{"id":30247,"date":"2023-08-08T02:11:00","date_gmt":"2023-08-08T09:11:00","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=resources&#038;p=30247"},"modified":"2024-02-08T03:39:49","modified_gmt":"2024-02-08T10:39:49","slug":"guide-n-worksheets-for-insider-threat-program","status":"publish","type":"resources","link":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program","title":{"rendered":"CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen"},"content":{"rendered":"\n\t\t<div  class=\"block-b6c06cac-9a70-4008-b560-85b774bb92fd areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-f26438c8-74ca-4606-bcdc-4d8372daf750 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div id=\"breadcrumbs\" class=\"block-b514dd46-7047-46a4-89f2-34f10db3d577 col areoi-element resource-breadcrumbs col-sm-12\">\n\t\t\t\n\t\t\t\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/www.syteca.com\/de\/resources\/%resource_category%\">Resources<\/a><\/span> &gt; <span><a href=\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\">Whitepaper<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\">CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen<\/span><\/span><\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-45b87262-2067-4936-a0f8-fd067324a8a7 col areoi-element wp-gallery col-12 col-lg-6 col-xl-6\">\n\t\t\t\n\t\t\t\n\n<h1 class=\"wp-block-heading text-center text-lg-start\">Praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen<\/h1>\n\n\n<div class=\"rl-gallery-container rl-loading\" id=\"rl-gallery-container-1\" data-gallery_id=\"28957\"> <div class=\"rl-gallery rl-basicgrid-gallery white-paper rl-hover-icon-2\" id=\"rl-gallery-1\" data-gallery_no=\"1\"> <div class=\"rl-gallery-item\"><a href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/29234833\/Whitepaper-CISO-practical-guide-prev-1-1.png\" title=\"\" data-rl_title=\"\" class=\"rl-gallery-link\" data-rl_caption=\"\" data-rel=\"lightbox-gallery-1\" data-magnific_type=\"gallery\"><img decoding=\"async\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/29234833\/Whitepaper-CISO-practical-guide-prev-1-1.png\" width=\"473\" height=\"648\" alt=\"\"\/><\/a><\/div><div class=\"rl-gallery-item\"><a href=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/29234912\/Whitepaper-CISO-practical-guide-prev-2.png\" title=\"\" data-rl_title=\"\" class=\"rl-gallery-link\" data-rl_caption=\"\" data-rel=\"lightbox-gallery-1\" data-magnific_type=\"gallery\"><img decoding=\"async\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/29234912\/Whitepaper-CISO-practical-guide-prev-2.png\" width=\"473\" height=\"648\" alt=\"\"\/><\/a><\/div> <\/div> <\/div>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e5108d22-a8dc-4401-88c4-1fc60e1010e7 col areoi-element block-white-papers-form col-12 col-lg-6   bg-body\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(16, 206, 158,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-151229e2-1af4-449d-8b55-1ec3a888221b areoi-element hs-white-pares-form\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script><script>hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"612026\",\n    formId: \"ec8d5a98-2250-41de-a9dc-f916ee6d3329\"\n  });\n<\/script>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-2127817d-34da-44ec-a14a-387c7064ac0e areoi-element container block-about-author mx-0 mx-xxl-auto\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-8f52cdcf-9b5b-425c-a5fd-c84bb86c9d38 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-bef72f02-2bd1-4c78-bd52-abb0824c9ef2 col areoi-element block-description-bg col-12 col-lg-6 order-1 order-lg-0\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(55, 84, 115,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"mb-0\" style=\"font-size:1rem;font-style:normal;font-weight:400\">Lassen Sie sich von Jonathan Care, einem hochkar\u00e4tigen ehemaligen Cybersicherheitsanalytiker von Gartner, fachkundig beim Aufbau eines robusten und betrieblich effizienten Programms f\u00fcr Insider- Bedrohungen beraten.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2  class=\"wp-block-heading\">Lesen Sie diese Arbeit, um Folgendes <mark style=\"background-color:rgba(0, 0, 0, 0);color:#548ff9\" class=\"has-inline-color\">zu erfahren:<\/mark><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gebrauchsfertige Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Insider- Bedrohungsprogramms, die Verfolgung von KPIs und die Bewertung ihrer Effektivit\u00e4t, die Messung von Risikobereitschaft und -toleranz sowie die Verfolgung von Standards und Compliance<\/li>\n\n\n\n<li>Herausforderungen bei Insider-Risiken und Insider-Bedrohungen<\/li>\n\n\n\n<li>Die Systematik der Insiderrisiken &#8211; Worauf ist wann und wo zu achten?