{"id":32196,"date":"2017-07-09T18:54:18","date_gmt":"2017-07-09T22:54:18","guid":{"rendered":"https:\/\/www.cyberark.com\/cisoview\/"},"modified":"2024-03-19T05:52:01","modified_gmt":"2024-03-19T09:52:01","slug":"cisoview","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/cisoview\/","title":{"rendered":"CISO View"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg dark&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text]<\/p>\n<h1>CISO View<\/h1>\n<h2>Unabh\u00e4ngige Ratschl\u00e4ge von branchenf\u00fchrenden CISOs.<\/h2>\n<p>[\/vc_column_text][vc_btn title=&#8220;JETZT HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fwhite-papers%2Fciso-view-privilegierten-zugriff-in-einem-zero-trust-modell-sch%25C3%25BCtzen-zusammenfassung|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top text-md-center&#8220;][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">\u00dcber die CISO View forschungsserie<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-btm text-md-center&#8220;][vc_column width=&#8220;2\/3&#8243; offset=&#8220;vc_col-sm-offset-2&#8243;][vc_column_text]<\/p>\n<h5>Die CISO View-Berichtserie wird zusammen mit dem unabh\u00e4ngigen Forschungsunternehmen Robinson Insight durchgef\u00fchrt. Sie bringt f\u00fchrende CISOs zusammen, die wertvolle Informationen zum Aufbau effektiver Cybersicherheitsprogramme austauschen.<\/h5>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 seesaw cybv2-pad-btm&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above wistia_embed&#8220;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_aswr8gsmnr videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Schutz des privilegierten Zugriffs bei der Umstellung auf Zero Trust.<\/h4>\n<p>Digitale Transformation und Unternehmensmobilit\u00e4t bedeuten eine schnelle Aufl\u00f6sung des herk\u00f6mmlichen Perimetermodells. Wie k\u00f6nnen Unternehmen angesichts des Wegfalls der Perimter den Zugriff auf ihre wertvollsten Ressourcen \u2013 Daten, Anwendungen und Infrastruktur \u2013 vor Ort oder in der Cloud sch\u00fctzen?<\/p>\n<p>Wir haben eine Gruppe  von 12\u00a0Global 1000\u00a0CISOs zu dem sich ver\u00e4ndernden Risikobild befragt, einschlie\u00dflich der Entwicklung von Angriffstechniken, die auf privilegierten Zugriff abzielen. Sie gaben spezifische Empfehlungen zur Risikominderung mithilfe eines Zero-Trust-Modells. Dieser Bericht ist einer der ersten, der CISOs und ihren Teams praktische und operative Einblicke in die Implementierung eines Zero-Trust-Modells bietet.<\/p>\n<p>Ein Begleitdokument zu diesem Bericht ist\u00a0<a href=\"https:\/\/www.cyberark.com\/resources\/white-papers\/the-ciso-view-2021-survey-zero-trust-and-privileged-access\">The CISO View 2021 Survey: Zero Trust and Privileged Access<\/a>. Nachdem wir die Meinung unserer Gruppe erfahren hatten, wollten wir wissen, ob die gr\u00f6\u00dfere Sicherheits-Community diese Ansichten teilt. Aus diesem Grund haben wir 100\u00a0Sicherheitsmanager gro\u00dfer Unternehmen (\u00fcber 1\u00a0Mrd. $ Jahresumsatz) zu ihren Perspektiven befragt. Die Umfrageteilnehmer und die Gruppe sind sich einig \u00fcber den Wert von Zero Trust und die wachsende Dringlichkeit, privilegierten Zugang zu sichern.[\/vc_column_text][vc_btn title=&#8220;Bericht lesen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-btm text-md-center&#8220;][vc_column][vc_column_text]<\/p>\n<h2 class=\"vc_custom_heading\">Mehr aus der serie<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw cyb-reverse&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-left&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Schutz des privilegierten Zugriffs in Robotic Process Automation<\/h4>\n<h6 class=\"vc_custom_heading\">RPA-Workflows sichern<\/h6>\n<p>Robotic Process Automation (robotergesteuerte Prozessautomatisierung, RPA) verspricht eine schnelle Umsetzung gesteigerter Effizienz, Produktivit\u00e4t und Qualit\u00e4t. Aus dem Blickwinkel der Cybersicherheit birgt RPA aber auch eine neue und attraktive Angriffsfl\u00e4che, vor allem in Bezug auf privilegierten Zugriff.<\/p>\n<p>Dieser CISO View untersucht Probleme, wie: Welche Verfahren k\u00f6nnten Angreifer einsetzen, um privilegierten Zugriff in RPA-Systemen auszunutzen? Was sind die gr\u00f6\u00dften Risiken? Welche Kontrollen sind am n\u00fctzlichsten und am einfachsten umsetzbar? Welche Erfolgsfaktoren sind bei der Arbeit mit gesch\u00e4ftlichen Stakeholdern am wichtigsten?