[{"data":1,"prerenderedAt":847},["ShallowReactive",2],{"globals":3,"report-Empfehlungen-fur-ein-effektives-Third-Party-Cyber-Risk-Management":465},{"de":4,"en":194,"fr":348},{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12,"logo":13,"favicon":27,"seo":40,"navigation":48,"header":128,"footer":138,"videoPoster":161,"localizations":182},64,"nxlpiutyi22j347lzjvtcmt9","|","Cybervadis","2025-03-26T10:37:37.549Z","2026-01-21T15:16:59.044Z","2025-10-22T12:44:06.951Z","de",{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},276,"ns1dycmcy8eby82nudaixp17","logo.svg",null,303,57,"logo_9f7aa692ba",".svg","image/svg+xml",4.05,"https://assets.cybervadis.com/strapi/assets/logo_9f7aa692ba.svg","strapi-provider-upload-azure-storage","2025-04-10T15:46:43.920Z",{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":32,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},122,"ngfzwjibdex3knh7ftwqfvjx","favicon.png",32,{},"favicon_032a9b11b1",".png","image/png",0.5,"https://assets.cybervadis.com/strapi/assets/favicon_032a9b11b1.png","2025-02-25T09:03:35.564Z","2025-02-25T11:54:37.400Z",{"id":41,"metaDescription":17,"metaImage":17,"metaTags":42,"scripts":43},1191,[],[44,46],{"id":45,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},103,{"id":47,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},104,{"id":5,"links":49},[50,75,98,103],{"id":51,"label":52,"to":53,"external":17,"target":17,"icon":17,"children":54},287,"Third-Party Risiken reduzieren","/third-party-risiken-reduzieren",[55,59,63,67,71],{"id":56,"label":57,"to":58,"external":17,"target":17,"icon":17},6139,"Automatisierte Risikoanalysen","/third-party-risiken-reduzieren/automatisierte-risikoanalysen",{"id":60,"label":61,"to":62,"external":17,"target":17,"icon":17},6140,"Evidenzbasierte Risikobewertung","/third-party-risiken-reduzieren/evidenzbasierte-risikobewertung",{"id":64,"label":65,"to":66,"external":17,"target":17,"icon":17},6141,"Gemeinsame Risikoreduzierung","/third-party-risiken-reduzieren/gemeinsame-risikoreduzierung",{"id":68,"label":69,"to":70,"external":17,"target":17,"icon":17},6142,"Framework-basierte Methodik","/third-party-risiken-reduzieren/framework-basierte-methodik",{"id":72,"label":73,"to":74,"external":17,"target":17,"icon":17},6143,"Preise","/third-party-risiken-reduzieren/preise",{"id":76,"label":77,"to":78,"external":17,"target":17,"icon":17,"children":79},288,"Jetzt bewertet werden","/jetzt-bewertet-werden",[80,84,88,92],{"id":81,"label":82,"to":83,"external":17,"target":17,"icon":17},6144,"So funktioniert es","/jetzt-bewertet-werden/so-funktioniert-es",{"id":85,"label":86,"to":87,"external":17,"target":17,"icon":17},6145,"Individuelle Bewertungen","/jetzt-bewertet-werden/individuelle-bewertungen",{"id":89,"label":90,"to":91,"external":17,"target":17,"icon":17},6146,"CyberVadis Badges","/jetzt-bewertet-werden/cybervadis-badges",{"id":93,"label":94,"to":95,"external":96,"target":97,"icon":17},6147,"Help center (EN)","https://help.cybervadis.com/en/",true,"_blank",{"id":99,"label":100,"to":101,"external":17,"target":17,"icon":17,"children":102},286,"Ressourcen","/ressourcen",[],{"id":104,"label":105,"to":106,"external":17,"target":17,"icon":17,"children":107},289,"Über uns","/uber-uns",[108,112,116,120,124],{"id":109,"label":110,"to":111,"external":17,"target":17,"icon":17},6148,"Warum CyberVadis","/warum-cybervadis",{"id":113,"label":114,"to":115,"external":17,"target":17,"icon":17},6149,"Trust Center (EN)","/uber-uns/trust-center",{"id":117,"label":118,"to":119,"external":96,"target":97,"icon":17},6150,"Careers (EN)","https://careers.cybervadis.com/",{"id":121,"label":122,"to":123,"external":17,"target":17,"icon":17},6151,"Aktuelles","/de/aktuelles",{"id":125,"label":126,"to":127,"external":17,"target":17,"icon":17},6152,"Kontakt","/uber-uns/kontakt",{"id":5,"info":17,"login":129,"button":134},{"id":130,"label":131,"to":132,"external":133,"target":17,"icon":17},6153,"Lieferanten