{"id":483,"date":"2025-02-14T13:02:31","date_gmt":"2025-02-14T14:02:31","guid":{"rendered":"https:\/\/hwl-consulting.ch\/blog\/?p=483"},"modified":"2025-11-11T17:50:46","modified_gmt":"2025-11-11T18:50:46","slug":"security-beginnt-mit-der-organisation","status":"publish","type":"post","link":"https:\/\/hwl-consulting.ch\/blog\/security-beginnt-mit-der-organisation\/","title":{"rendered":"Security beginnt mit der Organisation"},"content":{"rendered":"\n<p>Eine spannende Blog-Serie von Werner Lerch, urspr\u00fcnglich verfasst f\u00fcr den Cyber Security Blog von terreActive AG<\/p>\n\n\n\n<p><a href=\"https:\/\/hwl-consulting.ch\/blog\/security-beginnt-mit-der-organisation-grundlagen-der-prozessmodelle-%e2%88%92-teil-1\/\" data-type=\"post\" data-id=\"472\">Grundlagen der Prozessmodelle<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/hwl-consulting.ch\/blog\/security-beginnt-mit-der-organisation-cmdb-und-risikobewertung-%e2%88%92-teil-2\/\" data-type=\"post\" data-id=\"474\">CMDB und Risikobewertung<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/hwl-consulting.ch\/blog\/security-beginnt-mit-der-organisation-change-prozess-richtig-einsetzen-%e2%88%92-teil-3\/\" data-type=\"post\" data-id=\"477\">Change-Prozess richtig einsetzen<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/hwl-consulting.ch\/blog\/security-beginnt-mit-der-organisation-auf-incidents-richtig-reagieren-%e2%88%92-teil-4\/\" data-type=\"post\" data-id=\"479\">Auf Incidents richtig reagieren<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/hwl-consulting.ch\/blog\/security-beginnt-bei-der-organisation-prozesse-sollen-den-menschen-dienen-%e2%88%92-teil-5\/\" data-type=\"post\" data-id=\"481\">Prozesse sollen den Menschen dienen<\/a><\/p>\n\n\n\n\n\n<p><strong>Werner Lerch<\/strong><\/p>\n\n\n\n<p>Senior IT Project Manager, Service Manager und Datensch\u00fctzer<\/p>\n\n\n\n<p>Swiss Post Cyber Security AG, Kasinostrasse 30, 5000 Aarau<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eine spannende Blog-Serie von Werner Lerch, urspr\u00fcnglich verfasst f\u00fcr den Cyber Security Blog von terreActive AG Grundlagen der Prozessmodelle CMDB und Risikobewertung Change-Prozess richtig einsetzen Auf Incidents richtig reagieren Prozesse sollen den Menschen dienen Werner Lerch Senior IT Project Manager, Service Manager und Datensch\u00fctzer Swiss Post Cyber Security AG, Kasinostrasse 30, 5000 Aarau<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,62,7,60,85,61,8,6],"tags":[],"class_list":["post-483","post","type-post","status-publish","format-standard","hentry","category-gedanken","category-itil","category-leadership","category-management","category-persoenlich","category-strategie","category-technologie","category-unternehmensfuehrung"],"_links":{"self":[{"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/posts\/483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/comments?post=483"}],"version-history":[{"count":3,"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/posts\/483\/revisions"}],"predecessor-version":[{"id":514,"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/posts\/483\/revisions\/514"}],"wp:attachment":[{"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/media?parent=483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/categories?post=483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hwl-consulting.ch\/blog\/wp-json\/wp\/v2\/tags?post=483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}