simplify ISMS implementation thanks to integrated BSI standards.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<div class=\"w-separator size_huge\"><\/div><section class=\"l-section wpb_row us_custom_a9be633b height_auto width_full\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">What benefits does an ISMS offer?<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_grid cols_3 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><p><strong>4conform ENTERPRISE ISMS <\/strong>is used specifically to make managing your information security easier and more efficient. It serves as a central platform to support processes relating to information security, risk and compliance management.<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-vwrapper hide_on_default hide_on_laptops align_left valign_top\" style=\"--vwrapper-gap:1rem\"><div class=\"w-text us_custom_4bc4e190 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Efficient management of information security processes<\/span><\/span><\/div><div class=\"w-text us_custom_d6cb00e6 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Risk management<\/span><\/span><\/div><div class=\"w-text us_custom_29b2984c has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Compliance assurance<\/span><\/span><\/div><div class=\"w-text us_custom_b4bd793a has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Documentation<\/span><\/span><\/div><div class=\"w-text us_custom_c8dc5ce1 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Traceability<\/span><\/span><\/div><div class=\"w-text us_custom_55d3bd97 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Audit and certification support<\/span><\/span><\/div><div class=\"w-text us_custom_03470961 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Reporting<\/span><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper hide_on_tablets hide_on_mobiles align_left valign_top\" style=\"--vwrapper-gap:1rem\"><div class=\"w-text us_custom_4bc4e190 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Efficient management of information security processes<\/span><\/span><\/div><div class=\"w-text us_custom_29b2984c has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Compliance assurance<\/span><\/span><\/div><div class=\"w-text us_custom_c8dc5ce1 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Traceability<\/span><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper hide_on_tablets hide_on_mobiles align_left valign_top\" style=\"--vwrapper-gap:1rem\"><div class=\"w-text us_custom_d6cb00e6 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Risk management<\/span><\/span><\/div><div class=\"w-text us_custom_b4bd793a has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Documentation<\/span><\/span><\/div><div class=\"w-text us_custom_55d3bd97 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Audit and certification support<\/span><\/span><\/div><div class=\"w-text us_custom_03470961 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Reporting<\/span><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-separator size_large\"><\/div><div class=\"wpb_text_column us_custom_fa14d838 styled_title_text white_text has_text_color us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: left;\">Data protection<\/h2>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h4 style=\"text-align: left;\">How can our DSMS help you?<\/h4>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"g-cols wpb_row via_grid cols_2 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_7e35600f us_animate_this\"><div class=\"wpb_wrapper\"><p>For <strong>public administration,<\/strong> which is considered critical infrastructure under the <strong>NIS2 Directive<\/strong>, a comprehensive <strong>data protection management system (DSMS) <\/strong>is essential to ensure the security and integrity of sensitive data (e.g. citizen data, tax information). Specialized solutions such as <strong>4conform ENTERPRISE DSMS<\/strong> support public authorities in making all <strong>data processing <\/strong>processes NIS2 and <strong>GDPR compliant <\/strong>and protecting the privacy of citizens. <\/p>\n<p>A DSMS <strong>strengthens trust in government services<\/strong>, reduces legal risks and ensures the <strong>reliability<\/strong> of critical systems. By implementing a DSMS, public institutions can not only achieve <strong>compliance<\/strong>, but also avoid disruptions in provision (e.g. failure of registration offices, social benefit systems). This is crucial to ensure the continuity of public services, which are essential for the functioning of society and the economy.