[\/vc_column_text][vc_btn title=&#8220;Bericht lesen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-robotic-process-automation|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above&#8220;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_n1cxswixdq videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above&#8220;][vc_column_text]<\/p>\n<div class=\"video-window\">    <script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script>\r\n            <div class=\"wistia_embed wistia_async_rl2yohwgz5 videoFoam=true\" style=\"width:580px;height:397px;\">&nbsp;<\/div>\r\n        <\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Privilegierten zugriff sch\u00fctzen<\/h4>\n<h6 class=\"vc_custom_heading\">Sicherung von DevOps- und Cloud-Umgebungen<\/h6>\n<p>Der Lohn einer schnellen Softwarebereitstellung und eines automatisierten IT-Betriebs ist eindeutig\u00a0\u2013 schnellere Markteinf\u00fchrungszeiten und geringere Kosten. Welche Risiken gibt es aber? Wie sichern Sie DevOps- und Cloud-Umgebungen erfolgreich?<\/p>\n<p>Der CISO View-Forschungsbericht basiert auf der Erfahrung von CISOs aus Global-1000-Firmen sowie Sicherheits- und Technikexperten, die DevOps-Umgebungen angepasst und gesichert haben.[\/vc_column_text][vc_btn title=&#8220;Bericht lesen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fwhite-papers%2Fder-ciso-view-protecting-privileged-access-in-devops-and-cloud-environments|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw cyb-reverse&#8220;][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-left&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Schnelle risikominderung:<\/h4>\n<h6 class=\"vc_custom_heading\">Schutz privilegierter Anmeldeinformationen in 30 Tagen<\/h6>\n<p>Wie verhindern Sie eine Datenschutzverletzung? Schlussendlich m\u00fcssen Sie wissen, welche Techniken die Angreifer verwenden und welche Sicherheitskontrollen sie aufhalten k\u00f6nnen. Dieser CISO View-Forschungsbericht bietet einen Einblick in die Erkenntnisse, die aus verschiedenen umfassenden Datenverletzungen gewonnen wurden, sowie Empfehlungen und ein 30-Tage-Sprint-Framework f\u00fcr eine schnelle Implementierung wichtiger Kontrollen.[\/vc_column_text][vc_btn title=&#8220;Bericht lesen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fwhite-papers%2Freport-ciso-view-2017-30-tage-countdown-f%25C3%25BCr-ein-verbessertes-security-konzept-privilegierte-anmeldedaten|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131862\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" alt=\"Rapid Risk Reduction\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 seesaw&#8220;][vc_column width=&#8220;5\/12&#8243; el_class=&#8220;above&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131870\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg\" alt=\"The Balancing Act\" width=\"770\" height=\"515\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1.jpg 770w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-300x201.jpg 300w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-768x514.jpg 768w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-02-1-150x100.jpg 150w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/>[\/vc_column_text][\/vc_column][vc_column width=&#8220;7\/12&#8243; el_class=&#8220;below-right&#8220;][vc_column_text el_class=&#8220;dark&#8220;]<\/p>\n<h4>Der balanceakt:<\/h4>\n<h6 class=\"vc_custom_heading\">CISO View zur Verbesserung der Kontrollen des privilegierten Zugriffs<\/h6>\n<p>Dieser Bericht enth\u00e4lt eine praktische Hilfestellung f\u00fcr CISOs zur Verbesserung der Privileged-Access-Kontrollen auf Basis der eigenen Kenntnisse f\u00fchrender Unternehmen. Dazu geh\u00f6ren Empfehlungen, wie man ein Gleichgewicht zwischen dem Gew\u00e4hren und Verhindern umfassenden Zugriffs auf Informationsressourcen herstellt.[\/vc_column_text][vc_btn title=&#8220;Bericht lesen&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-balancing-act-the-ciso-view-on-improving-privileged-access-controls|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 plp-overview-more-col&#8220;][vc_column width=&#8220;5\/6&#8243; el_class=&#8220;text-md-center heading&#8220; offset=&#8220;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3 class=\"vc_custom_heading cyb-ltr-spc-6\">\u00dcber den CISO view-forschungsansatz und das gremium<\/h3>\n<p class=\"vc_custom_heading\">Heute sind Unternehmen mit immer ausgekl\u00fcgelteren und schwierigeren Cyber-Gefahren konfrontiert. Wir bei CyberArk glauben, dass ein Austausch von Einblicken und Empfehlungen in der CISO-Gemeinde zu besseren Sicherheitsstrategien und besser gesch\u00fctzten Unternehmen f\u00fchrt.<\/p>\n<p class=\"vc_custom_heading\">CyberArk hat das unabh\u00e4ngige Forschungsunternehmen Robinson Insight damit beauftragt, die CISO View-Berichtserie zu erstellen, in der untersucht wird, wie die Privileged-Access-Kontrollen verbessert werden k\u00f6nnen. Die Initiative bringt CISOs aus f\u00fchrenden Unternehmen weltweit zusammen, die ihre Einblicke zu kritischen Problemen austauschen, mit denen Sicherheitsexperten konfrontiert sind. Das Ziel dabei ist es, wertvolle Leitlinien und Dialoge zwischen Kollegen aufzubauen. Zu den Mitwirkenden an aktuellen und fr\u00fcheren Berichten und den Mitgliedern des CISO View-Forschungsgremiums z\u00e4hlen folgende Personen.