bewerten","/de/third-party-risiken-reduzieren",false,{"id":135,"icon":17,"label":136,"form":137},1080,"Demo buchen","demo",{"id":5,"newsletterTitle":139,"copyright":140,"legalLinks":141,"socialLinks":150},"Newsletter abonnieren","Urheberrecht © 2025. Alle Rechte vorbehalten.",[142,146],{"id":143,"label":144,"to":145,"external":17,"target":17,"icon":17},6154,"Rechtliche Hinweise (EN)","/de/legal",{"id":147,"label":148,"to":149,"external":17,"target":17,"icon":17},6155,"Datenschutzerklärung (EN)","/de/legal-notice",[151,156],{"id":152,"label":153,"to":154,"external":96,"target":97,"icon":155},6156,"X","https://x.com/cybervadis","fa6-brands:x-twitter",{"id":157,"label":158,"to":159,"external":96,"target":97,"icon":160},6157,"LinkedIn","https://www.linkedin.com/company/cybervadis/","fa6-brands:linkedin",{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":167,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},242,"vrv61ssc0oc744hr7dgkqznu","Video Preview",1028,690,{"thumbnail":168},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},"https://assets.cybervadis.com/strapi/assets/thumbnail_Design_sans_titre_6_f21ca94567.png","thumbnail_Design_sans_titre_6_f21ca94567","thumbnail_Design sans titre (6).png",14.9,232,156,14897,"Design_sans_titre_6_f21ca94567",18.5,"https://assets.cybervadis.com/strapi/assets/Design_sans_titre_6_f21ca94567.png","2025-03-12T09:54:21.008Z","2025-03-12T09:54:35.444Z","2025-03-12T09:54:21.009Z",[183,189],{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188},66,"2025-02-19T11:28:33.351Z","2026-01-21T15:16:58.561Z","2026-01-21T15:16:58.826Z","en",{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193},63,"2025-06-17T20:29:42.853Z","2025-10-22T12:40:51.539Z","fr",{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188,"logo":195,"favicon":196,"seo":198,"navigation":227,"header":303,"footer":325,"videoPoster":342,"localizations":345},{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":197,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},{},{"id":199,"metaDescription":17,"metaImage":200,"metaTags":219,"scripts":220},1281,{"id":201,"documentId":202,"name":203,"alternativeText":17,"caption":17,"width":204,"height":205,"formats":206,"hash":215,"ext":34,"mime":35,"size":216,"url":217,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":218,"updatedAt":218,"publishedAt":218},284,"ntditjqus6ubg59uwiew5zqu","meta image by default.png",1200,630,{"thumbnail":207},{"ext":34,"url":208,"hash":209,"mime":35,"name":210,"path":17,"size":211,"width":212,"height":213,"sizeInBytes":214},"https://assets.cybervadis.com/strapi/assets/thumbnail_meta_image_by_default_5c51d0a0d5.png","thumbnail_meta_image_by_default_5c51d0a0d5","thumbnail_meta image by default.png",64.36,245,129,64355,"meta_image_by_default_5c51d0a0d5",210.02,"https://assets.cybervadis.com/strapi/assets/meta_image_by_default_5c51d0a0d5.png","2025-04-17T14:53:22.089Z",[],[221,223,225],{"id":222,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},108,{"id":224,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},109,{"id":226,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},110,{"id":184,"links":228},[229,254,274,279],{"id":230,"label":231,"to":232,"external":17,"target":17,"icon":17,"children":233},295,"Mitigate third-party risks","/mitigate-third-party-risks",[234,238,242,246,250],{"id":235,"label":236,"to":237,"external":17,"target":17,"icon":17},6289,"Automated Risk Insights","/mitigate-third-party-risks/automated-risk-insights",{"id":239,"label":240,"to":241,"external":17,"target":17,"icon":17},6290,"Evidence-based risk assessment","/mitigate-third-party-risks/evidence-based-risk-assessment",{"id":243,"label":244,"to":245,"external":17,"target":17,"icon":17},6291,"Collaborative Risk Reduction","/mitigate-third-party-risks/risk-reduction",{"id":247,"label":248,"to":249,"external":17,"target":17,"icon":17},6292,"Framework-based