{"id":36,"date":"2024-01-08T11:08:04","date_gmt":"2024-01-08T10:08:04","guid":{"rendered":"https:\/\/laokoon-security.com\/?page_id=36"},"modified":"2024-11-28T11:06:54","modified_gmt":"2024-11-28T10:06:54","slug":"cyber-security-assessment-csa","status":"publish","type":"page","link":"https:\/\/laokoon-security.com\/en\/service\/cyber-security-assessment-csa\/","title":{"rendered":"Cyber Security Assessment"},"content":{"rendered":"<div class=\"wp-block-columns are-vertically-aligned-center alignwide hero-section-v1 has-lk-gradient has-background is-layout-flex wp-container-core-columns-is-layout-4ab3942d wp-block-columns-is-layout-flex\" style=\"background:linear-gradient(149deg,rgb(21,54,73) 29%,rgb(109,128,140) 100%);padding-top:170px;padding-right:0px;padding-bottom:60px;padding-left:0px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns are-vertically-aligned-center hero-divs-holder is-layout-flex wp-container-core-columns-is-layout-35b47e0a wp-block-columns-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:45%\">\n<p class=\"fade-up has-primary-color has-text-color has-link-color wp-elements-ff5dc116dd93506a4a038baea3ed94bc\"><strong>Cyber Security Assessment (CSA)<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading fade-up has-contrast-color has-text-color has-link-color wp-elements-f25ac2f8f1b166fd34f29324cecada01\" style=\"font-style:normal;font-weight:600\">The key to a secure IT infrastructure<\/h1>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:40px\">\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Configure CSA<\/a><\/div>\n\n\n\n<div class=\"wp-block-button fade-up\"><a class=\"wp-block-button__link has-contrast-color has-text-color has-background has-link-color has-border-color has-primary-border-color wp-element-button\" href=\"https:\/\/laokoon-security.com\/en\/contact\/\" style=\"border-width:2px;background-color:#ffffff00\">Get advice<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<figure class=\"wp-block-image alignright size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/laokoon-cyber-security-assessment.svg\" alt=\"\" class=\"wp-image-468\" style=\"width:429px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-e5780d3d wp-block-group-is-layout-flex\" style=\"margin-top:100px;margin-bottom:150px;padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group contentbox-main-container wp-container-content-663c14dd is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-a687b86e wp-block-group-is-layout-flex\" style=\"padding-right:60px\">\n<div class=\"wp-block-group is-horizontal is-layout-flex wp-block-group-is-layout-flex\" style=\"margin-top:50px;margin-bottom:50px\">\n<h2 class=\"wp-block-heading\">Cyber Security Assessment<\/h2>\n\n\n\n<p><em>Our core business and our passion:<\/em>\u00a0We check\u00a0<strong>demand-orientated\u00a0<\/strong>your systems and applications, document the current status and show you where you can improve.<\/p>\n\n\n\n<p>During a cyber security assessment, the IT security situation of your company or organisation is systematically reviewed. The aim is to identify vulnerabilities, risks and potential threats in order to improve the security of the IT infrastructure. A cyber security assessment serves as the basis for planning and implementing effective security measures.<\/p>\n\n\n\n<p>An audit of your vulnerable systems does not have to be expensive. We believe that every company should be able to afford security. That's why we offer a range of packages, from a comprehensive package to customised services.<\/p>\n\n\n\n<p>In a cyber security assessment, we use clearly defined routines to check your\u00a0<strong>technical safety measures<\/strong>whereby the\u00a0<strong>Focus<\/strong>\u00a0clearly on the\u00a0<strong>technical aspects<\/strong>\u00a0lies.<\/p>\n\n\n\n<p>As a rule, you as the client provide us with pre-defined access points to the systems to be tested. Cyber Security Assessments can be carried out as Basic CSA or Extended CSA, depending on the order.<\/p>\n\n\n\n<p>The aim is to provide you with a good overview of the health status of your IT infrastructure and thus support you in securing it. You receive a clear overview of systems affected by vulnerabilities and benefit from a high degree of automation at the same time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advantages of a cyber security assessment<\/h2>\n\n\n\n<p>A cyber security assessment is recommended in many respects:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protection against cyber attacks<\/strong>Early identification of vulnerabilities minimises the risk of attacks.<\/li>\n\n\n\n<li><strong>Better risk management<\/strong>Companies receive a clear overview of their security risks and can react to them in a targeted manner. <\/li>\n\n\n\n<li><strong>Increasing safety awareness<\/strong>Employees are sensitised and can actively contribute to safety.