<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131879\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg\" alt=\"Alissa Adbullah\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/alissa-adbullah-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Alissa (Dr. Jay) Abdullah<\/h4>\n<p>SVP and Deputy Chief Security Officer, Mastercard[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131887\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg\" alt=\"Brad Arkin\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/brad-arkin-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Brad Arkin<\/h4>\n<p>SVP, Chief Security &amp; Trust Officer, Cisco[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131895\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg\" alt=\"Tim Bengson\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/tim-bengson-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Tim Bengson<\/h4>\n<p class=\"vc_custom_heading\">VP, Global Chief Information Security Officer, Kellogg Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131903\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg\" alt=\"Dawn Cappelli\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dawn-cappelli-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dawn Cappelli<\/h4>\n<p class=\"vc_custom_heading\">VP, Global Security and Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131911\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg\" alt=\"Melissa Carvalho\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/melissa-carvalho-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Melissa Carvalho<\/h4>\n<p>VP, Enterprise and Customer Identity and Access Management,<br \/>\nRoyal Bank of Canada (RBC)[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131919\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg\" alt=\"Dave Estlick\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/dave-estlick-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Dave Estlick<\/h4>\n<p>Chief Information Security Officer, Chipotle[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131927\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg\" alt=\"Peter Fizelle\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/peter-fizelle-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Peter Fizelle<\/h4>\n<p>Chief Information Security Officer, Asian Development Bank[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131935\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg\" alt=\"Mike Gordon\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/mike-gordon-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Gordon<\/h4>\n<p class=\"vc_custom_heading\">VP and Chief Information Security Officer, Lockheed Martin Corporation (LMC)<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131943\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg\" alt=\"Omar Khawaja\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/omar-khawaja-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Omar Khawaja<\/h4>\n<p>VP and Chief Information Security Officer, Highmark Health[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131951\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg\" alt=\"Olivier Perrault\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/olivier-perrault-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Olivier Perrault<\/h4>\n<p>Cyber Security Officer, Orange Business Services[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131959\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg\" alt=\"Emma Smith\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/emma-smith-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Emma Smith<\/h4>\n<p>Global Security Director, Vodafone[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text]<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-131967\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg\" alt=\"Daniel Tse\" width=\"164\" height=\"164\" srcset=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse.jpg 164w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-150x150.jpg 150w, https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/daniel-tse-100x100.jpg 100w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/>[\/vc_column_text][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Daniel Tse<\/h4>\n<p>Head, Cyber Security, Information and Technology Risk, GIC