{"id":42848,"date":"2026-04-23T12:56:01","date_gmt":"2026-04-23T12:56:01","guid":{"rendered":"https:\/\/3-core.de\/?p=42848"},"modified":"2026-05-11T14:40:16","modified_gmt":"2026-05-11T14:40:16","slug":"security-measures","status":"publish","type":"post","link":"https:\/\/3-core.de\/en\/blog-en\/security-measures\/","title":{"rendered":"From risk assessment to security measures"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"42848\" class=\"elementor elementor-42848 elementor-42251\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-4cae2909 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"50858\" data-id=\"4cae2909\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8e38fd9\" data-eae-slider=\"17015\" data-id=\"8e38fd9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15eb2064 elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"15eb2064\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/20250624_100346-600x600.jpg\" class=\"attachment-ocean-thumb-m size-ocean-thumb-m wp-image-42254\" alt=\"A woman wearing a helmet and a high-visibility vest points to a security fence as a visible security measure on a site in clear, sunny weather.\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/20250624_100346-600x600.jpg 600w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/20250624_100346-150x150.jpg 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3b909fe7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"14500\" data-id=\"3b909fe7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-58c103fa\" data-eae-slider=\"73311\" data-id=\"58c103fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d09fa39 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"d09fa39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">From risk assessment to security measures<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-1bf7c1cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"57379\" data-id=\"1bf7c1cb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d3ee239\" data-eae-slider=\"22386\" data-id=\"3d3ee239\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-571e61aa elementor-widget elementor-widget-text-editor\" data-id=\"571e61aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security concepts provide the framework for assessing risks, defining security objectives and deriving appropriate security measures from them. They help organisations manage security not through isolated measures, but as a structured and transparent process. This principle is also reflected in the current BSI foundations: a security concept describes the measures by which the security objectives are pursued and requires a defined scope.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-e7775b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"6921\" data-id=\"e7775b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-a6e4c20\" data-eae-slider=\"67295\" data-id=\"a6e4c20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e8b0205\" data-eae-slider=\"43264\" data-id=\"e8b0205\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c83b9cd elementor-cta--skin-classic elementor-animated-content elementor-bg-transform elementor-bg-transform-zoom-in elementor-widget elementor-widget-call-to-action\" data-id=\"c83b9cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"call-to-action.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-cta\">\n\t\t\t\t\t<div class=\"elementor-cta__bg-wrapper\">\n\t\t\t\t<div class=\"elementor-cta__bg elementor-bg\" style=\"background-image: url(https:\/\/3-core.de\/wp-content\/uploads\/2026\/04\/3-core-GmbH_Download_Security-Concepts_EN-1024x709.jpg);\" role=\"img\" aria-label=\"3-core GmbH_Download_Security Concepts_EN\"><\/div>\n\t\t\t\t<div class=\"elementor-cta__bg-overlay\"><\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-cta__content\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-cta__title elementor-cta__content-item elementor-content-item\">\n\t\t\t\t\t\tDownload the security concepts guide now\t\t\t\t\t<\/h2>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-cta__button-wrapper elementor-cta__content-item elementor-content-item \">\n\t\t\t\t\t<a class=\"elementor-cta__button elementor-button elementor-size-\" href=\"https:\/\/3-core.de\/en\/download-guide-security-concept\/\">\n\t\t\t\t\t\tDOWNLOAD\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-43dc434\" data-eae-slider=\"40515\" data-id=\"43dc434\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-65ba0937 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"62549\" data-id=\"65ba0937\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c25abe\" data-eae-slider=\"82574\" data-id=\"3c25abe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79b60eb elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"79b60eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2\" data-end=\"37\">What defines a security concept<\/h2><p data-start=\"42\" data-end=\"99\">A <a href=\"https:\/\/3-core.de\/en\/security-management\/\">security concept<\/a> is based on a simple relationship:<\/p><ul><li data-start=\"104\" data-end=\"191\">Risk assessment<\/li><li data-start=\"104\" data-end=\"191\">Definition of security objectives<\/li><li data-start=\"104\" data-end=\"191\">Security measures<\/li><\/ul><p data-start=\"196\" data-end=\"487\">The risks faced by an organisation are considered in the light of both its internal and external context. Security objectives are then derived from the analysis of threats and the security-relevant history. Only on this basis are appropriate security measures determined and implemented.