{"id":41128,"date":"2026-03-19T13:12:04","date_gmt":"2026-03-19T13:12:04","guid":{"rendered":"https:\/\/3-core.de\/?p=41128"},"modified":"2026-03-19T13:16:24","modified_gmt":"2026-03-19T13:16:24","slug":"3-core-in-an-interview-with-welt-tv-public-security-under-pressure","status":"publish","type":"post","link":"https:\/\/3-core.de\/en\/blog-englisch\/3-core-in-an-interview-with-welt-tv-public-security-under-pressure\/","title":{"rendered":"3-core in an interview with WELT TV: Public security under pressure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"41128\" class=\"elementor elementor-41128 elementor-20667\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-30914b6a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"49834\" data-id=\"30914b6a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-64555e38\" data-eae-slider=\"13864\" data-id=\"64555e38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-268959b elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"268959b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.welt.de\/vermischtes\/video252708768\/Angriff-auf-TGV-Netz-Die-vielen-Streckenkilometer-zu-ueberwachen-ist-fast-nicht-moeglich.html\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"429\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/05\/weltTV-768x429.png\" class=\"attachment-medium_large size-medium_large wp-image-21942\" alt=\"A news broadcast shows two male anchors discussing security concepts and crisis management, with an image of workers in orange suits responding to a rail incident onscreen. Headline: Massiver Angriff auf Frankreichs Bahn-Netz. Scrolling ticker and live labels are visible.\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/05\/weltTV-768x429.png 768w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/05\/weltTV-300x167.png 300w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/05\/weltTV.png 799w\" sizes=\"(max-width: 768px) 100vw, 768px\" title=\"\">\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-53f46539 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"30066\" data-id=\"53f46539\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-329cc92\" data-eae-slider=\"90775\" data-id=\"329cc92\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cf6baf6 elementor-widget elementor-widget-spacer\" data-id=\"cf6baf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-231bd4c6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"27578\" data-id=\"231bd4c6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-31475f72\" data-eae-slider=\"79750\" data-id=\"31475f72\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65c58191 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"65c58191\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">3-core in an interview with WELT TV: Public security under pressure<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-a5ff801 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"45726\" data-id=\"a5ff801\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20e71e77\" data-eae-slider=\"97003\" data-id=\"20e71e77\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5515a9cc elementor-widget elementor-widget-text-editor\" data-id=\"5515a9cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Public security is increasingly under pressure because the threat landscape is intensifying noticeably and disruptions are becoming more complex. Targeted attacks, sabotage, and failures of technical systems are no longer exceptional cases. The consequences often extend beyond an organization\u2019s own operations and affect supply, mobility, and trust. In an<a href=\"https:\/\/www.welt.de\/vermischtes\/video252708768\/Angriff-auf-TGV-Netz-Die-vielen-Streckenkilometer-zu-ueberwachen-ist-fast-nicht-moeglich.html\" data-wplink-edit=\"true\" target=\"_blank\" rel=\"noopener\"> interview with WELT TV<\/a>, Stefan Erdweg, Managing Director of 3-core GmbH, explains why resilience must be managed strategically today and how security concepts, business continuity management, and crisis management help organizations remain capable of acting.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5585f196 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"10556\" data-id=\"5585f196\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-577fd3de\" data-eae-slider=\"33602\" data-id=\"577fd3de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f47965 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"2f47965\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"0\" data-end=\"52\">System outages with consequences for public security<\/h2><p data-start=\"54\" data-end=\"681\">The events in France have shown how vulnerable highly interconnected systems are. The arson attacks on the rail network not only had operational impacts on rail services, but also led to delays, diversions, and cascading effects across mobility and supply. Incidents like these make it clear that public security also depends on how well critical processes are protected and how quickly organizations can remain able to act at key interfaces. That is why a resilience strategy is essential, one that brings prevention, crisis organization, and recovery and restart together, instead of placing individual measures side by side.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-28bbb975 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"96221\" data-id=\"28bbb975\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-46c8d40e\" data-eae-slider=\"55355\" data-id=\"46c8d40e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0caac75 elementor-widget elementor-widget-image\" data-id=\"0caac75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Erklaerbild-Sicherheitskonzept-1024x683.jpeg\" class=\"attachment-large size-large wp-image-23501\" alt=\"A man in a suit points to a large screen displaying a slide titled Examples of Security Measures, showcasing icons and descriptions for technical, physical, organizational, and personnel security management solutions.