methodology","/mitigate-third-party-risks/framework-based-methodology",{"id":251,"label":252,"to":253,"external":17,"target":17,"icon":17},6293,"Pricing","/mitigate-third-party-risks/pricing",{"id":255,"label":256,"to":257,"external":17,"target":17,"icon":17,"children":258},296,"Get assessed ","/get-assessed",[259,263,267,271],{"id":260,"label":261,"to":262,"external":17,"target":17,"icon":17},6294,"How it works","/get-assessed/how-it-works",{"id":264,"label":265,"to":266,"external":17,"target":17,"icon":17},6295,"Standardized Assessments","/get-assessed/tailored-and-standardized-assessment",{"id":268,"label":269,"to":270,"external":17,"target":17,"icon":17},6296,"CyberVadis Medals","/get-assessed/medals",{"id":272,"label":273,"to":95,"external":96,"target":97,"icon":17},6297,"Help center",{"id":275,"label":276,"to":277,"external":17,"target":17,"icon":17,"children":278},294,"Resources","/resources",[],{"id":280,"label":281,"to":282,"external":17,"target":17,"icon":17,"children":283},297,"About us ","/about-us",[284,288,292,295,299],{"id":285,"label":286,"to":287,"external":17,"target":17,"icon":17},6298,"Why CyberVadis","/why-cybervadis",{"id":289,"label":290,"to":291,"external":17,"target":17,"icon":17},6299,"Trust center","/about-us/trust-center",{"id":293,"label":294,"to":119,"external":96,"target":97,"icon":17},6300,"Careers",{"id":296,"label":297,"to":298,"external":17,"target":17,"icon":17},6301,"In the news","/in-the-news",{"id":300,"label":301,"to":302,"external":17,"target":17,"icon":17},6302,"Contact","/about-us/contact",{"id":184,"info":304,"login":319,"button":322},[305],{"type":306,"children":307},"paragraph",[308,311,317],{"text":309,"type":310},"Already a CyberVadis client ? ","text",{"url":312,"type":313,"children":314},"https://app.cybervadis.com/","link",[315],{"text":316,"type":310},"You can access your account here",{"text":318,"type":310},"",{"id":320,"label":321,"to":232,"external":133,"target":17,"icon":17},6303,"Assess Vendors",{"id":323,"icon":17,"label":324,"form":137},1109,"Book a demo",{"id":184,"newsletterTitle":326,"copyright":327,"legalLinks":328,"socialLinks":337},"Subscribe to newsletter","Copyright © 2025. All rights reserved.",[329,333],{"id":330,"label":331,"to":332,"external":17,"target":17,"icon":17},6304,"Legal mentions","/legal",{"id":334,"label":335,"to":336,"external":17,"target":17,"icon":17},6305,"Data privacy","/legal-notice",[338,340],{"id":339,"label":153,"to":154,"external":96,"target":97,"icon":155},6306,{"id":341,"label":158,"to":159,"external":96,"target":97,"icon":160},6307,{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":343,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},{"thumbnail":344},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},[346,347],{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12},{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193},{"id":190,"documentId":6,"titleSeparator":7,"title":8,"createdAt":191,"updatedAt":10,"publishedAt":192,"locale":193,"logo":349,"favicon":350,"seo":352,"navigation":363,"header":435,"footer":442,"videoPoster":459,"localizations":462},{"id":14,"documentId":15,"name":16,"alternativeText":17,"caption":17,"width":18,"height":19,"formats":17,"hash":20,"ext":21,"mime":22,"size":23,"url":24,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":26,"updatedAt":26,"publishedAt":26},{"id":28,"documentId":29,"name":30,"alternativeText":17,"caption":17,"width":31,"height":31,"formats":351,"hash":33,"ext":34,"mime":35,"size":36,"url":37,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":38,"updatedAt":39,"publishedAt":38},{},{"id":353,"metaDescription":17,"metaImage":354,"metaTags":357,"scripts":358},1190,{"id":201,"documentId":202,"name":203,"alternativeText":17,"caption":17,"width":204,"height":205,"formats":355,"hash":215,"ext":34,"mime":35,"size":216,"url":217,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":218,"updatedAt":218,"publishedAt":218},{"thumbnail":356},{"ext":34,"url":208,"hash":209,"mime":35,"name":210,"path":17,"size":211,"width":212,"height":213,"sizeInBytes":214},[],[359,361],{"id":360,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},101,{"id":362,"src":17,"tagPosition":17,"innerHTML":17,"defer":17},102,{"id":190,"links":364},[365,390,409,414],{"id":366,"label":367,"to":368,"external":17,"target":17,"icon":17,"children":369},283,"Atténuer