{"id":4873,"date":"2023-06-28T10:24:37","date_gmt":"2023-06-28T10:24:37","guid":{"rendered":"https:\/\/locaterisk.com\/?p=4873"},"modified":"2025-08-08T07:25:55","modified_gmt":"2025-08-08T07:25:55","slug":"mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/fr\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","title":{"rendered":"Priorit\u00e9 d'encouragement : Analyse de l'\u00e9tat actuel de la s\u00e9curit\u00e9 informatique"},"content":{"rendered":"<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Retour au blog                <a href=\"https:\/\/locaterisk.com\/fr\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">La Rh\u00e9nanie-du-Nord-Westphalie encourage l'analyse de l'\u00e9tat actuel de la s\u00e9curit\u00e9 informatique dans les PME<\/h1>\r\n            <p class=\"paragraph\"><br>La Rh\u00e9nanie-du-Nord-Westphalie subventionne les mesures pr\u00e9ventives en mati\u00e8re de s\u00e9curit\u00e9 informatique. Le programme de soutien <a href=\"https:\/\/www.mittelstand-innovativ-digital.nrw\/\" target=\"_blank\" rel=\"noreferrer noopener\">S\u00e9curit\u00e9 num\u00e9rique MID<\/a> vise \u00e0 renforcer les PME dans le domaine de la cybers\u00e9curit\u00e9. Les entreprises peuvent faire financer des journ\u00e9es de maintenance, des certifications, des formations de sensibilisation, des s\u00e9minaires ainsi que des mesures pr\u00e9ventives telles que des scans de vuln\u00e9rabilit\u00e9 et des analyses de risques informatiques, etc. Cette initiative repr\u00e9sente une opportunit\u00e9 pr\u00e9cieuse, en particulier pour les petites et moyennes entreprises, de se pr\u00e9munir contre les cyberattaques et de renforcer leur s\u00e9curit\u00e9 num\u00e9rique.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-1024x1024.png\" alt=\"NRW f\u00f6rdert Analyse des Ist-Zustandes der IT-Sicherheit\" class=\"wp-image-4886\" style=\"width:-528px;height:-528px\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-1024x1024.png 1024w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-300x300.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-150x150.png 150w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-768x767.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie-12x12.png 12w, https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">NRW Promotion de la s\u00e9curit\u00e9 num\u00e9rique MID depuis le 1er mai 2023<br><\/h3>\n\n\n\n<p>Le programme de soutien a \u00e9t\u00e9 lanc\u00e9 par le minist\u00e8re de l'\u00c9conomie, de l'Industrie, de la Protection du climat et de l'\u00c9nergie du Land de Rh\u00e9nanie-du-Nord-Westphalie le 1er mai 2023. Il encourage les mesures qui am\u00e9liorent la s\u00e9curit\u00e9 num\u00e9rique de votre entreprise. Il s'agit notamment de tests visant \u00e0 identifier et \u00e0 combler les failles de s\u00e9curit\u00e9, de formations et de certifications pour les employ\u00e9s, ainsi que de l'installation et de la maintenance de mesures de protection informatique de base telles que des antivirus et des pare-feu.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conditions pr\u00e9alables \u00e0 la demande de subvention MID-S\u00e9curit\u00e9 num\u00e9rique<\/h3>\n\n\n\n<p>La prime d'encouragement d\u00e9pend de la taille de l'entreprise. Le montant de la subvention est de 4.000 euros \u00e0 15.000 euros maximum. Les entreprises peuvent choisir une p\u00e9riode de mise en \u0153uvre de douze semaines afin d'acc\u00e9l\u00e9rer la mise en \u0153uvre des mesures de s\u00e9curit\u00e9 num\u00e9rique.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Le site principal de l'entreprise concern\u00e9e doit \u00eatre situ\u00e9 en Rh\u00e9nanie-du-Nord-Westphalie.<\/li>\n\n\n\n<li>Moins de 250 employ\u00e9s \u00e0 temps plein.<\/li>\n\n\n\n<li>Chiffre d'affaires annuel de 50 millions d'euros maximum ou total du bilan de 43 millions d'euros maximum.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Domaines prioritaires de la promotion : R\u00e9alisation d'une analyse de l'\u00e9tat actuel de la s\u00e9curit\u00e9 informatique<\/h3>\n\n\n\n<p><strong>Quel est le niveau de s\u00e9curit\u00e9 de votre entreprise ? <\/strong><br>Les trois axes de soutien comprennent l'analyse de l'\u00e9tat actuel de votre s\u00e9curit\u00e9 num\u00e9rique dans l'entreprise ainsi que des mesures visant \u00e0 rem\u00e9dier aux points faibles identifi\u00e9s.<br><br> Les analyses de risques informatiques de LocateRisk permettent pr\u00e9cis\u00e9ment cela. La solution capture votre environnement informatique connect\u00e9 via Internet et \u00e9value les syst\u00e8mes en fonction de leur \u00e9tat de s\u00e9curit\u00e9. Le contr\u00f4le des risques est effectu\u00e9 dans huit cat\u00e9gories. Le r\u00e9sultat est consolid\u00e9 dans un score de s\u00e9curit\u00e9, pr\u00e9sent\u00e9 de mani\u00e8re compr\u00e9hensible sous forme d'aper\u00e7u de gestion et vous est expliqu\u00e9 lors d'un entretien personnel. Si vous le souhaitez, nous pouvons \u00e9galement vous mettre en contact avec des partenaires de services informatiques de notre r\u00e9seau.