\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Erklaerbild-Sicherheitskonzept-1024x683.jpeg 1024w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Erklaerbild-Sicherheitskonzept-300x200.jpeg 300w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Erklaerbild-Sicherheitskonzept-768x512.jpeg 768w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Erklaerbild-Sicherheitskonzept-1536x1024.jpeg 1536w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Erklaerbild-Sicherheitskonzept-2048x1365.jpeg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2140a82\" data-eae-slider=\"26645\" data-id=\"2140a82\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-103ac49c elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"103ac49c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"0\" data-end=\"33\">Public security affects companies<\/h2><p data-start=\"35\" data-end=\"773\">Public security is often seen as the responsibility of authorities. In practice, however, it depends just as much on how reliably companies deliver their services and how quickly they can manage disruptions. As soon as energy, transport, IT, production, or municipal services are affected, there are immediate impacts on customers, partners, and often entire supply chains. Typical consequences in such situations include production downtime, delivery delays, service outages, financial losses, and a loss of trust that can only be rebuilt slowly. Public security therefore becomes a question of whether organizations assess risks realistically, put effective precautions in place, and respond in a structured way when an incident occurs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5784467 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"24074\" data-id=\"5784467\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d02a7a6\" data-eae-slider=\"41815\" data-id=\"d02a7a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1724832 elementor-widget elementor-widget-text-editor\" data-id=\"1724832\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"0\" data-end=\"57\">Understanding threats and securing systems systematically<\/h2><p data-start=\"59\" data-end=\"420\">The interviews make it clear that companies should not view disruptions in isolation. Individual protective measures only work when they are embedded in an overall system. What matters is identifying vulnerabilities early, clarifying responsibilities, and planning measures so that they work in everyday operations and do not fail at interfaces in an emergency.<\/p><p data-start=\"422\" data-end=\"507\">Three points emerge particularly often in implementation as critical success factors:<\/p><ol><li data-start=\"509\" data-end=\"856\">There needs to be clarity about which processes are truly critical and which dependencies sit behind them.<\/li><li data-start=\"509\" data-end=\"856\">The organization must remain able to make decisions during an incident, even when information is incomplete and time pressure increases.<\/li><li data-start=\"509\" data-end=\"856\">Effectiveness only becomes robust when it is documented, verified, and improved on a regular basis.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3a704a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"94942\" data-id=\"3a704a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-75c2dec\" data-eae-slider=\"60175\" data-id=\"75c2dec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b293b37 elementor-widget elementor-widget-heading\" data-id=\"b293b37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Building blocks for resilience in the context of public security:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-1f2055b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"98333\" data-id=\"1f2055b6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3d4f55bc\" data-eae-slider=\"83928\" data-id=\"3d4f55bc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30e6ea13 elementor-view-stacked elementor-shape-square elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"30e6ea13\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-bounce-in\" href=\"https:\/\/3-core.de\/en\/security-management\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-unlock-alt\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-44558892\" data-eae-slider=\"3590\" data-id=\"44558892\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-211891b6 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"211891b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm\/main:[--thread-content-margin:--spacing(6)] @w-lg\/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"3b6ceaea-c464-4f47-9fa0-e31835ba2b56\" data-message-model-slug=\"gpt-5-2-thinking\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\"><h3 data-start=\"0\" data-end=\"52\"><a href=\"https:\/\/3-core.de\/en\/security-management\/\">Physical security as a foundation of public security<\/a><\/h3><p data-start=\"54\" data-end=\"442\">Public security starts at sites, facilities, and critical interfaces. Physical security is effective when protection objectives are clearly defined and protective measures are integrated into operations, facility management, and the governance of service providers. This includes clear access rules, zoning logic, detection, and defined response paths that are backed by the organization.