<\/li>\n\n\n\n<li><strong>Customised solutions<\/strong>Our recommended measures are tailored specifically to the requirements of your company.<\/li>\n<\/ul>\n\n\n\n<p>A professionally conducted cyber security assessment provides companies with a solid basis for strengthening IT security effectively and sustainably. In addition, a cyber security assessment helps to fulfil legal requirements and compliance requirements such as the GDPR or ISO27001. This not only reduces legal risks, but also increases the trust of your customers and business partners. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Avoid risks before they arise<\/h2>\n\n\n\n<p>A cyber security assessment is an indispensable measure to protect your company in the digitalised business world. Cybercrime threats are not only increasing in frequency, but also in complexity. A successful cyber attack can cause serious damage within minutes - from financial loss and data theft to long-term reputational damage. With a cyber security assessment, you can proactively protect your company against these threats. It enables the early identification of vulnerabilities in your IT infrastructure so that they can be rectified before attackers exploit them.<\/p>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Invest in the security of your IT systems now<\/strong> and act preventively before damage occurs. The costs of preventive security measures are always lower than the financial and immaterial consequences of a successful cyber attack. A cyber security assessment is the first step towards minimising risks, increasing trust and laying the foundations for a secure digital future for your company. Let our Laokoon Security cyber security experts provide you with competent advice. <a href=\"https:\/\/laokoon-security.com\/en\/contact\/\" data-type=\"page\" data-id=\"62\">advise<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group sticky-cta-box has-contrast-background-color has-background wp-container-content-2f62e668 is-vertical is-nowrap is-layout-flex wp-container-core-group-is-layout-7e91b5de wp-block-group-is-layout-flex wp-container-1 is-position-sticky\" style=\"border-radius:10px;margin-top:30px;padding-top:35px;padding-right:35px;padding-bottom:35px;padding-left:35px\">\n<h6 class=\"wp-block-heading has-base-color has-text-color has-link-color wp-elements-2251ca9178336a229b7ca49f168a755d\">When does a cyber security assessment make sense for your company?<\/h6>\n\n\n\n<ul class=\"wp-block-list checklist has-base-color has-text-color has-link-color wp-elements-60982fafb75cd39605f7a862aaa53316\">\n<li>You want to obtain an up-to-date status between theory (e.g. the information in a CMDB) and practice.<\/li>\n\n\n\n<li>You would like to get an overview of current IT security issues.<\/li>\n\n\n\n<li>You are the new IT security officer of a company and would like to know where you should focus your efforts.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons service-container-cta is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:25px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"#cta\">Start now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div id=\"cta\" class=\"wp-block-group alignwide has-lk-gradient has-background is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-2a962c2a wp-block-group-is-layout-flex\" style=\"background:linear-gradient(111deg,rgb(21,54,73) 4%,rgb(94,121,138) 100%);padding-top:100px;padding-bottom:100px;padding-left:0px\">\n<div class=\"wp-block-group is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-8820e02c wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<div class=\"wp-block-group cta-footer-content wp-container-content-2f62e668 is-layout-flex wp-block-group-is-layout-flex\" style=\"padding-right:20px;padding-left:20px\">\n<h3 class=\"wp-block-heading has-text-align-left wp-container-content-958eb9dc\">Secure your IT now!<\/h3>\n\n\n\n<ul class=\"checklist has-contrast-color has-text-color has-link-color wp-block-list wp-elements-94d378b02289daa3b1444a4f5402d6a8 wp-container-content-958eb9dc\">\n<li class=\"fade-up\">Extensive experience in the field of offensive security<\/li>\n\n\n\n<li class=\"fade-up\">Broad experience in the team<\/li>\n\n\n\n<li class=\"fade-up\">Highly secure solutions that do not open new doors for attackers<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-group cta-footer-form has-contrast-background-color has-background wp-container-content-4fb2e66a is-layout-flex wp-container-core-group-is-layout-03c12fd1 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:50px;padding-right:50px;padding-bottom:50px;padding-left:50px\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-1323\" data-uid=\"69e5f14e24d58\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-1323\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-1323 forminator-design--default  