{"id":4873,"date":"2023-06-28T10:24:37","date_gmt":"2023-06-28T10:24:37","guid":{"rendered":"https:\/\/locaterisk.com\/?p=4873"},"modified":"2025-08-08T07:25:55","modified_gmt":"2025-08-08T07:25:55","slug":"mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","title":{"rendered":"Funding Priority: Analysis of the Current State of IT Security"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">NRW Promotes Analysis of the Current State of IT Security in SMEs<\/h1>\r\n            <p class=\"paragraph\"><br>North Rhine-Westphalia subsidizes preventive IT security measures. The funding program <a href=\"https:\/\/www.mittelstand-innovativ-digital.nrw\/\" target=\"_blank\" rel=\"noreferrer noopener\">MID Digital Safety<\/a> aims to strengthen SMEs in the area of cybersecurity. Companies can have maintenance days, certifications, awareness training, seminars and preventive measures such as vulnerability scans and IT risk analyses etc. funded. The initiative is a valuable opportunity for small and medium-sized enterprises in particular to arm themselves against cyber attacks and strengthen their digital security.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-1024x1024.png\" alt=\"NRW f\u00f6rdert Analyse des Ist-Zustandes der IT-Sicherheit\" class=\"wp-image-4886\" style=\"width:-528px;height:-528px\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-1024x1024.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-300x300.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-150x150.png 150w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-768x767.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-12x12.png 12w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">NRW MID digital security funding since May 1, 2023<br><\/h3>\n\n\n\n<p>The funding program was launched by the Ministry of Economic Affairs, Industry, Climate Protection and Energy of the State of North Rhine-Westphalia on May 1, 2023. It promotes measures that improve your company's digital security. These include tests to identify and close security gaps, training and certification for employees, and the installation and maintenance of basic IT protection measures such as antivirus programs and firewalls.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Requirements for applying for MID Digital Security funding<\/h3>\n\n\n\n<p>The funding bonus depends on the size of the company. The funding amount is between 4,000 euros and a maximum of 15,000 euros. Companies can choose an implementation period of twelve weeks to implement the digital security measures more quickly.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The main location of the company in question must be in North Rhine-Westphalia.<\/li>\n\n\n\n<li>Less than 250 full-time employees.<\/li>\n\n\n\n<li>Annual sales of max. 50 million euros or balance sheet total of max. 43 million euros.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Funding priorities: Conducting an analysis of the current state of IT security.<\/h3>\n\n\n\n<p><strong>How secure is your company? <\/strong><br>The three funding priorities include the ACTUAL analysis of your digital security in the company as well as measures to remedy the identified weaknesses.<br><br> IT risk analysis from LocateRisk enables you to do just that. The solution captures your Internet-connected IT environment and assesses systems for their security status. The risk check is carried out in eight categories. The result is consolidated in a security score, presented in a comprehensible management overview and explained to you in a personal meeting. If you wish, we can also put you in touch with IT service partners from our network.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More info:<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.mittelstand-innovativ-digital.nrw\/mid-digitale-sicherheit\" target=\"_blank\" rel=\"noreferrer noopener\">MID Digital Safety<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.digital-sicher.nrw\/infomaterial\/foerdermoeglichkeiten\/foerdergeld-fuer-ihre-digitale-sicherheit#c2001\" target=\"_blank\" rel=\"noreferrer noopener\">Frequently asked questions<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.mittelstand-innovativ-digital.nrw\/faq\/mid-digitale-sicherheit\" target=\"_blank\" rel=\"noreferrer noopener\">FAQ<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/antrag.mittelstand-innovativ-digital.nrw\/mid-digitale-sicherheit\" target=\"_blank\" rel=\"noreferrer noopener\">Application portal<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The NRW program \"MID-Digitale Sicherheit\" (MID Digital Security) subsidizes IST analyses that enable you to identify and close security gaps in your company.