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Plus d'informations :<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.mittelstand-innovativ-digital.nrw\/mid-digitale-sicherheit\" target=\"_blank\" rel=\"noreferrer noopener\">S\u00e9curit\u00e9 num\u00e9rique MID<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.digital-sicher.nrw\/infomaterial\/foerdermoeglichkeiten\/foerdergeld-fuer-ihre-digitale-sicherheit#c2001\" target=\"_blank\" rel=\"noreferrer noopener\">Foire aux questions<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.mittelstand-innovativ-digital.nrw\/faq\/mid-digitale-sicherheit\" target=\"_blank\" rel=\"noreferrer noopener\">FAQ<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/antrag.mittelstand-innovativ-digital.nrw\/mid-digitale-sicherheit\" target=\"_blank\" rel=\"noreferrer noopener\">Portail de demande<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2>Demandez maintenant une D\u00e9mo en direct personelle<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Identifiez et r\u00e9duisez vos cyber-risques gr\u00e2ce \u00e0 un aper\u00e7u comparable et compr\u00e9hensible de votre s\u00e9curit\u00e9 informatique. Demandez conseil \u00e0 nos experts et d\u00e9couvrez comment LocateRisk peut vous aider \u00e0 r\u00e9soudre vos cyber-risques.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate data-trp-original-action=\"\">\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\" hidden>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Pr\u00e9nom\"\n\t\t\t\t\t\t\t\trequired\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nom\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"Courrier \u00e9lectronique\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"T\u00e9l\u00e9phone\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p class=\"translation-block\">Je suis d'accord avec la politique de confidentialit\u00e9<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demander une d\u00e9mo<\/button>\n\t\t\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"fr\"\/><\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>En savoir plus, r\u00e9server une d\u00e9mo ou simplement \u00e9changer quelques mots ? Nous nous en r\u00e9jouissons !<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Votre Contact<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">PDG<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Contactez-nous maintenant<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/fr\/\">Accueil<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/blog\/\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/about\/\">par rapport \u00e0 nous<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/kontakt\/\">Contact<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/impressum\/\">mentiones l\u00e9gales<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/datenschutz\/\">Confidentialit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">CONDITIONS G\u00c9N\u00c9RALES DE VENTE<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/fr\/jobs\/\">Carri\u00e8re<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">s\u00e9curit\u00e9<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Centre de confiance<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Le programme de la Rh\u00e9nanie-du-Nord-Westphalie \"MID-Digital Sicherheit\" subventionne des analyses IST qui vous permettent d'identifier et de combler les lacunes de s\u00e9curit\u00e9 dans votre entreprise.<\/p>","protected":false},"author":8,"featured_media":4886,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[4,50,49,48],"class_list":["post-4873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-it-sicherheit","tag-kmu","tag-mid-digitale-sicherheit","tag-nrw"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit - LocateRisk<\/title>\n<meta name=\"description\" content=\"Im Rahmen des Programms \u201eMID-Digitale Sicherheit\u201c f\u00f6rdert NRW die IST-Analyse Ihrer digitalen Sicherheit im Betrieb sowie Ma\u00dfnahmen, um die erkannten Schwachstellen zu beheben. Was sind die Voraussetzungen?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/fr\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Im Rahmen des Programms \u201eMID-Digitale Sicherheit\u201c f\u00f6rdert NRW die IST-Analyse Ihrer digitalen Sicherheit im Betrieb sowie Ma\u00dfnahmen, um die erkannten Schwachstellen zu beheben. Was sind die Voraussetzungen?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/fr\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T10:24:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T07:25:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1079\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kristina Breuer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristina Breuer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\"},\"author\":{\"name\":\"Kristina Breuer\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\"},\"headline\":\"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit\",\"datePublished\":\"2023-06-28T10:24:37+00:00\",\"dateModified\":\"2025-08-08T07:25:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\"},\"wordCount\":426,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/News4_shutterstock_1508286737-Kopie.png\",\"keywords\":[\"IT-Sicherheit\",\"KMU\",\"MID-Digitale Sicherheit\",\"NRW\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\",\"name\":\"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/News4_shutterstock_1508286737-Kopie.png\",\"datePublished\":\"2023-06-28T10:24:37+00:00\",\"dateModified\":\"2025-08-08T07:25:55+00:00\",\"description\":\"Im Rahmen des Programms \u201eMID-Digitale Sicherheit\u201c f\u00f6rdert NRW die IST-Analyse Ihrer digitalen Sicherheit im Betrieb sowie Ma\u00dfnahmen, um die erkannten Schwachstellen zu beheben. Was sind die Voraussetzungen?