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"1323\"\n\t\t\t\t data-color-option=\"default\" data-design=\"default\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69e5f14e24d58\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-0\"\n\t\t\t\tclass=\"forminator-pagination forminator-pagination-start\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-0-label\"\n\t\t\t\tdata-step=\"0\"\n\t\t\t\tdata-label=\"Finish\"\n\t\t\t\tdata-actual-label=\"Page 1\"\n\t\t\t\tdata-name=\"page-break-1\"\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"html-1\" class=\"forminator-field-html forminator-col forminator-col-12\"><div class=\"forminator-field forminator-merge-tags\" data-field=\"html-1\"><h4 class=\"has-base-color\">Order a cyber security assessment now!<\/h4><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"checkbox-1\" class=\"forminator-field-checkbox forminator-col forminator-col-12\"><div role=\"group\" class=\"forminator-field required\" aria-labelledby=\"forminator-checkbox-group-forminator-field-checkbox-1-69e5f14e24d58-label\"><span id=\"forminator-checkbox-group-forminator-field-checkbox-1-69e5f14e24d58-label\" class=\"forminator-label\">What type of penetration test should be carried out? <span class=\"forminator-required\">*<\/span><\/span><label id=\"forminator-field-checkbox-1-1-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-1-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Web application (full stack)\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Web\" id=\"forminator-field-checkbox-1-1-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-1-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Web application (full stack)<\/span><\/label><label id=\"forminator-field-checkbox-1-2-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-2-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"API\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"api\" id=\"forminator-field-checkbox-1-2-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-2-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">API<\/span><\/label><label id=\"forminator-field-checkbox-1-3-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-3-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Geraet\" id=\"forminator-field-checkbox-1-3-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-3-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT device<\/span><\/label><label id=\"forminator-field-checkbox-1-4-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-4-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"OT network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"OT-Netz\" id=\"forminator-field-checkbox-1-4-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-4-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">OT network<\/span><\/label><label id=\"forminator-field-checkbox-1-5-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-5-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Corporate network\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Unternehmensnetz\" id=\"forminator-field-checkbox-1-5-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-5-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Corporate network<\/span><\/label><label id=\"forminator-field-checkbox-1-6-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-6-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Kubernetes\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Kubernetes\" id=\"forminator-field-checkbox-1-6-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-6-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Kubernetes<\/span><\/label><label id=\"forminator-field-checkbox-1-7-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-7-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"IoT device\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IoT\" id=\"forminator-field-checkbox-1-7-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-7-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">IoT device<\/span><\/label><label id=\"forminator-field-checkbox-1-8-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-8-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"ActiveDirectory\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"AD\" id=\"forminator-field-checkbox-1-8-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-8-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">ActiveDirectory<\/span><\/label><label id=\"forminator-field-checkbox-1-9-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-9-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Cloud application and infrastructure\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"Cloud\" id=\"forminator-field-checkbox-1-9-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-9-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Cloud application and infrastructure<\/span><\/label><label