Private Limited[\/vc_column_text][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cybv2 plp-overview-more-col&#8220;][vc_column width=&#8220;5\/6&#8243; el_class=&#8220;text-md-center heading&#8220; offset=&#8220;vc_col-md-offset-1 vc_col-sm-offset-1&#8243;][vc_column_text]<\/p>\n<h3>Zu den mitwirkenden an fr\u00fcheren berichten geh\u00f6ren folgende personen<\/h3>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Rob Bening<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer Emeritus, ING Bank<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">David Bruyea<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &amp; Chief Information Security Officer, CIBC<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Connelly<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Lockheed Martin<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Khadir Fayaz<\/h4>\n<p class=\"vc_custom_heading\">Vice President, Global Security Strategy, Engineering &amp; Architecture, Pearson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Gelinne<\/h4>\n<p class=\"vc_custom_heading\">Managing Director, Advisory Cyber Risk Services, Deloitte &amp; Touche<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Fred Gibbins<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President &amp; Chief Information Security Officer, American Express Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Charles Gillman<\/h4>\n<p class=\"vc_custom_heading\">Chief Security Officer, NTT Communications \u2013 Cloud Infrastructure Services<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Steve Glynn<\/h4>\n<p class=\"vc_custom_heading\">Global Head of Information Security, ANZ<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mark Grant<\/h4>\n<p class=\"vc_custom_heading\">PhD, CIPP Chief Information Security Officer, CSX Corporation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Gary Harbison<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, Monsanto Company<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Jim Motes<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, Rockwell Automation<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Kathy Orner<\/h4>\n<p class=\"vc_custom_heading\">Chief Risk Officer, CWT<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Mike Wilson<\/h4>\n<p class=\"vc_custom_heading\">Vice President &amp; Chief Information Security Officer, McKesson<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">JD Rogers<\/h4>\n<p class=\"vc_custom_heading\">Chief Information Security Officer, American Financial Group<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">John Schramm<\/h4>\n<p class=\"vc_custom_heading\">CISA, CISSP, VP Global Information Risk Management &amp; CIRO, Manulife<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Chun Meng Tee<\/h4>\n<p class=\"vc_custom_heading\">Vice President and Head of Information Security, Singapore Exchange<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Thomas Tschersich<\/h4>\n<p class=\"vc_custom_heading\">Senior Vice President, Internal Security &amp; Cyber Defense, T-Systems International<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/6&#8243; el_class=&#8220;cta-box&#8220;][vc_column_text el_class=&#8220;link-arrow-right&#8220;]<\/p>\n<h4 class=\"vc_custom_heading medium\">Munawar Valiji<\/h4>\n<p class=\"vc_custom_heading\">Head of Information Security, News UK<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row el_class=&#8220;cybv2 cybv2-pad-btm text-center&#8220;][vc_column][vc_column_text]*Positionen zum Zeitpunkt der Mitwirkung.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2_talk_to_an_expert&#8220; css=&#8220;.vc_custom_1608677118624{background-color: #061b2b !important;}&#8220;][vc_column][vc_column_text el_class=&#8220;extra-space&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Los geht\u2019s<\/h2>\n<p>[\/vc_column_text][vc_column_text el_class=&#8220;new_hpstyle_section9_text&#8220;]<\/p>\n<p style=\"text-align: center;\">Nutzen Sie das Know-how der innovativsten CISOs der Branche, um noch heute ein effektives Cyber-Sicherheitsprogramm zu entwickeln.