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/News4_shutterstock_1508286737-Kopie.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/News4_shutterstock_1508286737-Kopie.png\",\"width\":1080,\"height\":1079,\"caption\":\"NRW f\u00f6rdert Analyse des Ist-Zustandes der IT-Sicherheit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/21e5a12d84c0f342634386c0ab61710d\",\"name\":\"Kristina Breuer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g\",\"caption\":\"Kristina Breuer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Priorit\u00e9 d'encouragement : Analyse de l'\u00e9tat actuel de la s\u00e9curit\u00e9 informatique - LocateRisk","description":"Dans le cadre du programme \"MID-Digital Sicherheit\", la Rh\u00e9nanie-du-Nord-Westphalie subventionne l'analyse de l'\u00e9tat actuel de la s\u00e9curit\u00e9 num\u00e9rique de votre entreprise ainsi que des mesures visant \u00e0 rem\u00e9dier aux points faibles identifi\u00e9s. Quelles sont les conditions pr\u00e9alables ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/fr\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","og_locale":"fr_FR","og_type":"article","og_title":"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit - LocateRisk","og_description":"Im Rahmen des Programms \u201eMID-Digitale Sicherheit\u201c f\u00f6rdert NRW die IST-Analyse Ihrer digitalen Sicherheit im Betrieb sowie Ma\u00dfnahmen, um die erkannten Schwachstellen zu beheben. Was sind die Voraussetzungen?","og_url":"https:\/\/locaterisk.com\/fr\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","og_site_name":"LocateRisk","article_published_time":"2023-06-28T10:24:37+00:00","article_modified_time":"2025-08-08T07:25:55+00:00","og_image":[{"width":1080,"height":1079,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","type":"image\/png"}],"author":"Kristina Breuer","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Kristina Breuer","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/"},"author":{"name":"Kristina Breuer","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d"},"headline":"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit","datePublished":"2023-06-28T10:24:37+00:00","dateModified":"2025-08-08T07:25:55+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/"},"wordCount":426,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","keywords":["IT-Sicherheit","KMU","MID-Digitale Sicherheit","NRW"],"articleSection":["Blog post"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","url":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/","name":"Priorit\u00e9 d'encouragement : Analyse de l'\u00e9tat actuel de la s\u00e9curit\u00e9 informatique - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","datePublished":"2023-06-28T10:24:37+00:00","dateModified":"2025-08-08T07:25:55+00:00","description":"Dans le cadre du programme \"MID-Digital Sicherheit\", la Rh\u00e9nanie-du-Nord-Westphalie subventionne l'analyse de l'\u00e9tat actuel de la s\u00e9curit\u00e9 num\u00e9rique de votre entreprise ainsi que des mesures visant \u00e0 rem\u00e9dier aux points faibles identifi\u00e9s. Quelles sont les conditions pr\u00e9alables ?","breadcrumb":{"@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2023\/06\/News4_shutterstock_1508286737-Kopie.png","width":1080,"height":1079,"caption":"NRW f\u00f6rdert Analyse des Ist-Zustandes der IT-Sicherheit"},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/mid-digitale-sicherheit-foerderschwerpunkt-analyse-des-ist-zustandes-der-it-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"F\u00f6rderschwerpunkt: Analyse des Ist-Zustandes der IT-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"Mesurer et comparer la s\u00e9curit\u00e9 informatique","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/21e5a12d84c0f342634386c0ab61710d","name":"Kristina Breuer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a648236f7b10a01aa9df8b4eb163c9868927150ca83c0f6462b6151fbbe1fe5?s=96&d=mm&r=g","caption":"Kristina Breuer"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/4873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/comments?post=4873"}],"version-history":[{"count":22,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/4873\/revisions"}],"predecessor-version":[{"id":6302,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/posts\/4873\/revisions\/6302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media\/4886"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/media?parent=4873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/categories?post=4873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/fr\/wp-json\/wp\/v2\/tags?post=4873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}