{"id":36,"date":"2025-12-04T00:28:50","date_gmt":"2025-12-03T23:28:50","guid":{"rendered":"https:\/\/cyberresilience.nrw\/?page_id=36"},"modified":"2026-03-24T16:20:25","modified_gmt":"2026-03-24T15:20:25","slug":"home","status":"publish","type":"page","link":"https:\/\/cyberresilience.nrw\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"36\" class=\"elementor elementor-36\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7426c920 e-flex e-con-boxed e-con e-parent\" data-id=\"7426c920\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b6acae3 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b6acae3\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"756\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/CyberResilience_NRW_Logo_Ohne-Weiss-scaled.png\" class=\"attachment-full size-full wp-image-61\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/CyberResilience_NRW_Logo_Ohne-Weiss-scaled.png 2560w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/CyberResilience_NRW_Logo_Ohne-Weiss-300x89.png 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/CyberResilience_NRW_Logo_Ohne-Weiss-1024x302.png 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/CyberResilience_NRW_Logo_Ohne-Weiss-768x227.png 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/CyberResilience_NRW_Logo_Ohne-Weiss-1536x454.png 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/CyberResilience_NRW_Logo_Ohne-Weiss-2048x605.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a0fd027 elementor-widget elementor-widget-heading\" data-id=\"4a0fd027\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Vision 2035 f\u00fcr eine<br>sichere digitale Zukunft<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-505bff5e elementor-widget elementor-widget-heading\" data-id=\"505bff5e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Wir schaffen heute die Grundlagen f\u00fcr eine sichere, resiliente\nund benutzerfreundliche digitale Welt von morgen.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b7c188d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4b7c188d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.iem.fraunhofer.de\/de\/referenzen\/cyberresiliente-software-widerstandsfaehige-wirtschaft-gesellschaft.html\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Projektreferenz<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-294cc845 e-con-full e-flex e-con e-parent\" data-id=\"294cc845\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5358ca67 elementor-widget elementor-widget-heading\" data-id=\"5358ca67\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font size=\"6\">Worum gehts?<\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-595c7150 elementor-widget elementor-widget-heading\" data-id=\"595c7150\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\"><br>Egal ob Wirtschaft oder Gesellschaft, Software ist heute fester Bestandteil unseres Alltags. Doch Software l\u00e4sst sich nicht vollst\u00e4ndig sch\u00fctzen und das Risiko f\u00fcr einen erfolgreichen Cyber-Angriff steigt stetig. Entscheidend ist daher Cyber\u2011Resilienz: die F\u00e4higkeit, Security-Vorf\u00e4lle zu verkraften und schnell wieder arbeitsf\u00e4hig zu sein. F\u00fcr Organisationen wird das zunehmend gesch\u00e4ftskritisch.\n<br>\n<br> Hier setzt unser Forschungsprojekt CyberResilience.nrw an. Wir verbinden Forschung, Industrie und Praxis, um Organisationen in NRW und ganz Deutschland bei der Entwicklung resilienter Softwareprodukte zu unterst\u00fctzen \u2013 mit werkzeuggest\u00fctzten Assessments, praxistauglichen Leitf\u00e4den und Werkzeugen im Sinne der Usable Security.\n<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c46b78 e-flex e-con-boxed e-con e-parent\" data-id=\"9c46b78\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e975593 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e975593\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-db5ed6d elementor-widget elementor-widget-heading\" data-id=\"db5ed6d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"elementor-heading-title elementor-size-default elementor-inline-editing pen\" data-elementor-setting-key=\"title\" data-pen-placeholder=\"Eingabe hier...\" style=\"text-transform: none;font-style: normal;text-decoration: none;letter-spacing: normal;text-align: center\"><font size=\"6\">Projektpartner<\/font><\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5738ae2 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5738ae2\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce484cb e-flex e-con-boxed e-con e-parent\" data-id=\"ce484cb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bec0886 elementor-widget elementor-widget-image\" data-id=\"bec0886\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.adesso.de\/de\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"612\" height=\"244\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/adesso_basic_Color_RGB.png\" class=\"attachment-full size-full wp-image-119\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/adesso_basic_Color_RGB.png 612w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/adesso_basic_Color_RGB-300x120.png 300w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d46752 elementor-widget elementor-widget-image\" data-id=\"3d46752\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.code-intelligence.com\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"602\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/CI_Logo-Logotype_black-1024x771.png\" class=\"attachment-large size-large wp-image-116\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/CI_Logo-Logotype_black-1024x771.png 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/CI_Logo-Logotype_black-300x226.png 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/CI_Logo-Logotype_black-768x578.png 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/CI_Logo-Logotype_black-1536x1156.png 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/CI_Logo-Logotype_black-2048x1542.