{"id":2145,"date":"2022-03-05T00:28:51","date_gmt":"2022-03-04T23:28:51","guid":{"rendered":"https:\/\/kalweit-its.de\/services\/cyber-resilience\/"},"modified":"2024-02-24T11:04:41","modified_gmt":"2024-02-24T10:04:41","slug":"cyber-incident-simulation","status":"publish","type":"page","link":"https:\/\/kalweit-its.de\/en\/services\/cyber-incident-simulation\/","title":{"rendered":"Cyber Incident Simulation"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”||10px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/kalweit-its.de\/wp-content\/uploads\/2023\/04\/14.01.2023_KalweitITS_0487-scaled.jpg” title_text=”14.01.2023_KalweitITS_0487″ _builder_version=”4.19.0″ _module_preset=”5556ca2a-c406-479f-b7c7-1a37901659d5″ global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”|||on|||||” global_colors_info=”{}”]<\/p>\n

Cyber incident simulation<\/h1>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ module_id=”cyber-incident-simulation” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” max_width=”480px” global_colors_info=”{}”]<\/p>\n

What happens when something happens that shouldn’t? An actual IT crisis, a complete systems failure, or a ransomware removal demand?<\/p>\n

Often there is ambiguity for such situations,<\/p>\n