<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-content-carousel items_1\"><div class=\"owl-carousel valign_stretch dotstyle_dash navstyle_circle arrows-ver-pos_middle arrows-hor-pos_on_sides_inside arrows-disabled_hide owl-responsive-2000 with_dots with_arrows\" style=\"--items-gap:30px;--transition-duration:350ms;--arrows-size:1.5rem;--arrows-gap:10px;\" onclick=\"return {&quot;aria_labels&quot;:{&quot;prev&quot;:&quot;Previous&quot;,&quot;next&quot;:&quot;Next&quot;},&quot;autoplayContinual&quot;:false,&quot;autoplayHoverPause&quot;:false,&quot;autoplayTimeout&quot;:3000,&quot;autoWidth&quot;:false,&quot;smartSpeed&quot;:350,&quot;margin&quot;:30,&quot;mouseDrag&quot;:true,&quot;rtl&quot;:false,&quot;slideBy&quot;:&quot;1&quot;,&quot;touchDrag&quot;:true,&quot;slideTransition&quot;:&quot;&quot;,&quot;responsive&quot;:{&quot;0&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:false,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:false,&quot;items&quot;:1,&quot;loop&quot;:false,&quot;nav&quot;:false,&quot;stagePadding&quot;:0,&quot;slideBy&quot;:&quot;1&quot;},&quot;601&quot;:{&quot;autoHeight&quot;:false,&quot;autoplay&quot;:false,&quot;autoWidth&quot;:false,&quot;center&quot;:false,&quot;dots&quot;:true,&quot;items&quot;:1,&quot;loop&quot;:false,&quot;nav&quot;:true,&quot;stagePadding&quot;:0}}}\"><div class=\"w-vwrapper align_center valign_top\"><div class=\"w-image us_custom_e33a8179 us_animate_this style_shadow-1 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1600\" height=\"915\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_datenvorfall_verlust_firmenlaptop.png\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_datenvorfall_verlust_firmenlaptop.png 1600w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_datenvorfall_verlust_firmenlaptop-300x172.png 300w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_datenvorfall_verlust_firmenlaptop-1024x586.png 1024w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/div><\/div><div class=\"wpb_text_column us_custom_567d60fe has_text_color\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Process data incidents easily and in compliance with the law in ENTERPRISE DSMS.<\/p>\n<\/div><\/div><\/div><div class=\"w-vwrapper align_center valign_top\"><div class=\"w-image us_custom_e33a8179 us_animate_this style_shadow-1 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1600\" height=\"915\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_betroffenenanfrage_01.png\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_betroffenenanfrage_01.png 1600w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_betroffenenanfrage_01-300x172.png 300w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_betroffenenanfrage_01-1024x586.png 1024w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/div><\/div><div class=\"wpb_text_column us_custom_567d60fe has_text_color\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Manage and process your data subject requests in accordance with the legal requirements.<\/p>\n<\/div><\/div><\/div><div class=\"w-vwrapper align_center valign_top\"><div class=\"w-image us_custom_e33a8179 us_animate_this style_shadow-1 align_center\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1600\" height=\"915\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_technische_organisatorische_massnahmen.png\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_technische_organisatorische_massnahmen.png 1600w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_technische_organisatorische_massnahmen-300x172.png 300w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_dsms_datenschutzmanagement_technische_organisatorische_massnahmen-1024x586.png 1024w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/div><\/div><div class=\"wpb_text_column us_custom_567d60fe has_text_color\"><div class=\"wpb_wrapper\"><p style=\"text-align: center;\">Map out your technical and organizational measures.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"g-cols wpb_row us_custom_891f2d1d us_animate_this via_grid cols_2-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_middle type_default reversed stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">What our customers in the energy industry say<\/h3>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_01931469 us_animate_this\"><div class=\"wpb_wrapper\"><p>\u201cOur standards for IT security and data protection are very high. With 4conform Enterprise, we have found a product that meets all the criteria. We were particularly impressed by the optimal implementation from the perspective of a processor, the comprehensive template package and the well thought-out role concept.\u201d<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_9729a9ef has_text_color us_animate_this\"><div class=\"wpb_wrapper\"><p>Bundesrechenzentrum<br \/>\nCentral IT service provider of the federal government<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-image us_custom_7e35600f us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"450\" height=\"350\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_bundesrechenzentrum_logo.