{"id":9957,"date":"2015-04-09T22:12:00","date_gmt":"2015-04-10T04:12:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/managing-security-as-a-business-risk\/"},"modified":"2025-01-10T10:28:52","modified_gmt":"2025-01-10T17:28:52","slug":"sicherheit-als-geschaftsrisiko-managen","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/","title":{"rendered":"Warum die Behandlung von Informationssicherheit als Gesch\u00e4ftsrisiko von entscheidender Bedeutung ist, Teil 1: Finanzielle Auswirkungen"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Verstreute US-Dollar-Scheine veranschaulichen finanzielle Risiken, Auswirkungen von Betrug und Kosten\u00fcberlegungen bei Cybersicherheitsoperationen.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2015-04-09T22:12:00-06:00\">9. April 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Warum die Behandlung von Informationssicherheit als Gesch\u00e4ftsrisiko von entscheidender Bedeutung ist, Teil 1: Finanzielle Auswirkungen<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"Benutzeravatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Leseminute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-Mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%201%3A%20Financial%20impact').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fmanaging-security-as-a-business-risk%2F', '_blank')\" title=\"E-Mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Why%20managing%20information%20security%20as%20a%20business%20risk%20is%20critical%2C%20part%201%3A%20Financial%20impact&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Fmanaging-security-as-a-business-risk%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>&nbsp;<\/h2>\n<h3>Teil I: Direkte finanzielle Auswirkungen<\/h3>\n<p>Eine der gr\u00f6\u00dften Herausforderungen f\u00fcr IT-Fachkr\u00e4fte heutzutage ist die weit verbreitete Silo-Mentalit\u00e4t, die sie von wichtigen Gesch\u00e4ftsinitiativen wie dem Risikomanagement trennt. Dieses Silo-Problem tritt besonders h\u00e4ufig im Bereich der Informationssicherheit auf; eine aktuelle Studie des R\u00fcstungskonzerns Raytheon unter 1.006 F\u00fchrungskr\u00e4ften im Technologiebereich ergab beispielsweise, dass <a href=\"http:\/\/investor.raytheon.com\/mobile.view?c=84193&amp;v=203&amp;d=1&amp;id=2018124\" target=\"_blank\" rel=\"noopener\">66 Prozent<\/a> Ich glaube nicht, dass die F\u00fchrungskr\u00e4fte in ihrem Unternehmen die IT-Sicherheit als strategische Priorit\u00e4t ansehen.<\/p>\n<p>Das Problem hat jedoch zwei Seiten. Informationssicherheitsexperten z\u00f6gern mitunter aus verschiedenen Gr\u00fcnden, Informationen zu teilen und mit anderen Abteilungen zusammenzuarbeiten \u2013 von Zeitmangel bis hin zu Bef\u00fcrchtungen mangelnder Akzeptanz seitens der Mitarbeiter. In dieser dreiteiligen Serie untersuchen wir, warum es f\u00fcr IT-Sicherheitsexperten und andere Beteiligte so wichtig ist, ihre Denkweise zu \u00e4ndern und das Management von Sicherheitsoperationen als ein entscheidendes Gesch\u00e4ftsrisiko und nicht als rein technologisches Problem zu betrachten.<\/p>\n<p>Die verschiedenen Abteilungen einbeziehen \u2013 und die <a title=\"Warum die Abstimmung zwischen SOC und C-Suite in Sachen Cybersicherheit von entscheidender Bedeutung ist\" href=\"https:\/\/swimlane.com\/de\/abstimmung-zwischen-soc-und-c-suite-in-sachen-cybersicherheit\/\">C-Suite<\/a> Auch die Zusammenarbeit ist entscheidend f\u00fcr die Entwicklung einer umfassenden und effektiven Sicherheitsstrategie. Der Austausch von Informationen zwischen den Abteilungen erleichtert die Endbenutzerschulung, und der kontinuierliche Dialog zwischen dem SOC und wichtigen Stakeholdern erh\u00f6ht die Wahrscheinlichkeit, dass das Unternehmen finanzielle Mittel f\u00fcr die Einf\u00fchrung leistungsstarker Sicherheitsl\u00f6sungen bereitstellt. <a title=\"Sicherheit verbessern. Kosten senken. Swimlane automatisiert Sicherheitsvorg\u00e4nge.\" href=\"https:\/\/swimlane.com\/de\/solution\/\">automatisierte Sicherheitsl\u00f6sungen<\/a>.<\/p>\n<p>Doch die Realit\u00e4t f\u00fcr CISOs und andere Mitarbeiter im SOC ist, dass sie im Falle einer Sicherheitsverletzung letztendlich die Verantwortung tragen. Tats\u00e4chlich ist der Druck auf CISOs so gro\u00df, dass er sogar zu einem Trend unter diesen Fachkr\u00e4ften gef\u00fchrt hat. <a title=\"Was treibt den F\u00fchrungswechsel bei CISOs an?