{"id":9908,"date":"2015-09-21T23:21:00","date_gmt":"2015-09-22T05:21:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/"},"modified":"2025-04-21T14:56:43","modified_gmt":"2025-04-21T20:56:43","slug":"mit-einer-automatisierten-strategie-zur-reaktion-auf-sicherheitsvorfalle-lassen-sich-hurden-fur-hacker-schaffen","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/","title":{"rendered":"Schaffen Sie H\u00fcrden f\u00fcr Hacker mit einer automatisierten Strategie zur Reaktion auf Sicherheitsvorf\u00e4lle."},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Auf einer Laufbahn sind H\u00fcrden aufgestellt, im Hintergrund sind Athleten zu sehen.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-09-21T23:21:00-06:00\">21. September 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Schaffen Sie H\u00fcrden f\u00fcr Hacker mit einer automatisierten Strategie zur Reaktion auf Sicherheitsvorf\u00e4lle.<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"Benutzeravatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Leseminute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-Mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Create%20hurdles%20for%20hackers%20with%20an%20automated%20incident%20response%20strategy').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcreate-hurdles-for-hackers-with-an-automated-incident-response-strategy%2F', '_blank')\" title=\"E-Mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Create%20hurdles%20for%20hackers%20with%20an%20automated%20incident%20response%20strategy&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcreate-hurdles-for-hackers-with-an-automated-incident-response-strategy%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcreate-hurdles-for-hackers-with-an-automated-incident-response-strategy%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fcreate-hurdles-for-hackers-with-an-automated-incident-response-strategy%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p>Krankenh\u00e4user beherbergen verst\u00e4ndlicherweise \u00e4u\u00dferst sensible Daten und modernste Technologien zur Verbesserung der Patientenversorgung. Viele Krankenh\u00e4user modernisieren beispielsweise ihre bestehende Infrastruktur, um ein integriertes System f\u00fcr elektronische Patientenakten (EHR) einzuf\u00fchren und so schneller auf Patientendaten zugreifen zu k\u00f6nnen, die im Ernstfall Leben retten k\u00f6nnen. Da Gesundheitseinrichtungen zunehmend auf digitale, internetbasierte Ans\u00e4tze in der Patientenversorgung setzen, ist es entscheidend, dass sie die richtigen Tools, Technologien und Best Practices implementieren, um ihre Netzwerke ausreichend zu sch\u00fctzen, die dadurch anf\u00e4lliger f\u00fcr Cyberangriffe werden k\u00f6nnen.<\/p>\n<p>Man denke nur an die verheerenden Folgen eines Cyberangriffs, wie er vor fast einem Jahr das Bostoner Kinderkrankenhaus (BCH) erlitt. Das Krankenhaus war einer Reihe von DDoS-Angriffen (Distributed Denial of Service) ausgesetzt \u2013 Angriffe, die dem Opfer den Zugriff auf sein System verweigern und schwer nachzuverfolgen sind, da sie von vielen verschiedenen Quellen ausgehen.<\/p>\n<p>F\u00fcr das BCH wurde ein Cyberangriff zur be\u00e4ngstigenden Realit\u00e4t. Die Angreifer ver\u00f6ffentlichten zun\u00e4chst die IP-Adresse und die Webserver-Informationen des BCH. Obwohl Dr. Daniel Nigrin, Senior Vice President und CIO des BCH, die geleakten Informationen als nicht besonders sensibel einstufte, erregte die Nachricht die Aufmerksamkeit des Krankenhauses. Dies veranlasste die Angreifer, eine gr\u00f6\u00dfere Anzahl von DDoS-Angriffen zu starten. Das BCH nahm entsprechende Netzwerk\u00e4nderungen vor, um die Hacker abzuwehren; die Organisation sah sich jedoch nur noch ausgefeilteren Angriffen ausgesetzt, die sich an die neuen Strategien angepasst hatten.<\/p>\n<p>Obwohl die IT-Mitarbeiter von BCH mit ihrem allgemeinen Krisenreaktionsteam zusammenarbeiteten, blieb die Organisation laut Berichten weiterhin angreifbar; Patientendaten, Betriebsdaten und diverse andere Daten waren weiterhin gef\u00e4hrdet und angreifbar. Daher beauftragte BCH einen externen Anbieter von Sicherheitsl\u00f6sungen, um sich gegen die Angriffe zu verteidigen.