{"id":7704,"date":"2026-03-24T09:00:52","date_gmt":"2026-03-24T09:00:52","guid":{"rendered":"https:\/\/locaterisk.com\/?p=7704"},"modified":"2026-03-25T07:47:41","modified_gmt":"2026-03-25T07:47:41","slug":"it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/en\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","title":{"rendered":"Lukas Baumann in the CIO Views Magazine Portrait"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to Blog                <a href=\"https:\/\/locaterisk.com\/en\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Making the invisible visible - CIO Views Magazine has portrayed LocateRisk's journey.<\/h1>\r\n            <p class=\"paragraph\"><br>Cyber threats rarely announce themselves. They often linger silently within overlooked vulnerabilities, exposed systems or forgotten digital assets until they are identified. For Lukas Baumann, CEO of LocateRisk, this lack of visibility is one of the biggest security risks facing modern businesses. In the recent feature in <strong><a href=\"https:\/\/cioviews.com\/lukas-baumann-making-the-invisible-risks-of-the-digital-world-visible\/\" target=\"_blank\" rel=\"noreferrer noopener\">CIO Views<\/a><\/strong> he explains why proactive action and technical facts must form the basis for resilient cybersecurity.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas.png\" alt=\"\" class=\"wp-image-7795\" style=\"object-fit:cover;width:842px;height:auto\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas.png 960w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-300x169.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-768x432.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-18x10.png 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><figcaption class=\"wp-element-caption\">CEO of LocateRisk Lukas Baumann and his team<\/figcaption><\/figure><\/div>\n\n\n<p>Traditional security approaches often focus on internal controls and compliance. However, this often neglects what the company's own infrastructure looks like from the perspective of an external attacker. Lukas Baumann pursues the goal of making these hidden risks measurable and minimizing risks preventively. Automation and scalability turn cybersecurity from a reactive to a proactive process.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>EASM: Controlling external attack surfaces through automation<\/strong><\/strong><\/h3>\n\n\n\n<p> The lack of overview of one's own attack surface is one of the central weak points in many organizations. LocateRisk makes it easy to assess and monitor your own external IT infrastructure with continuous IT risk monitoring.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automation:<\/strong>Recurring audits provide a continuous picture of digital exposure.<\/li>\n\n\n\n<li><strong>Precision:<\/strong>Instead of theoretical models, the focus is on technical facts.<\/li>\n\n\n\n<li><strong>Scalability:<\/strong>The solutions work across all industries for organizations of all sizes.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Efficiency: Time Savings through AI-powered Workflows<\/strong><\/strong><\/h3>\n\n\n\n<p> In cybersecurity, speed is a decisive factor in limiting or preventing damage. LocateRisk uses technology to accelerate decision-making processes.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AI integration:<\/strong>Artificial intelligence will be firmly integrated into daily processes until it becomes standard.<\/li>\n\n\n\n<li><strong>Relief:<\/strong>Automated analyses help teams to process information faster without overwhelming them.<\/li>\n\n\n\n<li><strong>Process orientation:<\/strong>Expertise is directly integrated into processes and not dependent on individual people.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Vendor risk management: security across the entire partner ecosystem<\/strong><\/strong><\/h3>\n\n\n\n<p>A company's security does not end at the boundaries of its own network, but also includes business partners and suppliers.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Third-party monitoring:<\/strong>Continuous insight into the security situation of suppliers reduces the risk through the supply chain.<\/li>\n\n\n\n<li><strong>Action orientation<\/strong>: Tools are provided to directly address identified vulnerabilities. \u2192 More about the <a href=\"https:\/\/locaterisk.com\/en\/landing\/vendor-risk-management-leicht-gemacht\/\" type=\"link\" id=\"https:\/\/www.locaterisk.com\/de\/easm\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vendor Risk Management - VRM<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Standardization meets concrete recommendations for action<\/strong><\/h3>\n\n\n\n<p>The individual analysis of IT security is only a snapshot. Lukas Baumann emphasizes that only continuous monitoring and the elimination of any deficiencies found will bring measurable security gains.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Standardization:<\/strong>The aim is to establish a standard for security ratings.