<\/p><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-fce2be9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"7575\" data-id=\"fce2be9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ed4888c\" data-eae-slider=\"3422\" data-id=\"ed4888c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cf914f elementor-view-stacked elementor-shape-square elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"6cf914f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-bounce-in\" href=\"https:\/\/3-core.de\/en\/crisis-management\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-bell\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6a05a3d\" data-eae-slider=\"56146\" data-id=\"6a05a3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cc2871 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"8cc2871\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm\/main:[--thread-content-margin:--spacing(6)] @w-lg\/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"3b6ceaea-c464-4f47-9fa0-e31835ba2b56\" data-message-model-slug=\"gpt-5-2-thinking\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\"><div class=\"markdown prose dark:prose-invert w-full break-words light markdown-new-styling\"><h3 data-start=\"0\" data-end=\"79\"><a href=\"https:\/\/3-core.de\/en\/crisis-management\/\">Crisis management for situational awareness, decision making, and communication<\/a><\/h3><p data-start=\"81\" data-end=\"652\">When disruptions occur, it is not only speed that matters, but leadership and structure. Crisis management ensures that a shared situational picture is established, decisions are made in a traceable way, and internal and external communication works in a coordinated manner. Especially at the interfaces between operations, IT, communications, service providers, and external stakeholders, it becomes clear whether roles, approvals, and escalation work or whether time is lost. In moments like these, it becomes clear how well public security is organizationally secured.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-80d21d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"75356\" data-id=\"80d21d3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ea1b2c8\" data-eae-slider=\"40981\" data-id=\"ea1b2c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70bd2e3 elementor-view-stacked elementor-shape-square elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"70bd2e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-bounce-in\" href=\"https:\/\/3-core.de\/en\/business-continuity-management\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-arrow-alt-circle-right\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-432aa3b\" data-eae-slider=\"6297\" data-id=\"432aa3b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7add18 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"f7add18\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"0\" data-end=\"67\"><a href=\"https:\/\/3-core.de\/en\/business-continuity-management\/\">Business continuity management for emergency operations and restart<\/a><\/h3><p data-start=\"69\" data-end=\"392\">To prevent services from failing for an extended period, you need robust emergency operations and a structured restart. Business continuity management translates risks into practical capability to act and defines what must continue, which minimum service levels are possible, and how the restart is implemented in practice.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-ef38be4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"99603\" data-id=\"ef38be4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dfe5805\" data-eae-slider=\"9737\" data-id=\"dfe5805\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6824211 elementor-view-stacked elementor-shape-square elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"6824211\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-bounce-in\" href=\"https:\/\/3-core.de\/en\/emergency-and-crisis-management\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-tasks\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-50dd47c\" data-eae-slider=\"91206\" data-id=\"50dd47c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23cc568 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"23cc568\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"0\" data-end=\"57\"><a href=\"https:\/\/3-core.de\/en\/emergency-and-crisis-management\/\">Verifiability becomes a permanent part of public security<\/a><\/h3><p data-start=\"59\" data-end=\"539\">Beyond actual effectiveness, verifiability is becoming increasingly important. Organizations must be able to demonstrate how risks are assessed, measures are prioritized, and improvements are implemented. Clear documentation, regular reviews, and tests and exercises make resilience auditable and continuously improvable, which is also relevant for stakeholders and auditing bodies. This ensures that public security is not only planned, but made robust and sustainable over time.