{"id":2680,"date":"2020-02-28T14:47:31","date_gmt":"2020-02-28T13:47:31","guid":{"rendered":"https:\/\/actrans.de\/services\/cybersicherheit\/"},"modified":"2025-11-17T14:03:44","modified_gmt":"2025-11-17T13:03:44","slug":"cyber-it-security","status":"publish","type":"page","link":"https:\/\/actrans.de\/en\/services\/cyber-it-security\/","title":{"rendered":"Cyber and IT security"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-be1e6058774879af251721ffe8b33e70\">\n.avia-section.av-av_section-be1e6058774879af251721ffe8b33e70{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/actrans.de\/wp-content\/uploads\/actrans-element-s.png);\nbackground-position:0% 0%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='desktop'  class='avia-section av-av_section-be1e6058774879af251721ffe8b33e70 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  av-small-hide av-mini-hide avia-bg-style-scroll av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_px='300'><div class='container av-section-cont-open' style='height:300px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-2680'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_three_fourth-068220c8262444be99a83ad265bdcedb\">\n.flex_column.av-av_three_fourth-068220c8262444be99a83ad265bdcedb{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-av_three_fourth-068220c8262444be99a83ad265bdcedb av_three_fourth  avia-builder-el-1  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-b057ea63ef4e313da3ebf76f36437c5b\">\n#top .hr.hr-invisible.av-av_hr-b057ea63ef4e313da3ebf76f36437c5b{\nheight:90px;\n}\n<\/style>\n<div  class='hr av-av_hr-b057ea63ef4e313da3ebf76f36437c5b hr-invisible  avia-builder-el-2  el_before_av_textblock  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-mi35k72u-13e02fdea79a6975bca1c6c2bf2950b0 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><strong>Cyber and IT security<\/strong><\/h1>\n<\/div><\/section><\/p><\/div><\/div><\/div><\/main><!-- close content main element --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-3730c0f65d6b253ad459050d27daea29\">\n.avia-section.av-av_section-3730c0f65d6b253ad459050d27daea29{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/actrans.de\/wp-content\/uploads\/actrans-element-s.png);\nbackground-position:100% 0%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='mobile'  class='avia-section av-av_section-3730c0f65d6b253ad459050d27daea29 main_color avia-section-default avia-no-border-styling  avia-builder-el-4  el_after_av_section  el_before_av_section  av-desktop-hide av-medium-hide avia-bg-style-scroll av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_px='300'><div class='container av-section-cont-open' style='height:300px'><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-2680'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_three_fourth-068220c8262444be99a83ad265bdcedb\">\n.flex_column.av-av_three_fourth-068220c8262444be99a83ad265bdcedb{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-av_three_fourth-068220c8262444be99a83ad265bdcedb av_three_fourth  avia-builder-el-5  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-b057ea63ef4e313da3ebf76f36437c5b\">\n#top .hr.hr-invisible.av-av_hr-b057ea63ef4e313da3ebf76f36437c5b{\nheight:90px;\n}\n<\/style>\n<div  class='hr av-av_hr-b057ea63ef4e313da3ebf76f36437c5b hr-invisible  avia-builder-el-6  el_before_av_textblock  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-mi35kcrc-f618cdf458f4b3bf8b40539c71603196 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1><strong>Cyber and IT security<\/strong><\/h1>\n<\/div><\/section><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='av_section_3'  class='avia-section av-12chtdo-d5151b175c504dfa36b0cc2f880ad77b main_color avia-section-default avia-no-border-styling  avia-builder-el-8  el_after_av_section  avia-builder-el-last  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-2680'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-116lbto-169b1b4cc95932a2821e21e3e41f36dd\">\n.flex_column.av-116lbto-169b1b4cc95932a2821e21e3e41f36dd{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-116lbto-169b1b4cc95932a2821e21e3e41f36dd