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2ecb0e elementor-widget elementor-widget-image\" data-id=\"a2ecb0e\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.connext.de\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"253\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/logo_cx_vivendi_rgb-1024x324.png\" class=\"attachment-large size-large wp-image-118\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/logo_cx_vivendi_rgb-1024x324.png 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/logo_cx_vivendi_rgb-300x95.png 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/logo_cx_vivendi_rgb-768x243.png 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/logo_cx_vivendi_rgb-1536x485.png 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/logo_cx_vivendi_rgb.png 1728w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a7c8b7 elementor-widget elementor-widget-image\" data-id=\"5a7c8b7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.dieboldnixdorf.com\/de-de\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/dn_logo_v_44farbig-1024x768.png\" class=\"attachment-large size-large wp-image-153\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/dn_logo_v_44farbig-1024x768.png 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/dn_logo_v_44farbig-300x225.png 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/dn_logo_v_44farbig-768x576.png 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/dn_logo_v_44farbig.png 1070w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ddeafef elementor-widget elementor-widget-image\" data-id=\"ddeafef\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"244\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/Ergo_Group_logo-1024x312.png\" class=\"attachment-large size-large wp-image-239\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/Ergo_Group_logo-1024x312.png 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/Ergo_Group_logo-300x91.png 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/Ergo_Group_logo-768x234.png 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/Ergo_Group_logo-1536x468.png 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/Ergo_Group_logo-2048x624.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6ddd31 elementor-widget elementor-widget-image\" data-id=\"d6ddd31\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.iem.fraunhofer.de\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"220\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/fraunhofer-iem-logo-klein-1024x282.jpg\" class=\"attachment-large size-large wp-image-71\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/fraunhofer-iem-logo-klein-1024x282.jpg 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/fraunhofer-iem-logo-klein-300x83.jpg 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/fraunhofer-iem-logo-klein-768x211.jpg 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/fraunhofer-iem-logo-klein-1536x422.jpg 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2025\/12\/fraunhofer-iem-logo-klein-2048x563.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3288f91 elementor-widget elementor-widget-image\" data-id=\"3288f91\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/company\/langlauf-security-automation-gmbh\/?originalSubdomain=de\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"198\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/Langlauf_Logo_FINAL_schwarz-1024x253.png\" class=\"attachment-large size-large wp-image-115\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/Langlauf_Logo_FINAL_schwarz-1024x253.png 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/Langlauf_Logo_FINAL_schwarz-300x74.png 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/Langlauf_Logo_FINAL_schwarz-768x190.png 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/Langlauf_Logo_FINAL_schwarz-1536x380.png 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/01\/Langlauf_Logo_FINAL_schwarz.png 1919w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2105d6c elementor-widget elementor-widget-image\" data-id=\"2105d6c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.rewe-digital.com\/de\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"446\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/REWEdigital-Logo-rgb_lemon-blue.png\" class=\"attachment-large size-large wp-image-152\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/REWEdigital-Logo-rgb_lemon-blue.png 967w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/REWEdigital-Logo-rgb_lemon-blue-300x167.png 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/REWEdigital-Logo-rgb_lemon-blue-768x428.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a0f57ec e-con-full e-flex e-con e-parent\" data-id=\"a0f57ec\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-03f91e5 e-flex e-con-boxed e-con e-child\" data-id=\"03f91e5\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e34c39 elementor-widget elementor-widget-heading\" data-id=\"6e34c39\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font size=\"6\">Ziel<\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aeb0033 elementor-widget elementor-widget-text-editor\" data-id=\"aeb0033\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\"><strong>Um unsere Ziele zu erreichen haben wir vier Arbeitspakete definiert. Sie umfassen:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53db193 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"53db193\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b7c041 elementor-widget__width-initial e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"9b7c041\" data-element_type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"163037249\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1630372491\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1630372491\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAP1: Ausgangslage und Vision\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1630372492\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1630372492\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAP2: Reifegrad und Leitfaden\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1630372493\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1630372493\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAP3: Assessment\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1630372494\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1630372494\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tAP4: Usable Security-Werkzeuge\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1630372491\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1630372491\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-5420e95 e-con-full e-flex e-con e-child\" data-id=\"5420e95\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-205baff elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"205baff\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a03d261 elementor-widget elementor-widget-text-editor\" data-id=\"a03d261\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">In AP1 m\u00f6chten wir die Erhebung des aktuellen Stands der Cyber-Resilienz in deutschen Organisationen sowie die Aufarbeitung aktueller Anforderungen und Ans\u00e4tze untersuchen. Die Ergebnisse flie\u00dfen in ein zentrales Ziel- und Leitbild zur Cyber-Resilienz und Usable Security ein \u2013 unsere Vision 2035.