les risques liés aux tiers","/attenuer-les-risques-lies-aux-tiers",[370,374,378,382,386],{"id":371,"label":372,"to":373,"external":17,"target":17,"icon":17},6120,"Analyse automatisée des risques","/attenuer-les-risques-lies-aux-tiers/analyse-automatisee-des-risques",{"id":375,"label":376,"to":377,"external":17,"target":17,"icon":17},6121,"Évaluation basée sur la revue de preuves","/attenuer-les-risques-lies-aux-tiers/evaluation-basee-sur-la-revue-de-preuves",{"id":379,"label":380,"to":381,"external":17,"target":17,"icon":17},6122,"Réduction des riques","/attenuer-les-risques-lies-aux-tiers/reduction-des-risques",{"id":383,"label":384,"to":385,"external":17,"target":17,"icon":17},6123,"Méthodologie basée sur un cadre de références","/attenuer-les-risques-lies-aux-tiers/methodologie-basee-sur-un-cadre-de-references",{"id":387,"label":388,"to":389,"external":17,"target":17,"icon":17},6124,"Tarification","/attenuer-les-risques-lies-aux-tiers/tarification",{"id":201,"label":391,"to":392,"external":17,"target":17,"icon":17,"children":393},"Se faire évaluer","/se-faire-evaluer",[394,398,402,406],{"id":395,"label":396,"to":397,"external":17,"target":17,"icon":17},6125,"Comment ça marche","/se-faire-evaluer/comment-ca-marche",{"id":399,"label":400,"to":401,"external":17,"target":17,"icon":17},6126,"Évaluation standardisée","/se-faire-evaluer/evaluation-adaptee-et-standardisee",{"id":403,"label":404,"to":405,"external":17,"target":17,"icon":17},6127,"Les médailles CyberVadis","/se-faire-evaluer/medailles",{"id":407,"label":408,"to":95,"external":96,"target":97,"icon":17},6128,"Help Center (EN)",{"id":410,"label":411,"to":412,"external":17,"target":17,"icon":17,"children":413},282,"Ressources","/ressources",[],{"id":415,"label":416,"to":417,"external":17,"target":17,"icon":17,"children":418},285,"À propos","/a-propos",[419,423,426,428,432],{"id":420,"label":421,"to":422,"external":17,"target":17,"icon":17},6129,"Pourquoi choisir CyberVadis","/pourquoi-choisir-cybervadis",{"id":424,"label":114,"to":425,"external":17,"target":17,"icon":17},6130,"/a-propos/trust-center",{"id":427,"label":118,"to":119,"external":96,"target":97,"icon":17},6131,{"id":429,"label":430,"to":431,"external":17,"target":17,"icon":17},6132,"Actualités","/actualites",{"id":433,"label":301,"to":434,"external":17,"target":17,"icon":17},6133,"/a-propos/contact",{"id":190,"info":17,"login":436,"button":439},{"id":437,"label":438,"to":368,"external":133,"target":17,"icon":17},6134,"Évaluer ses tiers",{"id":440,"icon":17,"label":441,"form":137},1079,"Réserver une démonstration",{"id":190,"newsletterTitle":443,"copyright":444,"legalLinks":445,"socialLinks":454},"S'inscrire à la newsletter","Copyright © 2025. Tous droits réservés. ",[446,450],{"id":447,"label":448,"to":449,"external":17,"target":17,"icon":17},6135,"Mentions légales (EN)","/fr/legal",{"id":451,"label":452,"to":453,"external":17,"target":17,"icon":17},6136,"Confidentialité des