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3c97a48e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"23393\" data-id=\"3c97a48e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4832a0d2\" data-eae-slider=\"14513\" data-id=\"4832a0d2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3bdc3a1 elementor-widget elementor-widget-text-editor\" data-id=\"3bdc3a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex flex-col text-sm pb-25\"><article class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"request-WEB:69e55a08-ab5c-44c2-a82c-a51595a28a45-46\" data-testid=\"conversation-turn-88\" data-scroll-anchor=\"true\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm\/main:[--thread-content-margin:--spacing(6)] @w-lg\/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"dfa14686-1837-4a38-a8df-d4c1218c4cfd\" data-message-model-slug=\"gpt-5-2-thinking\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\"><div class=\"markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling\"><h2 data-start=\"0\" data-end=\"69\">How we support public security as 3-core as an implementation partner<\/h2><p data-start=\"71\" data-end=\"655\">We support companies as an implementation partner in building security concepts so that prevention, response, and recovery and restart work together and actually function in operations. This is not about paper concepts, but about clear responsibilities, practical processes, and verifiability that is considered from the outset. Together, we develop and implement integrated solutions for physical security, crisis organization, and business continuity management so that companies can deliver their services reliably even under disruptions and sustainably strengthen public security.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-583eeeee elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"17132\" data-id=\"583eeeee\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-65d3898b\" data-eae-slider=\"51754\" data-id=\"65d3898b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-131be0e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"131be0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"0\" data-end=\"24\">Steps for public security<\/h2><p data-start=\"26\" data-end=\"366\">Public security cannot be achieved in interconnected structures through individual measures. What matters is that physical security, clear responsibilities, and robust procedures work together in a way that functions in everyday operations and takes effect immediately in an incident. In practice, the following steps have proven effective:<\/p><ol><li data-start=\"633\" data-end=\"962\">Critical sites, facilities, and access points are prioritized so that physical security focuses on where failures would have the greatest impact on public security.<\/li><li data-start=\"633\" data-end=\"962\">Physical security vulnerabilities are assessed on site so that access, perimeters, technical rooms, and interfaces with service providers do not become blind spots.<\/li><li data-start=\"633\" data-end=\"962\">Access and vehicle entry processes are clearly defined so that permissions, visitors, key management, and contractors remain practical in operations.<\/li><li data-start=\"633\" data-end=\"962\">Detection, alerting, and escalation are clearly defined so that a physical incident is recognized, assessed, and handled in a structured way quickly.<\/li><li data-start=\"633\" data-end=\"962\">Emergency and recovery and restart plans are backed by resources so that there is no need to improvise after a disruption and public security can be stabilized faster.<\/li><li data-start=\"633\" data-end=\"962\">Tests and exercises are carried out regularly so that measures, roles, and procedures actually work in an emergency.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-672d9c81\" data-eae-slider=\"13643\" data-id=\"672d9c81\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4ee56a elementor-widget elementor-widget-image\" data-id=\"a4ee56a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Fehler-Perimeterschutz-600x600.png\" class=\"attachment-ocean-thumb-m size-ocean-thumb-m wp-image-23503\" alt=\"A construction worker wearing a helmet and high-visibility jacket stands on a concrete block beside a metal fence, appearing to inspect or work on the fence near a blue building as part of security management measures.\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Fehler-Perimeterschutz-600x600.png 600w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Fehler-Perimeterschutz-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-5df3e094 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"7534\" data-id=\"5df3e094\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72e9bd27\" data-eae-slider=\"72614\" data-id=\"72e9bd27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-efe49b8 elementor-widget elementor-widget-spacer\" data-id=\"efe49b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a11c1fa elementor-widget elementor-widget-text-editor\" data-id=\"6a11c1fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Explore more: Projects &amp; other articles<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2a3e3785 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"49447\" data-id=\"2a3e3785\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-476e022c\" data-eae-slider=\"47313\" data-id=\"476e022c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-206bed43 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-widget elementor-widget-posts\" data-id=\"206bed43\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;3&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-20749 post type-post status-publish format-standard has-post-thumbnail hentry category-reference-emergency-management category-referenzen-notfallmanagement-en entry has-media\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/3-core.de\/en\/referenzen-notfallmanagement-en\/emergency-and-business-continuation-plan-for-flood-protection\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2021\/10\/3-core-2024-054-300x200.jpg\" class=\"attachment-medium size-medium wp-image-19283\" alt=\"A woman in business attire presents data on a large screen to four colleagues during a Security Awareness Kampagne in an office setting, with a potted plant in the background.