<\/li>\n\n\n\n<li>Der gesch\u00e4ftliche Nutzen der RACI- Matrix f\u00fcr das Insider-Risiko- Management und wie sie f\u00fcr die Strukturierung von Rollen und Verfahren genutzt werden kann <\/li>\n\n\n\n<li>Phasen und Zyklen eines erfolgreichen Programms f\u00fcr Insiderrisiken<\/li>\n\n\n\n<li>Wie die Wirksamkeit eines Programms zum Management von Insider-Risiken gemessen kann<\/li>\n\n\n\n<li>Laden Sie den Leitfaden jetzt herunter, um Ihr Team mit dem Wissen und den Werkzeugen auszustatten, die es braucht, um eine umfassende Abwehr gegen Insider- Bedrohungen zu etablieren und Ihre kritischen Ressourcen effektiv zu sch\u00fctzen.<\/li>\n<\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f5ea0eb1-c56a-4eae-867a-702c075eedbe col areoi-element col-12 col-lg-6 col-xl-6 order-0 order-lg-1\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-e93149a8-db7f-4cab-9486-d2367d94b937 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-fd1cabef-9335-4318-9f9c-9b047ddd8897 col areoi-element col-12 col-md-6 col-lg-12 order-1 order-md-0\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"336\" height=\"403\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/image-65.png\" alt=\"\" class=\"wp-image-4120\" srcset=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/image-65.png 336w, https:\/\/www.syteca.com\/wp-content\/uploads\/2022\/12\/image-65-250x300.png 250w\" sizes=\"(max-width: 336px) 100vw, 336px\" \/><\/figure>\n<\/div>\n\n\n\t\t<div  class=\"block-2a893644-491b-4763-ac1e-1e428d0eec80 areoi-element d-flex justify-content-around flex-md-column w-100 py-3 d-lg-none d-xl-none d-xxl-none\">\n\t\t\t\n\t\t\t\n\n<p class=\"btn-link btn-link-underlined\" style=\"font-size:1rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.linkedin.com\/in\/computercrime\/?originalSubdomain=uk\" target=\"_blank\" rel=\"noreferrer noopener\">Linkedin-Profil<\/a><\/p>\n\n\n\n<p class=\"btn-link btn-link-underlined\" style=\"font-size:1rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.gartner.com\/analyst\/53159\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner-Profil<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-426f6950-e2eb-41b1-86f9-8036bc520798 col areoi-element col-12 col-md-6 col-lg-12 order-0 order-md-1\">\n\t\t\t\n\t\t\t\n\n<div style=\"height:24px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2  class=\"wp-block-heading\">\u00dcber den Autor<\/h2>\n\n\n\n<p>Mit seiner herausragenden Karriere als erstklassiger Gartner-Analyst war Jonathan Care an vorderster Front an der Definition des Betrugsmarktes beteiligt und leitete Gartners Forschung zu Insider- Bedrohungen und Risiken. Er besitzt mehrere Auszeichnungen und Zertifizierungen, darunter als Zertifizierter Betrugspr\u00fcfer, PCI DSS-qualifizierter forensischer Ermittler, PCI DSS-qualifizierter Sicherheitsgutachter, PCI-qualifizierter Sicherheitsgutachter f\u00fcr Zahlungsantr\u00e4ge und ist ein von der Regierung des Vereinigten K\u00f6nigreichs akkreditierter Penetrationstester und gelisteter Sicherheitsberater.<\/p>\n\n\n\n<p>Jonathan hat weltweit f\u00fchrende Unternehmen im Bereich Cybersicherheit beraten und als Sachverst\u00e4ndiger und forensischer Ermittler vor Gericht ausgesagt. In &#8222;A Modern Guide to Running an Effective Insider Threat Program\u201c (Ein moderner Leitfaden f\u00fcr die Durchf\u00fchrung eines effektiven Insider-Bedrohungsprogramms) gibt er sein unvergleichliches Fachwissen weiter. Laden Sie den Leitfaden jetzt herunter, um von seiner umfassenden Branchenerfahrung zu profitieren und Ihr Unternehmen gegen interne Risiken zu wappnen.<\/p>\n\n\n\n\t\t<div  class=\"block-7a89450e-0678-482c-b8f5-33d800235645 areoi-element d-flex justify-content-around flex-md-column py-3 d-none d-sm-none d-md-none d-lg-block\">\n\t\t\t\n\t\t\t\n\n<p class=\"btn-link btn-link-underlined\" style=\"font-size:1rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.linkedin.com\/in\/computercrime\/?originalSubdomain=uk\" target=\"_blank\" rel=\"noreferrer noopener\">Linkedin-Profil<\/a><\/p>\n\n\n\n<p class=\"btn-link btn-link-underlined\" style=\"font-size:1rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/www.gartner.com\/analyst\/53159\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner-Profil<\/a><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\t\t<div  class=\"block-177d49dd-a200-4b3d-8f3f-eeb26b42b267 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-bd4c07de-706d-4e58-9170-e0ed461a285f row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-042a19fc-853d-4835-8b2e-094f7cb6f1cf col areoi-element block-share-social-buttons\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Teilen:<\/p>\n\n\n\n<ul class=\"wp-block-social-links has-icon-color has-icon-background-color is-layout-flex wp-block-social-links-is-layout-flex\"><li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.syteca.com%2Fde%2Fresources%2Fwhite-papers%2Fguide-n-worksheets-for-insider-threat-program&#038;title=\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.syteca.com%2Fde%2Fresources%2Fwhite-papers%2Fguide-n-worksheets-for-insider-threat-program\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-twitter  