{"id":9977,"date":"2014-12-23T07:55:00","date_gmt":"2014-12-23T14:55:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/filling-gap-cyber-security\/"},"modified":"2025-01-10T10:20:31","modified_gmt":"2025-01-10T17:20:31","slug":"schliesung-der-lucke-in-der-cybersicherheit","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/","title":{"rendered":"Die L\u00fccke in der Cybersicherheit schlie\u00dfen"},"content":{"rendered":"<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner\"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end\"><\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column\"><div class=\"wp-block-post-date\"><time datetime=\"2014-12-23T07:55:00-07:00\">23. Dez. 2014<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Die L\u00fccke in der Cybersicherheit schlie\u00dfen<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/de\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"Benutzeravatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Leseminute\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents\"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\"bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default\"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"E-Mail\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Filling%20the%20gap%20in%20cybersecurity').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Ffilling-gap-cyber-security%2F', '_blank')\" title=\"E-Mail\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Filling%20the%20gap%20in%20cybersecurity&url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Ffilling-gap-cyber-security%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Ffilling-gap-cyber-security%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"LinkedIn\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fde%2Fblog%2Ffilling-gap-cyber-security%2F\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewbox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents\">\n<h2>\u00a0<\/h2>\n<p>Brian Kafenbaum und ich betreiben seit f\u00fcnf Jahren ein Beratungsunternehmen f\u00fcr Cybersicherheit und haben in dieser Zeit einen unglaublichen Wandel in diesem Bereich miterlebt. Die explosionsartige Zunahme und die wachsende Komplexit\u00e4t von Angriffen haben Unternehmen dazu veranlasst, j\u00e4hrlich Milliarden von Dollar f\u00fcr Cybersicherheitsma\u00dfnahmen auszugeben, um mit den Bedrohungen Schritt zu halten. Doch bei unserer Beratung verschiedener Unternehmen stellten wir fest, dass trotz dieser hohen Investitionen eine L\u00fccke im Bereich der Cybersicherheit bestand \u2013 und genau deshalb haben wir Swimlane gegr\u00fcndet.<\/p>\n<p>Organisationen haben im Bereich der Cybersicherheit einen Punkt erreicht, an dem die Bedrohung <em>Detektion<\/em> Sicherheitsl\u00fccken treten nicht mehr typischerweise dort auf, wo sie entstehen, da zahlreiche hochwertige Erkennungsl\u00f6sungen verf\u00fcgbar sind, die Probleme sehr zuverl\u00e4ssig identifizieren. Vielmehr kommt es h\u00e4ufig zu Sicherheitsl\u00fccken \u2013 und den damit verbundenen enormen Problemen \u2013, weil Unternehmen bisher keinen Zugriff auf L\u00f6sungen hatten, die die L\u00fccke direkt nach SIEM oder anderen Erkennungsl\u00f6sungen im Sicherheits\u00f6kosystem schlie\u00dfen k\u00f6nnten. Anders ausgedr\u00fcckt: Organisationen haben nach wie vor Schwierigkeiten, die notwendigen Sicherheitsma\u00dfnahmen umzusetzen.<\/p>\n<p>Um dieses Problem zu l\u00f6sen, m\u00fcssen wir zun\u00e4chst seine Ursachen verstehen. Die Vielzahl an Erkennungsl\u00f6sungen informiert Sicherheitsanalysten und IT-Fachleute \u00fcber m\u00f6gliche Angriffe. Vereinfacht gesagt: \u201cHier gibt es ein Problem. Bitte beheben Sie es.\u201d W\u00fcrden t\u00e4glich nur f\u00fcnf oder zehn potenzielle Bedrohungen an Ihr IT-Team herangetragen, w\u00e4re das kein Problem.<\/p>\n<p>Doch wie Sicherheitsanalysten und CISOs nur allzu gut wissen, gehen heutzutage t\u00e4glich Hunderte oder Tausende von Bedrohungswarnungen mit unterschiedlichem Komplexit\u00e4tsgrad ein. Um dieser Menge und Komplexit\u00e4t entgegenzuwirken, setzen Unternehmen eine Vielzahl verschiedener Sicherheitstools ein. Ein aktueller Bericht von IBM nennt beispielsweise ein Beispiel eines Kunden, der 85 verschiedene Sicherheitstools von 45 Anbietern nutzte.