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1630372492\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1630372492\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-8fb1499 e-con-full e-flex e-con e-child\" data-id=\"8fb1499\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb3ab7c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bb3ab7c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d1ad67 elementor-widget elementor-widget-text-editor\" data-id=\"9d1ad67\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">AP2 besch\u00e4ftigt sich mit der Entwicklung eines produktspezifischen Reifegradmodells zur Bestimmung des aktuellen und notwendigen Reifegrads sowie einen unterst\u00fctzenden Leitfaden zur selbstst\u00e4ndigen Steigerung der Cyber-Resilienz.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1630372493\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1630372493\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\" elementor-element elementor-element-d4ccbca e-con-full e-flex e-con e-child\" data-id=\"d4ccbca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f30e497 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f30e497\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5329607 elementor-widget elementor-widget-text-editor\" data-id=\"5329607\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">AP3 unterst\u00fctzt die Erarbeitung von werkzeuggest\u00fctzten Assessments, sodass auch Produktteams mit wenig Security-Kompetenz den aktuellen und notwendigen Reifegrad ihrer Produkte m\u00f6glichst selbstst\u00e4ndig bestimmen k\u00f6nnen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1630372494\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1630372494\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\" elementor-element elementor-element-d361ec2 e-flex e-con-boxed e-con e-child\" data-id=\"d361ec2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-82457e6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"82457e6\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce13e6b elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"ce13e6b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">AP4 besch\u00e4ftigt sich mit der Weiterentwicklung bestehender Analysewerkzeuge mit Fokus auf Usable Security, sodass Entwickler:innen diese auch ohne ausgepr\u00e4gte Security-Expertise effizient nutzen k\u00f6nnen. Zudem werden Konzepte erarbeitet, die es den Werkzeugen erm\u00f6glichen, bei der automatischen Bestimmung des Reifegrads geeigneten und aussagekr\u00e4ftigen Input zu liefern.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-422870d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"422870d\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49b32ff7 elementor-widget elementor-widget-heading\" data-id=\"49b32ff7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font size=\"6\">Darauf bauen wir auf<\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-825c12f elementor-widget elementor-widget-heading\" data-id=\"825c12f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">AppSecure.nrw-Studie 2019<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b95bdea elementor-widget elementor-widget-text-editor\" data-id=\"b95bdea\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">Bereits 2019 zeigte unsere AppSecure.nrw-Studie: IT-Sicherheit ist f\u00fcr viele deutsche Unternehmen eine Herausforderung. Es mangelte vor allem an Sensibilisierung, Security-Kompetenzen sowie an praxistauglichen Methoden und Werkzeugen f\u00fcr die sichere Softwareentwicklung. Gleichzeitig gab ein Gro\u00dfteil der Befragten an, die IT-Sicherheit verbessern zu wollen. Das Forschungsprojekt AppSecure.nrw unterst\u00fctzte sie mit optimierten Methoden, weiterentwickelten Werkzeugen und passenden Schulungen. Das Ziel: sichere Softwareentwicklung von Anfang an.<\/p><p style=\"font-weight: 400;\"><strong>Und genau darauf bauen wir nun auf: Wir unterst\u00fctzen Organisationen in NRW und ganz Deutschland dabei die Cyber-Resilienz ihrer Softwareprodukte sicherzustellen.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1077d1f e-flex e-con-boxed e-con e-parent\" data-id=\"1077d1f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7b0ee3e e-con-full e-flex e-con e-child\" data-id=\"7b0ee3e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-838dd48 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"838dd48\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/appsecure.nrw\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Projektreferenz<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-653aea9 e-con-full e-flex e-con e-child\" data-id=\"653aea9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd1e789 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cd1e789\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/appsecure.nrw\/wp-content\/uploads\/2022\/02\/appsecure-nrw-studie-new.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Studie<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a877b6f e-flex e-con-boxed e-con e-parent\" data-id=\"a877b6f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5df6705 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"5df6705\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93cd75d e-con-full e-flex e-con e-child\" data-id=\"93cd75d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b07e5a3 elementor-widget elementor-widget-heading\" data-id=\"b07e5a3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font size=\"6\">Publikationen<\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-85d594e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"85d594e\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/openaccess.cms-conferences.org\/publications\/book\/978-1-964867-44-1\/article\/978-1-964867-44-1_8\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Assessing and Communicating Software Security: Enhancing Software Product Health with Architectural Threat Analysis <\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11334243\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Explaining Software Vulnerabilities with Large Language