wp-block-social-link\"><a rel=\"noopener nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.syteca.com%2Fde%2Fresources%2Fwhite-papers%2Fguide-n-worksheets-for-insider-threat-program&#038;text=\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":55746,"menu_order":0,"template":"","class_list":["post-30247","resources","type-resources","status-publish","has-post-thumbnail","hentry","resource_category-whitepaper"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen | Syteca<\/title>\n<meta name=\"description\" content=\"Holen Sie sich den Leitfaden f\u00fcr das Insider-Bedrohungsprogramm und die KPI-Arbeitsbl\u00e4tter, um einen umfassenden Schutz vor Insider-Bedrohungen aufzubauen und kontinuierlich zu verbessern\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen | Syteca\" \/>\n<meta property=\"og:description\" content=\"Holen Sie sich den Leitfaden f\u00fcr das Insider-Bedrohungsprogramm und die KPI-Arbeitsbl\u00e4tter, um einen umfassenden Schutz vor Insider-Bedrohungen aufzubauen und kontinuierlich zu verbessern\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-08T10:39:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png\" \/>\n\t<meta property=\"og:image:width\" content=\"624\" \/>\n\t<meta property=\"og:image:height\" content=\"324\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program\",\"url\":\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program\",\"name\":\"CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png\",\"datePublished\":\"2023-08-08T09:11:00+00:00\",\"dateModified\":\"2024-02-08T10:39:49+00:00\",\"description\":\"Holen Sie sich den Leitfaden f\u00fcr das Insider-Bedrohungsprogramm und die KPI-Arbeitsbl\u00e4tter, um einen umfassenden Schutz vor Insider-Bedrohungen aufzubauen und kontinuierlich zu verbessern\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png\",\"width\":624,\"height\":324},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\/\/www.syteca.com\/de\/resources\/%resource_category%\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper\",\"item\":\"https:\/\/www.syteca.com\/de\/resources\/whitepaper\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/de#website\",\"url\":\"https:\/\/www.syteca.com\/de\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen | Syteca","description":"Holen Sie sich den Leitfaden f\u00fcr das Insider-Bedrohungsprogramm und die KPI-Arbeitsbl\u00e4tter, um einen umfassenden Schutz vor Insider-Bedrohungen aufzubauen und kontinuierlich zu verbessern","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program","og_locale":"de_DE","og_type":"article","og_title":"CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen | Syteca","og_description":"Holen Sie sich den Leitfaden f\u00fcr das Insider-Bedrohungsprogramm und die KPI-Arbeitsbl\u00e4tter, um einen umfassenden Schutz vor Insider-Bedrohungen aufzubauen und kontinuierlich zu verbessern","og_url":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program","og_site_name":"Syteca","article_modified_time":"2024-02-08T10:39:49+00:00","og_image":[{"width":624,"height":324,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program","url":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program","name":"CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png","datePublished":"2023-08-08T09:11:00+00:00","dateModified":"2024-02-08T10:39:49+00:00","description":"Holen Sie sich den Leitfaden f\u00fcr das Insider-Bedrohungsprogramm und die KPI-Arbeitsbl\u00e4tter, um einen umfassenden Schutz vor Insider-Bedrohungen aufzubauen und kontinuierlich zu verbessern","breadcrumb":{"@id":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/08\/30002613\/cover-CISO-practical-guide.png","width":624,"height":324},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/de\/resources\/whitepaper\/guide-n-worksheets-for-insider-threat-program#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/www.syteca.com\/de\/resources\/%resource_category%"},{"@type":"ListItem","position":2,"name":"Whitepaper","item":"https:\/\/www.syteca.com\/de\/resources\/whitepaper"},{"@type":"ListItem","position":3,"name":"CISOs praktischer Leitfaden und Arbeitsbl\u00e4tter f\u00fcr den Aufbau eines Programms f\u00fcr Insider-Bedrohungen"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/de#website","url":"https:\/\/www.syteca.com\/de","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/de\/wp-json\/wp\/v2\/resources\/30247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/de\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.syteca.com\/de\/wp-json\/wp\/v2\/types\/resources"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/de\/wp-json\/wp\/v2\/media\/55746"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/de\/wp-json\/wp\/v2\/media?parent=30247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}