<\/li>\n\n\n\n<li><strong>Focus on results:<\/strong>The platform filters out irrelevant information and provides concrete approaches for solving problems. \u2192 Learn more about<a href=\"https:\/\/www.google.com\/search?q=https:\/\/www.locaterisk.com\/de\/it-risikomanagement\/\"> <\/a><a href=\"https:\/\/locaterisk.com\/en\/landing\/it-risikoanalyse\/\" type=\"link\" id=\"https:\/\/www.locaterisk.com\/de\/it-risikomanagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">the IT risk analysis and monitoring of LocateRisk<\/a><\/li>\n<\/ul>\n\n\n\n<p><span style=\"display:inline-flex; align-items:center;\"><br><img decoding=\"async\" class=\"wp-image-6345\" style=\"width: 150px; margin-right: 12px;\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Award-Logo-CIO-Views.png\" alt=\"\"><br>    <span style=\"display:inline-block;\"><strong>Link to the article in CIO Views<\/strong><br><a href=\"https:\/\/cioviews.com\/lukas-baumann-making-the-invisible-risks-of-the-digital-world-visible\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lukas Baumann: Making the Invisible Risks of the Digital World Visible<\/a><br>    <\/span><br>  <\/span><\/p>\n\n\n\n<div class=\"wp-block-lr-faq-module\"><div class=\"content\"><h3><strong>Technical FAQ: <strong>External Attack Surface Management<\/strong><\/strong><\/h3><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Why is the external view of IT security crucial?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Internal controls often fail to capture what the infrastructure looks like to attackers. An external analysis uncovers exposed assets and forgotten systems that pose a security risk.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>How does automation improve cybersecurity processes?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Automation enables scalable and recurring analyses that respond to changes faster than manual audits. This takes the pressure off teams and ensures that expertise is applied consistently.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>What role does AI play in accelerating the IT security process?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Thanks to MCP-\ud835\udde6\ud835\uddf0\ud835\uddf5\ud835\uddfb\ud835\uddf6\ud835\ude01\ud835\ude01\ud835\ude00\ud835\ude01\ud835\uddf2\ud835\uddf9\ud835\uddf9\ud835\uddf2 (Model Context Protocol), companies can access the analysis data and filter functions in the platform via their preferred AI models. This minimizes the time between detection and remediation.<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Request your personal Live-Demo now<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identify and reduce your cyber risks through a comparable and understandable overview of your IT security. Let our experts advise you and find out how LocateRisk can help you solve your cyber risks.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"first name\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"last name\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Email\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">I agree with the <a href=\"https:\/\/locaterisk.com\/en\/datenschutz\/\" target=\"_self\">privacy policy<\/a>.<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Request a Demo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Want to find out more, book a demo or simply exchange ideas? We look forward to hearing from you!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Your personal consultant<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Get in Touch Now<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/en\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/about\/\">About Us<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/impressum\/\">Legal Notice<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/datenschutz\/\">Privacy<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/gtc.pdf\">General Terms and Conditions<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/en\/jobs\/\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Making the invisible visible - that's what drives us at LocateRisk GmbH. Lukas Baumann in the CIO Views Magazine Portrait.<\/p>","protected":false},"author":17,"featured_media":7870,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[95,103,94,18,92,97,98,91,100,4,8,88,44,69,93,102,89,90,96,99,101],"class_list":["post-7704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-automatisierter-scan-vergleich-it-sicherheit","tag-cio-views","tag-cyber-vendor-risk-management","tag-cybersecurity","tag-easm","tag-easm-tool-mit-mcp-support","tag-effizienzsteigerung-it-security-analyst","tag-external-attack-surface-management","tag-it-risikoanalyse","tag-it-sicherheit","tag-it-sicherheitsanalysen","tag-ki-native-sicherheitsanalyse","tag-lieferanten-risikomanagement","tag-lieferantenbewertung","tag-locaterisk","tag-lukas-baumann","tag-mcp-schnittstelle","tag-model-context-protocol","tag-sicherheits-reporting-automatisieren-ki","tag-supply-chain-risk-management-nis-2","tag-vendor-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lukas Baumann im CIO Views Magazine Portrait - LocateRisk<\/title>\n<meta