Models<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.researchgate.net\/publication\/400369494_From_Detection_to_Prevention_Explaining_Security-Critical_Code_to_Avoid_Vulnerabilities\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-file\" viewBox=\"0 0 384 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M369.9 97.9L286 14C277 5 264.8-.1 252.1-.1H48C21.5 0 0 21.5 0 48v416c0 26.5 21.5 48 48 48h288c26.5 0 48-21.5 48-48V131.9c0-12.7-5.1-25-14.1-34zM332.1 128H256V51.9l76.1 76.1zM48 464V48h160v104c0 13.3 10.7 24 24 24h104v288H48z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">From Detection to Prevention: Explaining Security-Critical Code to Avoid Vulnerabilities<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-317293e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"317293e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-513d3c0 elementor-widget elementor-widget-heading\" data-id=\"513d3c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font size=\"6\">Das Projektteam<\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0d6c85 elementor-widget elementor-widget-image\" data-id=\"e0d6c85\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"1707\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/DSC09371_edit-scaled.jpg\" class=\"attachment-full size-full wp-image-142\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/DSC09371_edit-scaled.jpg 2560w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/DSC09371_edit-300x200.jpg 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/DSC09371_edit-1024x683.jpg 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/DSC09371_edit-768x512.jpg 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/DSC09371_edit-1536x1024.jpg 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/DSC09371_edit-2048x1365.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e5b64c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4e5b64c\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7def6f8 elementor-widget elementor-widget-heading\" data-id=\"7def6f8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><font size=\"6\">Kontakt<\/font><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1188bd5 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"1188bd5\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"2560\" height=\"2378\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/whb_Benedict_Wohlers-scaled.jpg\" class=\"attachment-full size-full wp-image-178\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/whb_Benedict_Wohlers-scaled.jpg 2560w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/whb_Benedict_Wohlers-300x279.jpg 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/whb_Benedict_Wohlers-1024x951.jpg 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/whb_Benedict_Wohlers-768x713.jpg 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/whb_Benedict_Wohlers-1536x1427.jpg 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/whb_Benedict_Wohlers-2048x1902.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Benedict Wohlers<\/h3><p class=\"elementor-image-box-description\">Projektleiter<br>benedict.wohlers@iem.fraunhofer.de<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d647a25 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d647a25\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e7f94c elementor-widget elementor-widget-image\" data-id=\"0e7f94c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2363\" height=\"532\" src=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/esf-foerderlogos_21-27_eu-landesregierung_foerdersatz_rgb.png\" class=\"attachment-full size-full wp-image-146\" alt=\"\" srcset=\"https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/esf-foerderlogos_21-27_eu-landesregierung_foerdersatz_rgb.png 2363w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/esf-foerderlogos_21-27_eu-landesregierung_foerdersatz_rgb-300x68.png 300w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/esf-foerderlogos_21-27_eu-landesregierung_foerdersatz_rgb-1024x231.png 1024w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/esf-foerderlogos_21-27_eu-landesregierung_foerdersatz_rgb-768x173.png 768w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/esf-foerderlogos_21-27_eu-landesregierung_foerdersatz_rgb-1536x346.png 1536w, https:\/\/cyberresilience.nrw\/wp-content\/uploads\/2026\/03\/esf-foerderlogos_21-27_eu-landesregierung_foerdersatz_rgb-2048x461.png 2048w\" sizes=\"(max-width: 2363px) 100vw, 2363px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-694bb9b e-flex e-con-boxed e-con e-parent\" data-id=\"694bb9b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d225603 e-flex e-con-boxed e-con e-parent\" data-id=\"d225603\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5252249 e-con-full e-flex e-con e-child\" data-id=\"5252249\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11750a1 elementor-widget elementor-widget-text-editor\" data-id=\"11750a1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/cyberresilience.nrw\/?page_id=23\u2197\">Impressum<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a1258b1 e-con-full e-flex e-con e-child\" data-id=\"a1258b1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a3a62a elementor-widget elementor-widget-text-editor\" data-id=\"4a3a62a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/cyberresilience.nrw\/?page_id=207\u2197\">Datenschutz<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Vision 2035 f\u00fcr einesichere digitale Zukunft Wir schaffen heute die Grundlagen f\u00fcr eine sichere, resiliente und benutzerfreundliche digitale Welt von morgen. Projektreferenz Worum gehts? Egal ob Wirtschaft oder Gesellschaft, Software ist heute fester Bestandteil unseres Alltags. Doch Software l\u00e4sst sich nicht vollst\u00e4ndig sch\u00fctzen und das Risiko f\u00fcr einen erfolgreichen Cyber-Angriff steigt stetig. Entscheidend ist daher [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":40,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-36","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=\/wp\/v2\/pages\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=36"}],"version-history":[{"count":127,"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=\/wp\/v2\/pages\/36\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=\/wp\/v2\/pages\/36\/revisions\/254"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=\/wp\/v2\/media\/40"}],"wp:attachment":[{"href":"https:\/\/cyberresilience.nrw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}