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_bundesrechenzentrum_logo.jpg 450w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_kunden_referenzen_bundesrechenzentrum_logo-300x233.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_huge\"><\/div><section class=\"l-section wpb_row height_auto width_full\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_1 mobiles-cols_1 valign_middle type_default\"><div class=\"wpb_column vc_column_container us_custom_177df999 us_animate_this has_bg_color\"><div class=\"vc_column-inner\"><div class=\"w-separator size_small\"><\/div><div class=\"g-cols wpb_row via_grid cols_2 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_middle type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_a518f36e styled_title_text us_animate_this\"><div class=\"wpb_wrapper\"><h2 style=\"text-align: left;\">DSMS Live<\/h2>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">Take a look at our DSMS in action<\/h3>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_aa2c80e6 us_animate_this\"><div class=\"wpb_wrapper\"><p>Book a demo now and find out how you can efficiently ensure the protection of sensitive data and meet legal requirements. In your demo appointment, we will show you how easy it is to integrate data protection into your company. Save your appointment and start into a more secure future!<\/p>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-btn-wrapper align_none\"><a class=\"w-btn us-btn-style_1 us_custom_1040e5a8 us_animate_this\" id=\"click_book_demo\" href=\"https:\/\/4conform.com\/en\/book-a-demo\/\"><span class=\"w-btn-label\">Book a demo<\/span><\/a><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-image us_custom_a137f1d8 us_animate_this align_none\"><div class=\"w-image-h\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_grafik_isometric_computer_screen_design_by_piki_via_freepik_05-1024x683.jpg\" class=\"attachment-large size-large\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_grafik_isometric_computer_screen_design_by_piki_via_freepik_05-1024x683.jpg 1024w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_grafik_isometric_computer_screen_design_by_piki_via_freepik_05-300x200.jpg 300w, https:\/\/4conform.com\/wp-content\/uploads\/2025\/02\/4conform_grafik_isometric_computer_screen_design_by_piki_via_freepik_05.jpg 1440w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_small\"><\/div><\/div><\/div><\/div><\/div><\/section>\n<div class=\"w-separator size_huge\"><\/div><section class=\"l-section wpb_row height_auto width_full\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3 style=\"text-align: left;\">What benefits does a DSMS offer?<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"g-cols wpb_row via_grid cols_3 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><p>Our <strong>ENTERPRISE DSMS software<\/strong> (data protection management system) is primarily used to ensure the protection and management of data in an organization. It focuses on compliance with data protection and data security regulations and the prevention of data breaches.<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"w-vwrapper hide_on_default hide_on_laptops align_none valign_top\" style=\"--vwrapper-gap:1rem\"><div class=\"w-text us_custom_4bc4e190 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Management of data protection requirements<\/span><\/span><\/div><div class=\"w-text us_custom_d6cb00e6 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Risk management in data protection<\/span><\/span><\/div><div class=\"w-text us_custom_29b2984c has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Record of processing activities (RPA)<\/span><\/span><\/div><div class=\"w-text us_custom_b4bd793a has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Proof of compliance<\/span><\/span><\/div><div class=\"w-text us_custom_03470961 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Ensuring technical and organizational measures (TOMs)<\/span><\/span><\/div><div class=\"w-text us_custom_c8dc5ce1 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Rights of data subjects<\/span><\/span><\/div><div class=\"w-text us_custom_55d3bd97 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Data breach management<\/span><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper hide_on_tablets hide_on_mobiles align_none valign_top\" style=\"--vwrapper-gap:1rem\"><div class=\"w-text us_custom_4bc4e190 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Management of data protection requirements<\/span><\/span><\/div><div class=\"w-text us_custom_29b2984c has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Record of processing activities (RPA)<\/span><\/span><\/div><div class=\"w-text us_custom_03470961 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Ensuring technical and organizational measures (TOMs)<\/span><\/span><\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-vwrapper hide_on_tablets