<\/p>\n<p>Angesichts der wachsenden Anzahl an Bedrohungen und der Vielzahl an Tools, die zu deren Erkennung ben\u00f6tigt werden, ist es f\u00fcr Sicherheitspersonal nahezu unm\u00f6glich geworden, jeden Vorfall manuell und gr\u00fcndlich zu bearbeiten. Und wenn Vorf\u00e4lle ungel\u00f6st bleiben, gelangen zwangsl\u00e4ufig einige Bedrohungen unentdeckt durchs Raster. Anders ausgedr\u00fcckt: Das aktuelle System ist schlichtweg nicht zukunftsf\u00e4hig. Was jetzt ben\u00f6tigt wird, um L\u00f6sungen zur Bedrohungserkennung zu erg\u00e4nzen, ist Folgendes: <a href=\"https:\/\/swimlane.com\/de\/incident-response-automation\/\"><strong>automatisierte Vorfallsreaktion<\/strong><\/a> Das:<\/p>\n<ul>\n<li>B\u00fcndelt alle Sicherheitswarnungen und -probleme anderer Sicherheitstools an einem zentralen Ort<\/li>\n<li>Liefert zus\u00e4tzliche Informationen zu Ereignissen, die mithilfe all Ihrer vorhandenen Tools und Datenquellen erkannt wurden.<\/li>\n<li>Korreliert die F\u00e4lle mit Bedrohungsdaten<\/li>\n<li>Schnell und <em>automatisch<\/em> l\u00f6st die weniger komplexen, sich wiederholenden, manuell intensiven Aufgaben \u2013 wie das Versenden von E-Mail-Benachrichtigungen an Kollegen, das Erstellen von Berichten, das \u00d6ffnen von Support-Tickets usw. \u2013, die den gr\u00f6\u00dften Teil der Zeit des Sicherheitspersonals in Anspruch nehmen.<\/li>\n<\/ul>\n<p>Dies sind nur einige der entscheidenden Funktionen, die die <a href=\"https:\/\/swimlane.com\/de\/schwimmbahnturbine\/\">Swimlane-Turbine<\/a> Eine KI-gest\u00fctzte Plattform zur Automatisierung der Sicherheitssicherheit bietet Unternehmen Unterst\u00fctzung. In diesem Blogbeitrag werden wir untersuchen, wie Funktionen wie diese funktionieren. <a href=\"https:\/\/swimlane.com\/de\/security-orchestration-platform\/\">Sicherheitsorchestrierung<\/a> Und <a href=\"https:\/\/swimlane.com\/de\/blog\/sicherheitsautomatisierung\/\">Sicherheitsautomatisierung<\/a> Wir werden au\u00dferdem Tipps und Tricks f\u00fcr Sicherheitsanalysten bereitstellen, Unternehmen Anregungen zur optimalen Nutzung ihrer Cybersicherheitsbudgets geben, Branchentrends und relevante Neuigkeiten beleuchten und Einblicke gew\u00e4hren, wie Organisationen schwierige Herausforderungen meistern k\u00f6nnen, beispielsweise den Erhalt von institutionellem Wissen nach dem Ausscheiden eines Sicherheitsmitarbeiters. Ich freue mich sehr darauf, in den kommenden Monaten mit Ihnen allen \u00fcber diese und weitere Themen zu diskutieren.<\/p>\n<p>Bitte besuchen Sie unsere Website, um mehr \u00fcber uns zu erfahren, und <a href=\"https:\/\/swimlane.com\/de\/kontakt\/\">Nehmen Sie Kontakt mit uns auf<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default\">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner\">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">\u00c4hnliche Beitr\u00e4ge<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e0873f3a543 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/swimlane-partner-cybersecurity-malaysia-skills-gap\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>31. M\u00e4rz 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane kooperiert mit CyberSecurity Malaysia, um die globale Qualifikationsl\u00fccke im Bereich Cybersicherheit zu schlie\u00dfen.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post-69e0873f3bc05 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/cyber-security-talent-gap-extends-to-state-governments\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>25. Juli 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Ein neuer Bericht zeigt, dass der gravierende Fachkr\u00e4ftemangel im Bereich Cybersicherheit auch die Regierungen der Bundesstaaten betrifft.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default\">\t\t\t\t\t<div class=\"bs-post bs-post__container bs-post__container--no-image bs-post-69e0873f3cde6 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/de\/blog\/cyber-security-drivers-part-one-the-internet-of-things\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>28. Januar 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Treiber der Cybersicherheit Teil 1: Das Internet der Dinge<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Mehr lesen<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns\"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<\/div>\n\n\n\n<div class=\"bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default\">\n<p class=\"has-white-color has-text-color\">Abonnieren Sie noch heute, um auf dem Laufenden zu bleiben und regelm\u00e4\u00dfig Updates von Swimlane zu erhalten.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Moderner SecOps-Hintergrund: Eine geometrische Gradientengrafik, die einen fl\u00fcssigen Datenfluss und Cloud-native Agilit\u00e4t darstellt.