av_three_fourth  avia-builder-el-9  el_before_av_one_half  avia-builder-el-first  first flex_column_div av-zero-column-padding  '     ><section  class='av_textblock_section av-y6enho-3783de9f2cc6c33a532ad0075719da8c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>Cyber\u00adsecurity aspects to be con\u00adsidered during design phase<\/h2>\n<p>Everybody is talking about cybersecurity. The number of hacker attacks is increasing and the sometimes-severe impacts on affected companies and institutions become visible. However, serious incidents are usually an unfortunate concatenation of weak spots: human error, negligence, design flaws.<\/p>\n<p>Whilst cyber\u00adsecurity mainly deals with technical solutions that safeguard data con\u00adfidentia\u00adlity and that guarantee integrity as well as availa\u00adbility in case of attack, our consul\u00adting focus is on the cyber resilience of civil and military plat\u00adforms.<\/p>\n<p>Most notably, we support our clients from the aero\u00adspace and defence industry about neces\u00adsary adjust\u00adments of organi\u00adsation and processes to allow for the intro\u00adduction of inherent design features to prevent and with\u00adstand attacks.<\/p>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-w1faz0-68e88a72f44817fc04a720f7d68f8526\">\n.flex_column.av-w1faz0-68e88a72f44817fc04a720f7d68f8526{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-w1faz0-68e88a72f44817fc04a720f7d68f8526 av_one_half  avia-builder-el-11  el_after_av_three_fourth  el_before_av_one_half  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-shcblo-f5bd546b28067262e17c7ec5633280eb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Our Services<\/h3>\n<ul>\n<li>Cybersecurity analysis of existing products<\/li>\n<li>Support for the intro\u00adduc\u00adtion of open system architec\u00adture approaches<\/li>\n<li>Necessary adjust\u00adments of organisation and processes to improve cyber resilience<\/li>\n<li>Support for the intro\u00adduction of certifica\u00adtions, e.g. ISO33000 (SPICE)<\/li>\n<li>Project-related IT security con\u00adcepts, accredi\u00adtation by DEUmilSAA, accreditation with BSI specification<\/li>\n<li>Support with develop\u00adment of safety targets e.g. functional safety according to EN61508<\/li>\n<li>Develop\u00adment of applicable norms and standards<\/li>\n<li>Provision of training courses and coaching<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_half-df2d4515a3cd12d84d8be2bd46fc5f37\">\n.flex_column.av-av_one_half-df2d4515a3cd12d84d8be2bd46fc5f37{\nborder-radius:0px 0px 0px 0px;\npadding:0px 40px 0px 40px;\nbackground-color:#005c69;\n}\n<\/style>\n<div  class='flex_column av-av_one_half-df2d4515a3cd12d84d8be2bd46fc5f37 av_one_half  avia-builder-el-13  el_after_av_one_half  avia-builder-el-last  flex_column_div  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-541a50d8512ee1db65e0a741449ba0b9\">\n#top .hr.hr-invisible.av-av_hr-541a50d8512ee1db65e0a741449ba0b9{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-av_hr-541a50d8512ee1db65e0a741449ba0b9 hr-invisible  avia-builder-el-14  el_before_av_textblock  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-502837cb091656a307d893691aad739f\">\n#top .av_textblock_section.av-av_textblock-502837cb091656a307d893691aad739f .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-502837cb091656a307d893691aad739f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p style=\"text-align: center;\">Your Contact Person<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-541a50d8512ee1db65e0a741449ba0b9\">\n#top .hr.hr-invisible.av-av_hr-541a50d8512ee1db65e0a741449ba0b9{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-av_hr-541a50d8512ee1db65e0a741449ba0b9 hr-invisible  avia-builder-el-16  el_after_av_textblock  el_before_av_image '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_image-0ba01b32c7e3352dbaecec6c0e246b4f\">\n.avia-image-container.av-av_image-0ba01b32c7e3352dbaecec6c0e246b4f img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-av_image-0ba01b32c7e3352dbaecec6c0e246b4f .