{"version":"1.0","provider_name":"LocateRisk","provider_url":"https:\/\/locaterisk.com\/fr","title":"Cybersecurity Compliance - LocateRisk","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"rKQ5m2g6d4\"><a href=\"https:\/\/locaterisk.com\/fr\/landing\/cybersecurity-compliance-mapping\/\">Conformit\u00e9 en mati\u00e8re de cybers\u00e9curit\u00e9<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/locaterisk.com\/fr\/landing\/cybersecurity-compliance-mapping\/embed\/#?secret=rKQ5m2g6d4\" width=\"600\" height=\"338\" title=\"&quot; Conformit\u00e9 en mati\u00e8re de cybers\u00e9curit\u00e9 &quot; - LocateRisk\" data-secret=\"rKQ5m2g6d4\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","description":"Wie erfasst man den Cybersecurity Compliance Status kontinuierlich und messbar? Mit einem automatisierten Compliance Mapping, das identifizierte Schwachstellen mit einer Vielzahl von Standards, darunter NIS2, TISAX, ISO 27001 oder BSI IT-Grundschutz uvm. abgleicht. KI-gest\u00fctzt \u00b7 Audit-ready \u00b7 Jederzeit nachweisbar!","thumbnail_url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Compliance-Mapping-Website-Hero-2.png"}