id=\"forminator-field-checkbox-1-10-69e5f14e24d58-label\" for=\"forminator-field-checkbox-1-10-69e5f14e24d58\" class=\"forminator-checkbox forminator-checkbox-inline\" title=\"Infrastructure-as-Code\"><input type=\"checkbox\" name=\"checkbox-1[]\" value=\"IaC\" id=\"forminator-field-checkbox-1-10-69e5f14e24d58\" aria-labelledby=\"forminator-field-checkbox-1-10-69e5f14e24d58-label\" data-calculation=\"0\"   data-hidden-behavior=\"zero\"\/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><span class=\"forminator-checkbox-label\">Infrastructure-as-Code<\/span><\/label><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-1\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-1-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"1\"\n\t\t\t\tdata-label=\"Page  1\"\n\t\t\t\tdata-actual-label=\"Page 2\"\n\t\t\t\tdata-name=\"page-break-3\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-1\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-1_69e5f14e24d58\" id=\"forminator-form-1323__field--select-1_69e5f14e24d58-label\" class=\"forminator-label\">Has a penetration test already been carried out?<\/label><select  id=\"forminator-form-1323__field--select-1_69e5f14e24d58\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-1\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-1_69e5f14e24d58-label\"><option value=\"yes\"  data-calculation=\"0\">Yes<\/option><option value=\"no\"  data-calculation=\"0\">No<\/option><\/select><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-2\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-2-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"2\"\n\t\t\t\tdata-label=\"Page  2\"\n\t\t\t\tdata-actual-label=\"Page 3\"\n\t\t\t\tdata-name=\"page-break-2\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"select-2\" class=\"forminator-field-select forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-form-1323__field--select-2_69e5f14e24d58\" id=\"forminator-form-1323__field--select-2_69e5f14e24d58-label\" class=\"forminator-label\">Which approach should be used for the penetration test?<\/label><select  id=\"forminator-form-1323__field--select-2_69e5f14e24d58\" class=\"forminator-select--field forminator-select2 forminator-select2-multiple\" data-required=\"\" name=\"select-2\" data-default-value=\"\" data-hidden-behavior=\"zero\" data-placeholder=\"\" data-search=\"false\" data-search-placeholder=\"\" data-checkbox=\"false\" data-allow-clear=\"false\" aria-labelledby=\"forminator-form-1323__field--select-2_69e5f14e24d58-label\" aria-describedby=\"forminator-form-1323__field--select-2_69e5f14e24d58-description\"><option value=\"WhiteBox\"  data-calculation=\"0\">White box - a lot of information is available to the testers (e.g. access to log information, source code, different user types)<\/option><option value=\"GrayBox\"  data-calculation=\"0\">Gray Box - some but not all information is available to the testers<\/option><option value=\"BlackBox\"  data-calculation=\"0\">Black box - no information is available to the testers.<\/option><\/select><span id=\"forminator-form-1323__field--select-2_69e5f14e24d58-description\" class=\"forminator-description\">We recommend the white box approach, as it is the most efficient in terms of implementation.<\/span><\/div><\/div><\/div><\/div><\/div><div\n\t\t\t\ttabindex=\"-1\"\n\t\t\t\trole=\"tabpanel\"\n\t\t\t\tid=\"forminator-custom-form-1323--page-3\"\n\t\t\t\tclass=\"forminator-pagination\"\n\t\t\t\taria-labelledby=\"forminator-custom-form-1323--page-3-label\"\n\t\t\t\taria-hidden=\"true\"\n\t\t\t\tdata-step=\"3\"\n\t\t\t\tdata-label=\"Page  3\"\n\t\t\t\tdata-actual-label=\"Page 4\"\n\t\t\t\tdata-name=\"\"\n\t\t\t\thidden\n\t\t\t><div class=\"forminator-pagination--content\"><div class=\"forminator-row\"><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69e5f14e24d58\" id=\"forminator-field-name-1_69e5f14e24d58-label\" class=\"forminator-label\">Name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"z. e.g. Max Mustermann\" id=\"forminator-field-name-1_69e5f14e24d58\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69e5f14e24d58\" id=\"forminator-field-email-1_69e5f14e24d58-label\" class=\"forminator-label\">e-mail address<\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"z. E.G. max@mustermann.de\" id=\"forminator-field-email-1_69e5f14e24d58\" class=\"forminator-input forminator-email--field\" data-required=\"\" aria-required=\"false\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69e5f14e24d58\" id=\"forminator-field-phone-1_69e5f14e24d58-label\" class=\"forminator-label\">Telephone <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"z. B.: +49 123 4567 89\" id=\"forminator-field-phone-1_69e5f14e24d58\" class=\"forminator-input forminator-field--phone\" data-required=\"1\" aria-required=\"true\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69e5f14e24d58\" id=\"forminator-field-textarea-1_69e5f14e24d58-label\" class=\"forminator-label\">Do you have further information that we should know?