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-av_image-0ba01b32c7e3352dbaecec6c0e246b4f av-styling-circle avia-align-center  avia-builder-el-17  el_after_av_hr  el_before_av_textblock '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-2651 avia-img-lazy-loading-not-2651 avia_image ' src=\"https:\/\/actrans.de\/wp-content\/uploads\/dr-marco-soijer_portraet_fotograf-matthias-tunger-300x300.jpg\" alt='Dr. Marco Soijer, Senior Consultant Actrans GmbH' title='dr-marco-soijer_portraet_fotograf-matthias-tunger'  height=\"300\" width=\"300\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/actrans.de\/wp-content\/uploads\/dr-marco-soijer_portraet_fotograf-matthias-tunger-300x300.jpg 300w, https:\/\/actrans.de\/wp-content\/uploads\/dr-marco-soijer_portraet_fotograf-matthias-tunger-80x80.jpg 80w, https:\/\/actrans.de\/wp-content\/uploads\/dr-marco-soijer_portraet_fotograf-matthias-tunger-36x36.jpg 36w, https:\/\/actrans.de\/wp-content\/uploads\/dr-marco-soijer_portraet_fotograf-matthias-tunger-180x180.jpg 180w, https:\/\/actrans.de\/wp-content\/uploads\/dr-marco-soijer_portraet_fotograf-matthias-tunger.jpg 700w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_textblock-502837cb091656a307d893691aad739f\">\n#top .av_textblock_section.av-av_textblock-502837cb091656a307d893691aad739f .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-av_textblock-502837cb091656a307d893691aad739f '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h4 style=\"text-align: center;\">Dr. Marco Soijer<\/h4>\n<p style=\"text-align: center;\">Senior Consultant<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-541a50d8512ee1db65e0a741449ba0b9\">\n#top .hr.hr-invisible.av-av_hr-541a50d8512ee1db65e0a741449ba0b9{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-av_hr-541a50d8512ee1db65e0a741449ba0b9 hr-invisible  avia-builder-el-19  el_after_av_textblock  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  class='avia-button-wrap av-av_button-39d8f7d302742d1b81006ce65079b873-wrap avia-button-center  avia-builder-el-20  el_after_av_hr  el_before_av_hr '><a href='mailto:marco.soijer@actrans.de'  class='avia-button av-av_button-39d8f7d302742d1b81006ce65079b873 av-link-btn avia-icon_select-no avia-size-medium avia-position-center avia-color-light'  target=\"_blank\"  rel=\"noopener noreferrer\"  aria-label=\"Email to Dr. Soijer\"><span class='avia_iconbox_title' >Email to Dr. Soijer<\/span><\/a><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mi35mmi5-c0a58841e2ca2bd69aaaa568bd5673a0\">\n#top .hr.hr-invisible.av-mi35mmi5-c0a58841e2ca2bd69aaaa568bd5673a0{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-mi35mmi5-c0a58841e2ca2bd69aaaa568bd5673a0 hr-invisible  avia-builder-el-21  el_after_av_button  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><\/p>\n<div class=\"shariff shariff-align-left shariff-widget-align-left\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button twitter shariff-nocustomcolor\" style=\"background-color:#595959\"><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Factrans.de%2Fen%2Fservices%2Fcyber-it-security%2F&text=Cyber%20and%20IT%20security\" title=\"Share on X\" aria-label=\"Share on X\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#000; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\"><path fill=\"#000\" d=\"M14.258 10.152L23.176 0h-2.113l-7.747 8.813L7.133 0H0l9.352 13.328L0 23.973h2.113l8.176-9.309 6.531 9.309h7.133zm-2.895 3.293l-.949-1.328L2.875 1.56h3.246l6.086 8.523.945 1.328 7.91 11.078h-3.246zm0 0\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button facebook shariff-nocustomcolor\" style=\"background-color:#4273c8\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Factrans.de%2Fen%2Fservices%2Fcyber-it-security%2F\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" role=\"button\" rel=\"nofollow\" class=\"shariff-link\" style=\"; background-color:#3b5998; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 18 32\"><path fill=\"#3b5998\" d=\"M17.1 0.2v4.7h-2.8q-1.5 0-2.1 