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"de\"\/><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":0,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9977","sw_resource","type-sw_resource","status-publish","hentry","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Filling the Cybersecurity Workforce Gap | Swimlane<\/title>\n<meta name=\"description\" content=\"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/de\/blog\/schliesung-der-lucke-in-der-cybersicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Filling the gap in cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/de\/blog\/schliesung-der-lucke-in-der-cybersicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T17:20:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Sitewide-OG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/\",\"url\":\"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/\",\"name\":\"Filling the Cybersecurity Workforce Gap | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/de\/#website\"},\"datePublished\":\"2014-12-23T14:55:00+00:00\",\"dateModified\":\"2025-01-10T17:20:31+00:00\",\"description\":\"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Filling the gap in cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/de\/#website\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/de\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Schlie\u00dfung der L\u00fccke im Bereich Cybersicherheitsfachkr\u00e4fte | Swimlane","description":"Die explosionsartige Zunahme und wachsende Komplexit\u00e4t von Angriffen veranlasst Unternehmen, j\u00e4hrlich Milliarden von Dollar f\u00fcr Cybersicherheitsma\u00dfnahmen auszugeben, um mit den Bedrohungen Schritt zu halten. Doch in unseren Beratungen mit verschiedenen Unternehmen stellten wir fest, dass trotz dieser hohen Ausgaben weiterhin eine L\u00fccke im Bereich der Cybersicherheit besteht \u2013 aus diesem Grund haben wir Swimlane gegr\u00fcndet.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/de\/blog\/schliesung-der-lucke-in-der-cybersicherheit\/","og_locale":"de_DE","og_type":"article","og_title":"Filling the gap in cybersecurity","og_description":"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.","og_url":"https:\/\/swimlane.com\/de\/blog\/schliesung-der-lucke-in-der-cybersicherheit\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T17:20:31+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Sitewide-OG.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"The exploding number and growing complexity of attacks has led organizations to spend billions of dollars annually on cybersecurity measures in an effort to keep pace with threat levels. But as we consulted with various companies, we discovered that despite the money being spent, an empty space in the cybersecurity landscape remained\u2014which is why we founded Swimlane.","twitter_site":"@swimlane","twitter_misc":{"Est. reading time":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/","url":"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/","name":"Schlie\u00dfung der L\u00fccke im Bereich Cybersicherheitsfachkr\u00e4fte | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/de\/#website"},"datePublished":"2014-12-23T14:55:00+00:00","dateModified":"2025-01-10T17:20:31+00:00","description":"Die explosionsartige Zunahme und wachsende Komplexit\u00e4t von Angriffen veranlasst Unternehmen, j\u00e4hrlich Milliarden von Dollar f\u00fcr Cybersicherheitsma\u00dfnahmen auszugeben, um mit den Bedrohungen Schritt zu halten. Doch in unseren Beratungen mit verschiedenen Unternehmen stellten wir fest, dass trotz dieser hohen Ausgaben weiterhin eine L\u00fccke im Bereich der Cybersicherheit besteht \u2013 aus diesem Grund haben wir Swimlane gegr\u00fcndet.","breadcrumb":{"@id":"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/de\/blog\/filling-gap-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Filling the gap in cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/de\/#website","url":"https:\/\/swimlane.com\/de\/","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","description":"Agentische KI-Automatisierung f\u00fcr jede Sicherheitsfunktion","publisher":{"@id":"https:\/\/swimlane.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/de\/#organization","name":"Low-Code Sicherheitsautomatisierung &amp; SOAR-Plattform | Swimlane","url":"https:\/\/swimlane.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/sw_resource\/9977\/revisions"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/media?parent=9977"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/tags?post=9977"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-type?post=9977"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-topic?post=9977"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/resource-industry?post=9977"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/de\/wp-json\/wp\/v2\/blog-category?post=9977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}