{"version":"1.0","provider_name":"LocateRisk","provider_url":"https:\/\/locaterisk.com\/en","title":"Cybersecurity Compliance - LocateRisk","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"LSSnKjy8rS\"><a href=\"https:\/\/locaterisk.com\/en\/landing\/cybersecurity-compliance-mapping\/\">Cybersecurity compliance<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/locaterisk.com\/en\/landing\/cybersecurity-compliance-mapping\/embed\/#?secret=LSSnKjy8rS\" width=\"600\" height=\"338\" title=\"&quot;Cybersecurity Compliance&quot; - LocateRisk\" data-secret=\"LSSnKjy8rS\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","description":"Wie erfasst man den Cybersecurity Compliance Status kontinuierlich und messbar? Mit einem automatisierten Compliance Mapping, das identifizierte Schwachstellen mit einer Vielzahl von Standards, darunter NIS2, TISAX, ISO 27001 oder BSI IT-Grundschutz uvm. abgleicht. KI-gest\u00fctzt \u00b7 Audit-ready \u00b7 Jederzeit nachweisbar!","thumbnail_url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Compliance-Mapping-Website-Hero-2.png"}