<\/p><p data-start=\"196\" data-end=\"487\"><a href=\"https:\/\/youtube.com\/shorts\/rVzQXejxNUc?si=y1ymr62guVq7AAmE\" target=\"_blank\" rel=\"noopener\">Learn more about the security concept in our video.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-9719e7c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"55325\" data-id=\"9719e7c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60fe9d5\" data-eae-slider=\"94547\" data-id=\"60fe9d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de3f35c elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"de3f35c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2\" data-end=\"37\">Why risk assessment comes first<\/h2><p data-start=\"42\" data-end=\"467\">Risk assessment is the foundation of every security concept. It is a key element of the concept and raises questions about the security situation, general threats, specific areas with protection requirements, as well as legal and contractual requirements. These include location- and country-specific risks, vandalism and sabotage, previous incidents, sector-specific threats, BCM requirements and insurance requirements.<\/p><p data-start=\"472\" data-end=\"835\"><a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Grundschutz\/International\/bsi-standard-2003_en_pdf.pdf?__blob=publicationFile&amp;v=2\" target=\"_blank\" rel=\"noopener\">BSI Standard 200-3<\/a> brings together the risk-related work steps of IT-Grundschutz, while ISO 31000 describes risk management as a structured approach to identifying, analysing, evaluating, treating, monitoring and communicating risks. Only when this foundation has been properly established can it be determined which security measures are genuinely necessary.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-0faef5c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"70763\" data-id=\"0faef5c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0f211f3\" data-eae-slider=\"86496\" data-id=\"0f211f3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b48376d elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"b48376d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2\" data-end=\"33\">The role of the risk matrix<\/h2><p data-start=\"38\" data-end=\"395\">In risk assessment, a risk matrix helps to make risks visible and prioritise them. Risks are classified according to their potential impact and likelihood of occurrence. The matrix is an important element in defining security objectives. Later, it can be updated as part of the review of existing security measures.<\/p><p data-start=\"400\" data-end=\"718\">Federal Office for Information Security (BSI) also describes the risk matrix as a common and highly effective tool for illustrating frequencies of occurrence, potential impact and risks. BSI further emphasises that the categories should be clearly defined and adapted to the specific circumstances of the organisation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-033cd0c\" data-eae-slider=\"56287\" data-id=\"033cd0c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c04bb8 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-image\" data-id=\"8c04bb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"2048\" height=\"1618\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2026\/04\/Bild13-1-2048x1618.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-42922\" alt=\"\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2026\/04\/Bild13-1-2048x1618.png 2048w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/04\/Bild13-1-300x237.png 300w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/04\/Bild13-1-1024x809.png 1024w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/04\/Bild13-1-768x607.png 768w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/04\/Bild13-1-1536x1213.png 1536w\" sizes=\"(max-width: 2048px) 100vw, 2048px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b02f642 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"36033\" data-id=\"b02f642\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c29dda0\" data-eae-slider=\"17016\" data-id=\"c29dda0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6a4112 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"a6a4112\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2\" data-end=\"39\">Definition of security objectives<\/h2><p data-start=\"44\" data-end=\"255\">Following the risk assessment, security objectives are defined in a binding manner for the relevant areas. They describe what needs to be protected, to what extent, and which level of protection is required.<\/p><ul><li data-start=\"260\" data-end=\"370\">Define the level of protection<\/li><li data-start=\"260\" data-end=\"370\">Specify protection needs<\/li><li data-start=\"260\" data-end=\"370\">Classify critical areas and assets<\/li><\/ul><p data-start=\"375\" data-end=\"594\">The security measures are then derived from these security objectives. Organisational, technical and physical measures are therefore not defined in isolation, but developed on the basis of risk and protection needs.