données","/fr/legal-notice",[455,457],{"id":456,"label":153,"to":154,"external":96,"target":97,"icon":155},6137,{"id":458,"label":158,"to":159,"external":96,"target":97,"icon":160},6138,{"id":162,"documentId":163,"name":164,"alternativeText":17,"caption":17,"width":165,"height":166,"formats":460,"hash":176,"ext":34,"mime":35,"size":177,"url":178,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":179,"updatedAt":180,"publishedAt":181},{"thumbnail":461},{"ext":34,"url":169,"hash":170,"mime":35,"name":171,"path":17,"size":172,"width":173,"height":174,"sizeInBytes":175},[463,464],{"id":5,"documentId":6,"titleSeparator":7,"title":8,"createdAt":9,"updatedAt":10,"publishedAt":11,"locale":12},{"id":184,"documentId":6,"titleSeparator":7,"title":8,"createdAt":185,"updatedAt":186,"publishedAt":187,"locale":188},{"id":222,"documentId":466,"language":12,"date":467,"title":468,"description":469,"slug":509,"createdAt":510,"updatedAt":511,"publishedAt":512,"formUrl":513,"formHeight":514,"image":17,"preview":515,"seo":537,"blocks":542},"bqrxvkg27qui6f98vzh18zsf","2026-02-24","Aufbau eines leistungsstarken TPCRM-Programms: 10 Erfolgsfaktoren für Ihr TPCRM-Programm im Jahr 2026",[470,476,493,501],{"type":471,"level":472,"children":473},"heading",2,[474],{"text":475,"type":310},"Erfahren Sie, wie Sie ein zuverlässiges, skalierbares und handlungsorientiertes Third-Party Cyber Risk Management strukturieren, um Ihre Lieferkette nachhaltig zu sichern.",{"type":477,"format":478,"children":479},"list","unordered",[480,487],{"type":481,"children":482},"list-item",[483,485],{"bold":96,"text":484,"type":310},"Gewissheit durch Nachweise:",{"text":486,"type":310}," So validieren Sie den tatsächlichen Reifegrad Ihrer Geschäftspartner statt rein auf Selbsteinschätzungen zu vertrauen ",{"type":481,"children":488},[489,491],{"bold":96,"text":490,"type":310},"Strategische Priorisierung:",{"text":492,"type":310}," Setzen Sie Ihre Ressourcen gezielt bei den Drittparteien ein, die für Ihr Unternehmen am kritischsten sind.",{"type":477,"format":478,"children":494},[495],{"type":481,"children":496},[497,499],{"bold":96,"text":498,"type":310},"Skalierung:",{"text":500,"type":310}," Die Erfolgsfaktoren für die Bewertung Ihres gesamten Ökosystems, ohne Ihre Prozesse zu belasten.",{"type":477,"format":478,"children":502},[503],{"type":481,"children":504},[505,507],{"bold":96,"text":506,"type":310},"Vereinfachte Compliance: ",{"text":508,"type":310},"Antizipieren Sie die Anforderungen von NIS2 und DORA mit voller Zuversicht.","Empfehlungen-fur-ein-effektives-Third-Party-Cyber-Risk-Management","2026-02-26T11:27:33.931Z","2026-03-03T16:46:29.849Z","2026-03-03T16:46:30.164Z","https://www1.cybervadis.com/l/418762/2026-02-27/ft4ltx",30,{"id":516,"description":517,"image":518},342,"Optimieren Sie Ihr Cyber-Risikomanagement mit evidenzbasierten Lösungen. Dieser Leitfaden bietet Ihnen die Werkzeuge, um Ihr Ökosystem effektiv abzusichern.",{"id":519,"documentId":520,"name":521,"alternativeText":17,"caption":17,"width":522,"height":523,"formats":524,"hash":532,"ext":34,"mime":35,"size":533,"url":534,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":535,"updatedAt":535,"publishedAt":536},319,"cbqbrvrm74rbx1zyhxiek7l4","Ebook TPCRM cover DE.png",2826,1592,{"thumbnail":525},{"ext":34,"url":526,"hash":527,"mime":35,"name":528,"path":17,"size":529,"width":212,"height":530,"sizeInBytes":531},"https://assets.cybervadis.com/strapi/assets/thumbnail_Ebook_TPCRM_cover_DE_8c84d37ae1.png","thumbnail_Ebook_TPCRM_cover_DE_8c84d37ae1","thumbnail_Ebook TPCRM cover DE.png",37.1,138,37101,"Ebook_TPCRM_cover_DE_8c84d37ae1",517.03,"https://assets.cybervadis.com/strapi/assets/Ebook_TPCRM_cover_DE_8c84d37ae1.png","2026-02-26T11:29:21.172Z","2026-02-26T11:29:21.173Z",{"id":538,"metaDescription":539,"metaImage":17,"metaTags":540,"scripts":541},1347,"10 Empfehlungen für ein effektives\nThird-Party Cyber Risk Management",[],[],[543,745,809,816],{"__component":544,"id":545,"headline":546,"title":17,"speed":547,"startDelay":548,"direction":549,"playOnInit":96,"backgroundColor":550,"logos":551,"link":17},"block.logos-slider",560,"Diese Unternehmen minimieren ihr Drittparteienrisiko mit