0.6t-0.5 1.9v3.4h5.2l-0.7 5.3h-4.5v13.6h-5.5v-13.6h-4.5v-5.3h4.5v-3.9q0-3.3 1.9-5.2t5-1.8q2.6 0 4.1 0.2z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Factrans.de%2Fen%2Fservices%2Fcyber-it-security%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button xing shariff-nocustomcolor\" style=\"background-color:#29888a\"><a href=\"https:\/\/www.xing.com\/spi\/shares\/new?url=https%3A%2F%2Factrans.de%2Fen%2Fservices%2Fcyber-it-security%2F\" title=\"Share on XING\" aria-label=\"Share on XING\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#126567; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 25 32\"><path fill=\"#126567\" d=\"M10.7 11.9q-0.2 0.3-4.6 8.2-0.5 0.8-1.2 0.8h-4.3q-0.4 0-0.5-0.3t0-0.6l4.5-8q0 0 0 0l-2.9-5q-0.2-0.4 0-0.7 0.2-0.3 0.5-0.3h4.3q0.7 0 1.2 0.8zM25.1 0.4q0.2 0.3 0 0.7l-9.4 16.7 6 11q0.2 0.4 0 0.6-0.2 0.3-0.6 0.3h-4.3q-0.7 0-1.2-0.8l-6-11.1q0.3-0.6 9.5-16.8 0.4-0.8 1.2-0.8h4.3q0.4 0 0.5 0.3z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Factrans.de%2Fen%2Fservices%2Fcyber-it-security%2F&subject=Cyber%20and%20IT%20security\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button whatsapp shariff-nocustomcolor\" style=\"background-color:#5cbe4a\"><a href=\"https:\/\/api.whatsapp.com\/send?text=https%3A%2F%2Factrans.de%2Fen%2Fservices%2Fcyber-it-security%2F%20Cyber%20and%20IT%20security\" title=\"Share on Whatsapp\" aria-label=\"Share on Whatsapp\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#34af23; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#34af23\" d=\"M17.6 17.4q0.2 0 1.7 0.8t1.6 0.9q0 0.1 0 0.3 0 0.6-0.3 1.4-0.3 0.7-1.3 1.2t-1.8 0.5q-1 0-3.4-1.1-1.7-0.8-3-2.1t-2.6-3.3q-1.3-1.9-1.3-3.5v-0.1q0.1-1.6 1.3-2.8 0.4-0.4 0.9-0.4 0.1 0 0.3 0t0.3 0q0.3 0 0.5 0.1t0.3 0.5q0.1 0.4 0.6 1.6t0.4 1.3q0 0.4-0.6 1t-0.6 0.8q0 0.1 0.1 0.3 0.6 1.3 1.8 2.4 1 0.9 2.7 1.8 0.2 0.1 0.4 0.1 0.3 0 1-0.9t0.9-0.9zM14 26.9q2.3 0 4.3-0.9t3.6-2.4 2.4-3.6 0.9-4.3-0.9-4.3-2.4-3.6-3.6-2.4-4.3-0.9-4.3 0.9-3.6 2.4-2.4 3.6-0.9 4.3q0 3.6 2.1 6.6l-1.4 4.2 4.3-1.4q2.8 1.9 6.2 1.9zM14 2.2q2.7 0 5.2 1.1t4.3 2.9 2.9 4.3 1.1 5.2-1.1 5.2-2.9 4.3-4.3 2.9-5.2 1.1q-3.5 0-6.5-1.7l-7.4 2.4 2.4-7.2q-1.9-3.2-1.9-6.9 0-2.7 1.1-5.2t2.9-4.3 4.3-2.9 5.2-1.1z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":1851,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2680","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ACTRANS Consulting: Cyber and IT security<\/title>\n<meta name=\"description\" content=\"Cyber resilience of civil \/ military platforms and adaptation of processes. ACTRANS is a consultancy for companies in the aerospace and defence sectors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/actrans.de\/en\/services\/cyber-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ACTRANS Consulting: Cyber and IT security\" \/>\n<meta property=\"og:description\" content=\"Cyber resilience of civil \/ military platforms and adaptation of processes. ACTRANS is a consultancy for companies in the aerospace and defence sectors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/actrans.de\/en\/services\/cyber-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ACTRANS Consulting f\u00fcr Aerospace und Defence\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T13:03:44+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/services\\\/cyber-it-security\\\/\",\"url\":\"https:\\\/\\\/actrans.de\\\/en\\\/services\\\/cyber-it-security\\\/\",\"name\":\"ACTRANS Consulting: Cyber and IT security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/#website\"},\"datePublished\":\"2020-02-28T13:47:31+00:00\",\"dateModified\":\"2025-11-17T13:03:44+00:00\",\"description\":\"Cyber resilience of civil \\\/ military platforms and adaptation of processes. ACTRANS is a consultancy for companies in the aerospace and defence sectors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/services\\\/cyber-it-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/actrans.de\\\/en\\\/services\\\/cyber-it-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/actrans.de\\\/en\\\/services\\\/cyber-it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/actrans.