\" href=\"http:\/\/searchsecurity.techtarget.com\/answer\/Whats-driving-executive-turnover-for-CISOs\" target=\"_blank\" rel=\"noreferrer noopener\">Ausscheiden aus der Unternehmenswelt<\/a> F\u00fcr die Anbieterseite des Gesch\u00e4fts gilt: Nichts bringt einen Sicherheitsverantwortlichen schneller in Bedr\u00e4ngnis als ein Sicherheitsproblem, das dem Unternehmen direkt Kosten verursacht.<\/p>\n<p>Das deutlichste Beispiel daf\u00fcr, wie sich ein IT-Sicherheitsvorfall finanziell auf ein Unternehmen auswirkt, ist der Diebstahl. Bis vor Kurzem galten Banken und andere Finanzinstitute als am besten gegen Angriffe gewappnet, doch diese Illusion hat sich als falsch erwiesen. Einige der j\u00fcngsten Schlagzeilen konzentrierten sich auf Cyberkriminelle, die sensible Kundendaten erbeuteten, doch manchen IT-Sicherheitsexperten ist m\u00f6glicherweise nicht bewusst, dass Hacker Wege gefunden haben, \u2026 <a title=\"Bankhacker erbeuten Millionen durch Schadsoftware\" href=\"http:\/\/www.nytimes.com\/2015\/02\/15\/world\/bank-hackers-steal-millions-via-malware.html\" target=\"_blank\" rel=\"noreferrer noopener\">direkt Millionen stehlen<\/a> Die Angriffe erfolgten durch Banken, die Schadsoftware einsetzten. Sie richteten sich gegen \u00fcber 100 Banken in 30 L\u00e4ndern, und es ist nahezu sicher, dass viele CISOs und andere Sicherheitsexperten dieser Institute zumindest einen Reputationsschaden erleiden und im schlimmsten Fall ihre K\u00fcndigung riskieren werden.<\/p>\n<p>E-Commerce ist ein weiteres Beispiel. Mittlerweile ist fast jedem, der sich mit Informationssicherheit oder E-Commerce auskennt, klar, dass ein Einbruch, der zu Website-Ausf\u00e4llen f\u00fchrt, den Umsatz negativ beeinflusst. Die \u00dcberraschung, insbesondere f\u00fcr gro\u00dfe Unternehmen, k\u00f6nnte genau darin liegen, dass\u2026 <em>wie viel <\/em>Innerhalb k\u00fcrzester Zeit k\u00f6nnen hohe Summen verloren gehen. So wurde beispielsweise Mike Azevedo, CEO des Datenbankl\u00f6sungsanbieters Clustrix, mit der Aussage zitiert, dass Website-Ausf\u00e4lle E-Commerce-Unternehmen enorme Kosten verursachen k\u00f6nnen. <a title=\"431.030 Verbraucher erlebten w\u00e4hrend der Weihnachtssaison 2014 Leistungsprobleme mit E-Commerce-Websites.\" href=\"https:\/\/www.internetretailer.com\/2015\/03\/10\/43-consumers-had-e-commerce-website-performance-issues\" target=\"_blank\" rel=\"noreferrer noopener\">$500.000 pro Stunde<\/a>. Bei diesem Tempo k\u00f6nnte bereits ein einziger Datenversto\u00df die Quartalszahlen eines Unternehmens beeintr\u00e4chtigen und die Position des CISO ernsthaft gef\u00e4hrden.<\/p>\n<p>Leider sind direkte finanzielle Verluste nicht die einzige Art und Weise, wie Unternehmen und ihre CISOs durch Cyberangriffe gesch\u00e4digt werden k\u00f6nnen. Schauen Sie n\u00e4chste Woche wieder vorbei f\u00fcr weitere Informationen. <a title=\"10 Fakten, die jeder Cybersicherheitsexperte kennen sollte\" href=\"https:\/\/swimlane.com\/de\/10-fakten-die-jeder-cybersicherheitsexperte-kennen-sollte\/\">Teil 2<\/a> In dieser Reihe untersuchen wir, wie der Ruf von Unternehmen und IT-Sicherheitsexperten durch einen Datenversto\u00df gesch\u00e4digt werden kann.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">\u00c4hnliche Beitr\u00e4ge<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d7aa22b6184 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk-part-2\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>26. April 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Warum die Behandlung von Informationssicherheit als Gesch\u00e4ftsrisiko so wichtig ist, Teil 2: Reputationssch\u00e4den<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69d7aa22b74b6 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk-part-3\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12. Mai 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Warum die Behandlung von Informationssicherheit als Gesch\u00e4ftsrisiko so wichtig ist, Teil 3: Geistiges Eigentum<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69d7aa22b85b5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/cyber-security-drivers-security-information-overload\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10. M\u00e4rz 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cybersicherheitstreiber Teil 4: Informationsflut im Bereich Sicherheit<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnieren Sie noch heute, um auf dem Laufenden zu bleiben und regelm\u00e4\u00dfig Updates von Swimlane zu erhalten.