CyberVadis","slow",1000,"forward","white",[552,569,590,613,630,650,671,689,707,724],{"id":553,"image":554,"link":566},4664,{"id":514,"documentId":555,"name":556,"alternativeText":17,"caption":17,"width":557,"height":558,"formats":559,"hash":560,"ext":21,"mime":22,"size":561,"url":562,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":563,"updatedAt":564,"publishedAt":565},"seoq146jon0ba8u2aqegac1l","sanofi-seeklogo.com.svg",1159,308,{},"sanofi_seeklogo_com_e51b897c18",4.76,"https://assets.cybervadis.com/strapi/assets/sanofi_seeklogo_com_e51b897c18.svg","2025-02-21T00:42:34.675Z","2025-02-25T14:22:25.851Z","2025-02-21T00:42:34.676Z",{"id":567,"label":17,"to":568,"external":96,"target":97,"icon":17},6898,"https://www.sanofi.de/de",{"id":570,"image":571,"link":587},4665,{"id":572,"documentId":573,"name":574,"alternativeText":17,"caption":17,"width":575,"height":575,"formats":576,"hash":583,"ext":34,"mime":35,"size":584,"url":585,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":586,"updatedAt":586,"publishedAt":586},208,"afca67tcj07fbbzhz67m274b","2.png",256,{"thumbnail":577},{"ext":34,"url":578,"hash":579,"mime":35,"name":580,"path":17,"size":581,"width":174,"height":174,"sizeInBytes":582},"https://assets.cybervadis.com/strapi/assets/thumbnail_2_d0beb8449e.png","thumbnail_2_d0beb8449e","thumbnail_2.png",4.15,4147,"2_d0beb8449e",1.1,"https://assets.cybervadis.com/strapi/assets/2_d0beb8449e.png","2025-03-04T15:21:48.725Z",{"id":588,"label":17,"to":589,"external":96,"target":97,"icon":17},6899,"https://www.kone.de/",{"id":591,"image":592,"link":610},4666,{"id":593,"documentId":594,"name":595,"alternativeText":17,"caption":17,"width":596,"height":597,"formats":598,"hash":606,"ext":34,"mime":35,"size":607,"url":608,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":609,"updatedAt":609,"publishedAt":609},317,"ibyg1hy6uuwahopjl7q18pq3","Evotec.svg.png",1024,378,{"thumbnail":599},{"ext":34,"url":600,"hash":601,"mime":35,"name":602,"path":17,"size":603,"width":212,"height":604,"sizeInBytes":605},"https://assets.cybervadis.com/strapi/assets/thumbnail_Evotec_svg_d8f686d1a5.png","thumbnail_Evotec_svg_d8f686d1a5","thumbnail_Evotec.svg.png",8.48,90,8484,"Evotec_svg_d8f686d1a5",7.15,"https://assets.cybervadis.com/strapi/assets/Evotec_svg_d8f686d1a5.png","2026-01-27T14:36:01.400Z",{"id":611,"label":17,"to":612,"external":96,"target":97,"icon":17},6900,"https://www.evotec.com/de/",{"id":614,"image":615,"link":627},4667,{"id":616,"documentId":617,"name":618,"alternativeText":17,"caption":17,"width":619,"height":190,"formats":620,"hash":621,"ext":21,"mime":22,"size":622,"url":623,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":624,"updatedAt":625,"publishedAt":626},34,"e734ib10q6pxid79qjeo20i3","Schmitz_Cargobull_Logo.png",151,{},"Schmitz_Cargobull_Logo_bd8df86f0c",8.21,"https://assets.cybervadis.com/strapi/assets/Schmitz_Cargobull_Logo_bd8df86f0c.svg","2025-02-21T00:42:36.541Z","2025-03-05T15:02:36.383Z","2025-02-21T00:42:36.556Z",{"id":628,"label":17,"to":629,"external":96,"target":97,"icon":17},6901,"https://www.cargobull.com/de",{"id":631,"image":632,"link":647},4668,{"id":633,"documentId":634,"name":635,"alternativeText":17,"caption":17,"width":575,"height":575,"formats":636,"hash":643,"ext":34,"mime":35,"size":644,"url":645,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":646,"updatedAt":646,"publishedAt":646},210,"z86obdp0ngm14ybfiggu6p80","5.png",{"thumbnail":637},{"ext":34,"url":638,"hash":639,"mime":35,"name":640,"path":17,"size":641,"width":174,"height":174,"sizeInBytes":642},"https://assets.cybervadis.com/strapi/assets/thumbnail_5_65459f2cba.png","thumbnail_5_65459f2cba","thumbnail_5.png",6.39,6390,"5_65459f2cba",2.08,"https://assets.cybervadis.com/strapi/assets/5_65459f2cba.png","2025-03-04T15:22:39.190Z",{"id":648,"label":17,"to":649,"external":96,"target":97,"icon":17},6902,"https://www.axaglobalhealthcare.com/en/",{"id":651,"image":652,"link":668},4669,{"id":653,"documentId":654,"name":655,"alternativeText":17,"caption":17,"width":575,"height":575,"formats":656,"hash":663,"ext":34,"mime":35,"size":664,"url":665,