\" title=\"\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2021\/10\/3-core-2024-054-300x200.jpg 300w, https:\/\/3-core.de\/wp-content\/uploads\/2021\/10\/3-core-2024-054-1024x683.jpg 1024w, https:\/\/3-core.de\/wp-content\/uploads\/2021\/10\/3-core-2024-054-768x512.jpg 768w, https:\/\/3-core.de\/wp-content\/uploads\/2021\/10\/3-core-2024-054-1536x1024.jpg 1536w, https:\/\/3-core.de\/wp-content\/uploads\/2021\/10\/3-core-2024-054-2048x1366.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/3-core.de\/en\/referenzen-notfallmanagement-en\/emergency-and-business-continuation-plan-for-flood-protection\/\">\n\t\t\t\tEmergency and business continuation plan for flood protection\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/3-core.de\/en\/referenzen-notfallmanagement-en\/emergency-and-business-continuation-plan-for-flood-protection\/\" aria-label=\"Read more about Emergency and business continuation plan for flood protection\" tabindex=\"-1\">\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-20757 post type-post status-publish format-standard has-post-thumbnail hentry category-security-management-references entry has-media\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/3-core.de\/en\/security-management-references\/security-consulting-for-construction\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"251\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/03\/3-core-2024-138-300x251.jpg\" class=\"attachment-medium size-medium wp-image-19597\" alt=\"Three women in business attire stand in a hallway having a discussion about corporate security. One holds papers while the others listen attentively. Modern decor and a painting are visible in the background.\" title=\"\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/03\/3-core-2024-138-300x251.jpg 300w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/03\/3-core-2024-138-1024x857.jpg 1024w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/03\/3-core-2024-138-768x643.jpg 768w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/03\/3-core-2024-138-1536x1285.jpg 1536w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/03\/3-core-2024-138-2048x1714.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/3-core.de\/en\/security-management-references\/security-consulting-for-construction\/\">\n\t\t\t\tSecurity consulting for construction\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/3-core.de\/en\/security-management-references\/security-consulting-for-construction\/\" aria-label=\"Read more about Security consulting for construction\" tabindex=\"-1\">\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-20765 post type-post status-publish format-standard has-post-thumbnail hentry category-security-management-references entry has-media\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/3-core.de\/en\/security-management-references\/security-measures-of-austrian-energy-company\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2024\/10\/3-core-2024-082-300x200.jpg\" class=\"attachment-medium size-medium wp-image-19268\" alt=\"Two people in business attire discuss data related to business impact analyses displayed on a computer monitor at a modern office desk, with documents, a keyboard, and a coffee mug visible. One person is standing, the other is seated.\" title=\"\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2024\/10\/3-core-2024-082-300x200.jpg 300w, https:\/\/3-core.de\/wp-content\/uploads\/2024\/10\/3-core-2024-082-1024x683.jpg 1024w, https:\/\/3-core.de\/wp-content\/uploads\/2024\/10\/3-core-2024-082-768x512.jpg 768w, https:\/\/3-core.de\/wp-content\/uploads\/2024\/10\/3-core-2024-082-1536x1024.jpg 1536w, https:\/\/3-core.de\/wp-content\/uploads\/2024\/10\/3-core-2024-082-2048x1366.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/3-core.de\/en\/security-management-references\/security-measures-of-austrian-energy-company\/\">\n\t\t\t\tSecurity measures of austrian energy company\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/3-core.de\/en\/security-management-references\/security-measures-of-austrian-energy-company\/\" aria-label=\"Read more about Security measures of austrian energy company\" tabindex=\"-1\">\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-299307dc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"75065\" data-id=\"299307dc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a7715c4\" data-eae-slider=\"47879\" data-id=\"5a7715c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1af87446 elementor-align-right elementor-fixed elementor-widget elementor-widget-button\" data-id=\"1af87446\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;fixed&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Artikel auf LinkedIn weiterlesen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Public security is increasingly under pressure because the threat landscape<\/p>\n","protected":false},"author":7,"featured_media":21942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[174],"tags":[],"class_list":["post-41128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-englisch","entry","has-media"],"_links":{"self":[{"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/posts\/41128","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/comments?post=41128"}],"version-history":[{"count":14,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/posts\/41128\/revisions"}],"predecessor-version":[{"id":42002,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/posts\/41128\/revisions\/42002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/media\/21942"}],"wp:attachment":[{"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/media?parent=41128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/categories?post=41128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/tags?post=41128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}