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Moderner SecOps-Hintergrund: Eine geometrische Gradientengrafik, die einen fl\u00fcssigen Datenfluss und Cloud-native Agilit\u00e4t darstellt.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"de\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9958,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9957","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Managing information security as a critical business risk<\/title>\n<meta name=\"description\" content=\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/sicherheit-als-geschaftsrisiko-managen\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why managing information security as a business risk is critical, part 1: Financial impact\" \/>\n<meta property=\"og:description\" content=\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/sicherheit-als-geschaftsrisiko-managen\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:28:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/\",\"url\":\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/\",\"name\":\"Managing information security as a critical business risk\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\",\"datePublished\":\"2015-04-10T04:12:00+00:00\",\"dateModified\":\"2025-01-10T17:28:52+00:00\",\"description\":\"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png\",\"width\":1120,\"height\":696,\"caption\":\"U.S. dollar bills scattered illustrating financial risk, fraud impact and cost considerations in cybersecurity operations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why managing information security as a business risk is critical, part 1: Financial impact\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/de\/#website\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/de\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Management der Informationssicherheit als kritisches Gesch\u00e4ftsrisiko","description":"Eine der gr\u00f6\u00dften Herausforderungen f\u00fcr IT-Fachleute heutzutage ist eine Silo-Mentalit\u00e4t, die sie von wichtigen Gesch\u00e4ftsinitiativen des Unternehmens trennt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/sicherheit-als-geschaftsrisiko-managen\/","og_locale":"de_DE","og_type":"article","og_title":"Why managing information security as a business risk is critical, part 1: Financial impact","og_description":"One the main challenges facing IT professionals today is a siloed mentality that keeps them separate from critical organizational business initiatives.","og_url":"https:\/\/swimlane.com\/de\/blog\/sicherheit-als-geschaftsrisiko-managen\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:28:52+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/","url":"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/","name":"Management der Informationssicherheit als kritisches Gesch\u00e4ftsrisiko","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","datePublished":"2015-04-10T04:12:00+00:00","dateModified":"2025-01-10T17:28:52+00:00","description":"Eine der gr\u00f6\u00dften Herausforderungen f\u00fcr IT-Fachleute heutzutage ist eine Silo-Mentalit\u00e4t, die sie von wichtigen Gesch\u00e4ftsinitiativen des Unternehmens trennt.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-finance.png","width":1120,"height":696,"caption":"U.S. dollar bills scattered illustrating financial risk, fraud impact and cost considerations in cybersecurity operations"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/managing-security-as-a-business-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Why managing information security as a business risk is critical, part 1: Financial impact"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9957\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media\/9958"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=9957"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=9957"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=9957"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=9957"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=9957"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=9957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}