<\/p><ul><li data-start=\"599\" data-end=\"733\">Derive measures systematically<\/li><li data-start=\"599\" data-end=\"733\">Provide a professional rationale for priorities<\/li><li data-start=\"599\" data-end=\"733\">Build a structured security concept<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b03e57 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"4b03e57\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2\" data-end=\"65\">Which security measures are derived from a security concept<\/h2><p data-start=\"70\" data-end=\"217\">Appropriate <a href=\"https:\/\/3-core.de\/en\/security-management\/\">security measures<\/a> are derived on the basis of the risk assessment and the security objectives. We distinguish between four areas:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-7815a3a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"12878\" data-id=\"7815a3a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4f47b157\" data-eae-slider=\"66479\" data-id=\"4f47b157\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ae53834 elementor-view-stacked elementor-shape-square elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"2ae53834\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-bounce-in\" href=\"https:\/\/3-core.de\/en\/security-management\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-network-wired\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-48c2a72d\" data-eae-slider=\"25229\" data-id=\"48c2a72d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e061ebb elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"5e061ebb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"2\" data-end=\"24\"><a href=\"https:\/\/3-core.de\/en\/security-management\/\">Personnel measures<\/a><\/h3><p data-start=\"29\" data-end=\"299\">These primarily concern security personnel with clearly defined roles and responsibilities. Personnel measures help to monitor security-relevant areas, detect incidents at an early stage, and respond in accordance with defined procedures in the event of an incident.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-6e10d71 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"24269\" data-id=\"6e10d71\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a1b562d\" data-eae-slider=\"88393\" data-id=\"a1b562d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4d683e4 elementor-view-stacked elementor-shape-square elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"4d683e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-bounce-in\" href=\"https:\/\/3-core.de\/en\/security-management\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-clipboard-list\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ef05658\" data-eae-slider=\"38732\" data-id=\"ef05658\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-936d43e elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"936d43e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"2\" data-end=\"29\"><a href=\"https:\/\/3-core.de\/en\/security-management\/\">Organisational measures<\/a><\/h3><p data-start=\"34\" data-end=\"333\" data-is-last-node=\"\">Organisational measures establish rules, responsibilities and procedures within the organisation. These include, for example, emergency and incident response plans or security zone concepts, which define how security is to be implemented in day-to-day operations and in the event of an incident.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-31707f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"93705\" data-id=\"31707f8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3aa4c79\" data-eae-slider=\"41415\" data-id=\"3aa4c79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d610ff9 elementor-view-stacked elementor-shape-square elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"d610ff9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-bounce-in\" href=\"https:\/\/3-core.de\/en\/security-management\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-laptop\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6c12e4a\" data-eae-slider=\"77415\" data-id=\"6c12e4a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b35684 elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3b35684\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"2\" data-end=\"24\"><a href=\"https:\/\/3-core.de\/en\/security-management\/\" data-wplink-edit=\"true\">Technical measures<\/a><\/h3><p data-start=\"29\" data-end=\"360\">Technical measures help to identify risks, control access and ensure that incidents can be traced. These include, for example, intrusion alarm systems, hold-up alarm systems, video surveillance systems and access control systems, which are used for monitoring, alerting and access control.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-d3e7d16 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"99709\" data-id=\"d3e7d16\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f1f1b41\" data-eae-slider=\"41109\" data-id=\"f1f1b41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e980d07 elementor-view-stacked elementor-shape-square elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"e980d07\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<a class=\"elementor-icon elementor-animation-bounce-in\" href=\"https:\/\/3-core.de\/en\/security-management\/\">\n\t\t\t<i aria-hidden=\"true\" class=\"fas fa-person-booth\"><\/i>\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d038e9b\" data-eae-slider=\"49691\" data-id=\"d038e9b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e15dbfc elementor-widget__width-initial elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"e15dbfc\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3 data-start=\"2\" data-end=\"25\"><a href=\"https:\/\/3-core.de\/en\/security-management\/\">Structural measures<\/a><\/h3><p data-start=\"30\" data-end=\"250\">Structural measures provide the physical basis for protection. These include, for example, doors, gates, walls, turnstiles and fences, which can be used to secure areas, restrict access and demarcate sensitive zones.