<\/p>\n<p>Dies ist zwar nur ein Beispiel f\u00fcr m\u00f6gliche Cybersicherheitsrisiken, doch insgesamt hat die Mehrheit der Gesundheitsorganisationen bereits unter einem Angriff gelitten. Laut der Wirtschaftspr\u00fcfungs-, Steuer- und Beratungsgesellschaft KPMG gaben sogar 81 Prozent der F\u00fchrungskr\u00e4fte im Gesundheitswesen an, dass ihre Organisationen in den letzten zwei Jahren von einem Angriff betroffen waren.<\/p>\n<p>Laut KPMG haben 13 Prozent dieser F\u00fchrungskr\u00e4fte mehr als 350 Cyberangriffsversuche in einem einzigen Monat erfasst, was deutlich zeigt, dass Unternehmen Bedrohungen nicht effektiv verstehen, verfolgen, melden oder managen.<\/p>\n<p>Was BCH bei der Reaktion auf diese Angriffe h\u00e4tte helfen k\u00f6nnen, w\u00e4re eine robuste Strategie zur Reaktion auf Sicherheitsvorf\u00e4lle gewesen, die die richtigen Mitarbeiter, Prozesse und Technologien umfasst. Cybersicherheit bedeutet nicht nur, Mechanismen zur Erkennung und Abwehr von Cyberangriffen zu implementieren, sondern auch einen Plan f\u00fcr den Fall, dass etwas schiefgeht. Unternehmen sollten bei der Strategieentwicklung die Auswirkungen dieser Sicherheitsl\u00fccken auf ihre Kunden, internen Systeme und ihr \u00f6ffentliches Image ber\u00fccksichtigen. Je nach Ausma\u00df und Gef\u00e4hrdungspotenzial gibt es in jedem dieser Bereiche unterschiedliche Interessengruppen.<\/p>\n<p>Die Reaktion auf Sicherheitsvorf\u00e4lle findet nicht isoliert statt; viele Bereiche Ihres Unternehmens werden betroffen sein. Ber\u00fccksichtigen Sie firmeneigene Daten, Kundendaten, Mitarbeiterdaten und andere sensible Informationen sowie die Verf\u00fcgbarkeit umsatzgenerierender Systeme. Unternehmen m\u00fcssen sicherstellen, dass ihre<a href=\"https:\/\/swimlane.com\/de\/blog\/reaktion-auf-zwischenfalle\/\"> Notfallplan<\/a> Dazu geh\u00f6rt die Benachrichtigung des Managements, wann die \u00d6ffentlichkeitsarbeit eingeschaltet werden muss, die rechtlichen Folgen eines Sicherheitsvorfalls und die gesetzlichen Offenlegungspflichten. Unternehmen m\u00fcssen auch die Auswirkungen auf die Mitarbeiter ber\u00fccksichtigen und festlegen, wie diese mit der Presse kommunizieren sollten, falls sie kontaktiert werden. Obwohl wir die Reaktion auf Sicherheitsvorf\u00e4lle im Kontext der technischen Cybersicherheit diskutieren, umfasst sie als Unternehmensprogramm weit mehr als nur die IT; sie betrifft die Gesch\u00e4ftsleitung, PR\/Marketing, Rechtsabteilung, Personalabteilung und Kundenservice.<\/p>\n<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">\u00c4hnliche Beitr\u00e4ge<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e349d600f18 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/automated-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>22. August 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automatisierte Reaktion auf Sicherheitsvorf\u00e4lle: Alles, was Sie wissen m\u00fcssen<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e349d60232c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/automated-incident-response-respond-every-alert\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>3. M\u00e4rz 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automatisierte Vorfallsreaktion: Auf jede Warnung reagieren<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e349d60332e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/best-practices-to-fortify-your-cyber-security-strategy\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>17. Februar 2016<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Bew\u00e4hrte Verfahren zur St\u00e4rkung Ihrer Cybersicherheitsstrategie<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnieren Sie noch heute, um auf dem Laufenden zu bleiben und regelm\u00e4\u00dfig Updates von Swimlane zu erhalten.<\/p>\n\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"de\"\/><\/form>\n<script>\n    var embeddedFormId = '3e31543a73a1e2975cbd8f55197794a48f4c0f8f';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Moderner SecOps-Hintergrund: Eine geometrische Gradientengrafik, die einen fl\u00fcssigen Datenfluss und Cloud-native Agilit\u00e4t darstellt.