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":666,"updatedAt":667,"publishedAt":666},211,"ny2l70nlq0c9svdhqan3fb6t","CNP",{"thumbnail":657},{"ext":34,"url":658,"hash":659,"mime":35,"name":660,"path":17,"size":661,"width":174,"height":174,"sizeInBytes":662},"https://assets.cybervadis.com/strapi/assets/thumbnail_CNP_abbf286d04.png","thumbnail_CNP_abbf286d04","thumbnail_CNP",10.34,10337,"CNP_abbf286d04",4.8,"https://assets.cybervadis.com/strapi/assets/CNP_abbf286d04.png","2025-03-04T15:27:39.516Z","2025-03-04T16:00:00.147Z",{"id":669,"label":17,"to":670,"external":96,"target":97,"icon":17},6903,"https://www.cnp.fr/en/the-cnp-assurances-group",{"id":672,"image":673,"link":686},4670,{"id":674,"documentId":675,"name":676,"alternativeText":17,"caption":17,"width":677,"height":678,"formats":679,"hash":680,"ext":21,"mime":22,"size":681,"url":682,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":683,"updatedAt":684,"publishedAt":685},22,"n6va294azhbs4d2vqvvuj3in","Eramet_logo_2018.svg",320,127,{},"Eramet_logo_2018_07e4849c53",8.53,"https://assets.cybervadis.com/strapi/assets/Eramet_logo_2018_07e4849c53.svg","2025-02-21T00:42:31.762Z","2025-02-25T14:27:08.610Z","2025-02-21T00:42:31.763Z",{"id":687,"label":17,"to":688,"external":96,"target":97,"icon":17},6904,"https://www.eramet.com/en/",{"id":690,"image":691,"link":704},4671,{"id":692,"documentId":693,"name":694,"alternativeText":17,"caption":17,"width":695,"height":696,"formats":697,"hash":698,"ext":21,"mime":22,"size":699,"url":700,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":701,"updatedAt":702,"publishedAt":703},17,"d3dqe26urj7nf5ro1oxsh6oq","Beiersdorf_Logo.svg",851,139,{},"Beiersdorf_Logo_fb8ad1d59e",11.03,"https://assets.cybervadis.com/strapi/assets/Beiersdorf_Logo_fb8ad1d59e.svg","2025-02-21T00:42:30.085Z","2025-02-25T14:27:24.416Z","2025-02-21T00:42:30.086Z",{"id":705,"label":17,"to":706,"external":96,"target":97,"icon":17},6905,"https://www.beiersdorf.de/",{"id":708,"image":709,"link":721},4672,{"id":710,"documentId":711,"name":712,"alternativeText":17,"caption":17,"width":713,"height":31,"formats":714,"hash":715,"ext":21,"mime":22,"size":716,"url":717,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":718,"updatedAt":719,"publishedAt":720},16,"b7pz0kerp2049kio2mkn4t6t","arkema-seeklogo.com.svg",238,{},"arkema_seeklogo_com_4e8105585f",9.82,"https://assets.cybervadis.com/strapi/assets/arkema_seeklogo_com_4e8105585f.svg","2025-02-21T00:42:30.076Z","2025-02-25T14:27:32.987Z","2025-02-21T00:42:30.083Z",{"id":722,"label":17,"to":723,"external":96,"target":97,"icon":17},6906,"https://www.arkema.com/global/en/",{"id":725,"image":726,"link":742},4673,{"id":727,"documentId":728,"name":729,"alternativeText":17,"caption":17,"width":575,"height":575,"formats":730,"hash":737,"ext":34,"mime":35,"size":738,"url":739,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":740,"updatedAt":741,"publishedAt":740},212,"ur3ilh0k4v1ct5v51dimra48","GRDF FINAL",{"thumbnail":731},{"ext":34,"url":732,"hash":733,"mime":35,"name":734,"path":17,"size":735,"width":174,"height":174,"sizeInBytes":736},"https://assets.cybervadis.com/strapi/assets/thumbnail_Design_sans_titre_4_083f68a499.png","thumbnail_Design_sans_titre_4_083f68a499","thumbnail_Design sans titre (4).png",11.04,11044,"Design_sans_titre_4_083f68a499",5.59,"https://assets.cybervadis.com/strapi/assets/Design_sans_titre_4_083f68a499.png","2025-03-04T15:58:44.484Z","2025-03-04T15:58:56.356Z",{"id":743,"label":17,"to":744,"external":96,"target":97,"icon":17},6907,"https://www.grdf.fr/grdf-en",{"__component":746,"id":747,"anchor":17,"badge":17,"title":17,"description":748,"features":808,"link":17},"block.text",1368,[749,753,758,766,774,782,786,790,796,802],{"type":471,"level":472,"children":750},[751],{"text":752,"type":310},"Die Grundlagen eines effektiven Third-Party Cyber Risk Managements",{"type":471,"level":754,"children":755},3,[756],{"text":757,"type":310},"Ein