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-678bb13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"61654\" data-id=\"678bb13\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-39bcb7a0\" data-eae-slider=\"96959\" data-id=\"39bcb7a0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e645395 elementor-widget elementor-widget-text-editor\" data-id=\"1e645395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2\" data-end=\"73\">Why security concepts need to be implemented and reviewed regularly<\/h2><p data-start=\"78\" data-end=\"573\">A <a href=\"https:\/\/3-core.de\/en\/security-management\/\">security concept<\/a> only delivers its full value when the defined security measures are embedded in the organisation, understood by employees, and adapted where necessary. This includes communicating changes, raising awareness and providing training, as well as regularly reviewing whether the measures remain effective and still reflect the current threat landscape. New legal requirements, changing risks, changes to the business model, or new best practices may make adjustments necessary.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b159ddc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"87169\" data-id=\"b159ddc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6855ed1\" data-eae-slider=\"92515\" data-id=\"6855ed1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05f72e2 elementor-widget elementor-widget-text-editor\" data-id=\"05f72e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-start=\"2\" data-end=\"62\">How 3-core supports organisations with security concepts<\/h2><p data-start=\"67\" data-end=\"596\">At 3-core, we support organisations not only in developing security concepts methodically, but also in implementing them in practice. From risk assessment and the definition of security objectives through to the derivation of appropriate security measures, we create a structure that works in day-to-day operations. Our Resilience Time Planner also makes it possible to present risk-based protection zone planning, including cost calculations, in a clear, structured and transparent way.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-de89c20\" data-eae-slider=\"89308\" data-id=\"de89c20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ef8de14 elementor-widget elementor-widget-video\" data-id=\"ef8de14\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/1x575O9vdvI?si=IMnpf7zKNMimepds&quot;,&quot;_animation&quot;:&quot;none&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3af50deb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"134\" data-id=\"3af50deb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76b490bb\" data-eae-slider=\"80652\" data-id=\"76b490bb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55fc8c03 elementor-widget elementor-widget-text-editor\" data-id=\"55fc8c03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" contenteditable=\"true\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Type Here...\">Find out more: Projects &amp; Articles<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-360fc5b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"12535\" data-id=\"360fc5b7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-636b0fa2\" data-eae-slider=\"75746\" data-id=\"636b0fa2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28915b3f elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-widget elementor-widget-posts\" data-id=\"28915b3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;classic_columns&quot;:&quot;3&quot;,&quot;classic_columns_tablet&quot;:&quot;2&quot;,&quot;classic_columns_mobile&quot;:&quot;1&quot;,&quot;classic_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;classic_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;classic_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.classic\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-classic elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-42984 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-download category-download-en entry has-media\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/3-core.de\/en\/blog-en\/emergency-plan\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img decoding=\"async\" width=\"240\" height=\"300\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Stabsuebung-240x300.jpeg\" class=\"attachment-medium size-medium wp-image-23478\" alt=\"Four professionals are gathered around a table in an office setting, discussing crisis management and reviewing an emergency plan. One woman is standing beside a flipchart with notes, while the others are seated around a laptop, working together.