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div><\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9909,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9908","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Create hurdles for hackers with an automated incident response\u2026<\/title>\n<meta name=\"description\" content=\"As healthcare embraces a more digital approach to patient care, it\u2019s critical to implement the appropriate tools, technologies &amp; best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/mit-einer-automatisierten-strategie-zur-reaktion-auf-sicherheitsvorfalle-lassen-sich-hurden-fur-hacker-schaffen\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Create hurdles for hackers with an automated incident response strategy\" \/>\n<meta property=\"og:description\" content=\"As healthcare embraces a more digital approach to patient care, it\u2019s critical to implement the appropriate tools, technologies &amp; best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/mit-einer-automatisierten-strategie-zur-reaktion-auf-sicherheitsvorfalle-lassen-sich-hurden-fur-hacker-schaffen\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-21T20:56:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/\",\"url\":\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/\",\"name\":\"Create hurdles for hackers with an automated incident response\u2026\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png\",\"datePublished\":\"2015-09-22T05:21:00+00:00\",\"dateModified\":\"2025-04-21T20:56:43+00:00\",\"description\":\"As healthcare embraces a more digital approach to patient care, it\u2019s critical to implement the appropriate tools, technologies & best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png\",\"width\":1120,\"height\":696,\"caption\":\"Track hurdles lined up on a running track with athletes in the background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Create hurdles for hackers with an automated incident response strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/de\/#website\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/de\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Erschweren Sie Hackern das Leben durch eine automatisierte Reaktion auf Sicherheitsvorf\u00e4lle\u2026","description":"Da im Gesundheitswesen ein st\u00e4rker digitaler Ansatz in der Patientenversorgung verfolgt wird, ist es entscheidend, die geeigneten Werkzeuge, Technologien und bew\u00e4hrten Verfahren einzusetzen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/mit-einer-automatisierten-strategie-zur-reaktion-auf-sicherheitsvorfalle-lassen-sich-hurden-fur-hacker-schaffen\/","og_locale":"de_DE","og_type":"article","og_title":"Create hurdles for hackers with an automated incident response strategy","og_description":"As healthcare embraces a more digital approach to patient care, it\u2019s critical to implement the appropriate tools, technologies & best practices.","og_url":"https:\/\/swimlane.com\/de\/blog\/mit-einer-automatisierten-strategie-zur-reaktion-auf-sicherheitsvorfalle-lassen-sich-hurden-fur-hacker-schaffen\/","og_site_name":"AI Security Automation","article_modified_time":"2025-04-21T20:56:43+00:00","og_image":[{"width":1120,"height":696,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/","url":"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/","name":"Erschweren Sie Hackern das Leben durch eine automatisierte Reaktion auf Sicherheitsvorf\u00e4lle\u2026","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png","datePublished":"2015-09-22T05:21:00+00:00","dateModified":"2025-04-21T20:56:43+00:00","description":"Da im Gesundheitswesen ein st\u00e4rker digitaler Ansatz in der Patientenversorgung verfolgt wird, ist es entscheidend, die geeigneten Werkzeuge, Technologien und bew\u00e4hrten Verfahren einzusetzen.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-hurdles.png","width":1120,"height":696,"caption":"Track hurdles lined up on a running track with athletes in the background"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/create-hurdles-for-hackers-with-an-automated-incident-response-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Create hurdles for hackers with an automated incident response strategy"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9908\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/9909"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=9908"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=9908"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=9908"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=9908"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=9908"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=9908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}