TPCRM-Programm, das echten Mehrwert schafft, basiert auf drei wesentlichen Säulen, die in diesem Leitfaden detailliert beschrieben werden:",{"type":477,"format":478,"children":759},[760],{"type":481,"children":761},[762,764],{"bold":96,"text":763,"type":310},"Zuverlässigkeit:",{"text":765,"type":310}," Basieren Sie Ihre Entscheidungen auf expertengeprüftenNachweisen (evidence-based)(, statt auf einfachen Eigenerklärungen.",{"type":477,"format":478,"children":767},[768],{"type":481,"children":769},[770,772],{"bold":96,"text":771,"type":310},"Skalierbarkeit:",{"text":773,"type":310}," Nutzen Sie gemeinsame Prozesse, um alle Ihre Drittparteien abzudecken – von den kritischsten Partnern bis hin zu den kleinsten Zulieferern.",{"type":477,"format":478,"children":775},[776],{"type":481,"children":777},[778,780],{"bold":96,"text":779,"type":310},"Wirkung:",{"text":781,"type":310}," Verwandeln Sie jede Bewertung in einen konkreten Korrekturmaßnahmenplan (Remediation Plan), der kontinuierlich überwacht wird.",{"type":471,"level":472,"children":783},[784],{"text":785,"type":310},"Eine Methodik, die auf Handlungsfähigkeit ausgelegt ist.",{"type":306,"children":787},[788],{"text":789,"type":310},"Wir unterstützen Unternehmen dabei, von einer statischen Risikobetrachtung zu einem dynamischen Management überzugehen.",{"type":477,"format":478,"children":791},[792],{"type":481,"children":793},[794],{"text":795,"type":310},"Menschliche Expertise: Ihre Nachweise werden von spezialisierten Analysten geprüft.",{"type":477,"format":478,"children":797},[798],{"type":481,"children":799},[800],{"text":801,"type":310},"Zusammenarbeit mit Drittparteien: Eine Benutzeroberfläche, die darauf ausgelegt ist, die Arbeit Ihrer Partner zu erleichtern und deren Engagement zu maximieren.",{"type":477,"format":478,"children":803},[804],{"type":481,"children":805},[806],{"text":807,"type":310},"Globaler Standard: Ein anerkanntes Bewertungsmodell, das den Austausch und das Benchmarking vereinfacht.",[],{"__component":810,"id":811,"anchor":17,"fit":812,"image":813},"block.image",192,"object-cover",{"id":519,"documentId":520,"name":521,"alternativeText":17,"caption":17,"width":522,"height":523,"formats":814,"hash":532,"ext":34,"mime":35,"size":533,"url":534,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":535,"updatedAt":535,"publishedAt":536},{"thumbnail":815},{"ext":34,"url":526,"hash":527,"mime":35,"name":528,"path":17,"size":529,"width":212,"height":530,"sizeInBytes":531},{"__component":817,"id":818,"size":819,"title":820,"description":821,"backgroundColor":822,"heading":823,"contactForm":17,"contactFormTitle":17,"form":17,"link":17,"button":824,"image":828},"block.cta",846,"md","Holen Sie sich Expertenunterstützung für Ihr Third-Party Cyber Risk Management (TPCRM)","Sie haben Schwierigkeiten mit dem Cyber-Risikomanagement Ihrer Lieferanten? Sie kämpfen mit der mangelnden Transparenz Ihrer Partner, neuen Bestimmungen und steigenden Kosten? Wir können Ihnen helfen. Sprechen Sie mit einem unserer Experten. ","blue","h2",{"id":825,"icon":17,"label":826,"form":827},1133,"Jetzt Termin vereinbaren","demo-enterprise",{"id":360,"documentId":829,"name":830,"alternativeText":17,"caption":17,"width":831,"height":832,"formats":833,"hash":841,"ext":34,"mime":35,"size":842,"url":843,"previewUrl":17,"provider":25,"provider_metadata":17,"createdAt":844,"updatedAt":845,"publishedAt":846},"kmob33tg8jbcaw8n0l09wesp","E4.png",1008,616,{"thumbnail":834},{"ext":34,"url":835,"hash":836,"mime":35,"name":837,"path":17,"size":838,"width":212,"height":839,"sizeInBytes":840},"https://assets.cybervadis.com/strapi/assets/thumbnail_E4_3b6b026869.png","thumbnail_E4_3b6b026869","thumbnail_E4.png",85.55,150,85548,"E4_3b6b026869",250.18,"https://assets.cybervadis.com/strapi/assets/E4_3b6b026869.png","2025-02-24T17:09:26.539Z","2025-02-25T13:27:39.143Z","2025-02-24T17:09:26.540Z",1772606232711]