name=\"description\" content=\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/en\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/en\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-24T09:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T07:47:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png\" \/>\n\t<meta property=\"og:image:width\" content=\"635\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"},\"author\":{\"name\":\"Shaima Luc\u00eda El Qaouti\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\"},\"headline\":\"Lukas Baumann im CIO Views Magazine Portrait\",\"datePublished\":\"2026-03-24T09:00:52+00:00\",\"dateModified\":\"2026-03-25T07:47:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"},\"wordCount\":674,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"keywords\":[\"Automatisierter Scan-Vergleich IT-Sicherheit\",\"CIO Views\",\"Cyber Vendor Risk Management\",\"Cybersecurity\",\"EASM\",\"EASM Tool mit MCP-Support\",\"Effizienzsteigerung IT-Security-Analyst\",\"External Attack Surface Management\",\"IT-Risikoanalyse\",\"IT-Sicherheit\",\"IT-Sicherheitsanalysen\",\"KI-native Sicherheitsanalyse\",\"Lieferanten-Risikomanagement\",\"Lieferantenbewertung\",\"LocateRisk\",\"Lukas Baumann\",\"MCP-Schnittstelle\",\"Model Context Protocol\",\"Sicherheits-Reporting automatisieren KI\",\"Supply Chain Risk Management NIS-2\",\"Vendor Risk Management\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\",\"name\":\"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"datePublished\":\"2026-03-24T09:00:52+00:00\",\"dateModified\":\"2026-03-25T07:47:41+00:00\",\"description\":\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"width\":635,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lukas Baumann im CIO Views Magazine Portrait\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\",\"name\":\"Shaima Luc\u00eda El Qaouti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"caption\":\"Shaima Luc\u00eda El Qaouti\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/en\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","og_locale":"en_US","og_type":"article","og_title":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","og_description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","og_url":"https:\/\/locaterisk.com\/en\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","og_site_name":"LocateRisk","article_published_time":"2026-03-24T09:00:52+00:00","article_modified_time":"2026-03-25T07:47:41+00:00","og_image":[{"width":635,"height":500,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","type":"image\/png"}],"author":"Shaima Luc\u00eda El Qaouti","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Shaima Luc\u00eda El Qaouti","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"},"author":{"name":"Shaima Luc\u00eda El Qaouti","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7"},"headline":"Lukas Baumann im CIO Views Magazine Portrait","datePublished":"2026-03-24T09:00:52+00:00","dateModified":"2026-03-25T07:47:41+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"},"wordCount":674,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","keywords":["Automatisierter Scan-Vergleich IT-Sicherheit","CIO Views","Cyber Vendor Risk Management","Cybersecurity","EASM","EASM Tool mit MCP-Support","Effizienzsteigerung IT-Security-Analyst","External Attack Surface Management","IT-Risikoanalyse","IT-Sicherheit","IT-Sicherheitsanalysen","KI-native Sicherheitsanalyse","Lieferanten-Risikomanagement","Lieferantenbewertung","LocateRisk","Lukas Baumann","MCP-Schnittstelle","Model Context Protocol","Sicherheits-Reporting automatisieren KI","Supply Chain Risk Management NIS-2","Vendor Risk Management"],"articleSection":["Blog post"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","url":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","name":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","datePublished":"2026-03-24T09:00:52+00:00","dateModified":"2026-03-25T07:47:41+00:00","description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","width":635,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Lukas Baumann im CIO Views Magazine Portrait"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Measure and compare IT security","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7","name":"Shaima Luc\u00eda El Qaouti","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","caption":"Shaima Luc\u00eda El Qaouti"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/7704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/comments?post=7704"}],"version-history":[{"count":51,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/7704\/revisions"}],"predecessor-version":[{"id":7869,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/posts\/7704\/revisions\/7869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media\/7870"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/media?parent=7704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/categories?post=7704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/en\/wp-json\/wp\/v2\/tags?post=7704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}