\" title=\"\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Stabsuebung-240x300.jpeg 240w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Stabsuebung-819x1024.jpeg 819w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Stabsuebung-768x960.jpeg 768w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Stabsuebung-1229x1536.jpeg 1229w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Stabsuebung-1638x2048.jpeg 1638w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/08\/Bild-Stabsuebung-scaled.jpeg 2048w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/3-core.de\/en\/blog-en\/emergency-plan\/\">\n\t\t\t\tWhy an emergency plan is not the same as emergency management\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/3-core.de\/en\/blog-en\/emergency-plan\/\" aria-label=\"Read more about Why an emergency plan is not the same as emergency management\" tabindex=\"-1\">\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-42934 post type-post status-publish format-standard has-post-thumbnail hentry category-blog-en category-download category-download-en entry has-media\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/3-core.de\/en\/blog-en\/crisis-management-for-organisations\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/04\/3-core-2024-174-300x225.jpg\" class=\"attachment-medium size-medium wp-image-19993\" alt=\"Three professionally dressed people stand in a hallway discussing crisis management for organisations; one woman holds a tablet and gestures while speaking to two men in suits under warm overhead lighting.\" title=\"\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2025\/04\/3-core-2024-174-300x225.jpg 300w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/04\/3-core-2024-174-1024x768.jpg 1024w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/04\/3-core-2024-174-768x576.jpg 768w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/04\/3-core-2024-174-1536x1152.jpg 1536w, https:\/\/3-core.de\/wp-content\/uploads\/2025\/04\/3-core-2024-174-2048x1536.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/3-core.de\/en\/blog-en\/crisis-management-for-organisations\/\">\n\t\t\t\tEstablishing crisis management for organisations\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/3-core.de\/en\/blog-en\/crisis-management-for-organisations\/\" aria-label=\"Read more about Establishing crisis management for organisations\" tabindex=\"-1\">\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-43029 post type-post status-publish format-standard has-post-thumbnail hentry category-download entry has-media\" role=\"listitem\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/3-core.de\/en\/download\/nis2-implementation\/\" tabindex=\"-1\">\n\t\t\t<div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"240\" height=\"300\" src=\"https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/3-core-2024-083-240x300.jpg\" class=\"attachment-medium size-medium wp-image-41874\" alt=\"Two people in business attire are seated at a desk, discussing NIS2 implementation while looking at a computer monitor. One points to the screen as the other takes notes. A coffee mug and a small plant are also on the desk.\" title=\"\" srcset=\"https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/3-core-2024-083-240x300.jpg 240w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/3-core-2024-083-819x1024.jpg 819w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/3-core-2024-083-768x960.jpg 768w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/3-core-2024-083-1229x1536.jpg 1229w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/3-core-2024-083-1638x2048.jpg 1638w, https:\/\/3-core.de\/wp-content\/uploads\/2026\/03\/3-core-2024-083-scaled.jpg 2048w\" sizes=\"(max-width: 240px) 100vw, 240px\" \/><\/div>\n\t\t<\/a>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h2 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/3-core.de\/en\/download\/nis2-implementation\/\">\n\t\t\t\tNIS2 implementation: obligations and sanctions\t\t\t<\/a>\n\t\t<\/h2>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/3-core.de\/en\/download\/nis2-implementation\/\" aria-label=\"Read more about NIS2 implementation: obligations and sanctions\" tabindex=\"-1\">\n\t\t\tWeiterlesen \u00bb\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3acbbb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"48148\" data-id=\"3acbbb1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6b5525ef\" data-eae-slider=\"13933\" data-id=\"6b5525ef\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-2d7f941 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"82521\" data-id=\"2d7f941\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-518a00b\" data-eae-slider=\"2307\" data-id=\"518a00b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24186 elementor-widget elementor-widget-global elementor-global-24186 elementor-widget-html\" data-id=\"24186\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div style=\"text-align: center;\">\n<a href=\"https:\/\/zeeg.me\/info6655\/30min-termin\" class=\"zeeg-popup-link\" target=\"_blank\" rel=\"noopener\">Book your Free Kickoff Call<\/a>\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security concepts provide the framework for assessing risks, defining security<\/p>\n","protected":false},"author":7,"featured_media":42254,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[43,179,180],"tags":[],"class_list":["post-42848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-download","category-download-en","entry","has-media"],"_links":{"self":[{"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/posts\/42848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/comments?post=42848"}],"version-history":[{"count":37,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/posts\/42848\/revisions"}],"predecessor-version":[{"id":43867,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/posts\/42848\/revisions\/43867"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/media\/42254"}],"wp:attachment":[{"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/media?parent=42848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/categories?post=42848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/3-core.de\/en\/wp-json\/wp\/v2\/tags?post=42848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}