<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69e5f14e24d58\" class=\"forminator-textarea\" rows=\"6\" style=\"min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69e5f14e24d58\" id=\"forminator-field-consent-1_69e5f14e24d58-label\" class=\"forminator-label\">Consent to data processing <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69e5f14e24d58__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69e5f14e24d58\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69e5f14e24d58-label\" aria-describedby=\"forminator-field-consent-1_69e5f14e24d58__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69e5f14e24d58__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>Yes, I agree that my data just collected may be used in accordance with <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">Data protection regulations<\/a> and <a href=\"https:\/\/laokoon-security.com\/en\/data-protection\/\">GTC<\/a> may be processed by Laokoon Security GmbH.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><button class=\"forminator-button forminator-pagination-submit\" style=\"display: none;\" disabled>Send message<\/button><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"30c3f5b366\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/36\" \/><input type=\"hidden\" name=\"form_id\" value=\"1323\"><input type=\"hidden\" name=\"page_id\" value=\"36\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/laokoon-security.com\/en\/service\/cyber-security-assessment-csa\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_9\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_9\" type=\"text\" name=\"input_9\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-4f7ca424 wp-block-group-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px;padding-right:15px;padding-left:15px\">\n<div class=\"wp-block-group has-primary-background-color has-background is-content-justification-space-between is-layout-flex wp-container-core-group-is-layout-b34fc131 wp-block-group-is-layout-flex\" style=\"border-radius:10px;padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\">\n<figure class=\"wp-block-image size-full lk-quote-icon\"><img decoding=\"async\" src=\"https:\/\/laokoon-security.com\/wp-content\/uploads\/2024\/01\/lk-quote.svg\" alt=\"\" class=\"wp-image-161\"\/><\/figure>\n\n\n\n<p class=\"lk-quote has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-0a9e79ae7f018d4195fe6357c43b118d wp-container-content-9e2f13cb\">The colleagues at Laokoon were on hand to answer any questions we had and provided uncomplicated support.<\/p>\n\n\n\n<p class=\"lk-quote-refer has-custom-wei-darkmode-ingnore-color has-text-color has-link-color wp-elements-5a652d193299fa90dc05bed09215521d wp-container-content-577e1c61\"><em>Team Leader Development<\/em><\/p>\n<\/div>\n<\/div>\n\n\n\n<style>\n.select2-selection {\n\tborder: none!important;\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown-container--open .forminator-custom-form-1323.forminator-dropdown--default {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-results__options  {\n\tbackground-color: var(--wp--preset--color--base)!important;\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.select2-selection__rendered {\n\tcolor: var(--wp--preset--color--contrast)!important;\n}\n\n.forminator-select-dropdown {\nborder: none!important;\n}\n\n.select2-selection .forminator-icon-chevron-down {\n\tcolor: var(--wp--preset--color--primary)!important;\n}\n\n.select2-results {\n\tborder: none!important;\n}\n\n.select2-results__option--selected {\n\tbackground-color: var(--wp--preset--color--primary)!important;\n}\n<\/style>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cyber Security Assessment (CSA) Der Schl\u00fcssel zu einer sicheren IT-Infrastruktur Cyber Security Assessment Unser Kerngesch\u00e4ft und unsere Leidenschaft:\u00a0Wir pr\u00fcfen\u00a0bedarfsorientiert\u00a0Ihre Systeme und Anwendungen, dokumentieren den Ist-Stand und zeigen Ihnen, wo Sie sich besser aufstellen k\u00f6nnen. Bei einem Cyber Security Assessment wird die IT-Sicherheitslage Ihres Unternehmens bzw. Ihrer Organisation systematisch \u00fcberpr\u00fcft. Ziel ist es, Schwachstellen, Risiken und [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":468,"parent":18,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-36","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":10,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/36\/revisions"}],"predecessor-version":[{"id":3868,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/36\/revisions\/3868"}],"up":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/pages\/18"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media\/468"}],"wp:attachment":[{"href":"https:\/\/laokoon-security.com\/en\/wp-json\/wp\/v2\/media?parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}