<\/p>","protected":false},"author":8,"featured_media":4886,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[4,50,49,48],"class_list":["post-4873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-it-sicherheit","tag-kmu","tag-mid-digitale-sicherheit","tag-nrw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit - LocateRisk<\/title>\n<meta name=\"description\" content=\"Im Rahmen des Programms \u201eMID-Digitale Sicherheit\u201c f\u00f6rdert NRW die IST-Analyse Ihrer digitalen Sicherheit im Betrieb sowie Ma\u00dfnahmen, um die erkannten Schwachstellen zu beheben. Was sind die Voraussetzungen?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Im Rahmen des Programms \u201eMID-Digitale Sicherheit\u201c f\u00f6rdert NRW die IST-Analyse Ihrer digitalen Sicherheit im Betrieb sowie Ma\u00dfnahmen, um die erkannten Schwachstellen zu beheben. Was sind die Voraussetzungen?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T10:24:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:25:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1079\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit\",\"datePublished\":\"2023-06-28T10:24:37+00:00\",\"dateModified\":\"2025-08-08T07:25:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\"},\"wordCount\":426,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/News4_shutterstock_1508286737-Kopie.png\",\"keywords\":[\"IT-Sicherheit\",\"KMU\",\"MID-Digitale Sicherheit\",\"NRW\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\",\"name\":\"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/News4_shutterstock_1508286737-Kopie.png\",\"datePublished\":\"2023-06-28T10:24:37+00:00\",\"dateModified\":\"2025-08-08T07:25:55+00:00\",\"description\":\"Im Rahmen des Programms \u201eMID-Digitale Sicherheit\u201c f\u00f6rdert NRW die IST-Analyse Ihrer digitalen Sicherheit im Betrieb sowie Ma\u00dfnahmen, um die erkannten Schwachstellen zu beheben. Was sind die Voraussetzungen?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/News4_shutterstock_1508286737-Kopie.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/News4_shutterstock_1508286737-Kopie.png\",\"width\":1080,\"height\":1079,\"caption\":\"NRW f\u00f6rdert Analyse des Ist-Zustandes der IT-Sicherheit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Funding priority: Analysis of the current state of IT security - LocateRisk","description":"As part of the \"MID-Digitale Sicherheit\" (MID-Digital Security) program, NRW promotes the analysis of your company's current digital security and measures to eliminate the identified weaknesses. What are the requirements?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","og_locale":"en_US","og_type":"article","og_title":"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit - LocateRisk","og_description":"Im Rahmen des Programms \u201eMID-Digitale Sicherheit\u201c f\u00f6rdert NRW die IST-Analyse Ihrer digitalen Sicherheit im Betrieb sowie Ma\u00dfnahmen, um die erkannten Schwachstellen zu beheben. Was sind die Voraussetzungen?","og_url":"https:\/\/locaterisk.com\/en\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","og_site_name":"LocateRisk","article_published_time":"2023-06-28T10:24:37+00:00","article_modified_time":"2025-08-08T07:25:55+00:00","og_image":[{"width":1080,"height":1079,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristina Breuer","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit","datePublished":"2023-06-28T10:24:37+00:00","dateModified":"2025-08-08T07:25:55+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/"},"wordCount":426,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","keywords":["IT-Sicherheit","KMU","MID-Digitale Sicherheit","NRW"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","url":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","name":"Funding priority: Analysis of the current state of IT security - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","datePublished":"2023-06-28T10:24:37+00:00","dateModified":"2025-08-08T07:25:55+00:00","description":"As part of the \"MID-Digitale Sicherheit\" (MID-Digital Security) program, NRW promotes the analysis of your company's current digital security and measures to eliminate the identified weaknesses. What are the requirements?","breadcrumb":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","width":1080,"height":1079,"caption":"NRW f\u00f6rdert Analyse des Ist-Zustandes der IT-Sicherheit"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=4873"}],"version-history":[{"count":22,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4873\/revisions"}],"predecessor-version":[{"id":6302,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/4873\/revisions\/6302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/4886"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=4873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=4873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=4873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}