hide_on_mobiles align_none valign_top\" style=\"--vwrapper-gap:1rem\"><div class=\"w-text us_custom_d6cb00e6 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Risk management in data protection<\/span><\/span><\/div><div class=\"w-text us_custom_b4bd793a has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Proof of compliance<\/span><\/span><\/div><div class=\"w-text us_custom_c8dc5ce1 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Rights of data subjects<\/span><\/span><\/div><div class=\"w-text us_custom_55d3bd97 has_text_color us_animate_this icon_atleft\"><span class=\"w-text-h\"><i class=\"fas fa-check-circle\"><\/i><span class=\"w-text-value\">Data breach management<\/span><\/span><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<div class=\"w-separator size_huge\"><\/div><div class=\"g-cols wpb_row us_custom_679b460c has_text_color via_grid cols_2-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_middle type_default stacking_default\" style=\"--columns-gap:4rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_a308f7bd us_animate_this\"><div class=\"wpb_wrapper\"><p>\u201cPublic administrations face the challenge of reconciling GDPR, NIS2 and BSI requirements &#8211; with limited resources. Our ENTERPRISE DSMS automates precisely these processes: from the documentation of processing activities to the reporting of data breaches within 72 hours. By integrating ISO 27001, authorities can finally manage information security and data protection in combination &#8211; with clear workflows for risk analysis, implementation of measures and reporting.\u201d<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-image us_custom_460b5245 us_animate_this style_shadow-1 has_ratio align_none has_bg_color\"><div class=\"w-image-h\"><div style=\"padding-bottom:100%\"><\/div><img decoding=\"async\" width=\"300\" height=\"260\" src=\"https:\/\/4conform.com\/wp-content\/uploads\/2025\/03\/4conform_unternehmen_geschaeftsfuehrer_thorsten_jost_marc_gfrerer_schild-300x260.png\" class=\"attachment-medium size-medium\" alt=\"\" loading=\"lazy\" \/><\/div><\/div><div class=\"w-text us_custom_26462047 us_animate_this\"><span class=\"w-text-h\"><span class=\"w-text-value\">Thorsten Jost &#038; Marc Gfrerer<\/span><\/span><\/div><div class=\"w-text us_custom_bfbe0532 us_animate_this\"><span class=\"w-text-h\"><span class=\"w-text-value\">Founder &#038; Managing Director<\/span><\/span><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"l-section wpb_row height_auto width_full\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><section class=\"l-section wpb_row height_auto color_primary\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-separator size_large\"><\/div><div class=\"g-cols wpb_row via_grid cols_2-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_middle type_default stacking_default\" style=\"--columns-gap:3rem;\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column us_custom_e33a8179 us_animate_this\"><div class=\"wpb_wrapper\"><h3>Full security with 4conform<\/h3>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column us_custom_aa2c80e6 us_animate_this\"><div class=\"wpb_wrapper\"><p>Information and data security is a complex topic. But it doesn&#8217;t have to be complicated. Learn more about our smart GRC and information security solutions and schedule a free initial consultation.<\/p>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-btn-wrapper default_align_right laptops_align_right tablets_align_left mobiles_align_left\"><a class=\"w-btn us-btn-style_4 us_custom_631ad31c us_animate_this icon_atright\" id=\"click_termin_erstgespraech\" href=\"\/en\/arrange-your-no-obligation-initial-consultation-today\/\"><span class=\"w-btn-label\">Book your appointment<\/span><i class=\"far fa-chevron-right\"><\/i><\/a><\/div><\/div><\/div><\/div><div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/section>\n<div class=\"w-separator size_large\"><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"featured_media":4522,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4558","branchenloesung","type-branchenloesung","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/4conform.com\/en\/wp-json\/wp\/v2\/branchenloesung\/4558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4conform.com\/en\/wp-json\/wp\/v2\/branchenloesung"}],"about":[{"href":"https:\/\/4conform.com\/en\/wp-json\/wp\/v2\/types\/branchenloesung"}],"version-history":[{"count":14,"href":"https:\/\/4conform.com\/en\/wp-json\/wp\/v2\/branchenloesung\/4558\/revisions"}],"predecessor-version":[{"id":5062,"href":"https:\/\/4conform.com\/en\/wp-json\/wp\/v2\/branchenloesung\/4558\/revisions\/5062"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4conform.com\/en\/wp-json\/wp\/v2\/media\/4522"}],"wp:attachment":[{"href":"https:\/\/4conform.com\/en\/wp-json\/wp\/v2\/media?parent=4558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}