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/actrans.de\\\/en\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber and IT security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/actrans.de\\\/#website\",\"url\":\"https:\\\/\\\/actrans.de\\\/\",\"name\":\"ACTRANS Consulting f\u00fcr Aerospace und Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/actrans.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/actrans.de\\\/#organization\",\"name\":\"Actrans GmbH\",\"url\":\"https:\\\/\\\/actrans.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/actrans.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/actrans.de\\\/wp-content\\\/uploads\\\/actrans_logo-square.jpg\",\"contentUrl\":\"https:\\\/\\\/actrans.de\\\/wp-content\\\/uploads\\\/actrans_logo-square.jpg\",\"width\":512,\"height\":512,\"caption\":\"Actrans GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/actrans.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ACTRANS Consulting: Cyber and IT security","description":"Cyber resilience of civil \/ military platforms and adaptation of processes. ACTRANS is a consultancy for companies in the aerospace and defence sectors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/actrans.de\/en\/services\/cyber-it-security\/","og_locale":"en_US","og_type":"article","og_title":"ACTRANS Consulting: Cyber and IT security","og_description":"Cyber resilience of civil \/ military platforms and adaptation of processes. ACTRANS is a consultancy for companies in the aerospace and defence sectors.","og_url":"https:\/\/actrans.de\/en\/services\/cyber-it-security\/","og_site_name":"ACTRANS Consulting f\u00fcr Aerospace und Defence","article_modified_time":"2025-11-17T13:03:44+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/actrans.de\/en\/services\/cyber-it-security\/","url":"https:\/\/actrans.de\/en\/services\/cyber-it-security\/","name":"ACTRANS Consulting: Cyber and IT security","isPartOf":{"@id":"https:\/\/actrans.de\/#website"},"datePublished":"2020-02-28T13:47:31+00:00","dateModified":"2025-11-17T13:03:44+00:00","description":"Cyber resilience of civil \/ military platforms and adaptation of processes. ACTRANS is a consultancy for companies in the aerospace and defence sectors.","breadcrumb":{"@id":"https:\/\/actrans.de\/en\/services\/cyber-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/actrans.de\/en\/services\/cyber-it-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/actrans.de\/en\/services\/cyber-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/actrans.de\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/actrans.de\/en\/services\/"},{"@type":"ListItem","position":3,"name":"Cyber and IT security"}]},{"@type":"WebSite","@id":"https:\/\/actrans.de\/#website","url":"https:\/\/actrans.de\/","name":"ACTRANS Consulting f\u00fcr Aerospace und Defence","description":"","publisher":{"@id":"https:\/\/actrans.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/actrans.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/actrans.de\/#organization","name":"Actrans GmbH","url":"https:\/\/actrans.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/actrans.de\/#\/schema\/logo\/image\/","url":"https:\/\/actrans.de\/wp-content\/uploads\/actrans_logo-square.jpg","contentUrl":"https:\/\/actrans.de\/wp-content\/uploads\/actrans_logo-square.jpg","width":512,"height":512,"caption":"Actrans GmbH"},"image":{"@id":"https:\/\/actrans.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/pages\/2680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/comments?post=2680"}],"version-history":[{"count":3,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/pages\/2680\/revisions"}],"predecessor-version":[{"id":6041,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/pages\/2680\/revisions\/6041"}],"up":[{"embeddable":true,"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/pages\/1851"}],"wp:attachment":[{"href":"https:\/\/actrans.de\/en\/wp-json\/wp\/v2\/media?parent=2680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}