<\/p>\n<p>[\/vc_column_text][vc_btn title=&#8220;JETZT HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; align=&#8220;center&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fresources%2Fwhite-papers%2Fthe-ciso-view-protecting-privileged-access-in-a-zero-trust-model%2F|&#8220; el_class=&#8220;cybv2-button-solid cyb-button-hpstyle_section5&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg dark&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text] CISO View Unabh\u00e4ngige Ratschl\u00e4ge von branchenf\u00fchrenden CISOs. [\/vc_column_text][vc_btn title=&#8220;JETZT HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fwhite-papers%2Fciso-view-privilegierten-zugriff-in-einem-zero-trust-modell-sch%25C3%25BCtzen-zusammenfassung|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top text-md-center&#8220;][vc_column][vc_column_text] \u00dcber die CISO View forschungsserie [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-32196","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CISO-Berichte: Privileged Access Management f\u00fcr CISOs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/de\/cisoview\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO View\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg dark&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text] CISO View Unabh\u00e4ngige Ratschl\u00e4ge von branchenf\u00fchrenden CISOs. [\/vc_column_text][vc_btn title=&#8220;JETZT HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fwhite-papers%2Fciso-view-privilegierten-zugriff-in-einem-zero-trust-modell-sch%25C3%25BCtzen-zusammenfassung|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top text-md-center&#8220;][vc_column][vc_column_text] \u00dcber die CISO View forschungsserie [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/de\/cisoview\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-19T09:52:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/de\/cisoview\/\",\"url\":\"https:\/\/www.cyberark.com\/de\/cisoview\/\",\"name\":\"CISO-Berichte: Privileged Access Management f\u00fcr CISOs\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/cisoview\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/cisoview\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"datePublished\":\"2017-07-09T22:54:18+00:00\",\"dateModified\":\"2024-03-19T09:52:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/cisoview\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/de\/cisoview\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/cisoview\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/de\/cisoview\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO View\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#website\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO-Berichte: Privileged Access Management f\u00fcr CISOs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/de\/cisoview\/","og_locale":"de_DE","og_type":"article","og_title":"CISO View","og_description":"[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 int-hero-noimg dark&#8220;][vc_column width=&#8220;3\/4&#8243; el_class=&#8220;column-1&#8243;][vc_column_text] CISO View Unabh\u00e4ngige Ratschl\u00e4ge von branchenf\u00fchrenden CISOs. [\/vc_column_text][vc_btn title=&#8220;JETZT HERUNTERLADEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Fwww.cyberark.com%2Fde%2Fresources%2Fwhite-papers%2Fciso-view-privilegierten-zugriff-in-einem-zero-trust-modell-sch%25C3%25BCtzen-zusammenfassung|&#8220; el_class=&#8220;cybv2-button-solid&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2 cybv2-pad-top text-md-center&#8220;][vc_column][vc_column_text] \u00dcber die CISO View forschungsserie [\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;cybv2...","og_url":"https:\/\/www.cyberark.com\/de\/cisoview\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2024-03-19T09:52:01+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"11 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/de\/cisoview\/","url":"https:\/\/www.cyberark.com\/de\/cisoview\/","name":"CISO-Berichte: Privileged Access Management f\u00fcr CISOs","isPartOf":{"@id":"https:\/\/www.cyberark.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/de\/cisoview\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/cisoview\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","datePublished":"2017-07-09T22:54:18+00:00","dateModified":"2024-03-19T09:52:01+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/de\/cisoview\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/de\/cisoview\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/cisoview\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/06\/ciso-03-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/de\/cisoview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/de\/"},{"@type":"ListItem","position":2,"name":"CISO View"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/de\/#website","url":"https:\/\/www.cyberark.com\/de\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/de\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=32196"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32196\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=32196"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=32196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}